Showing posts with label Database. Show all posts
Showing posts with label Database. Show all posts

Tuesday, March 6, 2018

ASIAN, Inc. Fraud Page

Hey come check out this page on Cyber Crime and Fraud Protection that me and my team put together on ASIAN, Inc.. Learn about the different ways you could be taken advantage of and how hackers operate to get there hands on your personal data.

ASIAN, Inc. Fraud Page

Thursday, January 5, 2012

Troubleshooting BigBlueButton Server

What is BigBlueButton?

BigBlueButton (BBB) Server is an opensource video conferencing/desktop sharing/presentation server that runs on a Linux box which is what we needed at our office. It is composed of a collection 15 or more opensource technologies. BigBlueButton also supports

Tuesday, September 20, 2011

To Cache or Not to Cache That is the Question?? Memcached

Memcached is a technology that uses the HEAP stack to access data more quickly than disk I/O in a traditional MySQL database. This functionality is built into the enterprise edition of the MySQL Server.

In a Memcached Client, the tables that are most frequently used in a highly utilized database are inserted into memory of the Memcached Server where they are stored and queried from by the application layer. This is useful where the application is in high demand and data is considered a necessity for the user-base and performance is key to retaining users.

Financially Feasible

From a technical stand point, one can see that this technology would be a memory hog. However, that is an added benefit when considering performance and finances. Since it uses memory for speed, you could have one or more budget server(s) to handle your cached system. The CPU and HD is in less of a demand for Memcached to be enabled than a traditional database.

Monday, September 12, 2011

A Cryptic Approach To Cryptography

Its been a while since my last post. Ive got two posts sitting in my draft since February. I'm a little behind on I thought I would give some advice about Cryptography.

Scenario
Lets say that you have a list of passwords and usernames stored in a db generated from your web/intranet app. If your like me, you only want the best in security for your users. So you go shopping for encryption technology.

Wednesday, February 2, 2011

MySQL Temporary Table Bug ERROR #1137

Apparently you can not reference two temporary tables in 5.1 using a simple join.

I was trying to create test environment based on my tables so that I could have a place to advance on this stored routine. The MEMORY storage engine provided me the comfort of performance and the fact that

Saturday, May 22, 2010

MySQL MATCH AGAINST Query ERROR 1191

I came across this problem when I ran into a client who needed Boolean search functionality on his site. The previous query he had was using LIKEs to do the searching on 6 columns. I told him about using a new query that used FULLTEXT indexes and continued about the performance benefits and also overhead this might cause as their data changes overtime. Naturally, I gave him a cronjobs script that basically optimizes the table to help him with maintenance. The problem arose when I implemented the query (Match..Against) I kept on getting:
ERROR 1911 (HY000): Can't find FULLTEXT index matching the column list.

Friday, February 19, 2010

MySQL Replication Explained

One of the many features of MySQL to keep your database live and productive is MySQL Replication.

Note: this entry will cover asynchronous replication

So whats this technology all about anyways?

Replication is data that is reproduced in one or more locations. It consists of two or more servers, normally, in its simplest form, one master server and its slave server(s).