o/firebird-devel
--
Jim Starkey, AmorphousDB, LLC
Firebird-Devel mailing list, web interface at
https://lists.sourceforge.net/lists/listinfo/firebird-devel
list, web interface
athttps://lists.sourceforge.net/lists/listinfo/firebird-devel
--
Jim Starkey, AmorphousDB, LLC// Copyright (c) 2014 by James A. Starkey. All rights reserved.
#pragma once
#include "Stream.h"
#include "StringClass.h"
#include "UUId.h"
#include
on level?
Thanks to anyone for any input.
Best and regards,
Pól...
Firebird-Devel mailing list, web interface
athttps://lists.sourceforge.net/lists/listinfo/firebird-devel
--
Jim Starkey, AmorphousDB, LLCFirebird-Devel mailing list, web interface at
https://lists.sourceforge.net/lists/listinfo/firebird-devel
ote:
https://en.wikipedia.org/wiki/Multiversion_concurrency_control#History
Szía Attila, és köszi!
Hi Attila, and thanks!
Pól...
Firebird-Devel mailing list, web interface at
https://lists.sourceforge.net/lists/listinfo/firebird-devel
--
Jim Starkey, AmorphousDB, LLC
Firebird-Devel mailing
rebird pie!
There is a very good reason that multi-version concurrency control won
out big time (Wikipedia lists 80+ database systems with MVCC).
Interbase was the second.
Just as a matter of historical interest, which was the first database to
release with MVCC? Oracle?
Best regards,
Pól...
J
...
That is already supported by "snapshot" (isc_tpb_consistency) transactions, no?
If not, how is it different, aside from the connection vs. transaction level?
Sean
Firebird-Devel mailing list, web interface at
https://lists.sourceforge.net/lists/listinfo/firebird-devel
--
Jim Starke
interface at
https://lists.sourceforge.net/lists/listinfo/firebird-devel
--
Jim Starkey, AmorphousDB, LLC
Firebird-Devel mailing list, web interface at
https://lists.sourceforge.net/lists/listinfo/firebird-devel
? I see that it forces engine to start a
transaction and that's all.
--
Jim Starkey, AmorphousDB, LLC
Firebird-Devel mailing list, web interface at
https://lists.sourceforge.net/lists/listinfo/firebird-devel
ole" to refresh the current roles.
I was thinking the profiler should not touch profiled attachments at
all. It might influence its logic.
--
Jim Starkey, AmorphousDB, LLCFirebird-Devel mailing list, web interface at
https://lists.sourceforge.net/lists/listinfo/firebird-devel
DZ2ZwBHN0aW1lAzE1Nzg1OTA3MzE->
• Privacy
<https://info.yahoo.com/privacy/us/yahoo/groups/details.html> •
Unsubscribe
<mailto:firebird-architect-unsubscr...@yahoogroups.com?subject=Unsubscribe>
• Terms of Use <https://info.yahoo.com/legal/us/yahoo/utos/terms/>
.
__,_._,_
On 4/7/2016 11:12 AM, Dimitry Sibiryakov wrote:
> 14.03.2016 10:13, Alex Peshkoff wrote:
>> There is a least one reason why expansion is needed (I have no idea how
>> can it be avoided) in yvalve. "Providers" config parameter is
>> per-database configurable, i.e. to have correct list of providers
On 4/6/2016 12:47 PM, Dmitry Yemanov wrote:
> 06.04.2016 19:00, Jim Starkey wrote:
>
>> I suggest that FB4 get completely out of the business of passing
>> database file names over the API and go strictly with something like a
>> URL that identifies the location and nam
With some remorse, I recently realized that the PathName class and file
name matching is my fault as is the larger problem of a client
identifying a database by filename. It has never worked well, and if
pushed, works badly. File names are excellent for opening files and bad
almost anything
On 3/31/2016 4:26 AM, marius adrian popa wrote:
> I think Jim Starkey will love this
> https://blogs.msdn.microsoft.com/vcblog/2016/03/30/visual-c-for-linux-development/
>
Well, not quite ready for prime time. But the only serious problem I
ran into was that Visual Studio crashed
On 3/28/2016 10:25 AM, Dimitry Sibiryakov wrote:
> 28.03.2016 16:16, Jim Starkey wrote:
>> nothing else was more suitable.
> But still clone of Firebird repository is 10 times bigger than its
> sources.
>
That's an interesting question. I don't know the answer, but somebod
On 3/28/2016 10:06 AM, Dimitry Sibiryakov wrote:
> 28.03.2016 15:29, Alex Peshkoff wrote:
>> Somewhy that zip link is awfully slow - download took 2m 12s (compare
>> with Firebird-3.0.0.32366-ReleaseCandidate2.tar.bz2 at SF mirror, 24s)
> Git is not suitable for large projects with long
On 3/24/2016 10:50 AM, Adriano dos Santos Fernandes wrote:
>>Creating a new BLR version number doesn't make sense since
>> it is hoped that future versions of Firebird will treat BLR as at most a
>> legacy interface.
>>
> So you suggest Java .class go away? Compile source code dynamically and
Talking advantage of a discounted sale price, I recently bought a
notebook to replace my elderly boat computer. Taking advantage of a
deeply appreciation observation on this list, I download, among many
other things, the "Community" version of Visual Studio 2015, and
preceded to move a
On 3/24/2016 9:24 AM, Adriano dos Santos Fernandes wrote:
> On 08/03/2016 10:02, Dmitry Yemanov wrote:
>> All,
>>
>> The good thing is that the code internals are more or less ready to work
>> with context/stream number of any size, thanks to Claudio's refactoring.
>> So the issue is mostly about
On 3/23/2016 1:18 PM, Michal Kubecek wrote:
> On Wed, Mar 23, 2016 at 10:59:20AM -0400, Jim Starkey wrote:
>> Defining your own macro layer gives you cheap portability and a zero
>> overhead implementation.
> That's one side of it. The other is that for occasional contributors
On 3/23/2016 5:04 AM, Vlad Khorsun wrote:
> All,
>
> in new codebase (v4) we going to use atomic operations more intensively than
> before. The question is: could we use standard features of C++11 or should
> choose some 3rd party library (such as libatomic_ops) for it ?
>
> The main
On 3/22/2016 8:33 AM, Dimitry Sibiryakov wrote:
> Hello, All.
>
> Because there is nothing like isc_spb_lc_ctype, must be established a
> rule for
> determining of encoding of all strings passed into services and back. I
> suggest to use
> following:
> If isc_spb_utf8_filename is
On 3/16/2016 8:49 AM, Lester Caine wrote:
On 16/03/16 11:39, James Starkey wrote:
Or simply restrict database file names to ASCII. It's not like users
have to deal with them, just like they don't have to deal with
identifiers in SQL, or C or Java.
As someone linguistically challenged, I have
My experimentation with git submodules was completely successful.
Basically trivial.
To enable, in the project root directory, do a
git submodule add
In the project CMakeLists.txt add something like
add_subdirectory ( EXCLUDE_FROM_ALL)
This will prevent unreferenced
On 3/17/2016 6:56 AM, Dimitry Sibiryakov wrote:
> 17.03.2016 11:24, Paul Beach wrote:
>> I am now trying to work out exactly what I need
>> to do to start committing some of my changes for the Mac Port for 3.0
>> back into git...
> I may be wrong, but you cannot create a pull request from
Could somebody explain why Firebird is in the filename translation
business at all? Other than the need for the inet remote interface to
follow symbolic links, historically this has not been necessary. It
clearly isn't needed to open the file.
If the purpose is to server as the root of the
On 3/14/2016 8:29 AM, Michal Kubecek wrote:
> On Mon, Mar 14, 2016 at 11:20:34AM +, Lester Caine wrote:
>> The fact that git does not handle modular projects at all well was my
>> main objection to being forced to use it. CVS had it's faults, but also
>> it's good points, and being able to
If any serious thought is going to be given to internalizing SQL to
support SQL rather than GDML in MET, you might think about changing how
system tables are handled during start up with an eye to both
flexibility and simplicity.
Here is how I've done system startup on post-Interbase database
On 3/9/2016 2:02 PM, Vlad Khorsun wrote:
> We don't have SQL/GDML sources for many system triggers, just the byte-code.
> They
> could be reverse engineered, but I'd rather throw away system triggers
> at all and embed their functionality directly into the engine.
>> I wrote a (not complete) tool
On 3/9/2016 11:29 AM, Dimitry Sibiryakov wrote:
> 09.03.2016 17:25, Jim Starkey wrote:
>> Am I missing something, or will a custom build step in Visual Studio
>> handle the problem?
> You're missing Vlad's disagreement.
>
I haven't been following this closely, but ho
Is there a plan to phase out BLR? Full support of SQL in the engine
would allow MET to switch to SQL, eliminate the build dependency of GPRE
(which seems to be getting long in tooth), simplify startup, and
eliminate the 256 context problem.
BLR was created to allow a language neutral
On 3/9/2016 10:22 AM, Adriano dos Santos Fernandes wrote:
> On 09/03/2016 12:09, Dimitry Sibiryakov wrote:
>> 09.03.2016 15:54, Alex Peshkoff wrote:
>>> Dmitry - I'm surprised much with that time. What 386 box are you
>>> building on? :)
>> AMD A4-1250, but I can't use both cores for build
AmorphousDB, ironically, doesn't have blobs, per se. It has an "opaque"
type, but the decision as whether a particular large object is stored as
part of the record or as a separate database object.
The Rdbs, Interbase, and Firebird have supported a numerical blob type
to support automatic
Netfrastructure had a large law firm that went paperless. All
correspondence was generated by the application and stored in the
database as a PDF blog. All incoming correspondence was scanned in the
mail room and stored in the database as a blob. The amount of daily
blob data was enormous,
!
-Original Message-
From: Ann Harrison <a...@qbeast.net>
To: For discussion among Firebird Developers
<firebird-devel@lists.sourceforge.net>
Sent: Thu, 03 Mar 2016 18:37
Subject: Re: [Firebird-devel] RFC: Tablespaces
On Thu, Mar 3, 2016 at 1:02 PM, Jim Starkey <j...
On 3/3/2016 11:43 AM, Vlad Khorsun wrote:
> 03.03.2016 17:57, Jim Starkey wrote:
>> The place to start is with a clear, well understood, and agreed set of
>> requirements. Here is a suggested starting point.
>>
>> First, some definitions. A "data space" is t
On 3/3/2016 11:10 AM, Dmitry Yemanov wrote:
> Am I missing something obvious?
Yeah. Data.
> Dmitry
> --
>
> Site24x7 APM Insight: Get Deep Visibility into Application Performance
> APM + Mobile APM + RUM: Monitor 3
On 3/1/2016 11:29 AM, Dimitry Sibiryakov wrote:
> 01.03.2016 17:14, Jim Starkey wrote:
>> The "error prone" argument gets tossed around a lot, but I generally
>> don't buy it. Language features are not a substitute for testing. Sure,
>> "override&qu
On 3/1/2016 10:21 AM, Dimitry Sibiryakov wrote:
> 01.03.2016 16:14, Jim Starkey wrote:
>>Dropping support for platforms so you can use new C++
>> features that really don't add anything to the language.
> More readable and error-prone code worth that, IMHO.
>
More
On 3/1/2016 11:10 AM, Mark Rotteveel wrote:
> Maybe it's changed, but the freebie versions tend not to support MFC,
> which I need for historical reasons.
> That was Visual Studio Express, Visual Studio Community is equivalent
> to Visual Studio Professional with the exception of some TFS support
ing about firebird - no fees required
> to use it.
Maybe it's changed, but the freebie versions tend not to support MFC,
which I need for historical reasons.
> On 1 March 2016 at 18:21, Dimitry Sibiryakov <s...@ibphoenix.com> wrote:
>> 01.03.2016 16:14, Jim Starkey wrote:
>>>
On 3/1/2016 8:38 AM, Dimitry Sibiryakov wrote:
> 01.03.2016 14:20, Dmitry Yemanov wrote:
>> They may be maintained by someone else. We don't require our sources to
>> be built using VS 2013 exclusively.
> Yes, but VS 2010 doesn't support member initialization on declaration
> (very handy
>
On 2/29/2016 2:19 AM, Michal Kubecek wrote:
> .
>
> Question: Does this problem would also affect the compiled client
> library? Or do you guys also think nobody using Win XP/2003 will needs
> to connect to Firebird?
> First, the discussion is about a version which, extrapolating from
> previous
BLR uses a byte for context variables. It's my fault. Ann will explain
that I am a victim of the 16 bit depression. Not in my wildest dreams
could I image that your run of the mill $35 SMP computer would come with
a gigabyte of memory.
There probably isn't a workaround.
On 2/16/2016 10:58
OK, safe primes are "better" than ordinary primes in theory. But as I
said, in practice, the strength of the authentication is based on the
two random numbers, which are not exchanged. Any weakness of the price,
group, or generator is of use for breaking the verifier, not the
authentication
On 1/21/2016 12:41 PM, Dimitry Sibiryakov wrote:
> 21.01.2016 18:20, Leyne, Sean wrote:
>> Operationally, your app will die/fail which you try to exceed the Windows
>> FD_Size value -- it is a OS level limit.
> Nope, it is truly set at compile time and only application-defined
> structures
Hallelujah, Carlos!
At MySQL, I argued for SQL compliance until I was blue in the face but
without noticeable effect.
Database systems should have strings. Period. Not fixed strings,
variable strings, or bounded strings. String comparisons should be
blank extended. Nobody should ever have
In virtual all cases involving updates of non-interlocked data
structures, the logic is -- and must be:
for (;;)
{
if ()
if ()
}
About the only exceptions are interlocked increment and decrement for
very simple
, Dimitry Sibiryakov wrote:
> 08.12.2015 16:29, Jim Starkey wrote:
>> In virtual all cases involving updates of non-interlocked data structures,
>> the logic is --
>> and must be:
> Unfortunately, this logic doesn't work quite well for bit flags.
> Consider two thr
On 12/8/2015 11:25 AM, Dimitry Sibiryakov wrote:
> 08.12.2015 17:12, Jim Starkey wrote:
>> But I don't get the logic that saving 10 ns. is worth introducing a
>> bug.
> Could you elaborate what bug you have on mind?
>
>> I suppose there are cases where you want to
The original Interbase implementation had rational, aka reasonable,
arithmetic semantics.Your example is an excellent example of idiotic
semantics. Borland rewrote the code to conform what they, severely
lacking in working neurons, interrupted the SQL standard to require.
I care very
On 11/26/2015 7:38 AM, Dimitry Sibiryakov wrote:
> Hello, All.
>
> Can I be sure that "from" and "to" pointers got by plugins's
> encrypt/decrypt routines
> are always aligned to 16 bytes boundary?
>
I'm curious. Why does that matter?
From a developmental perspective, I think it makes more sense to first
develop an integrated authentication/encryption feature, then later, if
warranted, generalize it as a plugin. Trying to design a plugin
interface to subsystem that is not well understood awkward, difficult,
and likely to
On 11/15/2015 7:55 AM, Alex Peshkoff wrote:
> Presence of one surely known plain-text and corresponding encrypted
> text will be of great help to the potential attackers in such a case.
Really? Why do you think it would be a "great help." What useful
information is leaked? And how would a
On 11/14/2015 5:54 PM, Dimitry Sibiryakov wrote:
> 14.11.2015 23:16, Jim Starkey wrote:
>> So here's a simple scheme. The basic idea of a redundant set of
>> lightweight key servers running at various points in the network. When a
>> database wants to start up, it runs
On 11/14/2015 6:21 PM, Wols Lists wrote:
> On 14/11/15 22:16, Jim Starkey wrote:
>> While's it possible to fake the originator IP address with UDP, I don't
>> think it's possible with TCP.
> The attacker simply uses the same IP address as a valid client ???
>
> If the
On 11/14/2015 7:03 PM, Leyne, Sean wrote:
> Doesn't the need for a key server make the problem more complicated
> that required?
More complicated? Certainly. More complicated that required? Don't
know yet.
> Although I think it should be supported, via engine/config. I was
> referring to a
On 11/14/2015 9:48 AM, Dimitry Sibiryakov wrote:
> 10.11.2015 10:13, Alex Peshkoff wrote:
>> Does anybody see problems with suggested approach?
>> If not - I will add a ticket to the tracker for myself.
> After a good sleeping on it, I'm sure that verify the key by decrypting
> something kept
On 11/14/2015 3:51 PM, Leyne, Sean wrote:
> Jim,
>
>> If there's any interest, I have some ideas on how to handle unattended
>> startup of an encrypted database that we could kick around.
> I would like to have such a discussion, since I have found the discussion of
> the whole "key holder"
On 11/13/2015 10:58 AM, Jiří Činčura wrote:
> Hi *,
>
> May I kindly ask why the firebird.conf/databases.conf uses XML-like format
> (although it's not XML) but plugins.conf uses different one using curly
> braces etc.?
>
Firebird following the Linux/Unix convention that all product
On 11/11/2015 11:29 AM, Dimitry Sibiryakov wrote:
> 11.11.2015 16:22, Jim Starkey wrote:
>> Multiple inheritance with common base classes is, in fact, a mess. The
>> problem is that the C++ compiler can't really know whether two like
>> named methods in different classes
On 11/11/2015 6:52 AM, Adriano dos Santos Fernandes wrote:
> On 11/11/2015 09:37, Dimitry Sibiryakov wrote:
>> 11.11.2015 12:32, Adriano dos Santos Fernandes wrote:
>>> I can write almost any code mixing their common part in a single class,
>>> avoiding duplicate declarations, with our without
I've been trying not to get involved in this question, but it's not working.
JSON and XML are both complex formats that require formal parsers. JSON
can use a built-in parse, but that doesn't mean that a parser isn't
required. And one may reasonable argue than XML is more regular than
JSON
Uh, if you're talking about gds32.dll, I'm the original author.
Happily, I no longer support it.
On 11/9/2015 8:24 AM, JS-Ohjelmointi (J Sariola) wrote:
> I'm that software author. I'm testing software FB3 version before I
> distribute to clients.
>
> Why it's working with in other OS (Windows
On 11/9/2015 11:15 AM, Dimitry Sibiryakov wrote:
> 09.11.2015 16:49, Jim Starkey wrote:
>> For CBC mode, the initialization vector is XORed into the first block of
>> plaintext. Without this (or something like it), the first 16 bytes of
>> every page would have the same
On 11/9/2015 7:37 AM, Dimitry Sibiryakov wrote:
> 08.11.2015 20:12, Jim Starkey wrote:
>> Use the page number for the initialization vector.
> It is also pointless.
For CBC mode, the initialization vector is XORed into the first block of
plaintext. Without this (or so
On 11/8/2015 7:14 AM, Dimitry Sibiryakov wrote:
> 08.11.2015 12:34, James Starkey wrote:
>> Or have I missed sonething?
> RC4 is a stream cipher. For data pages it works much worse.
> Hardware-accelerated AES is an interesting idea, thanks.
>
You're absolutely right about stream ciphers
On 11/8/2015 12:25 PM, Dimitry Sibiryakov wrote:
> 08.11.2015 17:18, Jim Starkey wrote:
>> Keep in mind that you will need to use something other than ECB mode.
> Sure. But still there is a problem with first block and initialization
> vector. That's
> why I would like
A client side key really needs to be sent over an encrypted connection,
but establishing a session key is more than a little tricky. SSL, for
examples, uses public key encryption to pass random session keys where
the public key is on a certificate signed by recognized authority.
Requiring
I've been struggling with this issue for most of my professional life.
Going into the internal demo version of what eventually became PDP-11
Datatrieve, I required semi-colons as terminators. My technical writer
told me that that sucked, I was free to leave it that way, but the
documentation
On 10/15/2015 2:10 PM, Claudio Valderrama C. wrote:
>> Respectfully disagree. Yes, it complicates isql, but it
>> makes the user's life easier. One bit of complication in
>> isql, thousands of simpler to create triggers and procedures.
> And every change in FB's syntax will have to be mirrored
hould pick up that database server protocols don't provide such a
service, and without both an oracle and a bad padding mechanism, this
doesn't mean anything (and even if one did, it still would reveal the key).
>
> On 9/15/2015 7:42 PM, Jim Starkey wrote:
>> On 9/15/2015
ome of the problems with AES/CBC (known plaintext attack).
>
> Mark
>
> On Tue, 15 Sep 2015 11:22:22 -0400, Jim Starkey <j...@jimstarkey.net>
> wrote:
>> I've done some moderately careful performance apples to apples
>> comparisons for various crypto functi
I've done some moderately careful performance apples to apples
comparisons for various crypto functions with not very surprising
results. In general:
AES-NI < RC4 < ChaCha20 < AES (software)
The two AES functions, the Botan software version and the DJ Bernstein
NI (new instructions)
On 9/15/2015 12:24 PM, Leyne, Sean wrote:
> Jim,
>
>> I don't know of any known problems with AES/CBC. It is simply the most
>> trusted crypto algorithm in the history of computing. It isn't possible
>> prove
>> that something can't be broken, but many, many very smart people have
>> spent many
On 9/15/2015 12:57 PM, Leyne, Sean wrote:
>
>> None of these suggest that there is an attack -- read the comments.
> They refer to a possible attack and provide links to other sites. One of the
> sites has a link to the following:
>
>
On 9/10/2015 9:28 AM, Mark Rotteveel wrote:
> On 10-9-2015 09:29, Alex Peshkoff wrote:
> I need to keep switching
> between remote.cpp, interface.cpp, and inet.cpp
>> Feel lucky that you do not deal with windows - there are also xnet &
>> wnet in it ;)
> True ;)
>
Oh, there were even more. There
, this is not something I'm losing
sleep over.
Jim Starkey
> On Aug 31, 2015, at 2:01 AM, dbo...@poen.net wrote:
>
> Hi James,
>
> more numbers here.
>
> Soft. AES implementation vs AES-NI implementation, 512 MB, ECB mode of
> operation, single core, buffer size 32kB, Win
or by crook, taking over the server, forcing a database
server restart, and jumping in from the compromised client. But at that point,
you are so hopelessly compromised that nothing is going to work.
Jim Starkey
--
Firebird
You're excessing fussy. No one has ever found a SHA1 collision, let
alone a bogus hit. It is perfectly secure. It has known weaknesses,
but even with these known weaknesses, it is impossible to crack.
RC4 is perfectly secure. It is vulnerable to correlated keys as used in
WEP. But SRP
The theoretical basis of computer security and mutual authentication is
the concept of shared secrets. The most common implementations use
passwords. In Firebird, there are at least two implementation of
password based authentication, SRP verifiers and irreversible hash
algorithms. Each can
On 7/30/2015 12:06 PM, Claudio Valderrama C. wrote:
I purposely put a MODIFY of system tables in epp file without
considering dbb-readOnly() flag.
And it worked (changed the database) and committed the change.
Shouldn't that be prevent in lower layers?
Ideally, the low level layer should be
On 7/27/2015 11:31 AM, Ann Harrison wrote:
27.07.2015 1:24, Ann Harrison wrote:
Firebird was based on InterBase which was based on Rdb/ELN, an
implementation of DEC's [standard(!)] relational
interface. As part of DEC's VAX software empire, DSRI used
DEC's error
On 7/27/2015 8:35 AM, Alex Peshkoff wrote:
On 07/26/2015 10:36 PM, Jim Starkey wrote:
The bottom line is this: If you are going to change the password hash,
you are going to invalidate all existing passwords. But rather than
start over with an already flawed architecture, punt on storing
On 7/26/2015 2:38 PM, Alex Peshkoff wrote:
On 07/26/2015 01:39 PM, James Starkey wrote:
If you were starting over from scratch, you wouldn't want to use SHA-1 to
avoid wasting time with discussions like this. See also RC4. But the
problem with SHA-1 doesn't justify the inconvenience of
On 6/24/2015 9:26 AM, Adriano dos Santos Fernandes wrote:
On 24/06/2015 10:06, Alex Peshkoff wrote:
which are transformed to this in empbuild.c
isc_vtov ((char*) job_code, (char*) isc_36.isc_39, 21);
isc_vtov ((char*) job_country, (char*) isc_36.isc_40, 61);
Confirmed on linux.
On 5/31/2015 5:33 AM, Dimitry Sibiryakov wrote:
31.05.2015 9:17, Mark Rotteveel wrote:
The problem is probably that there is still an active transaction at
that point, where before it was already committed or rolled back.
Prepared statements are not bound to a transaction, they (and I
On 5/30/2015 10:48 AM, Dmitry Yemanov wrote:
30.05.2015 11:29, Mark Rotteveel wrote:
To better understand the implications of the pull request by Maxim, I'd
like to know the semantics of isc_tpb_autocommit. Is this documented
anywhere?
I'm not aware of any place.
I'd especially like to
Isn't it awfully confusing that a name that just happens to be all Ascii is
case insensitive but one with a non-ASCII character is case sensitive?
If you know the character set and the upcasing rules, why not upcase all
non-quoted identifiers?
Jim Starkey
On May 7, 2015, at 6:47 AM, Alex
Hmm. Hard to miss that gobs of cycles are being wasted passing both a thread
and a request object around. Since the request can only execute at any point
on a single thread, the request object can point to the active thread.
Jim Starkey
On Apr 6, 2015, at 2:06 PM, Dimitry Sibiryakov s
Adriano, it perpetually amazes me that somebody with such a keen sense of
database design doesn't dazzle the world with a brilliant new database rather
than continuously harping about the design of a 30 year old retread database
system.
On Mar 21, 2015, at 6:46 PM, Adriano dos Santos
On Mar 21, 2015, at 2:35 PM, Kovalenko Dmitry dmitry.lipe...@gmail.com
wrote:
Look to OLE DB properties.
Each property has the unique ID: GUID.Number.
Bad idea for many reasons:
1. Not upwards compatible from existing scheme
2. Gross overkill
3. GUIDs can't be
, GPL is useful for open source but closed development to enable dual
open source / propietary commercial licensing (the model MySQL used). This is,
however, incompatible with community development.
So to paraphrase Adriano, please state the problem before the solution.
Jim Starkey
On Mar 13
On Mar 5, 2015, at 2:30 PM, Roman Simakov roman.sima...@gmail.com wrote:
5 марта 2015 г., в 20:26, Jim Starkey j...@jimstarkey.net написал(а):
read imaginary»
Is it not the same as read uncommited? :)
Oh, certainly not! Read imaginary invents whole new record(s) conforming
On Mar 5, 2015, at 1:04 PM, Ann Harrison aharri...@nimbusdb.com wrote:
On Mar 5, 2015, at 11:26 AM, liviusliv...@poczta.onet.pl
liviusliv...@poczta.onet.pl wrote:
Hi,
It is usefull for testing purposes. Consider monitoring what actually is in
some table from other connection or
I don't think you can change the license for modules from individuals without
their permission. Vulcan modules explicitly forbid a change of license.
Jim Starkey
On Mar 5, 2015, at 4:16 AM, marius adrian popa map...@gmail.com wrote:
While there can we upgrade the license to mpl2 ?
http
zeros on ints, traling binary zeros on double, and traking blanks. The
encoding should address all of there. The only advantage run length encoding
should have is the ability to combine large numbers of consecutive zero ints.
Jim Starkey
On Mar 2, 2015, at 9:35 PM, Slavomir Skopalik skopa
makes sense, but practically, I
don't it buys much. A deep reorganzation, I believe, would have a much better
long term payoff.
But then maybe I missed your point...
Jim Starkey
On Feb 28, 2015, at 10:30 AM, Slavomir Skopalik skopa...@elektlabs.cz wrote:
Hi Jim,
I don't want to change
schemes could be added at will for either experimental purposes or for
table specific special schema.
Whether this is worth doing is a decision I will leave to others.
Jim Starkey
--
Dive into the World of Parallel
That's simple. It throws an exception. Or, if you want, it does an automatic
rollback (logically correct, but probably more dangerous).
Jim Starkey
On Feb 25, 2015, at 4:43 PM, Dmitry Yemanov firebi...@yandex.ru wrote:
25.02.2015 23:28, Dimitry Sibiryakov wrote:
make release
1 - 100 of 218 matches
Mail list logo