許毓仁委員20160711質詢財政部丁克華
台灣的FDI不如周邊國家,世界倒數第5名,如何做亞洲青年IPO中心?政府的亞洲矽谷計畫,又如何能以亞洲青年IPO中心作為計畫的KPI,讓亞洲矽谷成為癡人說夢的計畫?
FDI投資太少,表示外國企業對未來沒有期待、政府對台灣的未來沒有想像,台灣跟其他國家相比而言是「no story to tell」,要如何讓台灣看見,我知道還有很長的路要走,未來要一起努力。
我希望能推動天使投資抵稅減稅,所以質詢時問:「請問天使投資減稅抵稅的可行性如何?」財政部政次蘇建榮上台回答:「產創條例已經有相關規定。」這讓我很疑惑,因為產創條例訂的是補助方法,而非減稅抵稅。產創條例的減稅抵稅相關法規,才剛過一讀程序而已,而且還是我提的,才準備要付委員會審查,原來行政官員也在癡人說夢。
最後,我要再說一次:「沙盒監管機制」,這不僅對科技金融重要,也對新創公司很重要,財政部說已經在研究,我希望他們是說真的。
MySQL 5.7 includes several new features that improve performance, replication, and high availability. Key features include performance improvements from the performance schema and optimizer enhancements, replication improvements like multi-source replication and transaction-based parallel replication, and InnoDB improvements such as online operations and general tablespaces.
SQL Tuning02-Intorduction to the CBO OptimizerZhaoyang Wang
?
This document provides an introduction to the Cost-Based Oracle Optimizer (CBO). It describes the main components of the CBO including the estimator, plan generator, and OPTIMIZER_MODE. It also discusses important CBO concepts like selectivity, cardinality, cost and how they are estimated. The document provides examples of how to view CBO statistics and use 10053 tracing to analyze plans.
SQL Tuning04-Interpreting Execution PlansZhaoyang Wang
?
This document discusses various methods for interpreting SQL execution plans in Oracle databases, including using the PLAN_TABLE, views like V$SQL_PLAN, and tools like DBMS_XPLAN and AUTOTRACE. It also covers gathering plan statistics and interpretation from sources like the Automatic Workload Repository (AWR).
SQL Tuning01-Introduction to SQL TuningZhaoyang Wang
?
This document provides an introduction to SQL tuning. It discusses common causes of poor SQL performance such as stale statistics, missing indexes, and suboptimal execution plans. It then describes Oracle tools that can be used for SQL tuning such as the Automatic Database Diagnostic Monitor and SQL Tuning Advisor. Various SQL performance metrics are covered like wait time and how it relates to CPU and I/O times. Common SQL performance problems are also listed like parsing issues, full table scans, and redo log configuration errors. Finally, techniques for SQL tuning are discussed such as query rewrites, materialized views, and cursor sharing.
This document provides an overview of MySQL full-text search capabilities. It discusses the three types of full-text searches supported: natural language, boolean, and query expansion searches. It also covers stopwords, relevance ranking calculations, and techniques for fine-tuning full-text search performance such as configuring minimum/maximum word lengths and optimizing indexes. The document concludes with some restrictions and best practices for MySQL full-text search.
The document summarizes the key data structures used to organize data in InnoDB:
- InnoDB stores data in tablespaces which consist of data files. A tablespace header tracks free/used extents within these files.
- Data files contain fixed-size pages which are organized into extents of 1MB each. Page headers identify page types like interior, leaf, etc.
- File segments allocate ranges of pages to index trees. The root node of each index references two segment headers to allocate leaf/non-leaf pages separately.
MYSQLCLONE is a free and simple tool used to clone MySQL databases from one server to another. It can transfer the entire database including data, schemas, stored procedures, functions and events. The tool connects to the source and destination databases using connection parameters and then transfers the database objects and data in either LOAD or INSERT mode. Quick usage examples are provided to demonstrate transferring the full database, schema objects only, and row data in INSERT mode.
Oracle security 08-oracle network securityZhaoyang Wang
?
The document discusses securing Oracle Network services. It provides checklists and procedures for securing clients, the network, and the listener. It recommends configuring clients and browsers with authentication and encryption. It also recommends restricting network access through firewalls and IP address validation. For the listener, it suggests restricting privileges, password protecting administration, and monitoring logs to analyze activity and potential attacks. The goal is to describe how to securely administer the network and listener to restrict access and analyze logs for security.
Oracle security 02-administering user securityZhaoyang Wang
?
This document discusses administering user security in an Oracle database. It covers how to create and manage database user accounts, including authenticating users and assigning privileges. It also covers creating and managing roles to simplify privilege management, and creating profiles to implement password security and control resource usage. Profiles allow enforcing standards for password complexity, aging, locking accounts, and limiting resource consumption. The document stresses applying the principle of least privilege and separating administrative duties for security.
23. 混合云管理理规划
CMP - 传统IT及混合云资源纳管
统?一界?面 统?一编排 统?一管理理
?大数据服务 中间件服务对象服务 数据库服务?文件服务
OpenStack VMWare
阿?里里云
公有云
腾讯云 VM VM VM VM VM VM
X86服务器?/超融合?一体机未纳管
已纳管
可部署