(Nicklas Westerlund) First off, let me wish you all a Happy 2009, and my apologies for being a bit slack with blogging in the last two months of 2008. It’s been a bunch of busy weeks, but I’m fully expecting to remedy that in this year.
Tag: Open Source
Intro to MySQL Proxy
(Sean Hull) A proxy is a person who performs legal duties in another person’s stead. In technology, a web-proxy can provide anonymity, making your web surfing appear to originate from your proxy’s location. Proxies are also used to cache data between a client browser, and the actual web server hos
Dropping unused indexes
(Peter Zaitsev) Vadim wrote some time ago about how to find unused indexes with single query.
Triggers Use Case Compilation, Part II
(Shlomi Noach) In Triggers Use Case Compilation, Part I, I’ve demonstrated some triggers use scenarios. We continue our examples of triggers usage.
Some little known facts about Innodb Insert Buffer
(Peter Zaitsev) Despite being standard Innodb feature forever Insert Buffers remains some kind of mysterious thing for a lot of people, so let me try to explain thing a little bit.
sql_mode: a suggestion
(Shlomi Noach) I thought this deserves more than a comment on my previous post on the subject, in which I expressed the opinion that sql_mode is undesired.
Parsed but ignored?
(Mark Callaghan) Parsed but ignored has to stop. What am I talking about? If you don’t know then I have made my point.
Multicolumn UPDATE with Subquery the MySQL way
(Anders Karlsson) We all know the usual UPDATE statement, for example: UPDATE table_1 SET column_a1 = 57;
Tips for bulk loading
(Henrik Ingo) A collague at Sun asked me for tips on how to tune MySQL to get fast bulk loads of csv files. (The use case being, insert data into a data warehouse during a nightly load window.) Considering that I spend most of my time working with MySQL Cluster, I was amazed at how many tips I could
PHP Programs to Prevent MySQL Injection or HTML Form Abuse
(Codex-M) It has been known for a while that if a form is unsecured, malicious code in the form of a MySQL injection will be initiated to attack the site. HTML forms such as drop down menus, search boxes and check boxes are all susceptible entry points for this type of abuse. This article will expla
