Database War Stories

Published: April 28, 2006 - 7:47pm

The 2006 MySQL User Conference was this week. As part of his research, Tim O’Reilly asked several Web 2.0-related companies how they use databases. If you haven’t seen the posts on O’Reilly Radar, they’re Web 2.0 and Databases Part 1: Second Life, Database War Stories #2: bloglines and memeorandum, Database War Stories #3: Flickr, Database War Stories #4: NASA World Wind, and Database War Stories #5: craigslist.

There’s a lot for purists to hate, but given the choice between making it work and making it perfect, I’ll choose the former every time, then do my best to refactor toward the latter. (More on database agility next week.)

Trackback URL for this post:

/trackback/1334

Keeping Backup Simple: Purchasing the Right Systems To put it simply, data protection is complicated. Simplifying it involves assessing solutions for their near-term and long-term value. This paper examines the less obvious- but not less important - issues in simplifying backup.

Ensuring Security and Compliance through Automated Patch Management Today's data centers are increasingly under attack. Hackers are able to compromise organizational security within minutes or days of a vulnerability announcement. In the face of today's security challenges, IT organizations are forced to respond quickly, decisively and efficiently in patching systems while minimizing any downtime impact.

How Do You Protect Your Company From Spyware? The free White Paper proposes breakthrough solutions to counteract the Spyware problem. 8e6 Technologies provides high-value security appliances to manage Internet-related threats through filtering reporting and remediation. Save your company much expense and grief in combating Spyware. Get the Free White Paper.


( Related: Software Development )