Author’s note: This is joint work with John Newhook, Department of Civil and Resource Engineering, Dalhousie University. Over the past two years I have had the privilege to work on a number of different engineering initiatives related to the sport of curling. One of these is the development of an instrumented curling broom, a device
The past few weeks I have been researching resources for the two courses in Software Quality Assurance, PROG2070 and PROG8170, that I am scheduled to teach in the Fall 2013 and Winter 2014 semesters. I’ve chosen  (shown at right) as the textbook for both courses but will draw considerably on references [3, 4, 9,
Further to my previous article regarding disk corruption, below is another article originally published on my Sybase blog that outlined some results from Remzi Arpaci-Dusseau’s group at Wisconsin on the characteristics of failures with commodity disk hardware. This blog entry is copyright by Sybase, Inc., an SAP Company, and first appeared on Glenn Paulley’s Sybase
In May 2008 I wrote about Remzi Arpaci-Dusseau’s work at the University of Wisconsin regarding file system corruption and the dangers of both file systems that tradeoff robustness for performance, and the dangers of commodity disk hardware. As this week I am presenting material on backup, recovery, and database administration, here is the original article.
During May 31 – June 1, 1990 – just a few months before I started as a graduate student at Waterloo – the University of Waterloo hosted a two-day symposium entitled “The 1990’s – The Database Decade” that featured one-hour talks by both academic and industrial researchers, which included Paul Larson, François Bancilhon, Frank Tompa,
This week I am here at Schloss Dagstuhl attending the second Dagstuhl workshop, numbered 12321, on the topic of Robust Query Processing. This workshop, organized by Goetz Graefe of HP Labs along with Harumi Kuno, Wey Wuan Guy, and myself, follows a similar workshop held in September 2010 that also looked at robust query processing.
Databases have become ubiquitous. In addition to mainframe and client-server systems, relational database systems are utilized by embedded applications, on smartphones, within web browsers – just about everywhere. The article below provides some background regarding the necessary properties of “ubiquitous” database management systems, and also provided the title of this blog. This blog entry is