Posts Categorized: Technical Blog
Applying binary logs to a MySQL instance is not particularly difficult, using the mysqlbinlog command line utility. Turning off binary logging for a session is not difficult, from the MySQL commandline, if you authenticate as a user with the SUPER privilege.sometimes you want to apply binary logs to a MySQL instance, without having those changes applied to the binary logs themselves. One option is to restart the server binary logging disabled, and after the load is finished, restart the server with binary logging re-enabled. This is not always possible nor desirable, so there’s a better way, that works in at least versions 4.1 and up
I was sad that last year there was no community dinner, and I missed the one the year before when Jonathan Schwartz and Rich Green made an appearance. This year I am determined not to miss it, and so I am calling for a community (pay-your-own-way) dinner on Monday, April 12th, at Pedro’s
For many, CPAN is a Canadian Prairies-sized field of modules where it’s darn hard to separate the wheat from the chaff. While the CPAN Ratings service is the principal and official way CPAN tries to rank its distributions, for me at least, it doesn’t quite scratch the itch. Consequently, for a while now I’ve been playing with ideas on how the rating could be improved. What I came up with so far is a very minimal system going straight for the goods. And now, since I’ve had a three-day week, I decided to give the idea a try and implement a prototype.
You have found the 179th edition of Log Buffer, the weekly review of database blogs. Welcome. Enjoy your stay. We begin with . . .
There are those that are very adamant about letting people know that using INFORMATION_SCHEMA can crash your database. Of course they leave out one extremely important piece of information: you can actually figure out how dangerous your INFORMATION_SCHEMA query will be, ahead of time, using EXPLAIN. Here’s how.
Welcome to another edition of Blogrotate. This has been an interesting week in the IT world, with Microsoft security issues being the major focus of attention.
Pythian is hosting the February meeting of the Ottawa Valley System Admistrators Guild (OVSAGE). This free event is open to all those interested in System Administration.
Gerry Narvaja has published the 178th edition of Log Buffer, the weekly review of database blogs.
What should you expect coming to the Hotsos Symposium 2010? It’s 3 days packed with sessions on all aspects of Oracle performance optimization whether it’s design, troubleshooting, development, methodologies and processes. Legendary Tom Kyte — who else can you expect for the keynote?! If you take an optional training day with Tanel Poder then you are likely to learn at least as much about troubleshooting Oracle database performance as you do during the conference and probably even more. Every presentation by Tanel has been an eye opener for me. If you’ve seen his material, you’d know what I’m talking about. Now, imagine that it’s not a one-hour session but the whole day! It will fry your brains so this day is for the strongest! :)
On Thursday, January 21, Pythian hosted the Ottawa Valley System Administration Guild (OVSAGE) Ottawa Valley System Administration Guild (OVSAGE). The highlight of the meeting was an interesting presentation on security by the founder of OVSAGE, Scott Murphy. The focus was on the fact that security is a mindset, not a product. Scott’s presentation can be viewed here.