云中漫步 颠覆创新_创业邦春季创新峰会主题演讲 Cloud Innovation in ChinaChinaNetCloud
?
President of ChinaNetCloud, Yinan Gu's keynote speech at 2016 DEMO CHINA in Beijing, May 11.
Cloud Innovation in China, Speech at DEMO China in May, 2016 in Bejing by Yinan Gu, ChinaNetCloud's President (in Mandarin)
Pegasus: Designing a Distributed Key Value System (Arch summit beijing-2016)涛 吴
?
This slide delivered by Zuoyan Qin, Chief engineer from XiaoMi Cloud Storage Team, was for talk at Arch summit Beijing-2016 regarding how Pegasus was designed.
MySQL 5.7 includes several new features that improve performance, replication, and high availability. Key features include performance improvements from the performance schema and optimizer enhancements, replication improvements like multi-source replication and transaction-based parallel replication, and InnoDB improvements such as online operations and general tablespaces.
SQL Tuning02-Intorduction to the CBO OptimizerZhaoyang Wang
?
This document provides an introduction to the Cost-Based Oracle Optimizer (CBO). It describes the main components of the CBO including the estimator, plan generator, and OPTIMIZER_MODE. It also discusses important CBO concepts like selectivity, cardinality, cost and how they are estimated. The document provides examples of how to view CBO statistics and use 10053 tracing to analyze plans.
SQL Tuning04-Interpreting Execution PlansZhaoyang Wang
?
This document discusses various methods for interpreting SQL execution plans in Oracle databases, including using the PLAN_TABLE, views like V$SQL_PLAN, and tools like DBMS_XPLAN and AUTOTRACE. It also covers gathering plan statistics and interpretation from sources like the Automatic Workload Repository (AWR).
SQL Tuning01-Introduction to SQL TuningZhaoyang Wang
?
This document provides an introduction to SQL tuning. It discusses common causes of poor SQL performance such as stale statistics, missing indexes, and suboptimal execution plans. It then describes Oracle tools that can be used for SQL tuning such as the Automatic Database Diagnostic Monitor and SQL Tuning Advisor. Various SQL performance metrics are covered like wait time and how it relates to CPU and I/O times. Common SQL performance problems are also listed like parsing issues, full table scans, and redo log configuration errors. Finally, techniques for SQL tuning are discussed such as query rewrites, materialized views, and cursor sharing.
This document provides an overview of MySQL full-text search capabilities. It discusses the three types of full-text searches supported: natural language, boolean, and query expansion searches. It also covers stopwords, relevance ranking calculations, and techniques for fine-tuning full-text search performance such as configuring minimum/maximum word lengths and optimizing indexes. The document concludes with some restrictions and best practices for MySQL full-text search.
The document summarizes the key data structures used to organize data in InnoDB:
- InnoDB stores data in tablespaces which consist of data files. A tablespace header tracks free/used extents within these files.
- Data files contain fixed-size pages which are organized into extents of 1MB each. Page headers identify page types like interior, leaf, etc.
- File segments allocate ranges of pages to index trees. The root node of each index references two segment headers to allocate leaf/non-leaf pages separately.
MYSQLCLONE is a free and simple tool used to clone MySQL databases from one server to another. It can transfer the entire database including data, schemas, stored procedures, functions and events. The tool connects to the source and destination databases using connection parameters and then transfers the database objects and data in either LOAD or INSERT mode. Quick usage examples are provided to demonstrate transferring the full database, schema objects only, and row data in INSERT mode.
Oracle security 08-oracle network securityZhaoyang Wang
?
The document discusses securing Oracle Network services. It provides checklists and procedures for securing clients, the network, and the listener. It recommends configuring clients and browsers with authentication and encryption. It also recommends restricting network access through firewalls and IP address validation. For the listener, it suggests restricting privileges, password protecting administration, and monitoring logs to analyze activity and potential attacks. The goal is to describe how to securely administer the network and listener to restrict access and analyze logs for security.
Oracle security 02-administering user securityZhaoyang Wang
?
This document discusses administering user security in an Oracle database. It covers how to create and manage database user accounts, including authenticating users and assigning privileges. It also covers creating and managing roles to simplify privilege management, and creating profiles to implement password security and control resource usage. Profiles allow enforcing standards for password complexity, aging, locking accounts, and limiting resource consumption. The document stresses applying the principle of least privilege and separating administrative duties for security.
20. ?方案对?比3:虚拟全备技术
受保护的数据库
Delta Push
RMAN(Recovering Image Copies)
? 使?用增量量备份来恢复镜像拷?贝
? 不不需要每次都执?行行镜像拷?贝
? ?一旦恢复,?无法还原到之前的时间点
ZDLRA
? 基于指针呈现物理理全备份
? 节省10倍存储空间,保留留更更?长久的备份数据
? 快速恢复到任意时间点
Day 0?
Full
Day 1?
Incr
Day N?
Incr
Day ‘N’ Full Backup
Day N?
Incr
Day 1 Virtual Full
Day N Virtual Full
Day 1?
Incr
Day 0?
Full
增量量备份?文件
数据?文件
镜像拷?贝
RMAN> RECOVER COPY OF?
2> DATAFILE {n|'file_name'}
“Time Machine” for
database