We presented two sessions at the conference, and we wanted to share the slides with you. The first one is called Proactive Operational Measures.
The second one is called 8 Simple Rules to Design Secure Applications.
Augusto and I promised that we would make the slides available online, so we’re sorry for the slight delay in getting them published. Enjoy!
Alas, I won’t be attending the conference but in reading the speaking schedules, I found several talks that I hope will be recorded and published later. Many are directly applicable to our customers and the work we do for them, some would tickle my inner geek and a few are super interesting for what they portend for the data management space.
Scale Up, Scale Out and HA – this is always a great topic. ever changing thanks to very creative administrators and developers solving real world problems.
Advanced Query Manipulation with MySQL Proxy - proxy has so many potential applications, i’d love to see what Kay is going to talk about.[Read more...]
I was working on a client’s server that was recently compromised. Interestingly the attacker had replaced the OpenSSH server with “trojan” binaries that accomplished two things:
This is bad enough, but it gets worse. The system had been compromised for a week before I began working on it. There is no telling how many other binaries were changed. I did find that the ssl certs had been modded. At this point there is no way that the current setup can be cleaned with any assurance that it is completely[Read more...]
It’s true! Currently MySQL Camp is set to happen, though I am still working out details with Colin Charles and Giuseppe Maxia. We had originally talked about having MySQL Camp on Tuesday and Wednesday, but I would like to add Monday so that folks attending the conference who are not attending a tutorial have a choice on Monday. I am also looking into lunch options, since the conference venue does not have many options within walking distance.
There will be plenty of[Read more...]
I have already blogged about this keynote at http://www.pythian.com/blogs/948/liveblogging-who-is-the-dick-on-my-site.
If you are interested in actually seeing the video, the 286 Mb .wmv file can be downloaded at http://technocation.org/videos/original/mysqlconf2008/2008_04_17_panelDick.wmv and played through your browser by clicking the “play” link at http://tinyurl.com/55c5ps. This is not to be missed!
The team just finished our second successful MySQL Con. Many thanks to Marten & Zack and all the folks at O’Reilly that put on such a great conference.
This year definitely had a different feel, and of course that had a lot to do with Sun’s influence. It felt like it was almost a new event, a chapter 2 for MySQL, and its ecosystem of vendors and customers. There were more people - I don’t know exact numbers, but it felt appeared to be twice as packed. The exhibit hall was the same, but we took up a bit more space than last year and certainly there were much fancier booths - ours included! We even gave away multiple prizes this year - our fun 8-ball tshirts, and a couple remote control helicopters. Scott Baird and Mike Hogan were the lucky winners this year.
The one[Read more...]
Jeff Rothschild of Facebook’s “A Match Made in Heaven? The Social Graph and the Database”
Taking a look at the social graph and what it means for the database.
The social graph:
“The social graph has transformed a seemingly simple application such as photos into something tremendously more powerful.” We’re interested about what people are saying about us, and about our friends. Social applications are compelling.
Facebook users blew through the estimate for 6 months of storage in 6 weeks. It is serving 250,000 photos per second at peak time, not[Read more...]
Identity 2.0: A world that’s simple, safe and secure.
Who is the Dick on My Site? by Dick Hardt (Sxip Identity Corporation)
“Really, data is about people. It’s really identity data.”
“Identity helps you predict behavior.”
“Identity is who you are.”
“Identity is also what you like.”
“Identity enables you to uniquely identify somebody.”
“There are things that other people say about you, too.”
“Modern identity is about photo IDs so you can prove your identity.”
“Identity is a complicated issue….Everyone has a different idea of what it is.”
Identity transactions are: