Posts Categorized: MySQL
Welcome to the 156th edition of Log Buffer, the weekly review of database blogs.
Here are all the videos from the 2009 MySQL Conference and 2009 MySQL Camp:
At the May 2009 Boston MySQL User Group, Giuseppe Maxia of Sun Microsystems gave a presentation about MySQL 5.4 with use cases and benchmarks to show how it outperforms all other current MySQL releases (including the Google patches and the OurDelta/Percona releases). Links to the slides and video can be found here.
At the July MySQL User Group, Eric Day and Patrick Galbraith spoke about Drizzle, a lightweight, microkernel, open source database for high-performance scale-out applications, and Gearman, an open source, distributed job queuing system. Links to the slides and video can be found here.
This is the 155th edition of Log Buffer, the weekly review of database blogs.
I think many people truly realized how much they take the MySQL documentation for granted during the recent multi-hour outage from mysql.com’s data center. Apparently there is a lot of FUD floating around about the legality of mirroring the documentation…
OpenSQLCamp 2009 is happening “in parallel to the Free and Open Source Conference 2009 (FrOSCon) on Saturday 22nd and Sunday 23rd August in St. Augustin, Germany …. close to Bonn and Cologne.” I plan on being at FrOSCon and OpenSQLCamp. Where I go before and after that is up to *you*. Yes, that is right, perhaps I will visit a user group, such as France’s MySQL User Group. Or perhaps your company needs the type of services Pythian can offer — we can do the “traditional consulting” model where we look over your systems for performance tuning and security gains, or fix problems in an emergency
Welcome to the 154th edition of Log Buffer, the weekly review of database blogs. Let’s dive right in, shall we?
This blog post was inspired by a recent report of a Database Analyst at American Express stealing Credit Card data. It’s amazing how many companies still follow a mainly “perimeter security” approach when it comes to controlling access to sensitive information—their focus is on network security using firewalls, advanced authentication options, and so on. Even with such measures, it’s very common to setup strong barriers to the outside world but very little by way of internal limits; most internal people have some level of access to servers that store and process sensitive data.
This is the 153rd edition of Log Buffer, the weekly review of database blogs.