Yes
On Sat, Aug 27, 2022 at 10:45 AM Dimitry Sibiryakov
wrote:
>Hello All,
>
>currently isc_info_firebird_version is formed from engine version,
> server
> version and remote provider version.
>I wonder if there should be also the Y-valve version in addition to all
> that
> in the ca
Of course there should. The ODS was designed with extensibility in mind,
so the initial part of the header page was sacrosanct (i.e. immutable).
This was an essential part of the architecture for forward and backward
compatibility. The Y-valve, by design, would pass a connection string to
all av
While I’m hardly entitled to a vote, it is almost impossible to find a use
case where making a concatenation with a NULL a NULL is useful. NULL
should be interpreted as “there ain’t nothing there” rather than a poison
pill for other contexts.
In Amorphous, concatenation of a NULL treats the NULL
Versions: 3.0.0
Environment: Debian sid, sparc64
Reporter: James Clarke
When building employee.fdb on sparc64, a bus error (unaligned memory access) is
produced:
sh -x -c "lockfile -1 ../../gen/Release/firebird/bin/build-db.lock &&
./empbuild ../../gen/examples
Issues / Porting
Affects Versions: 3.0.0
Environment: Any big-endian system (I was using Debian sid on PowerPC)
Reporter: James Clarke
https://github.com/FirebirdSQL/firebird/commit/4e4d8002e5fe9968b4d5a493fdb567ed773ccbab
extended locks to have 64-bit keys in most cases
Interesting, very interesting. And ironic since my portable, cmake file
driven, C++ IDE (in Java) just became operational yesterday.
Thanks for the pointer.
On Thursday, March 31, 2016, marius adrian popa > wrote:
> I think Jim Starkey will love this
>
> https://blogs.msdn.microsoft.com/vcblog/
On Saturday, March 19, 2016, Wols Lists wrote:
> On 16/03/16 21:03, Michal Kubecek wrote:
>
> An experienced developer might have 10 or 20 topics on the go - each in
> their own separate branches. That way work doesn't cross-contaminate -
> you don't want to accidentally upload a half-baked devel
On Wednesday, March 16, 2016, Lester Caine wrote:
> On 16/03/16 08:18, Александр Пешков wrote:
> > Could somebody explain why Firebird is in the filename translation
> > business at all?
> >
> > Imagine a system, containing linux server, using UTF-8 encoding, some
> > linux clients (also
On Thursday, March 3, 2016, Dmitry Yemanov wrote:
> 03.03.2016 19:16, Jim Starkey wrote:
>
> > On 3/3/2016 11:10 AM, Dmitry Yemanov wrote:
> >> Am I missing something obvious?
> >
> > Yeah. Data.
>
> I was not talking about value-based encoding (which surely requires a
> different approach).
>
>
I care about it. It was my first C program. But that doesn't mean I ever
want to use it again.
On Wednesday, March 2, 2016, Dmitry Yemanov wrote:
> 03.03.2016 00:21, Dimitry Sibiryakov wrote:
> >
> > Do you agree that support for boolean fields in gpre is a good thing?
>
> Yes, I do. I know al
Multi-file databases were implemente to handle databases larger than the
disk or file systen size. Disks have gotten a great deal larger, but so
have databases, so obviously something has to give to support your 7 TB
database.I sense an interesting design opportunity.
On Wednesday, March 2,
On 2/29/2016 2:19 AM, Michal Kubecek wrote:
.
Question: Does this problem would also affect the compiled client
library? Or do you guys also think nobody using Win XP/2003 will needs
to connect to Firebird?
First, the discussion is about a version which, extrapolating from
previous release dat
Is there any reasons to believe there are unsafe SRP primes?
The magnitude of the prime is a consideration when trying to break a
verifier, but the security of the handshake is more dependent on the
quality of the session specific random numbers generated in each side of a
connection.
In any case
question is moot.
On Wednesday, December 30, 2015, Mark Rotteveel
wrote:
> On Tue, 29 Dec 2015 19:43:37 -0500, James Starkey >
> wrote:
> > Could you explain to us what optimization a are possible on 686 that are
> > not on the 386?
>
> Look at
> https://en.wikipedia.org
Nope, interlocked compare and exchange were part of the 386 instruction set.
On Tuesday, December 29, 2015, Michal Kubecek wrote:
> On Tue, Dec 29, 2015 at 07:43:37PM -0500, James Starkey wrote:
> > Could you explain to us what optimization a are possible on 686 that
> > are
Could you explain to us what optimization a are possible on 686 that are
not on the 386?
On Tuesday, December 29, 2015, Dimitry Sibiryakov wrote:
> 29.12.2015 21:37, James Starkey wrote:
> > Why? For all practical purposes they're the same architecture. There
> is no
Why? For all practical purposes they're the same architecture. There is
no upside to the project and only down side for users.
Go ahead and drop Apollo/Domain, with my blessings.
On Tuesday, December 29, 2015, Dimitry Sibiryakov wrote:
>Hello, All.
>
>Isn't it a good time to drop sup
Huh? What are you blithering about? Is this about my paragraphing styke
30 years ago?
Get a life.
On Tuesday, November 10, 2015, Adriano dos Santos Fernandes <
adrian...@gmail.com> wrote:
> About the code style...
>
> You surely should not reinvent another style. It's very easy to see that
> t
On Sunday, November 8, 2015, Dimitry Sibiryakov wrote:
> 08.11.2015 12:08, Vlad Khorsun wrote:
> .
>
>Faster cryptoalgorithms are vulnerable to attack by known text. To make
> analysis
> harder, some random salt used to be appended in the beginning.
>
>
Really? Can you give an example of a
Issue Type: Bug
Components: Engine
Affects Versions: 3.0 Beta 2
Environment: Windows 8.1. Tested with 3.0 Beta 2 and snapshot
3.0.0.32134 (Win32)
Reporter: James Linse
Priority: Critical
Incorrect results may be returned when running a range query on a
On Wednesday, September 16, 2015, Paul Reeves wrote:
> On Wednesday 16 September 2015 11:35:02 Dmitry Yemanov wrote:
> > 16.09.2015 12:04, Paul Reeves пишет:
> > > I just noticed the size of firebird.msg in Fb 3 trunk - it seems to be
> > > around 550 Mb. In Fb 2.5 it is around 150 Mb and in the
k on plaintexts less than 16 bytes.
> >
> > The differences between AES in software and AES-NI (new instructions)
> will vary wildly depending whether AES-NI is implemented in just microcode
> or actual hardware. But none of these affect the security of AES.
> >
> > AES-256
Here are some numbers. The numbers were comoued on my boat computer, which
is a very cheap notebook, so consider them relative, not absolute.
10mb encryption with a single key:
RC4: 0.021 seconds
ChaCha20: 0.007
AES-128:0.212
10mb encryption setting key every 1024 byte
On Monday, August 24, 2015, Adriano dos Santos Fernandes <
adrian...@gmail.com> wrote:
>
> You're here mainly to build ideas for your products, not for Firebird,
> so it's not about open source.
>
> Sorry, but you're the first to complain about early expose to new ideas.
It must be very distractin
On Monday, August 24, 2015, Brian Vraamark
wrote:
>
> If you have 50 clients, you have 50 ways to access the master encryption
> key (database encryption key). If you steal the client-vaults, server-vault
> and the database, there would be 50 persons with a password that can
> decrypt the databas
On Monday, August 24, 2015, Adriano dos Santos Fernandes <
adrian...@gmail.com> wrote:
> On 24/08/2015 09:16, James Starkey wrote:
> >
> > No problem other than this requires that database account credentials
> > be on the client disk and therefor theoretically
On Monday, August 24, 2015, Ray Cote
wrote:
> What about integrating with an external credentials store such as:
> http://xordataexchange.github.io/crypt/?
> Granted, it means FB is dependent on an external library application.
>
That's just a vault. Nothing hard or exotic about building a vaul
ups?
>
> No problem other than this requires that database account credentials be
on the client disk and therefor theoretically available to an attacker.
There is no way to make any of this easy.
>
> Brian Vraamark
>
> -----
One of the tenants of moderm cryptology is that algorithms and mechanisms
have to be published for analysis and review. The basic idea is that
security is based on a mathematical impossibility that a cryptosystem cabe
be broken within the time remaining in the universe. The once dominant
idea was
On Saturday, August 22, 2015, Brian Vraamark
wrote:
> On windows you can use DPAPI. I don't know if Linux (and other systems)
> has something similar (maybe Gnome-Keyring?).
>
>
I have a strong preference for portable, transparent solutions. In theory,
Microsoft has the same problem that unatten
On Friday, August 21, 2015, Scott Morgan wrote:
>
> Q1 : 4, I don't expect NSA defeating crypto[0], but enough to keep
> casual eyes away from expensive data.
>
> Q2 : 5, It's a must. Whether the key is somehow held internal to the
> .FDB file (with it's own pswd, no system wide account access, n
I'm curious about how important people consider on-disk encryption to be.
I have two questions.
First question: On a scale from 1 (don't care, wouldn't use it) to 5 (I
need it yesterday) how important to us is the ability to encrypt database
files. Assume a bobust encryption scheme and a moderate
On Thursday, August 20, 2015, Alex Peshkoff wrote:
>
>
> And what about the vault at the client side containing long randomly
> generated password for SRP - this is definitely a way to make things not
> as bad as they can when verifiers are compromised. I suppose to use this
> suggestion in post-
On Thursday, August 20, 2015, Tommi Prami wrote:
> Just my 0.02€
>
> http://ianix.com/pub/chacha-deployment.html
>
> ChaCha20 is in TSL and OpenSSH etc. and mainly because it is secure and it
> is fast.
>
>
> I wasn't aware of that. Very, very cool.
--
Jim Starkey
On Thursday, August 20, 2015, Alex Peshkoff wrote:
> On 08/18/2015 12:22 AM, Jim Starkey wrote:
> >
> > Unless it can be guaranteed that SRP verifiers in Firebird are immune
> > to compromised
>
> What do you mean by 'immune to compromised' here? The main goal of using
> SRP as a default authenti
On Thursday, August 20, 2015, Mark Rotteveel wrote:
> On Wed, 19 Aug 2015 18:17:03 -0400, James Starkey >
> wrote:
> > A "better" hashing algorithm has no signficant effect. The difference
> in
> > security between a 20 byte hash and a 64 byte hash is 1 / 2
On Thursday, August 20, 2015, Michal Kubecek wrote:
> On Wed, Aug 19, 2015 at 02:55:33PM -0400, Jim Starkey wrote:
> >
> > The best alternative to RC4 is AES-128. It is "more" (but not
> > measurably) secure but also a couple of hundred times as expensive to
> > compute. If you don't believe me
On Wednesday, August 19, 2015, Mark Rotteveel wrote:
>
> >
> > In the final analysis, hardening any computing systems requires that the
> > most vulnerable links be addressed first. In Firebird, that is the use
> > of human chosen passwords.
>
> Using a client-side password vault is an interesti
On Monday, July 27, 2015, Alex Peshkoff wrote:
> On 07/26/2015 10:00 PM, Ivan Arabadzhiev wrote:
> > Personally, I've recently started using (mostly for kicks) things like
> > https://en.wikipedia.org/wiki/Scrypt
> > https://en.wikipedia.org/wiki/Bcrypt
> > https://en.wikipedia.org/wiki/PBKDF2
>
Sorry, you got taught wrong. Security is about the whole system, not one
piece. Hash based security is vulnerable during password exchange, which a
slow hash doesn't fix.
Internet connections typically pass through a dozen routers, any of which
could be configured to mount a man in the middle at
On Sunday, July 26, 2015, Jiří Činčura wrote:
> > Personally, I've recently started using (mostly for kicks) things like
> > https://en.wikipedia.org/wiki/Scrypt
> > https://en.wikipedia.org/wiki/Bcrypt
> > https://en.wikipedia.org/wiki/PBKDF2
> > I suppose the option to tune them in the future (
Get real. Read about the actual problems. Bthe issue is that there is a
theoretical problem that a manufactured duplicate collision could be
manufactored in something like time 2^82, something that nobody has
actually be able to do.
Sure, SHA-1 has a known weakeness. It's replacement probably ha
I don't believe it is "effectively limited" to 20 bytes. This was a
documentation error based on a profound misunderstanding of the SHA-1 hash
function.
On Thursday, July 23, 2015, Stefan Heymann wrote:
> In the FB3 Release Notes the chapter about "Increased Password Length"
> speaks of a maxim
Why not just go for 32 bit lengths and stop worrying about it. 16 bit
lengths made a lot of sense on pdp-11s, but those days are long gone.
On Wednesday, July 15, 2015, Adriano dos Santos Fernandes <
adrian...@gmail.com> wrote:
> Hi!
>
> Looking again, Ivan Přenosil may be right and string liter
I suggest you learn C. It's a very easy, simple language. It should only
take you a few hours and will save many times that down the road. In any
case, you will need to understand both C and the debugger to debug your
code.
Yes, Firebird is now officially C++, but probably closer to C+ in most
The SQL standard, and Ann will correct me if I'm wrong, is both clear and
simple. Unquoted (and necessarily ASCII) identifiers are folded to upper
case and quoted identifiers are not.
The SQL language character set is ASCII except for strings enclosed in
quotes.
Other than folding ASCII lower ca
As written, it did cyclical translation of environmental variables and
symbolic links looking for node names and files on NFS mounted file systems.
On Monday, April 20, 2015, Adriano dos Santos Fernandes
wrote:
> On 20/04/2015 11:08, Dimitry Sibiryakov wrote:
> > 20.04.2015 15:54, Adriano dos Sa
Why not just establish a mechanism for other providers to register their
dpb codes. It isn't like their is either a shortage of unused codes or a
large number of new providers. That would also provide an opportunity to
discuss and possibly improve a proposal.
I can't help but think that people a
No. The page/lock server is deeply involved with the Firebird on disk
structure.
On Monday, March 23, 2015, Tony Whyman
wrote:
> Just out of interest, is OCFS2/DRBD any use as a page/lock server?
>
> On 23/03/15 13:01, James Starkey wrote:
> > The major new piece is a separate
milliseconds (on a good and lucky day). So many
fewer I/Os and much faster I/Os.
The tricky parts all revolve around the issues of multiple/page lock
servers and have almost no effect on the Firebird engine, per se.
Questions? Brickbats? Rebuttals?
On Sunday, March 22, 2015, James Starkey wrote
> With FB 2.5.2 SC 64-bit on Windows 7 Prof.
>
> While copying a 18GB database from folder A to B on the same spinning
> physical disk at ~33MB/s read + ~33MB/s write, thus 66MB/s total, doing
> a select count(*) on that database (8K page size) for a table with ~6Mio
> records at a physical disk re
antos Fernandes
wrote:
> On 22-03-2015 13:01, James Starkey wrote:
> > So let me get this straight. Your "everything wrong" with DPBs boils
> > down to the absence of a comment in a header? Oh, dear me, that is
> > indeed a deep and grevious fault.
> >
>
So let me get this straight. Your "everything wrong" with DPBs boils down
to the absence of a comment in a header? Oh, dear me, that is indeed a
deep and grevious fault.
I certainly don't pretend to speak for the rest of the project, but if you
want to add a comment to dpb.h (or whatever), you m
are development, from weekly thought leadership blogs
> to
> news, videos, case studies, tutorials and more. Take a look and join the
> conversation now. http://goparallel.sourceforge.net/
> Firebird-Devel mailing list, web interface at
> https://lists.sourceforge.net/lists/listi
Goal: Morph Firebird into a high performance, distributed, fully redundant
database.
Both JRDs (DEC Rdb/ELN and Interbase) were designed as elastic database
systems for VAXClusters. They are share-nothing engines, communication
exclusively through a distributed lock manage and network attach dis
On Saturday, March 21, 2015, Thomas Steinmaurer wrote:
> >
>
> IMHO 99% of the Firebird customer-base isn't in the "distributed system
> business", thus state-of-the art scale up (instead of scale out)
> capabilities on a single server will be excellent.
> Scale up is a very bad strategy for an
>
> https://www.visualstudio.com/en-us/products/visual-studio-community-vs
>
> On Fri, Mar 20, 2015 at 11:19 PM, Egor Pugin > wrote:
>
>> Hi,
>>
>> What about just "The power of C++11 in Firebird" ?
>>
>> On 20 March 2015 at 23:44, James St
The classical mechanism is to establish one range for systen define codes
and another for private extensions.
As has beeb pointed out, any engine or transport can safely ignore
unrecognized codes. Part if the architecture long before Firebird and
Interbase existed.
For those newbies, the Firebir
le that everyone else wants out of the
office (telephone sanitizers, in short) than the best and the brightest.
On Friday, March 20, 2015, Egor Pugin wrote:
> Hi,
>
> What about just "The power of C++11 in Firebird" ?
>
> On 20 March 2015 at 23:44, James Starkey >
I think it would be extremely difficult to implement both fine grain
multi-threading and co-processor exploitation in a shared meta-data
implementation. If Firebird were rearchitected so that each connection had
a dedicated metadata cache (and the caches with a mechanism to propagate
metadata chan
t; could be used to perform the sorting/grouping while query threads reads the
> rows and build the sort buffers.
>
> The next version of the PHI (Knights Landing) will provide true
> independent functionality of each of "cpus" (Interview with James
> Reinders: future of Intel
ry it. Three forths of rhat work, however, would be in
abstracting and encapsulating SQZ, which is well worth doing (and
commiting) even if lz4 doesn't pan out.
On Monday, March 16, 2015, Alex Peshkoff wrote:
> On 03/16/15 19:42, James Starkey wrote:
> > I'd like to see some
I'd like to see some numbers computed from an actual (real) Firebird
database before it is considered.
But why records only over 4k? And what commonality do you expect to find
on large records?
On Monday, March 16, 2015, Slavomir Skopalik wrote:
> Hi Jim,
> I made some research about storage c
Indeed. The GPL is pathological. Sun developed a fantastic file system
called ZFS and released under a Sun open source license that requires, like
the Firebird licenses, that modifications be available under the same
license. But Linux integration would require some mods, the mods would
have to
I wouldn't get excited about TPCC / DBT2 either way. It's a remarkably
stupid benchmark designed to show that partioning is the only way to go.
It is full of idiotic assumption and horrible technology. It assumes, for
example, that everything a customer orders can be serviced from a single
wareho
I didn't know about that. I'm in love!
On Tuesday, March 10, 2015, Ivan Arabadzhiev wrote:
> Personally, I used https://code.google.com/p/gitextensions/ back when I
> was on a Windows/VS environment, and was really happy with it.
>
> 2015-03-10 15:37 GMT+02:00 Michal Kubecek >:
>
>> On Tue, M
There is no reason you can't do exactly what you want. Most people
familiar with git tend to use a single repository with multiple branches,
but either works. Multiple branches will consume more disk space, but in
this day and age, who cares?
A note about cmake, git, and MSVS: If git merges a cm
A DBKEY is a concatenation of one or more
pairs.
Has anyone considered a global replace of "relation" by "table"? Relation
is not only archaic but mathematically incorrect. In Codd's model,
relations were sets and consequently could not have duplicate rows. No
"relational" database every imple
not be used verbatim. Anyone is free, of course,
to use the technique. Also note that it hasn't been QAed for production
use, though it is thought to work.
// Copyright (c) 2014 by James A. Starkey. All rights reserved.
#include
#include
#include "Common.h"
#include "
This was a follow up to a problem I raised to another proposal. I thought
the context was clear, bu apparently not... So here's the context.
Data compression has a huge effect on performance. Reducing the physical
size of the data reduces database size and the number of pages to be read
to fetc
from machines and laboratories
> by means of system MASA (http://www.elektlabs.cz/m2demo)
> -
> Address:
> Elekt Labs s.r.o.
> Chaloupky 158
> 783 72 Velky Tynec
> Czech Republic
>
------
> Mobile: +420 724 207 851
> icq:199 118 333skype:skopalikse-mail:skopa...@elektlabs.cz
> http://www.elektlabs.cz
>
> On 27.2.2015 19:14, James Starkey wrote:
>
> Perhaps a smarter approach would be to capture the ru
-> thats way I
> was did it.
>
> You proposal will needs much more works.
> From my point of view, isn't realistic to do it into FB2.5x or FB3.
> When encoding will be implemented, will be nice to use it also for backup
> and wire protocol.
>
> Thank you for.
>
The answer to your questions is simple: It is much faster to encode from
the original record onto the data pages(s), eliminating the need to
allocate, populate, copy, and release a temporary buffer.
And, frankly, the cost of a byte per full database page is not something to
loose sleep over.
The
No, I don't see. What you want to do, and you agreed, could be done with
the existence ng event mechanism if yiu could figure out why sometimes it
appeared that events weren't being delivered. Instead, your proposing a
whole new class of trigger that would require yet another interface, a
mechani
Carlos, again, why not figure out why events aren't working at your site.
It is a mechanism designed from the beginning to do what you want,
e.g. notify other connections of a database state change.
What you are suggesting will introduce far more problems than it purports
to solve.
If there is is
If there's a bug, the correct response to to fix it, not invent yet another
feature to work around the bug.
A correctly code application should get events. The mechanism is designed
to eliminate race conditions. But if you don't understand how it's
supposed to work, it's straightforward to write
Could you describe what you are actually trying to do rather than how a
possible solution might work? It's a lot easier to work from an actual
problem than to reverse engineer from a murky proposal.
On Thursday, February 26, 2015, Carlos H. Cantu
wrote:
> I would like to start a discussion to
On Monday, February 23, 2015, Slavomir Skopalik
wrote:
> On 23.2.2015 20:36, James Starkey wrote:
> > Encode null as a value type and skip the null flags altogether -- saves a
> > couple of bytes for every record.
> I think to use flags only for nullable fields.
> In this ca
going to ask to sort million character fields. But
it would be nicer to try.
On Monday, February 23, 2015, Adriano dos Santos Fernandes <
adrian...@gmail.com> wrote:
> On 23/02/2015 16:36, James Starkey wrote:
> > Encode null as a value type and skip the null flags altogether --
&
Elekt Labs s.r.o.
> Chaloupky 158
> 783 72 Velky Tynec
> Czech Republic
> ---
> Mobile: +420 724 207 851
> icq:199 118 333skype:skopalikse-mail:skopa...@elektlabs.cz
> http://www.elektlabs.cz
>
> On 23.2.201
--
> Address:
> Elekt Labs s.r.o.
> Chaloupky 158
> 783 72 Velky Tynec
> Czech Republic
> ---
> Mobile: +420 724 207 851
> icq:199 118 333skype:skopalikse-mail:skopa...@elektlabs.cz
> http://www
Guys, this is a little crazy. When the reference count goes to zero, the
object goes away. That's the point of reference counting. If an object is
reference counted, it shouldn' have a destroy method or a public destructor.
And, of course, a provider has exactly the same semantics as the Y-valv
I'm been using a self-describing value encoding for a decade and a half.
It's denser and cheaper to compress and decompress than the existing run
length encoding, though I'm not sure that compressing version delta would
be a lot of fun, but probably some clever fellow can think of a good
algorithm.
On Thursday, February 19, 2015, Thomas Steinmaurer
wrote:
> Jim,
>
> >
> http://www.cio.co.uk/insight/data-management/jim-starkeys-nosql-low-down-it-wont-solve-big-data-3598479/
>
> What do you think about "tunable consistency" instead of "eventual
> consistency"?
>
>
> http://www.datastax.com/do
WhatbI have done on other database systems, and it has worked very well, is
allow authorized roles for a user to be assumed and dropped at anytime
during a connection. Access to an object is allowed if the access is
allowed in any of the active roles. There is also a mechanism to state
which roles
An exception to isc_receive with a null status vector should blow the
program out of the water.
On Saturday, January 31, 2015, Egor Pugin wrote:
> Hi!
>
> build_msg -D msg.fdb -P ./ -F firebird.msg -L all
> when msg.fdb is absent will result in infinite loop.
>
> I have the simple fix - try to
This sounds quite a bit like the circumstances that caused Torvalds to dump
Bitkeeper and write git.
Open source dependent on a private tool is a contradiction in terms.
If he hasn't already, I suggest that Adriano submit his tool to the
Firebird tree now or that Firebird find a different way to
Surely there is a transaction id info clumplet that will need to be
finessed...
On Thursday, January 15, 2015, Paul Beach wrote:
> < old), or this will break the old API?>>
>
> The API is completely unaffected by the support for 64bit transaction ids.
>
> Regards
> Paul
>
>
> ---
Why not require things that are potentially case sensitive to be in quotes?
On Tuesday, December 30, 2014, Alex Peshkoff wrote:
> On 12/30/14 02:15, Daniel Rail wrote:
> > Hi,
> >
> > At December 29, 2014, 7:00 AM, Adriano dos Santos Fernandes wrote:
> >
> >> About config keywords using OS case
I agree. That's how you understand it. But you are wrong.
On Thursday, December 25, 2014, Dimitry Sibiryakov wrote:
>Ok, let me simplify the question:
>
>I've created an engine that cannot work with databases, created by
> standard engine.
> Standard engine CAN work with databases crea
Uh, if you made it type-safe in the first place, you would need casts.
Think about that over and over until you get it -- if things are declared
and used properly, you never need casts.
Artificial types (used in moderation) eliminate most problems and make the
code easier to understand.
On Thurs
rom computing the discrete logarithm
>2. The hashing step currently defined as a two-step SHA1 in RFC 2945
>must be replaced with at least PBKDF2, bcrypt, or scrypt, with an
>appropriate iteration count / tuning parameters to deter from dictionary
>attacks
>
> ht
No for all questions. The record is a) run length encoded and b) contains
a format version number that must be looked up in rdb$formats.
On Sunday, November 30, 2014, Stuart Simon wrote:
>
>
> On Sunday, November 30, 2014, Stuart Simon > wrote:
>
>> Hello Firebird Developers:
>> Pardon me, bu
Has anyone done any performance studies on zlib? Decompression is OK, but
compression is very, very CPU intensive. I did a study a while back to
investigate using zlib for blobs. The short answer is that it was much,
much faster to read the extra pages than pay for zlib compression and
decompres
On the list of vulnerabilities, this probably about 250. The probability
of a random collision is something like 2^79 instead of the design goal of
2^128, but the probabilty of a manufactured duplicate is still around 2^128.
SSL sucks right, left, and center by comparison -- it has zippo protecti
The rational way to handle boolean is to store the value in a single byte
that is zero or one and use the boolean to string and string to boolean
conversion functions to translate zero or one to false and true,
respectively.
On Monday, November 17, 2014, Simonov Denis wrote:
> Why is half the Bo
No, the intention was to support non-English clients, period.
Translation of both messages and national character sets is always best
done on the client. This shouldn't be a problem as a message file should
always be available, even if it's the default English version. If there
isn't a message f
The compound key scheme isn't quite right. Binary 0 bytes delimit keys,
binary 0s in a key are replaced with the sequence 1,0 and binary 1s in the
key are replaced with the sequence 1,1. So delimiter < 0 < 1 < everything
else. I wish I had invented it, but I only stole it.
On Monday, October 27
Ann and I are settled at the hotel in Prague. Looking forward to seeing
everyone.
--
Jim Starkey
--
Comprehensive Server Monitoring with Site24x7.
Monitor 10 servers for $9/Month.
Get alerted through email, SMS, voice
1 - 100 of 130 matches
Mail list logo