Look back at the early / mid 1990's and if there was one paradigm
that would rule the world after that, it was the everything would
Object Oriented after that. I was pro-OO as a general idea also,
and still am, but I believe that there are still stuff to solve.
But hey, that wasn't the early 1990's, everything OO was
supposedly good. SQL with OO extensions (remember the ORDBMS
ideas? I still have Stonebreakers book, and it's worth reading,
but nothing much came out of it).
I think there are a whole bunch of reasons why OO didn't end up
being as important as it was foreseen to be back then (it's still
important and widely used, I know that, but if you were there in
the early 1990's OO rage, you could even go to the bathroom or
have a beer without creating an object, and as we realize, after
a few of those "Beer objects" it turns more and more difficult to
create them), and you could go to a bar and chat a lady up
without getting …
Sometimes we have to add new reserved words along with new features. This can cause irritation. For example, if you have a table named NONE and we make NONE a reserved word, you have to start using backticks or change the name. Beware particularly of these words that might someday become reserved according to one worklog task or another.
ARRAY ASYMMETRIC AUDIT BOOLEAN CIDR CONNECT CUBE CURRENT CURRENT_CATALOG CURRENT_PATH CURRENT_ROLE CYCLE DEFAULT DENSE_RANK EXCEPT FOR GET GLOBAL INET INTERSECT LOCAL MACADDR MERGE NEW NONE OLD OVER PARTITION RANK RESIGNAL ROWNUM ROW_NUMBER ROWS SESSION_USER SIGNAL START SOME SYMMETRIC SYSTEM_USER TRUNC UNKNOWN WINDOW
For an old list that includes reserved words in other DBMSs, check the end of an article I wrote several years ago for DBAzine, SQL Naming Conventions.
…
[Read more]As Brian mentioned, a number of us traveled up to Seattle last week to discuss the road map for Drizzle, Gearman, and memcached. Thanks to everyone who was able to make it! It was great to see folks again (Northscale guys, Robert Hodges, Padraig), and meet a couple new people like Nathan, one of the Google Summer of Code students for Drizzle. I thought I’d take a moment to mention some of the discussions related to the tasks I’m working on.
For Drizzle, we talked about the new configuration and plugin system I’ve been digging into lately. Monty Taylor has been doing a great job refactoring the plugin loading, but there are still some steps to be taken to get things where we want. One of the big goals with all this is to have the plugin and config system not specific to Drizzle at all so we can use this in other projects as well (one being Gearman). There are a bunch …
[Read more]The latest version is available for download. Big changes include a debug log file view tab, redesigned system management screen, authentication ACL fixes, host state fixes for server-loop, AJAX’d user/host/client pages, data grids for all pertinent tables, and a fix for the slate theme submit button. If you are running an older version of Kontrollbase I would highly recommend upgrading. I’ll be adding an “upgrade” page to the documentation today for just that purpose. Download the new release here: http://kontrollsoft.com/software-downloads
We decided that the simplest way for people to experience the new version of Kontrollbase was to setup an online, fully functional demo. Now you don’t have to download and install the application to see what it offers to your database environment. The application is free, the demo is free, check it out now: http://kontrollsoft.com/software-kontrollbase#demo – while you’re there be sure to check out the comparison between Kontrollbase and other MySQL monitoring applications.
My concept of a home server system has evolved over time.
I got in to a home network early on, long before I had broadband
internet or even a modem connection shared via a proxy server.
The purpose was sharing files and printers, playing the
occasional networked game. The network was peer to peer.
I originally decided that I needed a server right after I lost a
hard disk on my home computer system containing irreplaceable
information, and decided right then that one fatal hard disk
crash was too many, and I needed to be fault-tolerant in the
future. My initial implementation of a server was with the
oldest, slowest system that I had, a 486 with 20 meg of ram, to
which I attached a SCSI disk farm featuring three 6 gig hard
drives made into a RAID-5 array. Windows NT Server 4.0 was my
choice of operating system, influenced in no small way by similar
systems I was working with professionally. This served me well
for quite …
Recently Mark Callaghan(who I trust a lot) published on his facebook blog a post about a Doublewrite Buffer impact . And Sarah Sproehnle (who I trust a lot too :-)) commented it by saying:
..the doublewrite buffer is actually a benefit. Beyond guaranteeing that pages are recoverable, it also reduces the required fsyncs. Without it, each page that is written to the tablespace would need to be fsync'ed. With doublewrite enabled, a chunk of pages is written to the doublewrite buffer then 1 fsync is called, then pages are written to the tablespace and then 1 fsync...
While I'm completely agree with Mark that we absolutely need a recovery …
[Read more]This was accidently posted to the MySQL blog site. The full article on Oracle Fusion middleware can be found at http://fusioninsidersedition.blogspot.com.
A couple of weeks ago, at a MySQL study group in Tokyo I
presented about various kinds of MySQL hacking techniques, such
as debugging with MS Visual Studio or gdb, tracing with DTrace,
writing information schema plugins, accessing tables from UDF and
storage engine API, and extending MySQL server code itself. This
90-minute session went successful. Nearly 100 people attended,
including famous MySQL developers such as Kazuho Oku-san and
Kentoku Shiba-san, having productive discussions with attendees
and quite a lot of people seemed interested in MySQL hacking. The
slides are written in Japanese, but sample codes can be
understandable and can be downloaded here.
What audiences were most interested in was accessing MySQL tables
directly from Plugins(currently UDFs) and storage engine API. I
showed a sample …
Yesterday was a good vacation day at my sister's house. As usual
with me, I don't seem able to have a completely computer-free
day. I did some work tasks, and then turned my attention to my
sister's network problems. She has a Mac, which is wired, and
several Windows laptops. The windows laptops weren't able to
connect to the Verizon-supplied DSL modem and router in-one. It
was set up for WEP (64-bit). I tried numerous times to get the
windows laptops working and found finally that that using 128-bit
encryption WEP solved the problem. Except for one computer. It
was an old Dell laptop with Windows. She wants this to be her
daughter's (my 11 year-old niece) computer. This laptop was
running extremely slow and could not connect to the Verizon
router, even when not encrypted. This particular laptop also uses
a PCI Linksys wireless card, so perhaps it's out of date enough
to not work with the Verizon router.
My sister asked me if I could …