|
|
|
|
|
My SQL : Logging Statements (part 6) - Stored Functions |
Stored functions share many similarities with stored procedures and some similarities with triggers. Similar to both stored procedures and triggers, stored functions have a DEFINER clause that is normally (but not always) used when the CREATE FUNCTION statement is written to the binary log. |
|
My SQL : Logging Statements (part 5) - Stored Procedures |
Stored functions, stored procedures, and events are known by the common name stored routines. Since the server treats stored procedures and stored functions very differently, stored procedures will be covered in this section and stored functions in the next section. |
|
|
|
|
My SQL : Logging Statements (part 1) - Logging Queries |
For statement-based replication, the most common binlog event is the Query event, which is used to hold a statement executed on the master. In addition to the actual statement executed, the event contains some additional information necessary for execution of the statement. |
|
My SQL : The Binary Log - Structure of the Binary Log |
Conceptually, the binary log is a sequence of binary log events (also called binlog events or even just events when there is no risk of confusion). The binary log actually consists of several files, as shown in Figure 1, that together form the binary log. |
|
|
|
|
|
|
|
|
Protecting SQL Server Data : LAYERING SOLUTIONS |
At the highest level, we would want to consider the protection of our database files, including the database backups. In the SQL Server 2005 world, native options for protecting our physical database files, transaction logs and TempDB system database are non-existent. |
|
|
MySQL for Python : Simple Insertion - Using metadata |
On February 23, 2006, an American B-2 bomber crashed shortly after take-off in Guam due to bad data being fed to the airplane's flight control computers. A lack of data checking resulted in the loss of a $2.1 billion plane. As with any user interaction in programming, it is foolish to trust data without validating its integrity first. |
|
|
|
|
|
|
|
|
|