Oracle Announces Enterprise Manager 12c Update
The new release, officially titled Oracle Enterprise Manager 12c Release 4, delivers a host of new stack management and database management capabilities to the enterprises which use its product. Oracle states that the updated software can help businesses “become more agile and responsive, while reducing cost, complexity, and risk.”
One of the most wide-reaching elements included in the update is the Enterprise Manager's capability to automate tasks. It can now allow businesses to adopt database, middleware, and infrastructure services in their own private clouds by utilizing a set of core APIs available within the management program. Admins can provision services quickly with a few clicks of the mouse and clone data with the aim of testing such services.
Additionally, admins now have the power to detect data vulnerabilities from within their own code. Enterprise Manager makes this possible by providing a showback mechanism that relays data about running services that admins themselves have already provisioned.
The software now includes a performance warehouse that delivers predictive analytics about enterprises' databases and can therefore help them diagnose problems before they happen. To that end, Enterprise Manager syncs well with Oracle Database 12c and can handle system updates with ability to roll back any unwanted changes.
Admins can also take advantage of middleware by combining usage of Enterprise Manager with Oracle Fusion Middleware 12c. Together, the programs can provide a picture of diagnostics data that applies to IT workers in various disciplines across entire enterprises. Admins can use further automation procedures from within the software by provisioning service-oriented architectures (SOAs) at the touch of a button.
Finally, enterprise-grade management capabilities allow admins to assign private roles and credentials to Enterprise Manager users. From a single dashboard, admins can view a layout of users and their respective credentials. They can add and delete credentials and users at will and help protect the network as a whole with such fine-grained procedures.
Edited by Alisen Downey