Subscribe to this list via RSS Blog posts tagged in Databases

Posted by on in Blogs
Cryptography in the Database Here's a Slashdot review of an interesting-looking book, Cryptography in the Database: The Last Line of Defense....

Posted by on in Blogs
Potentially Interesting Delphi Job My daughter has always really enjoyed Melissa & Doug toys, and it seems the company is looking for a Delphi developer. From the borland.public.delphi.jobs newsgroup: "Melissa & Doug" is an award winning company located in Norwalk, Connecticut, that has experienced profitable growth for the past 17 years. We design, manufacture, and sell children's toys. Our mission is to provide educational, heirloom-quality products to children. We are looking for a Delphi Programmer who offers expert...

Posted by on in Blogs
InterBase Performance Monitor for Linux ...is now in beta. Want it? Get it here....

Posted by on in Blogs
SQL Server 2005 at Borland DevCon I'm not sure how many Delphi developers read Euan Gardner's blog, but if you are a MS SQL Server user, you really should. Euan is a Microsoft program manager for that product, and he has distinguished himself with his helpfulness in the Delphi newsgroups. Euan will be speaking at Borland DevCon and he is soliciting ideas for what you'd like him to talk about at the conference....

Posted by on in Blogs
New Web Magazine Features InterBase The InterBase and Firebird Developer Magazine just released its first issue. It has some good stuff, like a warning not to mix and match the SQL and API savepoint instructions (pick one or the other). The savepoint article doesn't mention IB 7.5.1's SET TRANSACTION NO SAVEPOINT feature, but 7.5.1 is quite recent and may have come too late for the author to include. The feature allows you to specify that there should not be an implicit savepoint at the start of every SQL statement. This gives a p...

Posted by on in Blogs
Nice Shirt I don't care enough to buy one, but I agree with the sentiment. They also have a good one about Unicode....
Tags: Databases

Posted by on in Blogs
Database Rootkits Another security issue to worry about: Rootkits refer to a set of tools used by crackers after breaking into a computer system to hide logins and processes under the control of an attacker from detection. Kornbrust said a database rootkit for Oracle systems would hide the Oracle execution path, database users, processes and jobs as well as modifying internal functions. Database rootkits would be implemented by either modifying a database object or changing the execution path, for example by cr...
Tags: Databases

Posted by on in Blogs
Security Holes in Sybase I could tell you about news of eight security holes in Sybase Adaptive Server Anywhere, but then I'd have to shoot you: Dublin, Calif.-based Sybase this week sent a letter to Next Generation Security Software Ltd. warning of legal consequences if it went ahead with plans to release information about the flaws it discovered in Version 12.5.3 of Sybase's Adaptive Server Enterprise (ASE) software. Surrey, England-based NGS initially disclosed the existence of the flaws only to Sybase, which relea...
Tags: Databases

Posted by on in Blogs
Rdb History Here is an ad (circa 1984) for "two new relational database products, VAX Rdb/VMS and VAX Rdb/ELN" along with Datatrieve 3.0. And this is a history of Rdb/VMS. InterBase users will see some familiar terminology....

Posted by on in Blogs
Multiversion Concurrency Control Before InterBase I've been doing some reading in the area of concurrency theory, and, interestingly, have found some citations on the use of multiple record versions for concurrency control and recovery which predate InterBase. The Birth of InterBase First, some InterBase history. According to this timeline Jim Starkey started writing JRD -- a personal project which would later grow into InterBase -- between 1981 and 1984 while at DEC. Ann Harrison states that: [Jim] began playing with shadowing, which he saw a...

Check out more tips and tricks in this development video: