Solved

MySQL BIGINT logical operator support

Posted on 2011-03-16
2
379 Views
Last Modified: 2012-05-11
i'm getting ready to expand a field that is INTEGER (32 bits) into BIGINT.
This is used as a binary bitmask, and is used with bitwise logical operators

My question is does MySQL 5 reliably support logical operators for BIGINT types?
have you heard of any problems?

thanks
0
Comment
Question by:willsherwood
2 Comments
 
LVL 50

Accepted Solution

by:
Steve Bink earned 500 total points
ID: 35162576
0
 

Author Closing Comment

by:willsherwood
ID: 35228163
thx
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
MYSQL/PHP inserting 1969-12-31 instead of NULL 12 49
Need help with a query 6 72
Have issues with Query MySQL 9 64
mcrypt_create_iv() is deprecated 4 144
All XML, All the Time; More Fun MySQL Tidbits – Dynamically Generate XML via Stored Procedure in MySQL Extensible Markup Language (XML) and database systems, a marriage we are seeing more and more of.  So the topics of parsing and manipulating XM…
Popularity Can Be Measured Sometimes we deal with questions of popularity, and we need a way to collect opinions from our clients.  This article shows a simple teaching example of how we might elect a favorite color by letting our clients vote for …
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question