Your SlideShare is downloading. ×
0
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

MySQL Proxy. From Architecture to Implementation

5,789

Published on

Slides from MySQL Proxy: From Architecture to Implementation presented at OSCON 08 by Ronald Bradford of 42SQL and Giuseppe Maxia of Sun Microsystems.

Slides from MySQL Proxy: From Architecture to Implementation presented at OSCON 08 by Ronald Bradford of 42SQL and Giuseppe Maxia of Sun Microsystems.

Published in: Technology
0 Comments
12 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
5,789
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
341
Comments
0
Likes
12
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. MySQL Proxy From architecture to implementation Giuseppe Maxia Ronald Bradford MySQL Community Team Lead Independent consultant Sun Microsystems This work is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported License.
  • 2. Raise your hand This work is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported License.
  • 3. Raise your hand  Who has heard of MySQL Proxy ? This work is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported License.
  • 4. Raise your hand  Who has heard of MySQL Proxy ?  Who has tried out MySQL Proxy ? This work is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported License.
  • 5. Raise your hand  Who has heard of MySQL Proxy ? 

×