Quantcast
Channel: Teradata Developer Exchange - All blogs
Browsing all 136 articles
Browse latest View live

Workload Management with User Defined Functions and Table Operators

How does TASM enforce rules such as classification and workload exceptions against User Defined Functions?  What about table functions and table operators, some of which do their work outside of...

View Article


Image may be NSFW.
Clik here to view.

Cheetah - Distributed In-memory Dual-active Application Engine

Cover Image: Teradata has great perfomance in batch processing. As a typical OLAP system, Tereadata can't peform as well as OLTP in high concurrency real-time application. I wrote an open source...

View Article


Image may be NSFW.
Clik here to view.

Statistics Collection Recommendations – Teradata Database 14.10

Cover Image: Statistical information is vital for the optimizer when it builds query plans. But collecting statistics can involve time and resources. By understanding and combining several different...

View Article

Image may be NSFW.
Clik here to view.

Everything All the Time

Cover Image: During my first coding class, after the obligatory “Hello, World,” my assignment was to find the least cost path in a matrix of values (linear programming).  The computer took some time to...

View Article

When sample statistics go wild

The accuracy of sample statistics has been greatly improved over the last Teradata releases. So I usually try to use sample stats on most of the big tables and I found them to be reliable on many...

View Article


Image may be NSFW.
Clik here to view.

Text Search pattern in Teradata with Java , SQLJ

Short teaser: Enhance Analytics, Text Seacrh Analytics, especially hadoop, Big dataCover Image: Unstructured data can be dealt with effortlessly in Teradata. Regular expression has been around for many...

View Article

Identifying Java Client Software

Beginning with Teradata Database 14.0 and Teradata JDBC Driver 13.10.00.21, the Client Attributes feature records a variety of information about the client system and client software in the system...

View Article

Image may be NSFW.
Clik here to view.

A Closer Look at How to Set up a Parsing-Only Workload

When you think about priorities, you probably focus your attention on AMP work.  Whether you are using Teradata Active System Management (TASM) or Teradata Integrated Workload Management (TIWM), AMP...

View Article


Image may be NSFW.
Clik here to view.

Just a Little Bit More

Cover Image: The theme of this blog is an examination of forces that would disrupt existing data warehouse implementations.  I categorize these as either long tail or black swan events.Data lakes (and...

View Article


Image may be NSFW.
Clik here to view.

Example Java UDF for Table Hash Calculations

Short teaser: A Java UDF - with not good performance - is shared for a table hash calculationThere is a demand to have a functionality similar to the industry standard SHA256 hash function to condense...

View Article

Image may be NSFW.
Clik here to view.

New, Simplified Approach to Parsing Workload Selection

Cover Image: As of Teradata Database 14.10.05 and 15.00.03, a simplified approach to determining which workload will support session management and parsing has been adopted  This posting describes this...

View Article

The Teradata JDBC Driver's COP Discovery, LCC, Logon, and more

The Teradata JDBC Driver Engineering team receives a lot of questions about what happens when a JDBC connection is created. Let's clarify the concepts Laddered Concurrent Connect (LCC) versus COP...

View Article

Image may be NSFW.
Clik here to view.

Using IOTAs to Determine the I/O Utilization of Your Workloads

I/O Token Allocations (IOTAs) are used in Teradata Database 14.10 with SLES 11 systems to enforce the I/O side of Workload Management Capacity on Demand (WM COD) and other SLES 11 hard limits.This...

View Article


Configuring Redrive and Recoverable Network Protocol in the .NET Data Provider

IntroductionThis blog will introduce the reader to a short description of Redrive and Recoverable Network Protocol in the .NET Data Provider and some of the restrictions that are present in supporting...

View Article

Image may be NSFW.
Clik here to view.

How to Fix the Data Scientist Shortage

Cover Image: The amount of data that is now available for analysis is growing at an exponential rate.  As the hardware to capture the data becomes cheaper, faster and omnipresent, the amount of data...

View Article


Image may be NSFW.
Clik here to view.

Global Weights in SLES 11 Priority Scheduler

Think about the priority part of workload management for a minute.The settings that the administrator makes when defining priorities for different workloads are on the surface--things like workload...

View Article

Image may be NSFW.
Clik here to view.

AMP Worker Task Resource Limits & Increased Load Limits for MLOADX

Cover Image: MLOADX is a new load utility enhancement introduced in Teradata Database 14.10 which is intended to overcome some of the limitations that are associated with standard MultiLoad.  This...

View Article


Image may be NSFW.
Clik here to view.

Teradata Basics: Parallelism

Cover Image: This “Teradata Basics” posting describes the current dimensions of parallelism in the Teradata Database, and how they work together. What is Query Parallelism?Executing a single SQL...

View Article

Image may be NSFW.
Clik here to view.

Special Treatment For Users DBC and TDWM

Cover Image: If you are user DBC or user TDWM and you log onto a Teradata Database, you might get treated somewhat differently than other users.  This posting describes what user DBC and user TDWM do,...

View Article

Image may be NSFW.
Clik here to view.

TDPython Pivot

Short teaser: PoC which evaluated to TDPyton devobs approachCover Image: In July 2015 Eric shared on http://developer.teradata.com/tools/reference/teradata-python-module insights on the Teradata Python...

View Article
Browsing all 136 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>