In order to enable an iCal export link, your account needs to have an API key created. This key enables other applications to access data from within Indico even when you are neither using nor logged into the Indico system yourself with the link provided. Once created, you can manage your key at any time by going to 'My Profile' and looking under the tab entitled 'HTTP API'. Further information about HTTP API keys can be found in the Indico documentation.
Additionally to having an API key associated with your account, exporting private event information requires the usage of a persistent signature. This enables API URLs which do not expire after a few minutes so while the setting is active, anyone in possession of the link provided can access the information. Due to this, it is extremely important that you keep these links private and for your use only. If you think someone else may have acquired access to a link using this key in the future, you must immediately create a new key pair on the 'My Profile' page under the 'HTTP API' and update the iCalendar links afterwards.
Permanent link for public information only:
Permanent link for all public and protected information:
The primary goal of this presentation is to show how to design a scalable application within Oracle that performs and how to easily create an APEX GUI accessing data in that application. We will start with schema design that allows storing the data in a way that is efficient, scalable and makes those data easily retrievable. In that part focus will be put on ER model
and best practices in schema design. Later we will explain in detail the SQL statements processing, with a number of tips/and tricks. We will talk about building a robust application using privileges, different connection types and number of other features. In the last part a small APEX application will be created using the designed data structure.
During Database Security presentation we will focus on Oracle Database security from developers point of view. We'll cover few topics, i.e. users, roles and privileges, encryption and SQL injection attacks.
Database and Application Design1h
Katarzyna Maria Dziedziniewicz-Wojcik