(Roger Schrag) Oracle maintains its own buffer cache inside the system global area (SGA) for each instance. A properly sized buffer cache can usually yield a cache hit ratio over 90%, meaning that nine requests out of ten are satisfied without going to disk.
Author: SSWUG Research
People Power
(Mike Miley) A global employment services company with more than 4,300 offices in 72 countries has compelling reasons to leverage a global IT infrastructure for both e-commerce applications and back-office financials. For starters, its clients need standardized global online access to the multicount
.Net Memory Management Rules: Part 2
(ayzec) As you continue to create .Net objects, the managed heap will eventually become full. As covered in Part 1 of this series, when the CLR determines that there is insufficient room on the heap to host the new object, it will perform a garbage collection in an attempt to free memory. Hence we a
Who connects to your computer?
(akomarov) Who connects to your computer? You can be notified by an MSN-like popup window while doing your work. The program can also create its own log file for all historical logon events. The log file created in the sample code is called called evlogger.txt and can be found in the application (ev
Examining ASP.NET 2.0’s Membership, Roles, and Profile – Part 4
(Scott Mitchell) The ASP.NET 2.0 Membership class provides a ValidateUser(userName, password) method that returns a Boolean value indicating whether or not a user’s supplied credentials are valid. This method is automatically utilized from the Login Web control and can also be used programmatically,
SQL Server 2000 64-bit eagerly acquires the amount of memory that is specified in the min server memory configuration option
This article describes that Microsoft SQL Server 2000 64-bit eagerly acquires the amount of memory that is specified in the min server memory configuration option, regardless of the memory that it currently needs.
.NET Offers a ‘First Chance’ to Squelch Performance-killing Hidden Exceptions
(Robert Bogue) Processing exceptions in any language is expensive. The process of capturing an exception and rolling it into a package that can be processed by code requires a stack walk—basically looking back through the history of what has happened—and that requires a lot of processing time to com
Final Checks and OCFS2 Setup
(Tarry Singh) In part 10, we covered an important topic called security. I think with the world (IT and likewise) gearing up for Utility Computing that virtualization will play greater role in helping utility computing become reality. There is a lot of talk of hosting applications from distant serve
A Look at the MySQL CSV Storage Engine
(Robin Schumacher) It’s amazing in an age where relational databases reign supreme when it comes to managing data that so much information still exists outside RDBMS engines in the form of flat files and other such constructs. In most enterprises, data is passed back and forth between disparate
In-Process Data Access (Sample Chapter)
(Bob Beauchemin and Dan Sullivan) Whether you access data from the client, middle tier, or server, when you’re using SQL Server and the .NET Framework, you use the SqlClient data provider. Your data access code is similar regardless of its location, but the .NET Framework 2.0 version of SqlClient co
