Welcome to the 93th edition of Log Buffer, the weekly review of database blogs.
Chose MySQL for performance and stability, and less important but still there, experience and support. Support is becoming increasingly more and more important.
Here are the slides and links I am using for the “Database Security Using White-Hat Google Hacking” at the 2008 MySQL Users Conference and Expo.
Taking a look at the social graph and what it means for the database. The social graph; at it’s heart it’s about people and their connections, learning about people who are in your world, can be a powerful tool for accelerating the use of an application. “The social graph has transformed a seemingly simple application such as photos into something tremendously more powerful.” We’re interested about what people are saying about us, and about our friends. Social applications are compelling.
How do you prove to a website who you are? It’s not what you give to the site, but what the site knows about you! If you have a good eBay rating, can you take that over to Craigslist? What we want in Identity 2.0 is a way to make identity user-centric, not site-centric, so a person can move their identity around. How do we solve this you ask.
It is quite common for Oracle Tech support, while troubleshooting any 11i E-Business Suite Self Service Applications (SSWA) related error messages, to ask to enable debug logging in JServ configuration files. The procedure we followed here saved us a complete bounce of Apache, but unfortunately, for changes in jserv.conf to take effect, we still need a complete Apache bounce. This trick will only work for files jserv.properties, forms.properties, viewer4i.properties, and xmlsvcs.properties.
Yesterday’s keynote panel on “Scaling MySQL — Up or Out?” Download or stream the presentation here.
Before MySQL 5.1 a UDF was the only way to extend MySQL. All you need in a UDF is: init() execute() deinit()my_bool id3_parse_init(UDF_INIT *initid UDF_ARGS *args, char *message) WARNING: use STRICT mode in MySQL, otherwise there are tons of silent failures.
They charge for some of their products because without money, they cease to exist, and then even the free version stops being developed on. “A necessary evil” is a dangerous phrase, and can lead to a slippery slope….but in this case, I do not envision that it is a big problem. Maybe I will regret saying this if things keep getting more and more closed, but I do not believe so.
Architecture of Maria: A New Storage Engine with a Transactional Design