On 05/04/16 14:53, Alex Peshkoff wrote:
> On 04/05/2016 04:43 PM, Dimitry Sibiryakov wrote:
>> 05.04.2016 15:22, Alex Peshkoff wrote:
>>> Yes currently all keys are ASCII but it's
>>> used also for plugins configuration and I see no reasons why national
>>> characters can't arrive there.
>> Bec
On 28/03/16 15:59, Michal Kubecek wrote:
>> But still clone of Firebird repository is 10 times bigger than its
>> > sources.
> That's one way to look at it. Another way is to say it's about 0.18 EUR
> of disk space in case of a SSD and 0.02 EUR in case of classical
> magnetic disk.
Another way to
On 16/03/16 21:03, Michal Kubecek wrote:
> One of the good ones is "Pro Git" book by Scott Chacon which can be
> viewed or downloaded at
>
> https://git-scm.com/book/en/v2
>
> For basic developer needs, chapters 1-3 are sufficient, to participate
> in a project, chapter 5 can help (at least fir
On 05/01/16 14:37, Dmitry Yemanov wrote:
> These examples say nothing about the approach used there: either
> literals are VARCHARs, or CASE derives the datatype differenly, or both.
>
> And I suppose Firebird is not really alone, see for MariaDB:
>
> CASE ... THEN 'a' ... THEN 'abcd' ... ELSE '
On 29/12/15 10:23, Dimitry Sibiryakov wrote:
> 24.12.2015 18:29, Alex Peshkoff wrote:
>> If we have one chain with 12 objects, three empty chains and chains
>> with 1, 2 or 3 objects - it's not bad.
>> I.e. existing stat-s is not enough for analysis.
>
>I've got following data from Igor V
On 24/12/15 17:22, Dmitry Yemanov wrote:
>> I suspect that "true hash" could make distribution of hash values more
>> equival
>> > and thus improve overall timing for lock table search.
> A couple of years ago I played a bit with different hash functions that
> are considered good nowadays. Quit
On 18/11/15 12:38, Dimitry Sibiryakov wrote:
>> Should there be a way to reset UUID for existing database?
>> >
>> > Backup-restore.
>> > Not really handy, I'd say.
>Whatever users use the ID for, it should identify the database as long as
> it exists.
> May be gfix may be ta
On 14/11/15 22:16, Jim Starkey wrote:
> While's it possible to fake the originator IP address with UDP, I don't
> think it's possible with TCP.
The attacker simply uses the same IP address as a valid client ???
If the valid client is offline, that's a simple attack. However, chances
are valid ad
On 30/09/15 00:34, Paul Vinkenoog wrote:
> Alex Peshkoff wrote:
>
>> On 09/29/2015 03:23 PM, Dimitry Sibiryakov wrote:
>>> 29.09.2015 13:21, Paul Vinkenoog wrote:
So a CASCADE option would be a welcome addition for such cases.
>>> Another question: how many levels should this cascade go?
On 29/09/15 11:20, Alex Peshkoff wrote:
> On 09/29/2015 01:11 PM, Paul Vinkenoog wrote:
>> Alex Peshkoff wrote:
>>
>>> Please look at this trivial sample.
>>>
>>> create table t (f int);
>>> grant select on t to public granted by abc;
>>> revoke all on all from abc;
>>>
>>> Currently privileges, gr
On 22/08/15 02:03, Geoff Worboys wrote:
>> Second question: If you would consider in-disk database
>> > encryption, on a scale of 1 to 5 how important is unattended
>> > startup, i.e. no human to enter a password, given that it's
>> > probably impossible to make such a system robustly secure?
> 3
>
On 06/04/13 10:42, Mark Rotteveel wrote:
> The question is: if you don't have permissions for a column, are you
> allowed to know of its existence?
Drifting a bit OT, but one filesystem I knew years ago used ACLs and
separated list and use permission. So if you had list permission you
could see i
On 03/04/13 12:12, Lester Caine wrote:
> Kjell Rilbe wrote:
>> > So, to be frank I'd say for many languages the problem is not if FB has
>> > support for phonetic matching or not, but if a working phonetic matching
>> > algorithm even exists (has been developed) for that language. If it
>> > does,
On 03/04/13 08:23, Kjell Rilbe wrote:
> Den 2013-04-03 09:09 skrev Alex Peshkoff såhär:
>> On 04/03/13 01:44, Thomas Beckmann wrote:
>>> Second: I'd like to have this like a plugin architecture,
>> The most simple requirement - just write UDF (or in FB3 external
>> function). No other plugins are n
On 17/03/13 08:50, Dimitry Sibiryakov wrote:
> 17.03.2013 2:35, Leyne, Sean wrote:
>> Data and database integrity it one of Firebird best features.
>
>But not in Embedded case. Memory corruption in host application will
> corrupt database.
>
And to quote the GP:
"Loss due to bad hardware or
On 15/03/13 19:38, Doug Chamberlin wrote:
> Ok, I'll bite. What is LO?
>
LibreOffice. The replacement for OpenOffice. They want to replace the
current Java-based database, and they'd like to use Firebird to do it.
I'm not sure their ideas are feasible, though ...
What is feasible is to configure
16 matches
Mail list logo