(Thomas) For as long as it is only about a few of them, it is as simple as looking at the SHOW PROCESSLIST output for thread identifiers to kill. They can be found in the first column called Id. These values can be passed to KILL thread_id command in MySQL.
Other News
VIDEO: The Customer Perspective on DB2, Part 3
In this third installment of a three-part video series, Tom DeJuneas of Coca-Cola Bottling discusses migrating from Oracle Database to IBM DB2, the patching and compression advantages of IBM DB2, and the autonomic computing features of DB2.
Using the Zero Resource Model for database management in WebSphere sMash
(Arun Lobo) The article offers details and insight into features and capabilities of the Zero Resource Model for database management on the IBM WebSphere sMash platform. This peek at agile database management describes the built-in database handling and processing capabilities of WebSphere sMash, an
SQL Server 2008 R2 Upgrade Failure due to Security Group upgrade rule
(Manvendra Singh) Last month I was working on a SQL Server 2005 to SQL Server 2008 R2 upgrade. Unfortunately, we were not able to complete our upgrade because of a failing a upgrade rule named “Security Group SID (Security Identifier)”. The SQL Server Upgrade Setup Wizard did not enable the ‘Next’
Centralized Authentication Services
Centralized Authentication Services In response to my editorial from yesterday regarding a centralized authentication framework, David Ellis, a regular contributor to our newsletter provides three authentication frameworks providing standardized trust capabilities. David writes: I’m aware of three major authentication frameworks that are trying to standardize exactly the problem you’re describing (allow trusted sources to provide for authentication). OpenID http://openid.net/ – […]
Authentication
Authentication I was recently talking with a colleague about Application Authentication. We were both in agreement that there is a logical separation between Authentication (Am I who I Say I am?) and Authorization (What rights and privileges do I have in your application). One of the key things about our conversation was the ever changing world of Authenticating. In the […]
Using SqlDataReader’s new async methods in .Net 4.5 Beta
(Daniel Paoliello) With the Developer Preview release of .Net 4.5, ADO.NET introduced two asynchronous methods to the SqlDataReader class: ReadAsync and NextResultAsync. These two methods allow you to move to the next row or result set asynchronously and represent a much more fine-grained level of a
I sed awk!
(Iggy Fernandez) Oracle DBAs most often find themselves working on Unix platforms and a knowledge of Unix scripting comes in handy. Utilities like “sed,” “awk,” and “grep” are often used in Unix scripts. Sed is a “stream editor” which filters and transforms a stream of text. Awk is a pattern matchin
Infinite Scroll in ASP.NET MVC
(Tomasz Pêczek) Recently I’ve decided to play a little bit with Infinite Scroll interaction design pattern as I was planning on using it in one of my upcoming projects. My key requirement was to implement the pattern as an enhancement which would not break the existing navigation/pagination mechanis
RDF 101
(Rob Gonzalez) RDF (Resource Description Framework) is one of the three foundational Semantic Web technologies, the other two being SPARQL and OWL.
