Congratulations New Oracle ACE, Jeremy Schneider!

I’ll be the first to offer a large congratulations to Jeremy Schneider on being the most recent appointment to the Oracle ACE program. He certainly deserves it (I nominated him, so I suppose I would think so) and I continue to look for great things to come.

Jeremy is the main creator of the IOUG RAC Attack! event that was held for the first time back in August 2008. He (with help from others) will also be putting it on as a half-day session at Collaborate 09. It’s a University Seminar on Thursday morning. All hands-on, all RAC, all the time. I’m looking forward to the event (I’m volunteering as a staffer). You should sign up now before it’s full! I can almost guarantee you’ll learn something.

Besides his work on this hands on lab/class for RAC, Jeremy has many other community contributions. His blog is full of excellent technical bits that always seem to come from a significant amount of research. He contributes occasionally to the Oracle-L mailing list. He also contributed some code to OCFS (v1) several years ago, so you can guess he understands a thing or two about programming and Linux, too.

His ACE Profile isn’t posted yet, but look for it to arrive soon. In the meantime, read some of the good stuff he wrote on his blog and look for him (and me too) at Collaborate in early May!

Congratulations, Jeremy!

IOUG RAC Attack!, Event Summary

As one of the organizers of the IOUG RAC Attack! event, I may have a slightly partial viewpoint, but I think the event overall went very well. The hands-on lab was especially popular and I think participants in the hands-on lab all got to learn at least a few new things. If you’ve been to Oracle Education training classes like I have, you know how it seems like you sometimes have to spend 5 days in training to get 1.5 days’ worth of material. With the hands-on lab at RAC Attack!, we provided guided exercises to demonstrate certain features and/or processes, but the whole day was more like “structured playtime” than particular labs that had to be completed. Continue reading “IOUG RAC Attack!, Event Summary”