Skip navigation links
Showing entries 1 to 20 of 146 Next 20 Older Entries

Displaying: Presentations (reset)

Presentations
Add to Favourites +3 Vote Up -0Vote Down
Video: Building a MySQL Slave and Keeping it in Sync At the Boston MySQL User Group Sheeri Cabral presented on how to get a consistent snapshot to build a slave, how to use mk-table-checksum to check for differences between masters and slaves on an ongoing basis, and how to use tools such as mk-table-sync and mysqldump to sync the data if there are any discrepancies. This link contains the slides and the videos
Presentations
Add to Favourites +0 Vote Up -0Vote Down
The Malta MySQL User Group (MMUG) met for the second time this Thursday, and compared to last time, we had a much better venue: Ixaris Systems let us use their board room, so we had all the tools we needed to have a good meeting. We managed to get a group picture before everyone has arrived, so I guess we can call the people in this picture "early birds". Once we all arrived, however, Sandro Gauci from EnableSecurity gave us a very interesting talk on SQL Injection security, and general security flaws from a developer point a view. You can find the slides here: sql-injection.pdf.Here's a picture of Mr. Gauci while presenting. (Sorry for the obvious problem with the over-white picture -- seems like I forgot to turn down the flash, and this was the only non-blurry shot I got.)
Presentations
Add to Favourites +0 Vote Up -0Vote Down
There's no video for Jacob Nikom's December 2007 Boston MySQL User Group meeting, but the slides for "Measuring MySQL Server Performance" can be downloaded (2.33 MB) at http://technocation.org/files/doc/Measuring_MySQL_server_performance_03.pptAnd with that, this is (I believe) post #10,000 at Planet MySQL!
Presentations
Add to Favourites +0 Vote Up -0Vote Down
Hi All!This year, the International Free Software Forum celebrated its 10th anniversary. It happened last week in Porto Alegre.Pythian presented a session on Thursday called 8 Rules for Designing More Secure Applications with MySQL. As promised, here are the slides we used on that session:
Presentations
Add to Favourites +0 Vote Up -0Vote Down
I was recently asked a question by someone who had attended my Shmoocon talk entitled "Why are Databases So Hard to Secure?". PDF slides are available (1.34 Mb). I was going to put this into a more formal structure, but the conversational nature works really well. I would love to see comments reflecting others' thoughts.I found several things of interest in your talk about database security and several new things to think about.In particular I realized that DBMSs have at least two hats in the world of software architecture namely as technical services ("smart file system") and as application framework. Perhaps that "depth" is one of the reasons why dbms is hard to secure? For example, considering just the question of who or what have user roles within a DBMS deployment. From the "deep" point of view, the "user" could be an application, or a module, or just the next layer up  []
Presentations
Add to Favourites +0 Vote Up -0Vote Down
Slides:http://www.technocation.org/files/doc/2009Keynote.pdfReferences:I am @sheeri on twitterMy blog is at http://pythian.com/blogs/author/sheeriMy e-mail is cabral@pythian.comPythian became the first ever Sun Enterprise Remote DBA Partner -- read the details at http://tinyurl.com/pythiansun.
Presentations
Add to Favourites +0 Vote Up -0Vote Down
Here are the slides and links I am using for the "Database Security Using White-Hat Google Hacking" at the 2008 MySQL Users Conference and Expo.pdf slidesWhere to Start:http://johnny.ihackstuff.com/ghdb.phpi-hacked.com/content/view/23/42
Presentations
Add to Favourites +4 Vote Up -0Vote Down
Tags:
(edit) mysql, oscon, PHP, scaling
Presentation given at OSCON 2009 on Scaling a web application (mostly PHP/MySQL) and gives a framework for creating scaling profiles and capacity/scenario profiling for your web site. An overview of Application and Database scaling steps and considerations.
Presentations
Add to Favourites +0 Vote Up -0Vote Down
Following a Query Back and Forth in the MySQL Server
Presentations
Add to Favourites +1 Vote Up -0Vote Down
Mikael Ronstrom, father of MySQL Cluster, explains the architecture of NDB (MySQL Cluster).
Presentations
Add to Favourites +4 Vote Up -0Vote Down
Jan Kneschke, creator of MySQL Proxy, gives an overview of the architecture and usage of MySQL Proxy.
Presentations
Add to Favourites +1 Vote Up -0Vote Down
Reggie Burnett, father of the MySQL Connector/NET API, explains how to build MySQL on Windows.
Presentations
Add to Favourites +0 Vote Up -0Vote Down
MySQL memory handling and memory handling in Falcon
Presentations
Add to Favourites +0 Vote Up -0Vote Down
Mikael "Monty" Widenius, father of MySQL, gives an overview of query execution and use of temp tables in the MySQL Server.
Presentations
Add to Favourites +0 Vote Up -0Vote Down
How to do a good code review
Presentations
Add to Favourites +0 Vote Up -0Vote Down
MySQL Error Handling and Reporting
Presentations
Add to Favourites +0 Vote Up -0Vote Down
Ann Harrison and Jim Starkey, creator of Falcon, explain the archtecture of the Falcon storage engine.
Presentations
Add to Favourites +0 Vote Up -0Vote Down
Timour Katchaounov explains the inner workings of the MySQL Optimizer.
Presentations
Add to Favourites +0 Vote Up -0Vote Down
Konstantin Osipov explains how locking works in MySQL.
Presentations
Add to Favourites +0 Vote Up -0Vote Down
Brian Aker explains the technology behind the MySQL storage handler interface.
Showing entries 1 to 20 of 146 Next 20 Older Entries