This document discusses the 2GB file size limit in Oracle. It explains that the 2GB limit is due to how file sizes are stored internally in 32-bit systems using data types that can only address up to 2GB. While this limit exists in Oracle APIs and utilities, Oracle itself can support file sizes over 2GB through workarounds like using 64-bit APIs. It also outlines upgrades to later Oracle versions which remove the 2GB limit.
This document describes the setup of an Oracle 8.1.7 database on 3 IBM Linux boxes using AIX 4.3.3. It details the hardware specifications of the IBM server and storage configuration. It also describes the logical volume layout and file system configuration for Oracle software and data files across multiple volumes. Administrative privileges for the oracle account are also specified.
This document discusses Oracle database archiving. It describes how Oracle databases can be configured for archival logging or no archival logging. It also provides an example of using the archive log list command to check the archiving configuration and status of a database. Maintaining database archives is important for backup, recovery, and ensuring data protection and high availability.
Mixi saw increases in revenue and profits during the second quarter of 2008. Revenue was up 18.9% from the same period last year to 29.38 billion yen. Profits were up 9.8% to 29.91 billion yen. The number of monthly active users reached 15.68 million, with PC users seeing 49.9 billion page views and mobile users seeing 97.8 billion page views. The average time spent on the site per month was 2 hours and 22 minutes.
1. This document provides information about Moodle and how to install it using EasyPHP including the components needed like a web server, PHP, and database.
2. EasyPHP is recommended for installing Moodle as it bundles Apache, PHP, and MySQL to simplify the setup process. Some steps include uninstalling previous MySQL and PHP versions before installing EasyPHP.
3. The installation of EasyPHP involves downloading the setup file, running through the default installation process, and finishing the setup. Moodle is then ready to use along with all of its dependencies provided by the EasyPHP package.
The document compares Xen open source virtualization software to Citrix XenServer 5.0. XenServer provides more stability, security, and support than the open source Xen through features like automated patching, high availability options, and integration testing. It also supports more guests, CPUs, and memory than Xen. Citrix enhances Xen with its own proprietary functionality and provides a more complete virtualization platform than the Xen community through products and support.
This document discusses several services and APIs provided by Microsoft as part of its Windows Live platform. It summarizes key services like Live Search, Virtual Earth, Silverlight Streaming, Windows Live ID, Windows Live Contacts Control, and Windows Live Spaces Photo Control. Each service is briefly described along with links to developer documentation and APIs that allow integration into external applications and websites. The goal is to enable developers to leverage these Windows Live services and build richer online experiences across many devices and contexts.
1. Google created the Android OS to allow more people access information globally through mobile devices.
2. As an open source OS, Android allows for customization and new applications to be easily added.
3. Key aspects of Android include the Linux kernel, customizable environments, and ability for independent applications to be added by developers.
This document describes the setup of an Oracle 8.1.7 database on 3 IBM Linux boxes using AIX 4.3.3. It details the hardware specifications of the IBM server and storage configuration. It also describes the logical volume layout and file system configuration for Oracle software and data files across multiple volumes. Administrative privileges for the oracle account are also specified.
This document discusses Oracle database archiving. It describes how Oracle databases can be configured for archival logging or no archival logging. It also provides an example of using the archive log list command to check the archiving configuration and status of a database. Maintaining database archives is important for backup, recovery, and ensuring data protection and high availability.
Mixi saw increases in revenue and profits during the second quarter of 2008. Revenue was up 18.9% from the same period last year to 29.38 billion yen. Profits were up 9.8% to 29.91 billion yen. The number of monthly active users reached 15.68 million, with PC users seeing 49.9 billion page views and mobile users seeing 97.8 billion page views. The average time spent on the site per month was 2 hours and 22 minutes.
1. This document provides information about Moodle and how to install it using EasyPHP including the components needed like a web server, PHP, and database.
2. EasyPHP is recommended for installing Moodle as it bundles Apache, PHP, and MySQL to simplify the setup process. Some steps include uninstalling previous MySQL and PHP versions before installing EasyPHP.
3. The installation of EasyPHP involves downloading the setup file, running through the default installation process, and finishing the setup. Moodle is then ready to use along with all of its dependencies provided by the EasyPHP package.
The document compares Xen open source virtualization software to Citrix XenServer 5.0. XenServer provides more stability, security, and support than the open source Xen through features like automated patching, high availability options, and integration testing. It also supports more guests, CPUs, and memory than Xen. Citrix enhances Xen with its own proprietary functionality and provides a more complete virtualization platform than the Xen community through products and support.
This document discusses several services and APIs provided by Microsoft as part of its Windows Live platform. It summarizes key services like Live Search, Virtual Earth, Silverlight Streaming, Windows Live ID, Windows Live Contacts Control, and Windows Live Spaces Photo Control. Each service is briefly described along with links to developer documentation and APIs that allow integration into external applications and websites. The goal is to enable developers to leverage these Windows Live services and build richer online experiences across many devices and contexts.
1. Google created the Android OS to allow more people access information globally through mobile devices.
2. As an open source OS, Android allows for customization and new applications to be easily added.
3. Key aspects of Android include the Linux kernel, customizable environments, and ability for independent applications to be added by developers.
This document provides an overview and agenda for a presentation on cloud computing technologies and the cloud services model. It discusses different categories of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Specific examples are provided for each category. The presentation also covers technological developments in cloud computing and the transition to cloud-based services and applications.
This document contains descriptions of several techniques (methods) for measuring the amount of electric energy using automated information and measurement systems of commercial accounting units. It provides details of measurement methods for accounting units in various regions of Russia, including Zabaykalsky Krai and the Voronezh region. The document is available for purchase in multiple languages in electronic PDF format from the listed website.
This document is a PDF file containing technical information about the document structure and formatting. It includes objects like pages, images, and streams of encoded text. The summary provides high-level technical details without interpreting the full contents.
This document provides an overview of the ID-WSF (Identity Web Services Framework) in Japanese. It discusses the framework's architecture and components, including user agents, web service providers, discovery services, and protocols. Examples are given of how identity information like addresses and names can be shared between services while respecting user consent policies. The presentation aims to explain the key concepts and functions of the ID-WSF standard.
The document discusses release notes for PostgreSQL 8.4 and provides an overview of new features and improvements in this version, including:
1. Performance improvements such as visibility maps which optimize vacuum operations and reduce disk I/O.
2. Enhanced diagnostics including improved logging of query plans and added statistics collection.
3. Better support for high availability architectures through features like multi-master replication and improved restore capabilities.
This document contains summaries of several Russian language documents related to measuring and billing of electric energy and power using automated information systems. The summaries describe metrological verification (MVI) of electric parameters and energy consumption for various utility companies and railway systems using different information and measurement technologies. Keywords mentioned include electric energy, power, automated information and measurement systems, traction substations, and branches of energy companies.
UGC allows users to generate and share content such as text, images, and videos by placing it on online platforms for others to view. Examples of UGC include blogs, wikis, video and photo sharing sites, podcasts, microblogging, and social networks. Research estimates that by 2010, the number of times UGC content is downloaded will exceed 650 billion times, generating $8.5 billion in revenue for UGC-based businesses. Common categories of UGC include blogs, wikis, video and photo sharing sites, podcasts, microblogging, social networks, news sites, functional tools, and educational content.
This document summarizes Peter Zaitsev's presentation on MySQL query optimization. It provides tips for optimizing queries such as avoiding unnecessary queries, caching results, simplifying queries, and optimizing queries by adding indexes and changing queries and schemas. The presentation also discusses query execution plans, indexing techniques like covering indexes, and how to optimize queries using LIMIT, GROUP BY and other SQL clauses.
This document discusses using Web APIs, specifically the Google Chart API, to generate charts and graphs. It provides:
1) An overview of what a Web API is and how it can be used to access functionality from another application over HTTP.
2) A description of the Google Chart API and how it can be used to generate charts as PNG images by specifying parameters in a URL.
3) Details on common parameters for the Google Chart API including how to specify chart size, data, type, and colors.
This document discusses Windows 7 logo certification, including an overview of the certification process and requirements. It states that the certification process involves downloading and installing the Windows 7 logo certification tool, which runs automated tests and reports results. It also outlines the technical requirements and guidelines that applications must meet, such as being uninstallable, supporting 64-bit Windows systems, and following UAC standards.
The document discusses autonomous vehicle technology and the DARPA Grand Challenge (DGC). It provides background on DGC competitions from 2004-2007 to advance autonomous vehicle capabilities. It describes the sensors, hardware, and software systems used in the MIT team's entry, including perception, planning & control, and navigation subsystems to process sensor data and safely navigate the vehicle.
The document provides information about Curl, a software tool and programming library for transferring data with URLs. Some key points:
- Curl was developed at MIT in the 1990s and is now widely used for tasks like uploading web content and downloading files and web pages.
- It supports many protocols including HTTP, HTTPS, FTP, FTPS, SFTP, TFTP, DAP, Telnet, LDAP, LDAPS, DICT, FILE, POP3, IMAP, SMTP and RTSP.
- Curl's major advantages include its high performance, flexibility and ease of use for transferring data to and from servers.
- It is commonly used in other software products and web services and
The document appears to be a PDF file containing technical metadata and encoding information. It includes objects like pages, fonts, images and other resources that are typical of a PDF specification file. Numbers, hexadecimal codes and cryptic field names are used throughout to describe the internal structure and encoding of the PDF.
The document discusses the development of a web application using Adobe Flex and ActionScript. It describes creating a framework, displaying search result location information and listings, and implementing features like search and map clicks. The application will be compiled into a SWF file to run on Flash Player or as an AIR application.
This document discusses the creation of an AIR application called IketeruGourmet. It describes preparing files and folders for the application, including icons, library files, and source files. It also summarizes the contents of the application.xml file which describes the core properties of the AIR application. The main parts of the user interface are built in the IketeruGourmet.mxml file using the WindowedApplication component.
In this second installment of a three-part research paper series on the KOOBFACE botnet, Trend Micro threat researchers examine the botnet in more technical detail, chronicling its behavior and payloads.
This document provides an overview and agenda for a presentation on cloud computing technologies and the cloud services model. It discusses different categories of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Specific examples are provided for each category. The presentation also covers technological developments in cloud computing and the transition to cloud-based services and applications.
This document contains descriptions of several techniques (methods) for measuring the amount of electric energy using automated information and measurement systems of commercial accounting units. It provides details of measurement methods for accounting units in various regions of Russia, including Zabaykalsky Krai and the Voronezh region. The document is available for purchase in multiple languages in electronic PDF format from the listed website.
This document is a PDF file containing technical information about the document structure and formatting. It includes objects like pages, images, and streams of encoded text. The summary provides high-level technical details without interpreting the full contents.
This document provides an overview of the ID-WSF (Identity Web Services Framework) in Japanese. It discusses the framework's architecture and components, including user agents, web service providers, discovery services, and protocols. Examples are given of how identity information like addresses and names can be shared between services while respecting user consent policies. The presentation aims to explain the key concepts and functions of the ID-WSF standard.
The document discusses release notes for PostgreSQL 8.4 and provides an overview of new features and improvements in this version, including:
1. Performance improvements such as visibility maps which optimize vacuum operations and reduce disk I/O.
2. Enhanced diagnostics including improved logging of query plans and added statistics collection.
3. Better support for high availability architectures through features like multi-master replication and improved restore capabilities.
This document contains summaries of several Russian language documents related to measuring and billing of electric energy and power using automated information systems. The summaries describe metrological verification (MVI) of electric parameters and energy consumption for various utility companies and railway systems using different information and measurement technologies. Keywords mentioned include electric energy, power, automated information and measurement systems, traction substations, and branches of energy companies.
UGC allows users to generate and share content such as text, images, and videos by placing it on online platforms for others to view. Examples of UGC include blogs, wikis, video and photo sharing sites, podcasts, microblogging, and social networks. Research estimates that by 2010, the number of times UGC content is downloaded will exceed 650 billion times, generating $8.5 billion in revenue for UGC-based businesses. Common categories of UGC include blogs, wikis, video and photo sharing sites, podcasts, microblogging, social networks, news sites, functional tools, and educational content.
This document summarizes Peter Zaitsev's presentation on MySQL query optimization. It provides tips for optimizing queries such as avoiding unnecessary queries, caching results, simplifying queries, and optimizing queries by adding indexes and changing queries and schemas. The presentation also discusses query execution plans, indexing techniques like covering indexes, and how to optimize queries using LIMIT, GROUP BY and other SQL clauses.
This document discusses using Web APIs, specifically the Google Chart API, to generate charts and graphs. It provides:
1) An overview of what a Web API is and how it can be used to access functionality from another application over HTTP.
2) A description of the Google Chart API and how it can be used to generate charts as PNG images by specifying parameters in a URL.
3) Details on common parameters for the Google Chart API including how to specify chart size, data, type, and colors.
This document discusses Windows 7 logo certification, including an overview of the certification process and requirements. It states that the certification process involves downloading and installing the Windows 7 logo certification tool, which runs automated tests and reports results. It also outlines the technical requirements and guidelines that applications must meet, such as being uninstallable, supporting 64-bit Windows systems, and following UAC standards.
The document discusses autonomous vehicle technology and the DARPA Grand Challenge (DGC). It provides background on DGC competitions from 2004-2007 to advance autonomous vehicle capabilities. It describes the sensors, hardware, and software systems used in the MIT team's entry, including perception, planning & control, and navigation subsystems to process sensor data and safely navigate the vehicle.
The document provides information about Curl, a software tool and programming library for transferring data with URLs. Some key points:
- Curl was developed at MIT in the 1990s and is now widely used for tasks like uploading web content and downloading files and web pages.
- It supports many protocols including HTTP, HTTPS, FTP, FTPS, SFTP, TFTP, DAP, Telnet, LDAP, LDAPS, DICT, FILE, POP3, IMAP, SMTP and RTSP.
- Curl's major advantages include its high performance, flexibility and ease of use for transferring data to and from servers.
- It is commonly used in other software products and web services and
The document appears to be a PDF file containing technical metadata and encoding information. It includes objects like pages, fonts, images and other resources that are typical of a PDF specification file. Numbers, hexadecimal codes and cryptic field names are used throughout to describe the internal structure and encoding of the PDF.
The document discusses the development of a web application using Adobe Flex and ActionScript. It describes creating a framework, displaying search result location information and listings, and implementing features like search and map clicks. The application will be compiled into a SWF file to run on Flash Player or as an AIR application.
This document discusses the creation of an AIR application called IketeruGourmet. It describes preparing files and folders for the application, including icons, library files, and source files. It also summarizes the contents of the application.xml file which describes the core properties of the AIR application. The main parts of the user interface are built in the IketeruGourmet.mxml file using the WindowedApplication component.
In this second installment of a three-part research paper series on the KOOBFACE botnet, Trend Micro threat researchers examine the botnet in more technical detail, chronicling its behavior and payloads.
PHP-GTK allows developers to create desktop applications using PHP and the GTK+ toolkit. It provides language bindings that allow PHP code to interface with GTK+ classes. The presentation demonstrated several PHP-GTK applications, including a simple text editor called pedit. It also discussed challenges with PHP-GTK like its portability and PHP's performance for desktop applications.
Pontedera is a small town in Italy with around 28,000 inhabitants located between the historic cities of Pisa and Florence. Originally founded around 1100 as a bridge called Ponte over the Era River and guarded by Pisan soldiers to protect against Florentine armies, Pontedera is now a modern town known for the Piaggio vehicle factory and public art decorating its squares and streets.
This document is a tutorial that teaches how to vectorize a bitmap image in CorelDRAW. It explains how to import a bitmap logo, trace it to convert it to a vector image using PowerTRACE, and then replace the text within the logo by ungrouping objects, deleting the text and background, and creating new text along a curved path within the logo. The tutorial also previews the tracing results and allows adjustments to tracing settings. It aims to teach how to import, trace, draw shapes, ungroup objects, delete objects, type text on a path, and use various drawing tools.
The document provides a tutorial for blending a photo into a background image using layer masks and the gradient tool in Photoshop. The key steps include: opening the background image and photo layers; adding the photo as a layer and applying a layer mask; using the gradient tool to fade the edges of the photo layer mask from opaque to transparent; and refining the blend using brushes on the layer mask. Layer masks allow precisely blending a photo into a background or manipulating its opacity in selected areas.
This document discusses magnolia garland, a common Christmas decoration made from the leaves of magnolia trees. Magnolia garland is available from October through March, with glossy green leaves and brown undersides. It provides a large mass of greenery and background for holiday decorations, and can last 6-10 days when used. The document also defines garland as a decorative rope or cord used for festive occasions that can be made from plants, flowers, or other materials.
This tutorial demonstrates how to generate a color image of the Triangulum Galaxy (M33) from astronomical data files. FITS files containing broadband and narrowband images of M33 taken by the WIYN 0.9-meter telescope are imported into Photoshop as separate layers. Each layer is scaled to maximize contrast before being assigned a color. Combining the layers using a "Screen" blending mode produces the final color image.
D I A B E T E S A N D B H R A M A R I D R S H R I N I W A S K A S H A L ...banothkishan
The document discusses how the pranayama technique called Bhramari can help overcome common respiratory infections associated with diabetes. Bhramari involves humming with the fingers placed in specific positions on the face and ears during prolonged expiration. It is believed to work through internal vibrations produced, stimulating internal organs like the sinuses, throat, and larynx. While more clinical trials are needed, the author finds Bhramari to be a calming and soothing activity.
This document summarizes a CakePHP meetup event in Osaka, Japan. It introduces the speaker, Yusuke Ando, discusses some CakePHP news and releases, and focuses on useful CakePHP plugins like debug_kit and api_generator that provide debugging and API documentation generation capabilities. Examples and setup instructions are provided for effectively using these plugins.
This document provides summaries and links to various Firefox add-ons. It summarizes the purpose and functionality of add-ons for managing tabs, bookmarks, Gmail, Google Books, maps, Twitter, photo editing, RSS feeds, and note taking. Links are provided to download each add-on from Mozilla's website.
This document provides a summary of Media Global Links Co., Ltd.'s earnings report for the first quarter of 2008. Key points include:
- Revenue was 1.722 trillion yen, up 46% from projections but below the initial forecast.
- Operating income was -1.494 trillion yen, below projections.
- Domestic sales increased 36% year-on-year while overseas sales decreased, especially in communications infrastructure.
This document provides an overview of ZOZOTOWN, a large online fashion retailer in Japan. Some key points:
1. ZOZOTOWN is Japan's largest fashion e-commerce platform, offering over 1,300 brands and 7,900 styles. It has over 83 million product listings and introduces over 3,000 new products daily.
2. In addition to online shopping, it offers same-day delivery services and provides digital marketing services.
3. The document discusses ZOZOTOWN's NoOps approach and how it leverages multiple datacenters and cloud services like AWS and Azure to provide a reliable and scalable online shopping platform.
The document discusses Oracle Cloud Infrastructure's Advent Calendar event which runs from December 1st to 25th. Each day a new "door" is opened with a blog post on a technology topic. The 2020 edition had posts from various Oracle advocates and partners. Blockchain topics will be featured this year along with posts in both Japanese and English to encourage more participation.
Webken 03: Project Design for Optimaizing User ExperienceNobuya Sato
This document discusses strategies for optimizing website design. It describes large-scale website design projects as having many interrelated parts and stakeholders. The document recommends taking a holistic, collaborative approach to website redesign projects that involves reconfiguring the entire site structure and shared interfaces. It also emphasizes the importance of user experience and usability testing during the design process.
Android is an open-source software platform built primarily for touchscreen mobile devices like smartphones and tablets. It includes an operating system, middleware, and key applications. The Open Handset Alliance, a consortium of 84 technology companies including Google, hardware manufacturers, and telecommunication companies, was founded in 2007 to develop Android. The Android software development kit includes tools and APIs used to develop applications that can be published through Google Play.
This document discusses Jupyter Notebooks and how to set up environments for using them. It provides an overview of Jupyter Notebooks, describing them as browser-based environments for interactive coding, visualizing results, and sharing code. It then discusses options for installing and running Jupyter Notebooks using Python, Docker, Vagrant, or natively on Linux.
This document describes an Oracle unconference agenda. The agenda includes topics such as introducing the conference speakers, discussing community formation, generating dynamic and engaging sessions, and a question and answer period. Details are provided about the speaker company and participants. The document is divided into sections for each agenda item.
The document discusses Debian, an open-source operating system that has been in development since 1993. It originated from a single university student and is now completely free and universal, running on many hardware architectures including x86, AMD64, ARM, ARMEL and MIPS systems.
The document discusses plans for developing a PHP-based issue tracking system called Candycane. It provides background on the developer and the goals of creating an easy-to-install, lightweight system that does not depend on specific PHP versions or extensions. It outlines the project members and timeline, which includes a 2-day hackathon in April.
The document discusses using LTspice circuit simulation software to analyze switching converter circuits. It describes some benefits of using circuit simulation software, such as clearly seeing voltage waveforms and quickly calculating losses. Examples of circuits that can be simulated include buck converters, forward converters, and DC-DC converters. The summary concludes that circuit simulation software is a useful tool for improving converter design efficiency and understanding circuit operation.
This document discusses parallel processing and techniques for parallelizing serial code, including threading, automatic parallelization, OpenMP, and vectorization. It provides examples of parallel programming models like shared memory, message passing with MPI, and task-based parallelism. Automatic parallelization identifies loops that can be parallelized safely. OpenMP is described as a programming model for shared-memory parallelism in C/C++ and Fortran using compiler directives. Vectorization using SIMD instructions is also covered.
The document summarizes an identity conference held by NTT regarding the Liberty Alliance ID-WSF 2.0 "People Service". It discusses how traditional SNS platforms are fragmented because each maintains separate user profiles, authentication, and social networking functions. It then introduces the concept of a People Service that would enable interoperability across platforms by centrally managing user identity information and attributes according to common standards, allowing single sign-on across multiple sites. The People Service is proposed to provide functions for creating, updating, deleting, and accessing user profile data on behalf of relying platforms and users.
The document discusses Redmine, an open source project management and bug tracking tool built using Ruby on Rails. It provides an overview of what Redmine is and how it can be used to manage bugs, track activities, and integrate with source code management systems. The presentation also compares Redmine to Trac and provides tips on installing and using Redmine, along with examples of how it could be applied to specific projects.
This document discusses TypeCast, an open source mobile blogging platform developed by Six Apart. It filters HTML for different mobile carriers in Japan, splitting content into multiple pages if needed. It uses the Atom format and API to access blog content and generates common HTML. Performance is optimized by caching Atom feeds and generated HTML. The goal is to make Six Apart's blogging platforms accessible on mobile via the Atom API.
This document discusses using the MXML compiler (mxmlc) to compile Flex projects from the command line rather than within Flex Builder. It provides an example command to compile a FlexMXML file located in the user's Documents folder. Additional command line arguments are also demonstrated, such as specifying the output SWF file location and adding library paths. The document recommends adding the Flex SDK bin directory to the system PATH environment variable so mxmlc can be called directly from the command line without specifying the full SDK path.
15. ITPUB µç×ÓÔÓÖ¾ The Oracle DBA's Guide to NT
Ô-×÷£º Harrison
Guy
ÍƼö£º
snowhite2000
·-Òë¸Ä±à£º
chao_ping
HOME: http://www.itpub.net MAIL: epub@itpub.net
16. ITPUB µç×ÓÔÓÖ¾ ÔÚ
ORACLE ÖÐÔËÐÐ ÃüÁî
OS
ÔÚ ORACLE ÖÐÔËÐÐ ÃüÁî
OS
ÔÚ
Oracle 8i ÖУ¬ÍùÍù»á³öÏÖÒªÔÚ´æ´¢¹ý³ÌÖÐÔËÐвÙ×÷ϵͳÃüÁîµÄÇé¿ö¡£Ò»°
ÓÃOracle Enterprise Manager É趨×÷ҵʱ¿ÉÒÔ´ïµ½Õâ¸öÄ¿µÄ¡£µ«ÊÇÓÉÓÚ
OEM ÔÚÉ趨×÷Òµ
ȱ·¦Áé»îÐÔ£¬É趨µÄ×÷ÒµµÄ²ÎÊýÊǹ̶¨µÄ¡£ÔÚʵ¼ÊÓ¦Óõ±ÖÐÍùÍùÐèÒªÔÚ
SQL Óï¾äµ±ÖÐÔËÐÐ
ÐèÒªËæʱÔËÐвÙ×÷ϵͳÃüÁî¡£ Oracle 8i ûÓÐÖ±½ÓÔËÐÐ
OS ÃüÁîµÄÓï¾ä£¬ÎÒÃÇ¿ÉÒÔÀûÓÃ
DBMS_PIPE ³ÌÐò°üʵÏÖÕâÒ»ÒªÇó¡£
DBMS_PIPE ͨ¹ý´´½¨¹ÜµÀ£¬¿ÉÒÔÈÃÖÁÉÙÁ½¸ö½ø³Ì½øÐÐͨÐÅ¡£
Oracle µÄ¹ÜµÀÓë²Ù×÷ϵ
ͳ
µÄ¹ÜµÀÔÚ¸ÅÄîÉÏÓÐÏàͬµÄµØ·½£¬µ«ÊÇÔÚʵÏÖ»úÖƲ»Í¬¡£
ÏÂÃæ½éÉÜʵÏÖ¾ßÌå²½Ö裺
1 ´´½¨Ò»¸ö³ÌÐò°ü£¬¹ÃÇÒÆðÃû½Ð Óï¾äÈçÏ£º
DAEMON£¬
SQL
/*´´½¨aemon ³ÌÐò°ü
d */
CREATE OR REPLACE PACKAGE BODY daemon AS
/*execute_system ÊÇʵÏÖÔËÐÐ
os ÃüÁîµÄº¯Êý
*/
FUNCTION execute_system(command VARCHAR2,
timeout NUMBER DEFAULT 10)
RETURN NUMBER IS
status NUMBER;
result VARCHAR2(20);
command_code NUMBER;
pipe_name VARCHAR2(30);
BEGIN
pipe_name := DBMS_PIPE.UNIQUE_SESSION_NAME;
DBMS_PIPE.PACK_MESSAGE('SYSTEM');
DBMS_PIPE.PACK_MESSAGE(pipe_name);
DBMS_PIPE.PACK_MESSAGE(command);
/*Ïò daemon ¹ÜµÀ·¢ËͱíʾÃü */
ÁîµÄ×Ö·û
status := DBMS_PIPE.SEND_MESSAGE('daemon', timeout);
IF status <> 0 THEN
RAISE_APPLICATION_ERROR(-20010,
'Execute_system: Error while sending. Status = ' || status);
END IF;
status := DBMS_PIPE.RECEIVE_MESSAGE(pipe_name, timeout);
IF status <> 0 THEN
RAISE_APPLICATION_ERROR(-20011,
'Execute_system: Error while receiving.
Status = ' || status);
END IF;
/*»ñÈ¡·µ»Ø½á¹û */
HOME: http://www.itpub.net MAIL: epub@itpub.net
17. ITPUB µç×ÓÔÓÖ¾ ÔÚ
ORACLE ÖÐÔËÐÐ ÃüÁî
OS
DBMS_PIPE.UNPACK_MESSAGE(result);
IF result <> 'done' THEN
RAISE_APPLICATION_ERROR(-20012,
'Execute_system: Done not received.');
END IF;
DBMS_PIPE.UNPACK_MESSAGE(command_code);
DBMS_OUTPUT.PUT_LINE('System command executed. result = ' ||
command_code);
RETURN command_code;
END execute_system;
/*stop ÊÇÈÃaemon Í£Ö¹
d */
PROCEDURE stop(timeout NUMBER DEFAULT 10) IS
status NUMBER;
BEGIN
DBMS_PIPE.PACK_MESSAGE('STOP');
status := DBMS_PIPE.SEND_MESSAGE('daemon', timeout);
IF status <> 0 THEN
RAISE_APPLICATION_ERROR(-20030,
'stop: error while sending. status = ' || status);
END IF;
END stop;
END daemon;
ͨ¹ýql*Plus ÔËÐÐÒÔÉÏ
S Óï¾ä£¬½«Îªµ±Ç°Óû§´´½¨
daemon ³ÌÐò°ü¡£
2 ´´½¨ÔÚ ÉÏÔËÐеÄÊØ»¤½ø³Ì
OS ,¼àÌýÓÉÉÏÃæµÄ ³ÌÐò°ü·¢À´µÄÒªÇóÖ´ÐÐ
daemon OS ÃüÁî
µÄÓï¾ä Pro*C µÄ´úÂ룬±ØÐëÓÉ
.ÒÔÏ pro*c ÏȽøÐÐÔ¤±àÒë¡£
#include
#include
EXEC SQL INCLUDE SQLCA;
EXEC SQL BEGIN DECLARE SECTION;
char *uid = "scott/tiger";/*ÔÚÕâ¸öµØ·½¸ÄΪÄã×Ô¼º·ÃÎʵÄÓû§
,ÃÜÂë
,·þÎñÃû
*/
int status;
VARCHAR command[20];
VARCHAR value[2000];
VARCHAR return_name[30];
EXEC SQL END DECLARE SECTION;
void
HOME: http://www.itpub.net MAIL: epub@itpub.net
18. ITPUB µç×ÓÔÓÖ¾ ÔÚ
ORACLE ÖÐÔËÐÐ ÃüÁî
OS
connect_error()
{
char msg_buffer[512];
int msg_length;
int buffer_size = 512;
EXEC SQL WHENEVER SQLERROR CONTINUE;
sqlglm(msg_buffer, &buffer_size, &msg_length);
printf("Daemon error while connecting:n");
printf("%.*sn", msg_length, msg_buffer);
printf("Daemon quitting.n");
exit(1);
}
void
sql_error()
{
char msg_buffer[512];
int msg_length;
int buffer_size = 512;
EXEC SQL WHENEVER SQLERROR CONTINUE;
sqlglm(msg_buffer, &buffer_size, &msg_length);
printf("Daemon error while executing:n");
printf("%.*sn", msg_length, msg_buffer);
printf("Daemon continuing.n");
}
main()
{
EXEC SQL WHENEVER SQLERROR DO connect_error();
EXEC SQL CONNECT :uid;
printf("Daemon connected.n");
EXEC SQL WHENEVER SQLERROR DO sql_error();
printf("Daemon waiting...n");
while (1) {
EXEC SQL EXECUTE
BEGIN
/*½ÓÊÕeamon ·¢À´µÄ×Ö·û
d */
:status := DBMS_PIPE.RECEIVE_MESSAGE('daemon');
IF :status = 0 THEN
/*È¡³ö×Ö·û */
DBMS_PIPE.UNPACK_MESSAGE(:command);
END IF;
HOME: http://www.itpub.net MAIL: epub@itpub.net
19. ITPUB µç×ÓÔÓÖ¾ ÔÚ
ORACLE ÖÐÔËÐÐ ÃüÁî
OS
END;
END-EXEC;
IF (status == 0)
{
command.arr[command.len] = '0';
/*Èç¹ûÊÇ stop,¸Ã½ø³Ì¾ÍÍ˳ö */
IF (!strcmp((char *) command.arr, "STOP"))
{
printf("Daemon exiting.n");
break;
}
ELSE IF (!strcmp((char *) command.arr, "SYSTEM"))
{
EXEC SQL EXECUTE
BEGIN
DBMS_PIPE.UNPACK_MESSAGE(:return_name);
DBMS_PIPE.UNPACK_MESSAGE(:value);
END;
END-EXEC;
value.arr[value.len] = '0';
printf("Will execute system command '%s'n", value.arr);
/*ÔËÐÐs ÃüÁî
o */
status = system(value.arr);
EXEC SQL EXECUTE
BEGIN
DBMS_PIPE.PACK_MESSAGE('done');
DBMS_PIPE.PACK_MESSAGE(:status);
:status := DBMS_PIPE.SEND_MESSAGE(:return_name);
END;
END-EXEC;
IF (status)
{
printf
("Daemon error while responding to system command.");
printf(" status: %dn", status);
}
}
ELSE
{
printf
("Daemon error: invalid command '%s' received.n",
command.arr);
HOME: http://www.itpub.net MAIL: epub@itpub.net
20. ITPUB µç×ÓÔÓÖ¾ ÔÚ
ORACLE ÖÐÔËÐÐ ÃüÁî
OS
}
}
ELSE
{
printf("Daemon error while waiting for signal.");
printf(" status = %dn", status);
}
}
EXEC SQL COMMIT WORK RELEASE;
exit(0);
}
HOME: http://www.itpub.net MAIL: epub@itpub.net
25. ITPUB µç×ÓÔÓÖ¾ Oracle DBA ÈÕ³£¹ÜÀí
--
-- free.sql
--
--To verify free space in tablespaces
--Minimum amount of free space
--document your thresholds:
--<tablespace_name> = <amount> m
--
SELECT tablespace_name, sum ( blocks ) as free_blk , trunc ( sum ( bytes ) /
(1024*1024) ) as free_m, max ( bytes ) / (1024) as big_chunk_k, count (*) as num_chunks
FROM dba_free_space
GROUP BY tablespace_name
1. Space.sql
--
-- space.sql
--
-- To check free, pct_free, and allocated space within a tablespace
--
-- 11/24/98
SELECT tablespace_name, largest_free_chunk
, nr_free_chunks, sum_alloc_blocks, sum_free_blocks
, to_char(100*sum_free_blocks/sum_alloc_blocks, '09.99') || '%'
AS pct_free
FROM ( SELECT tablespace_name
, sum(blocks) AS sum_alloc_blocks
FROM dba_data_files
GROUP BY tablespace_name
)
, ( SELECT tablespace_name AS fs_ts_name
, max(blocks) AS largest_free_chunk
, count(blocks) AS nr_free_chunks
, sum(blocks) AS sum_free_blocks
FROM dba_free_space
GROUP BY tablespace_name )
WHERE tablespace_name = fs_ts_name
2. analyze5pct.sql
--
-- analyze5pct.sql
--
-- To analyze tables and indexes quickly, using a 5% sample size
-- (do not use this script if you are performing the overnight
HOME: http://www.itpub.net MAIL: epub@itpub.net
26. ITPUB µç×ÓÔÓÖ¾ Oracle DBA ÈÕ³£¹ÜÀí
-- collection of volumetric data)
--
-- 11/30/98
BEGIN
dbms_utility.analyze_schema ( '&OWNER', 'ESTIMATE', NULL, 5 ) ;
END ;
/
3. nr_extents.sql
--
-- nr_extents.sql
--
-- To find out any object reaching <threshold>
-- extents, and manually upgrade it to allow unlimited
-- max_extents (thus only objects we *expect* to be big
-- are allowed to become big)
--
-- 11/30/98
SELECT e.owner, e.segment_type , e.segment_name , count(*) as nr_extents ,
s.max_extents
, to_char ( sum ( e.bytes ) / ( 1024 * 1024 ) , '999,999.90') as MB
FROM dba_extents e , dba_segments s
WHERE e.segment_name = s.segment_name
GROUP BY e.owner, e.segment_type , e.segment_name , s.max_extents
HAVING count(*) > &THRESHOLD
OR ( ( s.max_extents - count(*) ) < &&THRESHOLD )
ORDER BY count(*) desc
4. spacebound.sql
--
-- spacebound.sql
--
-- To identify space-bound objects. If all is well, no rows are returned.
-- If any space-bound objects are found, look at value of NEXT extent
-- size to figure out what happened.
-- Then use coalesce (alter tablespace <foo> coalesce;).
-- Lastly, add another datafile to the tablespace if needed.
--
-- 11/30/98
SELECT a.table_name, a.next_extent, a.tablespace_name
FROM all_tables a,
( SELECT tablespace_name, max(bytes) as big_chunk
HOME: http://www.itpub.net MAIL: epub@itpub.net
27. ITPUB µç×ÓÔÓÖ¾ Oracle DBA ÈÕ³£¹ÜÀí
FROM dba_free_space
GROUP BY tablespace_name ) f
WHERE f.tablespace_name = a.tablespace_name
AND a.next_extent > f.big_chunk
B. ÿÍí´¦Àí³ÌÐò
1. mk_volfact.sql
--
-- mk_volfact.sql (only run this once to set it up; do not run it nightly!)
--
-- -- Table UTL_VOL_FACTS
CREATE TABLE utl_vol_facts
(
table_name VARCHAR2(30),
num_rows NUMBER,
meas_dt DATE
)
TABLESPACE platab
STORAGE (
INITIAL 128k
NEXT 128k
PCTINCREASE 0
MINEXTENTS 1
MAXEXTENTS unlimited
)
/
-- Public Synonym
CREATE PUBLIC SYNONYM utl_vol_facts FOR &OWNER..utl_vol_facts
/
-- Grants for UTL_VOL_FACTS
GRANT SELECT ON utl_vol_facts TO public
/
2. analyze_comp.sql
--
-- analyze_comp.sql
--
BEGIN
HOME: http://www.itpub.net MAIL: epub@itpub.net
28. ITPUB µç×ÓÔÓÖ¾ Oracle DBA ÈÕ³£¹ÜÀí
sys.dbms_utility.analyze_schema ( '&OWNER','COMPUTE');
END ;
/
3. pop_vol.sql
--
-- pop_vol.sql
--
insert into utl_vol_facts
select table_name
, NVL ( num_rows, 0) as num_rows
, trunc ( last_analyzed ) as meas_dt
from all_tables -- or just user_tables
where owner in ('&OWNER') -- or a comma-separated list of owners
/
commit
/
C. ÿÖÜ´¦Àí³ÌÐò
1. nextext.sql
--
-- nextext.sql
--
-- To find tables that don't match the tablespace default for NEXT extent.
-- The implicit rule here is that every table in a given tablespace should
-- use the exact same value for NEXT, which should also be the tablespace's
-- default value for NEXT.
--
-- This tells us what the setting for NEXT is for these objects today.
--
-- 11/30/98
SELECT segment_name, segment_type, ds.next_extent as Actual_Next
, dt.tablespace_name, dt.next_extent as Default_Next
FROM dba_tablespaces dt, dba_segments ds
WHERE dt.tablespace_name = ds.tablespace_name
AND dt.next_extent !=ds.next_extent
AND ds.owner = UPPER ( '&OWNER' )
ORDER BY tablespace_name, segment_type, segment_name
2. existext.sql
--
-- existext.sql
--
HOME: http://www.itpub.net MAIL: epub@itpub.net
29. ITPUB µç×ÓÔÓÖ¾ Oracle DBA ÈÕ³£¹ÜÀí
-- To check existing extents
--
-- This tells us how many of each object's extents differ in size from
-- the tablespace's default size. If this report shows a lot of different
-- sized extents, your free space is likely to become fragmented. If so,
-- this tablespace is a candidate for reorganizing.
--
-- 12/15/98
SELECT segment_name, segment_type
, count(*) as nr_exts
, sum ( DECODE ( dx.bytes,dt.next_extent,0,1) ) as nr_illsized_exts
, dt.tablespace_name, dt.next_extent as dflt_ext_size
FROM dba_tablespaces dt, dba_extents dx
WHERE dt.tablespace_name = dx.tablespace_name
AND dx.owner = '&OWNER'
GROUP BY segment_name, segment_type, dt.tablespace_name, dt.next_extent
3. No_pk.sql
--
-- no_pk.sql
--
-- To find tables without PK constraint
--
-- 11/2/98
SELECT table_name
FROM all_tables
WHERE owner = '&OWNER'
MINUS
SELECT table_name
FROM all_constraints
WHERE owner = '&&OWNER'
AND constraint_type = 'P'
4. disPK.sql
--
-- disPK.sql
--
-- To find out which primary keys are disabled
--
-- 11/30/98
HOME: http://www.itpub.net MAIL: epub@itpub.net
30. ITPUB µç×ÓÔÓÖ¾ Oracle DBA ÈÕ³£¹ÜÀí
SELECT owner, constraint_name, table_name, status
FROM all_constraints
WHERE owner = '&OWNER' AND status = 'DISABLED’ AND constraint_type = 'P'
5. nonuPK.sql
--
-- nonuPK.sql
--
-- To find tables with nonunique PK indexes. Requires that PK names
-- follow a naming convention. An alternative query follows that
-- does not have this requirement, but runs more slowly.
--
-- 11/2/98
SELECT index_name, table_name, uniqueness
FROM all_indexes
WHERE index_name like '&PKNAME%'
AND owner = '&OWNER' AND uniqueness = 'NONUNIQUE'
SELECT c.constraint_name, i.tablespace_name, i.uniqueness
FROM all_constraints c , all_indexes i
WHERE c.owner = UPPER ( '&OWNER' ) AND i.uniqueness = 'NONUNIQUE'
AND c.constraint_type = 'P' AND i.index_name = c.constraint_name
6. mkrebuild_idx.sql
--
-- mkrebuild_idx.sql
--
-- Rebuild indexes to have correct storage parameters
--
-- 11/2/98
SELECT 'alter index ' || index_name || ' rebuild '
, 'tablespace INDEXES storage '
|| ' ( initial 256 K next 256 K pctincrease 0 ) ; '
FROM all_indexes
WHERE ( tablespace_name != 'INDEXES'
OR next_extent != ( 256 * 1024 )
)
AND owner = '&OWNER'
/
7. datatype.sql
HOME: http://www.itpub.net MAIL: epub@itpub.net
31. ITPUB µç×ÓÔÓÖ¾ Oracle DBA ÈÕ³£¹ÜÀí
--
-- datatype.sql
--
-- To check datatype consistency between two environments
--
-- 11/30/98
SELECT
table_name,
column_name,
data_type,
data_length,
data_precision,
data_scale,
nullable
FROM all_tab_columns -- first environment
WHERE owner = '&OWNER'
MINUS
SELECT
table_name,
column_name,
data_type,
data_length,
data_precision,
data_scale,
nullable
FROM all_tab_columns@&my_db_link -- second environment
WHERE owner = '&OWNER2'
order by table_name, column_name
8. obj_coord.sql
--
-- obj_coord.sql
--
-- To find out any difference in objects between two instances
--
-- 12/08/98
SELECT object_name, object_type
FROM user_objects
MINUS
SELECT object_name, object_type
FROM user_objects@&my_db_link
HOME: http://www.itpub.net MAIL: epub@itpub.net
32. ITPUB µç×ÓÔÓÖ¾ Oracle DBA ÈÕ³£¹ÜÀí
Áù ²Î¿¼ÎÄÏ×
.
1. Loney, Kevin Oracle8 DBA Handbook
2. Cook, David Database Management from Crisis to Confidence
[http://www.orapub.com/]
3. Cox, Thomas B. The Database Administration Maturity Model
HOME: http://www.itpub.net MAIL: epub@itpub.net