(Terrance_Smith) By default, when creating an object is used with the object literal notation such that…
Other News
MEB copies binary logs and relay logs to support PITR and cloning of master/slave
(Raveendra Reddy) With MySQL Enterprise Backup(MEB) 3.9.0 we had introduced full instance backup feature for cloning the MySQL server. Now with MEB 3.11.0 we have enhanced the feature by copying all the master-slave setup files like MySQL server binary logs(will be referred as ‘binlogs’), binary log
Transactional Data Caching for ADF Mobile MAF Application
(Andrejus Baranovskis) I have described basic idea for data caching in ADF Mobile MAF application in my previous post – Data Caching Implementation for ADF Mobile MAF Application. Today I would like to extend similar solution to handle transactional data caching.
FMW 12.1.3 – Invoking Enterprise Scheduler Service Web Services from SoapUI
(Lucas Jellema) The Fusion Middleware 12.1.3 platform contains the ESS or Enterprise Scheduler Service. This service can be used as asynchronous, schedule based job orchestrator. It can execute jobs that are Operating System jobs, java calls (local Java or EJB), PL/SQL calls, and Web Service calls (
Commit Puzzle
(Bobby Durrett) This graph represents commit time compared to CPU utilization and redo log write time. I’ve included only the hourly intervals with more than 1,000,000 commits. At these peaks the number of commits ranges 1 to 1.6 million commits per hour so each point on the graph represents rough
#0347 – SQL Server – Basics – A SELECT that does not fetch anything also does not SET anything
(Nakul Vachhrajani) In today’s post, I go all the way back to the basics because of a logical bug I saw in production code recently.
(Kenneth Fisher) For the love of all that’s SQL, triggers are not toys! I’m not even talking about logon triggers or DDL triggers. I’m talking about plain old ordinary DML triggers.
SQL Server Reporting Services (SSRS) Matrix within a Matrix
(Scott Murray) Often, as a SSRS developer, you will find that you have to be creative in order to get a report to display your data in just the exact way the report consumers want. Unfortunately, getting the data in the format needed is never easy and often times, getting the actual data is only a s
Enforce backup encryption with encrlib and encropts
(Henrik Loeser) What may sound like sore throat, “encrlib/encropts”, in reality is a really useful combination of new configuration parameters for DB2 in the Cancun release.
Rules for an Effective DB2 Monitoring Strategy
(Craig S. Mullins) DB2, and relational databases in general, have a reputation of being (relatively) easy for users to understand; users specify what data to retrieve, not how to retrieve it. The layer of complexity removed for the users, however, had to be relegated elsewhere: to the code of DB2.
