(Dmitry Tolpeko) The latest versions of MySQL largely extend the range of enterprise applications that can benefit from the high performance, reliability, scalability and cost reduction offered by this database server. That is why more and more companies today consider switching their mission-critic
Other News
Using MySQL Programs (Sample Chapter)
This chapter provides a brief overview of the programs provided by MySQL AB and discusses how to specify options when you run these programs. Most programs have options that are specific to their own operation, but the syntax for specifying options is similar for all of them. Later chapters provide
MySQL backups
(Ian Gilfillan) One of the most frequently requested topics for this column is, not surprisingly, backups. Not surprising because disks still fail, and developers still forget WHERE clauses and nuke entire tables. I am not ashamed to admit that I did just that a few days ago. Everyone destroys s
MySQL Transactions, Part III – BDB Tables, Table locking and Savepoints
(Ian Gilfillan) The previous two columns in this series have covered general transactions with InnoDB tables and transaction isolation levels. This month, we look at transactions with other table types, specifically BDB tables, and all other table types, including the default MyISAM table type.
MySQL Transactions, Part II – Transaction Isolation Levels
(Ian Gilfillan) Last month we started looking at transactions in MySQL, in particular with InnoDB tables. This month we look at the four transaction isolation levels, again with InnoDB tables, and see how they affect the usual locking transactional behavior.
Transactions in MySQL
(Ian Gilfillan) What is a transaction? If you are asking this question, you are probably used to website databases, where most often it does not matter in which order you run transactions, and if one query fails, it has no impact on others. If you are updating some sort of content, often you will
Talking to MySQL: Your First Look at JDBC
(Kevin Yank) To build the To-Do List application we will use to explore the myriad Java Web development technologies that are available, we’ll begin with the backbone of the application: a set of classes that connect to a MySQL database to retrieve, model, and update a to-do list.
Build SQL CLR Objects With .NET
(Doug Thews) One of the most anticipated features in SQL Server 2005 (code-named Yukon) and Visual Studio .NET 2005 (code-named Whidbey) is the capability to develop stored procedures, user-defined functions (UDFs), and user-defined data types in .NET 2.0. SQL Server 2005 now supports developing UDF
Are you Google hack-proof?
(Ong Boon Kiat) I tried my hand at Google hacking recently. It was easy, and all done with, well, Google. As Google hackers know, what I did was to use Google to look for information residing in other people’s Web-connected servers–and machines connected to those servers. Stuff that I’m not sup
Reading Configuration Information from an XML File
This tip helps to read configuration information in an XML file. Using XPath, the values can be read simply and the value is fetched from the file as CString.