SD Times: SQL 2003 to standardize XML interfaces, improve interoperability. Here is a little on the roadmap to SQL 2003 as of October 15, 2003.
JTC1/SC32. This is where ISO/IEC JTC1 SC32 materials are coordinated. It is not clear how current this material is.
dBforums - Are DOMAINs part of SQL-99 standard?. There is some weird business about whether DOMAINs are part of SQL yet, or is this an abuse of the concept and it is really something else, or ... what? [2003-11-02] Well, I figured out more of this. DOMAIN is not part of the Core for SQL:1999, but it is there. Whether or not it satisfies the Relational Model notion of domain is not clear. It does appear to be close to the DISTINCT TYPE that can be created as an user datatype in SQL:1999 as well. It is clearly not the whole job yet, but it seems to be closer.
Jim Reye. Jim Reye provided a seminar on What's new in SQL-99 and the PowerPoint slides can be downloaded from this page. I found this to be a valuable resource. What I find amazing is the degree to which implementations seem to pick and choose, and there is no harmony to when the extension is extended, when it is restricted, and when nothing is done about ascerting compliance in any way. That is what I want to find out about now [2003-11-02].
Intelligent Enterprise Magazine - Scalable Systems - SQL-99's New OLAP Functions. This article describes now nicely the OLAP functions were pulled together and appended as a supplement to the SQL:1999 statndard from ANSI. There are some useful links too.
SQLX.org WebSite - Welcome!!. This site is for the H2.3 task group on XML and SQL (formerly known as SQLX). Again, these pages seem to end before the January 2003 SC32 meeting in Santa Fe. It makes me wonder whether the whole thing has fallen apart!
ANSI & ISO Work Group's Web Site - SQL Standards. This site is not up-to-date and it doesn't have any ANSI H2 meeting schedules beyond January 2003 in Santa Fe.
H2. Well, it is apparently not ANSI anymore, but it is H2. How quaint. This is the InterNational Committee for Information Technology Standards technical committee H2 on Database. It was once ncits, and it still seems to be fairly US-centric.
SQL:1999. This is an odd but interesting article on the addition of User Defined Types to SQL. This is close to being able to have domains, but apparently not quite. There is also some sort of fragmentation around who defines SQL standards and how they lead implementation. A well-known problem in standards work, and a sin that I have committed too.
Amazon.com: Books: SQL-99 Complete, Really. I already have this book, and it surfaced in my search for SQL-99 information for the database class I am taking.
Directions in Database TechnologyLowell Database Research Self Assessment. This is the 2003 version of a self-assessment meeting held among database researchers to assess the status of that research and promising directions, new concerns, and emerging areas.
A Conversation with Jim Gray. This should be the Jim Gray interview by Dave Patterson, but I can't be sure from the URL. If that isn't what you find here, you will need to do some kind of search.
ACM Queue - A Conversation with Jim Gray - Who would ever, in this time of the greatest interconnectivity in human history, go back to shipping bytes around via snail mail as a preferred means of data transfer? It is because he puts whole computers in the mail and sends them to other people. The computer holds some near-terabyte amount of data and there are a number of them in circulation in projects where people are doing some great work involving large amounts of data. Some quantities of data can get there faster by pony express. Gray talks about this and more.&nbps; The key thing is that there is a dramatic change coming in some of the trade-offs that we make about data, and this is going to have a serious impact on the design of database systems. I am back looking for this article for that reason. It looks to me that the full-up relational model has been avoided by use of RDBMS systems that are accretions of hacks to get around performance problems while having to deal with increasing demands for automated assurance of data system integrity and consistency under load. When the economies change rapidly, a theoretically sound solution may be the lightweight winner. Won't that be strange.
Computers and Society
Whose Firewall Is It?ACM Ubiquity: Fiefer -- Port Wars. This is very, very, very funny. It could happen.
Computer Technology in Humanitarian ServiceHonours Thesis - Jason Paul Sargent - UoW 2003. Here's Jason Sargent's thesis project page for The Digital Aid Framework. This looks like a way to look at situated architectures, especially with the ideas about the ways that patterns are explored, used for confirmation and suggestion of approaches, and done in a way that makes sense to aid workers and organizations. I wonder if this is something my associate, Bill Anderson at Praxis101, will find worth exploring more closely with Sargent.
The Digital Age Framework. ACM Ubiquity article that looks at an end-to-end problem. There is a link to the paper done as author Jason Sargent's senior thesis.
The Relational ModelChap. 4 Database Design I: Functional Dependencies and Normalisation. Ian Holyer's slide set on Database Design for COMS30103 (Databases) at the University of Bristol, 2002-2003 term.
Boyce/Codd Normal Form(cont). This one works for me too. OK, what have we got here.
Scacchi: Slides on the Relational Model and its key concepts. How come that when I like the definition I hate the example, and when the example seems to work I can't figure the definition for Boyce-Codd Normal Form. Wowza. This is amazing.
Paul Dourish. I was looking around at some Database lecture slides by Walter Scacchi, and I got curious, so I looked up Walter, and went to a Blog that is used by part of the group he is in, and one of the postings was by Paul Dourish, so here I am at Paul's home page. I would love to know if he is still in touch with Annette Adler and others from PARC and what he is doing now, but I have homework to complete and the cats to feed so, here it is for another time.
EECS 647 - Chapter 14b - More Normal Forms. Here are the lecture slides of Dr. Susan Gauch from 1999-03-31.
Boyce-Codd Normal Form. No, I don't have the overlapping case.
Boyce-Codd Normal Form. This example would suggest that the situation is not in BCNF, and it won't be until I split the record.
Database Design: Normalization. A lecture by Ray R. Larson on 1997-09-18. These are the slides as Web pages.
Boyce-Codd Normal Form. Now this is very interesting. We are looking at a new condition on when BCNF is not present. So the schema I am looking at passes BCNF, if it passes 3NF.
Important Links. A nice link page that Tang maintains on sites of research teams. I didn't know that David Lomet is at Microsoft Research, and it reminds me that I have not heard anything of Barnet Corwin in a very long time.
Sherry Tang. This is the student who gathered the research materials on the theory of relational databases.
The Theory of Relational Databases. This is a course that goes through the topic, using material written by David Maier.
Boyce - Codd Normal Form. My only problem with this course is the example doesn't make sense to me. I don't know what it means to assign faculty to a day in the model used. So that makes me wonder about the rest of it, which I would like to be the case.
Normal Forms. Here's more of the reading for Spring 2003 at the University of Regina.
Boyce - Codd Normal Form. OK, I think I have it. Now if I could only figure out what this page is.
C.J.Date - Referential Integrity. VLDB 1981: 2-12. This paper may be available on the IEEE Computer database site too. It is probably here, but I don't know how to invent the link to it.
VLDB 1980: 245-259. I may have cited this already. I want to point out that the abstract is here and the PDF can be found, perhaps. I may need to get it off of the IEEE Computer Digital Library.
Reflections on Boyce-Codd Normal Form. VLDB 1982: 131-141. Here's a PDF that gets into Boyce-Codd and is part of a terrific collection of conference papers on Very Large Databases.
Overview of Normalization: Database-Management Principles and Applications, LIS 384K.11, Graduate School of Library and Information Science, The University of Texas at Austin.. This is an article by R. E. Wyllys. The introduction and overview are quite gentle. Mark Rettig is mentioned, so I need to find out about that part.
Schema Refinement and Normalization. Here's a version of BCNF that I almost understand. I think I understand the rule in my text section 4.1.5 (fig. 4.7) and the way in which 3NF is weaker. This is from 1999-01-22, by Raghu Ramakrishnan, who may have taken the notes used at Simon Fraser too. This appears to be a strong course, so I am somewhat heartened.
CMPT354 Database Systems ans Structures.&nsp; This course provided by instructor Osmar R. Zaïane in the Summer of 1998 has a section on Database Design that defines BCNF in a way that is inpenetrable to me. I don't understand why certain examples in our course are not also examples of BCNF. I need to check in class, but I think part of the problem is the different ways these conditions are described.
Security and ProtectionKerberos: The Network Authentication Protocol. The reliance on a secret key is an interesting problem. Here is the low-down on Kerberos. It is interesting to see the number of exploits are related to recently (2003) uncovered defects.
Bugnosis Web Bug Detector. An interesting little freeware site, located by classmate Robert Brayshaw.
EFF: Privacy, Security, Crypto, & Surveillance. Here's the main EFF page on Privacy and related subjects.
The Web Bug FAQ. This is a great FAQ about Web Bugs compiled at the Electronic Frontier Foundation. Circulated by classmate John Thomas.
Welcome to GUID.org!. Here's a way to be assigned a GUID that can be used to identify me as a visitor.
Welcome to cyScape, Inc.. Here is the BrowserHawk that obtains a great deal of browser information for adaptation of web presentation, for example. Located by classmate Mark Wilmshurst.
SearchSecurity.com, the news and tips source on information security and firewalls. Here is a nice security page that classmate Han Chen recommended.
Web Browser Header Exploration. This is information that was obtained by requesting a Cookie for the Gibson Research Shields UP! Header test and then refreshing. These are the headers that my browser is now sending to the site with a cookie that is set up for it:
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.0.3705; .NET CLR 1.1.4322)
Cookie: orcmid=what a loverly bunch of coconuts
Accept-Encoding: gzip, deflate
Gibson Shields UP! Report. The Gibson Research Shields UP! Test provided me this interesting commentary about my ADSL connection to the internet:"The text below might uniquely
identify you on the Internet
Your Internet connection's IP address is uniquely associated with the following 'machine name':
The string of text above is known as your Internet connection's 'reverse DNS.' The end of the string is probably a domain name related to your ISP. This will be common to all customers of this ISP. But the beginning of the string uniquely identifies your Internet connection. The question is: Is the beginning of the string an 'account ID' that is uniquely and permanently tied to you, or is it merely related to your current public IP address and thus subject to change?
The concern is that any web site can easily retrieve this unique 'machine name' (just as we have) whenever you visit. It may be used to uniquely identify you on the Internet. In that way it's like a 'supercookie' over which you have no control. You can not disable, delete, or change it. Due to the rapid erosion of online privacy, and the diminishing respect for the sanctity of the user, we wanted to make you aware of this possibility. Note also that reverse DNS may disclose your geographic location.
If the machine name shown above is only a version of the IP address, then there is less cause for concern because the name will change as, when, and if your Internet IP changes. But if the machine name is a fixed account ID assigned by your ISP, as is often the case, then it will follow yo"
--SpybotSD - Welcome to security.kolla.de. One of the spyware deletion programs that I find very useful. It allows review and management of most spyware exploits that I have heard of, and inhibits browser access to adware network sites.
Web Tracking Networks :: Kalsey Consulting Group. This article explains how 3rd-party cookies work and how you can prevent your browser from pulling ads (and their cookies) from adware sites.
How does an Ad Tracking program work ?. An interesting page that promotes a Ad Tracking.
NONE: Re: ONLINE-ADS>> web tracking. This is a nice message posting that addresses what works in terms of web tracking and how it is used.
NetTracker provides accurate, reliable, detailed Web site traffic analysis. Here's another tracking service. It will correlate names and phone numbers of customers and determine the customer visit and purchase patterns.
Web Tracking Sniffers, Page Counters by BellaCoola Software. Cache-corrected Referer logs for any site.. This is an example of the kinds of web tracking that are available for sites to use in determining advertisement effectiveness and responses from newsgroup postings.
Mark Levene: Online papers. This is a good bibliography that includes the PDF version of the paper on generalization of entity and referential integrity.
Data Integrity. This is a nice web page, found by classmate Arjen Huzen, that looks at data integrity beyond the structural integrity requirements for a relational model used to represent a data system.
Sanjay Kumar Madria - Home Page. The top level information.
Sanjay Kumar Madria Biography. I am working around the frames to get to pages that I can blog correctly. Here's one.
Bio-sketch of Sanjay Madria. I thought I would look to see if there is more information available on my instructor for the on-line M.Sc in IT Databases course. I have a name match, now let's see if I have a person match. (This is actually relevant to a question about what web sites can find out about us!)
UnRev-II - headers sorted: Re: [unrev-II] William Kent's book &. Here's an odd discussion of Data and Reality that goes off on the technical suggestions and not the key point of the book (as far as I can tell). I need to see if I can now find the book in its reprinted form. Time to look on amazon.com.
Data and Reality [Excerpts]. I need to take a look at this. It would appear to fit in the Winograd & Flores space and also deal with the ways in which database systems are not models of reality (and there probably are no models of reality in the way ordinarily understood).
Course Detail: Data Modeling. This is currently the most popular of the courses offered as part of the ACM Professional Development Centre. It is an 8-hour course on basic concepts that I might review to calibrate with the course I am in on databases for my on-line M.Sc in IT.
SQL by Design: Why You Need Database Normalization. This March 1999 article by Michelle A. Poolet describes the purpose and function of normalization.