connectionsSql>select Count (*) from v$session where status= ' active ' #查看并发连接数–6. To view the number of connections for a specified programSql>select Count (*) from v$session where program= ' jdbc thin client ' #查看jdbc连接oracle的数目–7. View Database Installation Instance (DBA authority)Sql>select * from V$instance–8. View Run Instance NameSql>show parameter instance_name–9. View database nameSql>show parameter db_name–10. View the database domain name
Original: DBA tool--dmv--View stored procedure execution information through Sys.dm_exec_procedure_statsFor DBAs, there is often some information about the phone's stored procedure:
How many times did you execute
How does the execution plan
What is the average read and write performed
How long does it take to execute on average
Column Name
Data Type
Description
database_id
int
This article for me to learn old boy teacher MySQL DBA senior operation of the study notes, rookie a If there is a wrong place to write, please the great God more guidance, I will thank you very much. hehe ~7.6.1 MySQL Multi-instance common configuration scheme6.1.1 Multi-instance configuration file deployment scenarioImplement multi-instance scenarios by configuring multiple configuration files and multiple startup programs[[emailprotected] ~]# tree
1. Database design and SQL statement additions and deletions.2. I believe that many small partners learn the operation and maintenance courses without the development experience of the database is very tired or even do many years of operation, can not be flexible to write SQL statements and additions to the search!3. Actually learning the database is tricky, first of all we have the initial database type Serversql MySQL and other database types. You have to learn how to install the database http
Tags: DB2 Database Introduction DB2 Introduction DB2 Components"Progressive DB2.DBA system Management, operation and application Case" (New) Reading notes 1Brief History of database development and DB2 introductionThe fundamental purpose of database generation and development is to facilitate data management and application development.The first form of data management is a document, the lack of management method is scattered data, poor centralized ma
over, in order to deepen understanding and memoryIf you have a foundation, you can choose chapters to learn according to your needs.2.3. Instructor Recommendations1. Be sure to follow the course to practice, think more, and work more together on the scene.2. It is a very good learning habit to watch videos and make some records and notes on the side.3. Be sure not to rely too much on video, to learn to read the API and use Baidu, learn to think, learn extrapolate4. Finally, I wish you to learn
Label:stylebloghttpcoloros io using ar file Http://neoremind.net/2011/06/%E4%B8%80%E4%B8%AAdba%E5%AF%B9%E4%BA%8E%E5%BC%80%E5%8F%91%E4%BA%BA%E5%91%98%E4%BD %bf%e7%94%a8mysql%e7%9a%84tips/ just entered the office shortly after a 3-year DBA departure, the last day to give us a training, the following are some key points of the record, MySQL use, table design learning is still very large, In the future will continue to learn the database part of the rele
ORACLE management-view users with DBA roles
1. view All users: select * from dba_users; select * from all_users; select * from user_users; 2. view system permissions of users or roles (system permissions assigned to users or roles): select * from dba_sys_privs; select * from user_sys_privs; SQL> select * from user_sys_privs; username privilege adm ---------------------------- permission --- zszq unlimited tablespace NO3. view the permissions of a role
growth experience, found that the past suffered setbacks, pain is not completely worthless, but it implies far-reaching significance. Now I, around the people and things, have more tolerant, more understanding, and no longer obsessed with personal gains and losses, so some people say " setbacks, pain behind the growth of space ." Period of study, self-struggle is, of course, the foundation, butpractice and humbly consultis even more critical. In theUniversity, every setback I met, every difficu
-reaching significance. Now I, around the people and things, have more tolerant, more understanding, and no longer obsessed with personal gains and losses, so some people say " setbacks, pain behind the growth of space ." Period of study, self-struggle is, of course, the foundation, butpractice and humbly consultis even more critical. In theUniversity, every setback I met, every difficulty, there wasTeachers,friends and classmates of the enthusiastic help, and every little bit of success, also h
Recursive directory Generator mode, else in the TMP display to obtain yield is indispensable, in the recursive algorithm to use the generator, you need to explicitly get all yield values in the generator's original function (first call)def get_file_recur(path): children = os.listdir(path) for child in children: qualified_child = os.path.join(path,child) if os.path.isfile(qualified_child): yield qualified_child else: tmp = get_file_recur(qualified_
prediction
Naturual Language Processing
Coursera Course Book on NLP
NLTK
NLP W/python
Foundations of statistical Language processing
Probability Statistics
Thinking Stats-book + Python Code
From algorithms to Z-scores-book
The Art of R Programming-book (not finished)
All of Statistics
Introduction to statistical thought
Basic probability theory
Introduction to probability
Principle of uncertainty
Probability Statistics Cookbo
Http://www.amazon.com/Consistency-Coherence-Synthesis-Lectures-Architecture/dp/1608455645/ref=pd_sim_14_1?ie= Utf8dpid=416va%2b7gpildpsrc=simsprest=_ac_ul160_sr129%2c160_refrid=0nsddkf5mwv2fxy1qtvqA Primer on Memory consistency and Cache Coherence (Synthesis Lectures on computer Architecture)multi-core Cache Hierarchies (Synthesis Lectures on computer Architecture)Shared-memory Synchronization (Synthesis Lectures on computer Architecture)Http://www.amazon.com/Multi-Core-Hierarchies-Synthesis-Lec
of the C standard I/O library is the location in the user space I/o buffer. For example, read a byte with fgetc, fgetc it is possible to read from the kernel 1024 bytes to the I/O buffer, and then return the first byte, when the file is recorded in the kernel read and write location is 1024, and in the file structure recorded in the read and write location is 1. Note that the return value type is ssize_t, which represents the signed size_t, which can return either a positive number of bytes, 0
must read.6, "Unix Programming Art", Open your eyes.5. Outside Java1, "UNIX Network Programming", learning Network programming must read.2, "C + + network programming" up and down two volumes, introduced Ace, but the application of various modes of the introduction of the very value of the first reading.3, "Joel said software", programming culture4, "People's Month myth", "Human pieces"5, "Effective programmer", give me a great inspiration of a book.6. The path of programmer's cultivation7, the
Microsoft today started a public test of two office plug-ins, "STAMP" (subtitling add-in for Microsoft powerpoint,powerpoint subtitle loading) and "Save As Daisy", These two plug-ins can help people with hearing, eyesight, or dyslexia to use Office Office software.
Stamp can help users add hidden captions to video or audio files in PowerPoint presentations (the audio portion of a TV signal is superimposed with a program description signal and displayed on a television screen, primarily for deaf
sites.The 10th chapter uses the VSFTPD service to transfer files.The 11th chapter uses Samba or NFS for file sharing.The 12th chapter uses bind to provide the domain name resolution service.The 13th chapter uses DHCP to dynamically manage host addresses.The 14th chapter uses postfix and Dovecot to send and receive e-mails.The 15th chapter uses squid to deploy the proxy cache service.16th. Deploy networked storage using iSCSI services.The 17th chapter deploys the directory service using OPENLDAP
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.