(Alexey Kovyrin) Really often in customers’ application we can see a huge tables with varchar/char fields, with small sets of possible values. These are “state”, “gender”, “status”, “weapon_type”, etc, etc. Frequently we suggest to change such fields to use ENUM column type, but is it really necessa
Other News
XmlTransform—A General-Purpose XSLT Pre-Processor
(Michael Sorens) The general-purpose XML transformer and/or validator discussed here, named “XmlTransform” operates on an arbitrarily deep directory tree containing files you want to transform. As output it optionally generates multi-level indices and can even add navigational linkages.
Conversion Operators
(Jim Mischel) In order to allow direct assignment, we need to define implicit conversion operators so the compiler understands that it’s okay to convert an integer type to Int128. The easiest one to write is converting from UInt64 (ulong in C#) to Int128, as shown here:
Introduction To Reverse Key Indexes: Part I
(Richard Foote) Following on from the “8 things You May Not Know About Indexes”, #7 regarding Reverse Key Indexes requires a number of posts to do the subject justice. However, Part I will focus of the specific issue related to point # 7, namely: “A REVERSE index can quite happily be used by the
Non-trusted constraints and performance
(Tibor Karaszi) The optimizer is a pretty smart little animal. It can even use constraints to eliminate some data access or part of a query. That assumes however that the constraint is trusted.
MySQL Acquisition Issues with Sun
New SelectViews SQL Server Show [Watch Now] A SQL Server problem triage plan and approach, a pet peeve about open source, public domain software, current release versions and more. Also on the show, the 60-second SQL Server tip of the day, upcoming events, the newsletter and discussion list watches and other goodies. Also Available [Watch Now] SQL on Call – […]
DB2 / Java Myths Debunked
(Julian Stuhler) Like any other technology, DB2 has its own myths and commonly-repeated fallacies, and nowhere is this more apparent than with Java applications. In this brief article, I’ll examine (and hopefully go some way to disprove) five of the more common fallacies that I see.
SQLPROCEDURECOLS – a metadata stored procedure
(Peggy Zagelow) Also among the ‘recommended practices’ that I often present on DB2 for z/OS stored procedures is this one: Don’t call the metadata stored procedures
Can RSS & XML Help Us Build the Data Web?
(Ric Hardacre) The Web is full of data: statistics, surveys, and reports can be found on almost any topic you care to search for. It’s this very fact that makes the Web the first stop in anyone’s research. Want to know the average number of petals on a daisy? Thirty-four. The number of species of wh
How big is your replication circle/chain?
(Mark Callaghan) Chained and circular are popular methods to provide highly available database service for MySQL. They are popular because such a deployment is easy to manage and provides great uptime. Chained replication is also popular elsewhere. I want to use it, but I don’t and will explain why.
