I've written a few times about database consistency before,
mainly in conjunction with NoSQL and the concept of Eventual
consistency. Now, I'm about to do an update on the subject, as I
have come to realize a few things.
From an oldtimer like myself, having been an SQL guy for 25
years, I remember Punk-rock and even The Beatles and I having
hair growing out of my ears, what can be contributed? Well, let
me beging with stating what I mean when I say Database
consistency. What I mean is Consistency as the C in ACID (no, we
aren't talking drugs here, we are talking databases). Let's see
what the online authorative reference work on just about anything
on this planet, from the size of J-Lo's feet to the number of
Atoms in the universe (those two numbers are quite far apart by
the way), Wikipedia: "The consistency property ensures that any
transaction will bring the database from one valid state to
another. Any data written to the database …
The release today of the MySQL for Database Administrators Training on Demand means you can now benefit from the MySQL for Database Administrators course lecture and lab exercises delivered by a top instructor from your own desk. With this On Demand offering you get all the classroom content online, available 24/7 and you can follow the course at your own pace.
In this cornerstone course of the MySQL Curriculum, you will learn how to secure users privileges, set resource limitations, access controls and describe backup and recovery basics. Students will also learn how to create and use stored procedures, triggers, views and more.
The Northern California Oracle Users Group (NoCOUG) just published an interview with me in their journal. It’s titled “A Whole New World of MySQL”. You can read it in the full journal (PDF), or on Iggy Fernandez’s blog. The full journal is well worth a read; there’s a lot of good information.
Thanks to Iggy for such a thought-provoking interview, and for inviting me to participate!
Further Reading:
[Read more]New feature provides significantly faster insight and root cause analysis
SAN JOSE, Calif., February, 15, 2012 – Monitis, the leading cloud and web application monitoring software provider, today announces that it has added comprehensive MySQL database monitoring to its award-winning Application Performance Management & Monitoring platform. The robust Software-as-a-Service (SaaS) tool enables users to gain significantly faster insight when conducting root cause analysis.
The MySQL monitoring feature includes 246 monitoring variables and more than 21 different metrics to provide one of the easiest to use, yet comprehensive database monitoring tools available. It was first introduced into the free Monitor.Us platform back in June last year and has seen the code battle hardened by many hundred free users over the last 8 months.
…
[Read more]Tuesday, 2/21/12 at 14:00 GMT/15:00 CET/9:00 ESTHigh availability is about more than making sure that apps can get to your data even if there is a failure.How about when you are upgrading your database schema? What if you need to add memory to a database server or reconfigure/restart MySQL? If your apps want to read data from a MySQL slave, how can you be sure they are not reading stale data
The Northern California Oracle Users Group (NoCOUG) just published an interview with me in their journal. It’s titled “A Whole New World of MySQL”. You can read it in the full journal (PDF), or on Iggy Fernandez’s blog. The full journal is well worth a read; there’s a lot of good information. Thanks to Iggy for such a thought-provoking interview, and for inviting me to participate!
Thanks, this is exactly what I was looking for
i can't help to think of austin powers when seeing one billion queries per minute
Default MySQL security sucks. There is no super user privilege protection, or tight filesystem security. What are the essentials for any initial MySQL installation? What is the minimum an Oracle DBA should understand and undertake for a neglected MySQL system? The MySQL privilege system provides several levels of data protection when implemented correctly, however this is rarely used. The most common user permission implementation creates several security and auditing risks? What are your MySQL user permissions, and how can developers exploit them? There are ways to secure communications within a MySQL topology, approaches to managing exposed public facing data collection via the BLACKHOLE storage engine, …
[Read more]Today at the RMOUG Training Days 2012 event I gave an introduction presentation on MySQL Security Essentials covering the following topics:
- MySQL Security defaults
- MySQL Security Improvements
- OS Security
- User Privileges
- Data Integrity
- Installation Practices
- Auditing Options
- Better Security
- Further References
Download slides for MySQL Security Essentials.