Posts Categorized: Pythian
This Log Buffer edition covers various tips, new releases, and technically rich blog posts from the worlds of Oracle, SQL Server and MySQL.
OakTable Network will be holding its OakTable World for the very first time during the COLLABORATE conference.
This year COLLABORATE 14 is being held at The Venetian and Sands Expo Center in Las Vegas, April 7-11. Some Pythian folks will be attending and speaking at the event, so be sure to watch for their presentations: Session Date Start Time Session Room Session Title Presenter Name April 9, 2014 8:30 AM Level 3,…
There are many posts out there about validating backup. However, none seem to address some recent concerns a client of mine had. Currently, backup validation is performed once a week and the question asked, “How to validate all archivelog backup?” List Backups – [D}atafile and [A]rchivelog backup from Incremental Level 0/1 RMAN> list backup summary;…
For some, blogging brings the same pleasure as laying under the swaying palms, where on the white sandy beaches the turquoise waters kiss their feet. This passion oozes into their posts, and this edition of Log Buffer is a manifestation of exactly that. Enjoy.
Musings about expressing dates using MMDD or DDMM.
The RMAN VALIDATE RECOVERY FILES command is a simple way to validate all backups, or so I thought.
In some versions it is broken, and in the versions where the bug has been fixed, it is even more broken.
This Log Buffer Editions encompasses the wide arena of Oracle, SQL Server, and MySQL databases and what bloggers are saying about them.
Have you ever seen an employee post negatively about their company using his or her real name? If not, then you are about to for the first time — you can count that as number 1 out of the 5 worst things about working at Pythian. There are several great reasons to work at Pythian, but…
When we talk about logical corruption, there are two different failure states that fall under this label: Accidental or incorrect modification of application data by a user or application. In this scenario, a user or application, either by misadventure or resulting from an application bug, changes data in a database to incorrect or inappropriate values….