The Wayback Machine - https://web.archive.org/web/20101204171454/http://internet.com/Developer/OpenSource/Other
  1. Home
  2. IT
  3. Developer
  4. Certifications & Degrees
DatabaseEnterpriseOpen SourceProgrammingWeb Development
JavaOtherPHP
Other  
Use Derived Tables in Your MySQL Queries to Improve Database Performance
There has been much debate as to whether derived tables, views, or temporary tables are actually faster in terms of database performance. The fact is that there is no simple answer, as different queries require different optimizations. Rob Gravelle presents and evaluates some uses for derived tables that highlight their value in many applications.
MySQL Hotbackups with XtraBackup
Hotbackups are a staple of many different database platforms, but they remain sadly absent from the core MySQL distribution. Not to worry, the open-source utility has just arrived to rescue you.
Eliminating Duplicate Rows from MySQL Result Sets
The go to solution for removing duplicate rows from your result sets is to include the distinct keyword in your select statement. It tells the query engine to remove duplicates to produce a result set in which every row is unique. The group by clause can also be used to remove duplicates.
Simple Automation - Examining your MySQL Index Usage
In the majority of MySQL systems, the schema is always updated and changed based on the needs and focus of the application, making it somewhat difficult to keep up with all of the changes that come down the pipe. Chris Schneider shows you how to gauge the index usage in a system, using grep, awk and sed.
Microsoft Offloads IronRuby and IronPython Languages to External Developers
Further development of the dynamic programming languages will be community-led.
Clearing a Path through the 3NF Join Jungle
Rob Gravelle explores the pros and cons of normalization with a particular focus on the ramifications of third normal form normalization on data extraction by SELECT query.
SkySQL Takes Aim at Delivering MySQL
Former Oracle and Sun execs start up new venture aimed at filling perceived gaps in the open source database support system - but is it an attack on Oracle?
Inside MySQL Character Sets & Settings
MySQL has sophisticated character set support, and can store, retrieve and collate single byte, and multi-byte character sets alike. Sean Hull explores using non-default character sets and settings, which use the hierarchy to control these settings.
MySQL Server Benchmarking 101
Benchmarking can be a very revealing process. It can be used to isolate performance problems, and drill down to specific bottlenecks. More importantly, it can be used to compare different servers in your environment, so you have an expectation of performance from those servers, before you put them to work servicing your application.
Cardinality in MySQL Data Modeling
In data modeling, explaining how each table links to another is known as cardinality. Knowing how to establish table cardinality is a key skill in database design because it can identify areas where the normalization process may have gone awry. This article looks at each relationship type more closely.
Komodo 6 Brings HTML 5, CSS 3 to the IDE
Popular Web development IDE based on Mozilla Framework gets a major update with new Python 3, HTML5 and CSS 3 features.
A Look Inside MySQL Enterprise Monitor
MySQL Enterprise Monitor was highlighted during "MySQL Sunday" at the Oracle Open World conference this past month. Given the ease of implementation and helpful GUI tools, MySQL Enterprise Monitor provides almost instant benefits for any MySQL shop.
Using mysqldump to Back Up Your MySQL Database
Whether you host your website and database internally or you use a hosting provider, it is of paramount importance that you institute a rigorous backup policy. If you're using MySQL, several easily implementable options are at your disposal. This article introduces one such option by showing you how to backup your database using MySQL's native mysqldump client.
The 10 Most Common MySQL Queries
MySQL queries are usually written once and then wrapped in class functions to minimize code repetition. This article lists the 10 queries used most often in MySQL.
How Operator Precedence Affects MySQL SELECT Queries
When joining tables on common fields, if you're not diligent in the use of AND-OR combinations in the criteria clause, be prepared for unexpected results! Learn how to break filtering criteria into individual steps and how to group AND-OR statements to most effectively isolate the data that you wish to retrieve.
Disambiguating between Duplicate Column Names in MySQL
To minimize headaches that can accompany long field lists, DBAs employ a range of techniques. The specific techniques covered today are used to disambiguate between duplicate column names. Don’t be too quick to judge this as basic stuff. You just might find that there are a few things you don’t know on this subject.
Inside MySQL Binary Logs
The MySQL Binary Log files are important to the proper functioning of the database and facilitate replication, and recovery. This article discusses some of the inner workings of these important files, and explains how ordering of transactions also plays into how they work.
Top 10 Security Tips for MySQL
Security is a crucial part of any database system and MySQL is no different! There are very specific techniques a database administrator can use to protect their MySQL installation. Read on to learn the TOP 10 security tips for MySQL database administrators.
Keeping up with High Availability - Automating MySQL Failovers
Automating failover situations can benefit an organization along with the database administrator who is on call. This article discusses how to setup Keepalived and how it may help in automated failovers for a Multi-Master MySQL cluster.
Identifying and Eliminating the Dreaded Cartesian Product
Cartesian Products usually don't provide useful information and often result in mistakes that can hurt your database developer career. Learn to spot Cartesian Joins and banish them from your SELECT queries forever.
Open Source R Language Shows Promise for Business Intelligence
Commercial vendors are realizing the potential that the R language has for facilitating big advances in analytics and business intelligence.
MySQL SELECT Statement 101
The SELECT statement is without question the most complex amongst MySQL's data manipulation statements. This article covers the syntax of the SELECT statement, exploring its many optional clauses.
MySQL in Amazon EC2 - Beginners Guide
Increasingly, enterprises are looking at cloud services such as Amazon Web Services for their deployments. Datacenter virtualization is much more sophisticated than its desktop counterpart is, providing a whole suite of tools that allow you to control every aspect of your deployments. Join Sean Hull as he explores the MySQL - Amazon EC2 solution.
Working with MySQL Multi-master Replication - Keeping a True Hot Standby
Knowing and working with master-master replication and keeping a true hot standby is very important, especially when your business requires a fast failover with the least amount of downtime. This article focuses on the wonderful world of multi-master replication. Knowing how to setup and implement multi-master replication is the next step to faster, automated failover.
When To Use Open Source in the Enterprise -- And When To Avoid It
Open source software has matured, it's better supported and more organizations are giving it a try.
WHITEPAPERS AND EBOOKS  Advertisement
HOTTEST OTHER DISCUSSIONS 
Advertisement
Visualize your workspace with new multiple monitor support, powerful Web development, new SharePoint support with tons of templates and Web parts, and more accurate targeting of any version of the .NET Framework. Get set to unleash your creativity. Download the Trial Now!
Many of the largest IT budget problems can be traced back to five big money drains. This e-book, provided by IBM, will introduce you to the five big IT budget killers - and some of the best ways to knock them out. Get it now.
Windows Azure features a very powerful, yet simple deployment model. By focusing on your application and abstracting away the infrastructure details, you can deploy almost any app with minimal fuss. Start Here.

Phony Holiday Tweets Hide Malware
Shortened URLs posted on Twitter may not lead to the holiday-themed sites listed.

Groupon, LivingSocial Attract Big Tech Interest
LivingSocial just announced a $175 million investment by Amazon, but will Groupon soon have even bigger news?

Google Chrome 8 Stable Addresses 800 Flaws
Search giant continues its breakneck clip of developing its Chrome browser, this week issuing a release that includes fixes for some 800 vulnerabilities and other bugs.

IBM Refreshes AppScan to Secure Input Validation
New release of AppScan platform -- version 8 -- from Big Blue targets cross-site scripting and SAL injection vulnerabilities with string analysis for secure coding.

Oracle Unveils New SPARC Servers, Roadmap
Database giant showcases SPARC-based Exalogic Elastic Cloud and SPARC Supercluster, accompanied by a product roadmap for future development.

Advertisement


Internet.com
The Network for Technology Professionals

About Internet.com

Legal Notices, Licensing, Permissions, Privacy Policy.
Advertise | Newsletters | E-mail Offers