Where did August go??

What do you call a bear without any teeth?

A gummy bear!

September and Autumn and the new school year is nearly upon us. (Some of you will be doing a big sigh of relief at school holidays nearly being over!) August has been quiet blogwise, but we’ve managed to rustle you up a few anyway. Including how an APEX application can keep track of some rescued baby rabbits (see number 8!)


Blogs of the week

  1. Replace deprecated apex_util.string_to_table (APEX 5.1/18.1)

Dimitri Gielis starts his blog by saying, “Sometimes the Oracle APEX documentation announces some packages will become deprecated in a release. It’s not that those packages are suddenly gone, but you should not use them anymore. Your code will run fine still, but in the future, APEX might take it out completely, so it’s best to replace them with the new package.”

He concludes by writing, “I recommend with every new release of Oracle APEX to look for deprecated components and search for those and make notes to change those when needed.”

2. ADF BC REST Query and SQL Nesting Control Solution

Andrejus Baranovskis blogs about “expert mode View Object (with hand written SQL). This View Object is created based on SQL join. So, thats my use case for today’s example. I will describe issue related to generated SQL statement and give a hint how to solve it. This is in particular useful, if you want to expose complex VO (SQL with joins and calculating totals) over ADF BC REST service and then run queries against this REST resource.”

He links to code available in his GitHub

3. Oracle Jet – security by obfuscation – Do not use it

Johan Louwers asks, “Should you use obfuscation?
His personal opinion; no. Main reason for saying no is that it provides a false sense of security. It gives you the idea you are safe while someone who is determined will figure it out at one moment in time. There are better and more structural ways of doing things like preventing people from overly active scrape your website. However, if obfuscation is a part of a wider set of security implementations you should think about a very good way of doing obfuscation and not simply rely on a solution like substitution as it will take a very short amount of time for someone to figure out the substitution algorithm.

4. Essbase REST API – Part 4

Part 4 in the series.

John Goodwin says, “Just to recap, in the first part I provided an overview of the REST API, the second part was focused on application and database monitoring such as applications/database and properties, starting, stopping and deleting. In the last part I concentrated on management type tasks like managing substitution variables, filters and access permissions.

In this post I am going to cover scripts, listing, creating and editing.”

5. Critical #Weblogic flaw needs to be patched. #infosec #oracle

Robert Lockard shares this link and cites the affected versions as:,,, and

6. API Gateway SSL configuration in Production

Gaurav Gupta writes, “This blog provides steps to configure SSL certificate in Oracle API Gateway node’s trust store. It becomes necessary when API gateway in installed in “production” mode. Without SSL certificate you won’t able to deploy an API to gateway node, because in production mode gateway must communicate with APIP management tier over SSL. Another use-case is when backend service is SSL enabled. We will discuss both the scenarios in this blog.

1. Configure certificate in gateway node for SSL based communication with APIP management tier
2. Configure certificate in gateway node when API is consuming SSL enabled backend service.

7. Using DBCA in Silent Mode

Liron Amitzi writes, “One of my customers is a software company and they use Oracle database for their product. One of the things we need to do when they certify an Oracle version is to create silent installation scripts. These scripts are for Windows and used for demo and testing environments. I did that for 11.2 and for 12.1 and now it’s 12.2’s turn.

I don’t remember having this issue in the previous release, but in 12.2 I ran into a problem that is frustrating because I don’t understand why it behaves like this, it seems to me that something wrong with the design here.”

8. Using REST to access Oracle APEX Cloud data in R

John Keymer writes, “A while back I wrote a blog post on The Power of R, and I want to extend that a little now by looking at easy it is to source data from an APEX Cloud instance directly into a R program.

To give a bit of background on this, for the past few weeks I’ve been looking after 5 baby rabbits that were rescued by our friend who is a vet. We had to weigh them daily, and keep the vets updated with these weights, so I knocked up a very simple APEX application on apex.oracle.com which let me add weights on my mobile.”

See how the baby rabbits progressed here!

9. Debugging PL/SQL Code with Toad for Oracle

Clarisa Maman Orfali begins by saying, “In this article we will learn how Toad for Oracle can help us debug PL/SQL code in very simple ways, allowing us to go through the code a line at a time, view variable content, start or stop execution of code, step in or out of called PL/SQL routines (such as functions and other called procedures) and finally, change the contents of a variable during execution.”

10. Log more change, easier to process change

Peter Scott starts his blog, “This is part one of a two part blog that’s going to talk about bright shiny things like Oracle GoldenGate Big Data streaming my ERP system changes through Kafka to cloud (in this case an Oracle Cloud App).”

This week on Twitter

ODTUG shared A lookback to Orlando

Luc Bors tweeted OracleJetPizzaBot



Stories from www.thatjeffsmith.com  and www.apress.com

Videos such as:

Why be a vendor?

and Essbase @ISMBRWITHATTR Function