[Top] [Prev]

Index

A

Accent sensitivity xvii

Adaptable architecture xv

Adding engines 3-8

Adding logins 10-5

Affinity, process 2-4

Aggregate function 5-2

Aging

out of cache 3-7

procedure cache 3-6

Aliases, creating 10-7

Allocating memory 2-11

alter database command

and allocating storage space 9-6

Alternate character sets xvii

Alternate date xvii

ANSI/ISO SQL `89 xvi

ANSI/ISO SQL `92 xvi

API 1-19

append_log semaphore 3-9

Application

client/server 1-6

design, DSS and OLTP 3-5

development 1-4

international xvii

named data caches for 3-5

Application-level protocol 4-10

AppModeler 1-5

Architecture 2-1 to 2-11

adaptable xv

kernel 4-1

multithreaded 2-1

network 4-9

SQL Server SMP 2-4 to 2-8

@@error 6-11

@@identity 6-12

at isolation clause 3-12

@@max_connections 6-11

@@nestlevel 6-11

@@procid 6-11

@@rowcount 6-12

@@servername 6-12

@@sqlstatus 6-12

@@textsize 6-12

@@total_read 6-12

@@total_write 6-12

@@trancount 6-12

@@version 6-12

Auditing 10-12 to 10-16

of client requests 1-21

queue, size of 10-14

sybsecurity database 10-13

system procedures for 10-13

Audit trail 7-3

Automated database managers 6-7

Automatic recovery 11-2

B

Backup and recovery parameters 6-14

Backups 11-4

incremental 11-7

Backup Server utility 11-4

Banyan StreetTalk 1-22

Batches vs. stored procedures 5-4

bcp (bulk copy utility)

large I/O for 4-8

begin transaction command 11-2

Benchmark, TPC-C xvi

Benefits of client/server 1-7

Binary sort order xvii

Binding

caches 3-4

tempdb 3-5

transaction logs 3-5

Bitwise indexing 1-4

Bitwise operators 5-10

Block size xv

Book, overview xvii

Buffer Cache Manager. See Logical Memory Manager (LMM)

Buffer washing 3-6

Built-in functions 5-9

Bulk copy command 4-10

Business, global 1-1

Business rules 1-12, 5-4

Byte size 6-12

C

C++ 1-5

Cache 2-7

aging out of 3-7

architecture 3-3

configuring multiple 3-4

named 3-2 to 3-5

and optimizer 4-3

Optimizer

and cache 4-3

Cache, data 3-2 to 3-5

hot spots bound to 3-4

spinlocks on 3-4

tempdb bound to own 3-5

transaction log bound to own 3-5

Cache, procedure

query plans in 3-6

Cache management 3-2 to 3-7

and contention 3-1

Cache manager parameters 6-14

Case sensitivity xvii

Catalog stored procedures

list of 7-17

chained on|off 6-10

Changing

configuration parameters 6-2

Changing log I/O size 3-8

Chapter overviews xvii

Character sets xvii

Cheap direct updates 4-4, 4-5

Check constraints 8-2, 8-4 to 8-5, 8-7

error messages 8-5

example 8-4

Checkpoint xv, 3-6

housekeeper task and 3-6

checkpoint command 4-8

Class B1 xvi

Class C2 requirements xvi

Class F-B1/E3 xvii

Client

application 1-6

implementation 2-2

node 1-7

service request 1-9, 2-9

Client/server

benefits 1-7

implementation 1-7

interaction 1-6

model 1-6 to 1-13

nodes 1-7

relative roles 1-8

and Sybase products 1-1

Client connections 2-1

Client functionality 1-8

Client-Library 1-4, 1-19

Client service request 2-10

Client-side API 1-19

Client task 2-2, 2-3

close on endtran on|off 6-10

Clustered indexes, effect on SQL Server performance 7-7

Columns

sizes of (list) 7-8 to 7-9

commit transaction command 11-2

Communication

interprocess 4-2

shared memory 2-7

Companion Server 9-9

Compaq xvi

Complex restrictions 5-6

Compliance, with standards xvi

Component model 2-1

Components 1-2, 1-11

DBMS 3-2

Compressing data 1-18

compute clause 5-2

sample query 5-2

Computing

client/server 1-6

mainframe 1-5 to 1-6, 1-7

model 1-1, 1-5

Concurrent inserts xv

Conditional triggers 8-7

Configuration parameters 6-9, 6-14

sp_sysmon and 6-2

Configurations 1-20

three-tier 1-20

Configuration tools 6-1

Configuring

I/O size 4-8

multiple caches 3-4

named caches 3-3

number of locks 3-10

Connection

client 2-1

maximum user number 6-11

memory consumption 2-2

simultaneous 2-6

and ULC 3-9

Connections, multiple 2-2

Consistency checker 8-8

Constraints 5-5

changing 8-3

defined 5-5

dropping 8-3

primary key 8-3

referential 8-4

system procedures for managing 7-11

unique 8-3

and user-defined messages 8-5

Contention 3-1

and cache management 3-1

disk I/O 6-6

last page xv

log, eliminating 3-8

and logging 3-1

minimized 3-1

on the log semaphore xv

Context switching 2-3

Control-of-flow language 5-3

Cost-based optimizer 4-3

CPU utilization 2-6

housekeeper task and 3-6

create database command 7-6

create database command

and allocating storage space 9-6

permissions 10-10

create index command 9-4

create rule command 8-5

create table command 9-4

Creating

aliases 10-7

database objects 9-4

cursor rows n 6-10

Cursors 5-7

Cycle, execution 2-5

D

Daemon 1-8

Data

access 1-5

dictionary 1-9

encryption 1-21

entry rules 8-4

massive amounts 1-4

presentation 1-5

replication 1-15

structures 3-2, 4-2

transparency 1-22

validation 1-5

warehousing 1-14

DataArchitect 1-5

Database 1-2

assigning to database devices 9-6

client and server 1-9

default size 9-6

layer 1-2, 1-3

online information 9-11

options 6-8

owners 10-4

procedures for managing 7-12

security 10-1 to 10-11

space allocation 9-1 to 9-11

standalone 1-18

system 7-1 to 7-3

system procedures for managing 7-12

user types 10-4 to 10-5

Database Consistency Checker 8-8

Database devices 9-5 to 9-11

information 9-11

initialization 9-5

online information 9-5

space allocation 9-14

Database layer 1-3, 1-12

Database management system 1-9

Database object owner 10-4 to 10-5

permissions of 10-10

Database objects

creating 9-4

system procedures for managing 7-11

Data cache 2-7, 2-8

hot spots bound to 3-4

and large I/O 4-7

spinlocks on 3-4

tempdb bound to own 3-5

transaction log bound to own 3-5

Data integrity 8-6 to 8-7

checking 8-8

in SQL Server 10-1

Datatypes 7-8

list of 7-8

properties 7-10

summary of 7-8 to 7-9

text and image 5-9

user-defined 7-10

dbcc (Database Consistency Checker) 8-8

large I/O for 4-8

dbcc checkdb 9-16

dbcc checktable 9-16

DBMS

components 3-2

and kernel 4-1, 4-2

dbo use only 6-11

ddl in tran 6-11

Deadlock 3-11

Debugging services 1-21

Decentralization 1-1

Decision support system (DSS) 1-14, 3-6

named data caches for 3-5

queries 3-5

Default devices, designating 9-5

Defaults 8-5

in data entry 5-5

defined 5-5

settings and permissions 7-2

system procedures for managing 7-11

Deferred updates 4-4, 4-6

delete

new clauses 3-5, 6-9

Deployment 1-4

Devices

default 9-5

initialization 9-5

online information 9-5

system procedures for managing 7-13

Dictionary sort order xvii

Digital xvi

Directory services 1-22

Direct updates 4-4

cheap 4-5

expensive 4-5

to system tables 6-17

Disk devices, mirroring 9-6 to 9-9

Disk I/O 2-8, 4-7

parameters 6-15

performing 2-10

queue 2-8

disk init command 9-4

disk mirror command 9-4

Disk mirroring 9-6 to 9-9

disk mirror command 9-4

Distributed computing environment (DCE) 1-22

Document purpose xvii

Domain constraints 8-1

Dumb terminal 1-5

Dump devices

online information 9-5

Dump striping 11-4

dump transaction 11-3

E

Efficiency 1-1

Efficient use of OS 4-1

Eliminating log contention 3-8

Engines 2-4

adding 3-8

comunication 2-7

functions and scheduling 2-5 to 2-8

network 2-6

scheduling 2-5

system tables entries for 7-5

Enhancements to SQL 5-1 to 8-8

Enterprise client/server 1-12

@@error 6-11

Error handling 5-8

Error numbers

checking global variables for 6-11

Escalating locks 3-10

Example

MPP 1-17

OLTP 1-14

Pass-through server 1-20

Replication Server 1-16

SMP processing 2-8

transparent server 1-21

Exclusive table lock 3-10

Executable 2-7

Execution 2-10

Execution cycle 2-5, 2-10

Expensive direct updates 4-4, 4-5

Extending business 1-2

Extensions, other 5-9

F

Family of servers 1-2

Fault tolerance 9-9

Fault tolerance in SQL Server 11-1

Features xv

security xvi

FIPS 127-1 xvi

First tier 1-12

Foreign language xvii

Formats, alternate xvii

Freelock list 3-11

Frequently used options 6-11

Functional compensation 1-22

G

General information parameters 6-15

Global business 1-1

Global distributed transaction 1-12

Global resources 3-2

Global stored procedures 1-22

Global variables 6-11 to 6-12

Graphical user interface (GUI) 1-7, 1-9

H

Hardware independence 2-1

Hash tables 3-10

Heap tables 9-15

Heterogeneous environment 1-7

Hewlett Packard xvi

High performance products 1-2

holdlock keyword 11-2

Hot pages 3-1, 3-4

"Hot spots"

binding caches to 3-4

Housekeeper task

free writes and 3-6

I

I/O

disk 2-10

network 2-6, 2-10

update operations and 4-5

Identifying users 10-2

@@identity 6-12

image datatype 5-9

large I/O for 4-8

Implementing

Client/server nodes 1-7

clients 2-2

Improving efficiency 1-1

Index

advanced 1-18

bitwise 1-4

statistics 4-6, 6-9, 6-13

system procedures for managing 7-11

Industry standards xvi

Infrastructure 1-2

client/server 1-12

Innovative solutions xvi

In-place updates 4-4, 4-5

insert

new clauses 3-5, 6-9

Inserts

concurrent xv

Integrating the mainframe 1-13

Intelligent analysis 1-5

International applications xvii

International Information Technology Security Evaluation Criteria (ITSEC) xvii

International Standards Organization (ISO) 1-7

Interprocess communication 4-2

Invoking a stored procedure 5-3

IQ 1-4, 1-18

ISO 9001 xvi

Isolation level 0 3-12

Isolation levels 3-12

ISQL 2-2

K

Kernel 2-7, 4-1 to 4-10

architecture 4-1

and scheduling 2-5

structures 2-7

Keys

automatically generated 5-3

foreign 8-4

primary 8-4

L

Language 6-15

foreign xvii

Large I/O 4-7

Last page contention xv

Layer

database 1-2, 1-3, 1-12

middleware 1-2, 1-12

tools 1-2, 1-4, 1-12

Leaf levels of indexes

large I/O and 4-8

Legacy

data 1-13

system 1-12

systems 1-2

Lightweight process 2-2

List

catalog stored procedures 7-17

configuration parameters 6-14 to 6-19

system procedures 7-10 to 7-16

system tables 7-4 to 7-6

Location transparency 1-22

Locking 3-9

Lock management 3-10 to 3-12

Lock manger parameters 6-16

Lock promotion threshold 3-10

Log

synchronization point 3-8

write ahead 3-7

Log, transaction 11-3

Log contetion, eliminating 3-8

Logging

and contention 3-1

data changes 3-8

mechanism 3-9

Log I/O size, changing 3-8

Logical I/O xv

Logical Memory Manager (LMM)

Logins 2-6, 2-9

account locking 10-2

adding to servers 10-5

dropping from servers 10-6

locking accounts 10-7

system procedures for managing 7-16

Log semaphore xv, 3-8, 3-9

M

Mainframe, integrating 1-13

Mainframe computing 1-5 to 1-6, 1-7

Maintenance

of SQL Server 11-1

Management

cache 3-2 to 3-7

lock 3-10 to 3-12

process 4-2

transaction 3-7 to 3-9

Market requirements 1-1

Mass deployment 1-18

Massively parallel processing 1-16

master database 6-12

system tables 7-5 to 7-6

Matrix, product 1-2

@@max_connections 6-11

max_rows_per_page 3-11

max engines freelocks configuration parameter 3-11

Mechanism, logging 3-9

Memory

allocation 2-11

shared 2-4, 2-7

use xv

Message command 4-10

Messages, user-defined

system procedures for managing 7-15

MetaWorks 1-5

Middle tier 1-12

Middleware 1-2

Middleware layer 1-2, 1-4, 1-12

Mirroring. SeeDisk mirroring.

Mobile devices 1-18

Model

client/server 1-6 to 1-13

component 1-11, 2-1

computing 1-1, 1-5

peer-to-peer 1-13

process 2-1 to 2-4

three-tier 1-11 to 1-21

two-tier 1-10 to 1-11

Model database 7-2

Monitor Historical Server 6-4

Monitoring performance (system) 6-2 to 6-11

Monitoring tools 6-1

MPP 1-3, 1-16

MRU/LRU chain 3-6

Multifile dumps 11-4

Multiple connections 2-2

Multiple data caches xv

Multiple network engines xv, 2-6, 4-9

Multiple sites 1-4

Multiprocessing Architecture, SQL Server SMP 2-4 to 2-10

Multithreaded

architecture 2-1

environment 4-1

kernel 2-3

N

Named caches 3-2 to 3-5

and performance 3-4

Naming services 1-22

National Computer Security Center (NCSC) xvi

National Institute of Standards and Technology xvi

Navigation Server 1-17

Nested triggers 8-7

Nesting levels 6-11

@@nestlevel 6-11

Network

architecture 4-9

bottlenecks 2-6

communication parameters 6-16

controller 2-6

dumps 11-5

nodes 1-8

queue 2-8

traffic 1-7

Networked systems 1-7

Network engines 2-6

Network I/O 2-6, 2-8

performing 2-10

Network manager engine 2-9

New paradigms 1-1

no chkpt on recovery 6-11

nocount 6-10

Nodes 1-7

on a network 1-8

noexec 6-10

Nomadic devices 1-18

Novell NetWare 1-22

NT 1-22

Number (quantity of)

nesting levels 6-11

simultaneous SQL connections 6-11

user connections (@@max_connections) 6-11

Number of

disk reads 6-12

disk writes 6-12

page locks 3-10

processes 2-5

rows 6-12

Numbers, error message 6-11

O

Object allocation map (OAM) 3-12

ObjectCycle 1-5

Object-oriented C++ 1-5

Objects

communication 2-7

ODBC procedures 7-17

Off-peak data writer xv

Oldest active transactions 11-3

OmniCONNECT 1-4, 1-12, 1-13, 1-19, 1-21

On-line transaction processing (OLTP) 1-13 to 1-14, 3-5

Open architecture 2-1

Open Client 1-4, 1-19

Open Client Client Library 2-2

Open Database Connectivity 7-17

Open Data Connectivity 1-19

Open Server 1-4, 1-12, 1-13, 1-19, 1-19 to 1-21

configurations 1-20

Operating system, use of 4-1

Operating system process 2-2

Operating system resources parameters 6-17

Operator

tasks of 10-3

Optima++ 1-5, 1-12, 2-2

Optimizer 4-3

Overhead 2-7

deferred updates 4-6

single process 2-3

Overview of chapters xvii

P

Package commands 4-10

Page allocation 3-12

Page lock 3-10

page utilization percent parameter 3-12

Parallel loads xv

Parallel processing 1-16

parseonly 6-10

Partitioning tables 9-15

Pass-through server 1-20

Passwords

encryption 10-2

expiration 10-2

length 10-2

lost 10-2

Peer-to-peer model 1-13

Performance 3-1 to 3-12

and disk usage 9-10

in single-process architecture 2-3

monitoring 6-2 to 6-11

and named cache 3-4

space allocation issues 9-2

and threads 2-3

Performing disk I/O 2-10

Performing network I/O 2-10

Permissions 10-8 to 10-10

aliases and 10-7

command/object 10-9 to 10-10

of database object owner 10-10

default 7-2

model database 7-2

and stored procedures 10-11

System Administrator 10-3

System Security Officer 10-3

and views 10-11

Physical memory parameters 6-17

Platform independence 2-1

PLC, see ULC xv

Polling sockets 4-9

PowerBuilder 1-4, 1-12

Powersoft 1-4

Predicting trends 1-2

Prefetch xv, 4-3

sequential 3-6

Private log cache xv

Private log cache (PLC). See User log cache

Problems, solving xvi

Procedure cache 2-7, 2-8

procedure cache percent configuration parameter and 2-7

query plans in 3-6

Process

identifier (PID) 2-2

in run queue 2-2

lightweight 2-2

model 2-1 to 2-4

number of 2-5

operating system 2-2

overhead 2-3

versus threads 2-2

ProcessAnalyst 1-5

Processors parameters 6-17

@@procid 6-11

Product matrix 1-2, 1-10

Products, high performance 1-2

Protocol diagnostics 1-21

Purpose, this document xvii

Q

Quality, ISO 9001 xvi

Quality certification xvi

Query optimization xv, 4-3

Query plan

factors affecting 4-6

optimizer and 4-3

procedure cache storage 3-6

Query processing

large I/O for 4-8

options 6-8

Queue

run 2-10

sleep 2-5, 2-8

Queued tasks 2-5

R

RAD 1-5

read only 6-11

Records

audit records 10-14

Recovery 11-2 to 11-3

in SQL Server 11-1

Recovery time

housekeeper task and 3-6

Reducing

checkpoint time xv

Reference Model, ISO 1-7

Referential integrity 5-6, 8-6 to 8-7

example 8-3

Relative roles, client/server 1-8

Remote login

System procedures for managing 7-14

Remote procedure calls

backups 11-5

Remote servers

System procedures for managing 7-14

Replication Server 1-4, 1-15

Request, client 1-9, 2-9

Requiremtents, market 1-1

Resource managers 3-2

Response time 3-1

Returning data 4-9

Reuse 2-1

Roles

Operator 10-3

System Administrator 10-2 to 10-3

System Security Officer 10-3

Roll back

trigger 5-6

rollback transaction command 11-2

Row aggregate function 5-2

@@rowcount 6-12

rowcount 6-10

Row ID (RID)

update operations and 4-4

Row-level locking 3-10

Rows per page 3-11

Rows returned 6-12

RPCs

command 4-10

Rules 8-4

for data entry 5-5, 8-4

and data integrity 8-2

defined 5-5

example 8-5

system procedures for managing 7-11

Running business 1-2

Run queue 2-2, 2-3, 2-8, 2-10

S

Sample database 7-3

Scalability xv, 3-1

Scans, table

large I/O for 4-8

Scenario, SMP 2-8

Scheduling

engines 2-5

tasks 2-5

S-Designor 1-5

Second tier 1-12

Security

database 7-3, 10-1 to 10-11

enhancements 1-21

features xvi

services 1-22

Segments 9-10 to 9-11

commands for using 9-11

creating 9-10

partitions and 9-16

and performance 9-10, 9-14 to 9-15

select command

new clauses 3-5, 3-12, 6-9

select into/bulkcopy 6-11

select into/bulkcopy database option

model database and 7-2

select into command

large I/O for 4-8

Semaphore 3-8, 4-3

log xv

Sequential prefetch xv, 3-6, 4-3

Server

application 1-6

node 1-7

Server functionality 1-8

@@servername 6-12

Server operations

System procedures for managing 7-14

Servers

adding new logins to 10-5

family of 1-2

monitoring activity of 6-2 to 6-11

monitoring performance 6-2

Server-side API 1-19

Server structures 2-7, 2-8, 4-2

Server toolkit 1-4

Services

naming 1-22

set command

sample options 6-10

set forceplan 3-5, 6-9

set prefetch 3-5, 6-9

set table count 3-5, 6-9

Shared data buffers 4-8

Shared memory 2-7

and OS 4-2

Shared procedure 4-8

showplan 6-10

Single

threading 2-2

user 6-11

Single CPU 2-2

Single-process overhead 2-3

Sites, multiple 1-4

Sleep queue 2-5, 2-8

SMP machines 1-17

SMP subsystems 2-8

SMP systems 4-9

architecture 2-4 to 2-8

Software independence 2-1

Solutions, innovative xvi

Solving problems xvi

Sort orders xvii

sp_adduser system procedure 7-2

sp_cachestrategy 3-5, 6-9

sp_configure 6-7

address lock spinlock ratio 3-11

page lock spinlock ratio 3-11

table lock spinlock ratio 3-11

user log cache spinlock ratio 3-9

sp_helpartition 9-16

sp_monitor 6-5

sp_sysmon 6-5

sp_volchanged 11-5

Space allocation

database devices 9-14

issues 9-1 to 9-4

Speed (Server)

cheap direct updates 4-5

deferred updates 4-6

direct updates 4-4

expensive direct updates 4-5

in-place updates 4-4

spinlock ratio parameter 3-9

Spinlocks 2-2, 2-7, 3-9, 3-10, 4-3

data cache and 3-4

SQL

Transact-SQL extensions 5-9

SQL Access Group 1-19

SQL Anywhere 1-4, 1-12, 1-16, 1-18

SQL Central 1-4

SQL Debug 5-9

SQL enhancements 5-1 to 8-8

SQL Remote 1-16

SQL Server 1-3

activities monitor 6-2 to 6-11

adding users to 10-5

administration parameters 6-17

engine 2-4

executable 2-7

name 6-12

users information 10-8

version 6-12

SQL Server Manager 1-4, 6-7

SQL Server Monitor 1-4

@@sqlstatus 6-12

Stack 2-5

Standalone databases 1-18

Standard cache architecture 3-3

Standards compliance xvi

State of the art features xv

Statistics

index 6-9, 6-13

statistics io 6-10

statistics time 6-10

Storage

system procedures for managing 7-13

Storage management 9-1 to 9-11

and system tables 9-2 to 9-3

Stored procedure ID 6-11

Stored procedures 7-10 to 7-16

effect on SQL Server performance 5-3

invoking 5-3

and optimizer 4-4

and permissions 10-11

query plan 3-6

system procedures for managing 7-15

Strategy

System 11 1-1 to 1-13

Structures 2-8, 3-2, 4-2

Summary

of this book xvii

Sun xvi

Sybase IQ 1-4, 1-12, 1-18

Sybase MPP 1-3, 1-12, 1-17

Sybase product matrix 1-10

Sybase products

client/server 1-1

Sybase Replication Server 1-15

sybsecurity database 10-13

Symmetric multiprocessing 2-4 to 2-10

Syntax database 7-3

sysindexes table 9-3

syslogshold system table 11-3

System

uniprocessor 2-2

System 11 strategy 1-1 to 1-13

System Administration

automated 6-7

commands 5-8

System Administrator 10-2 to 10-3

permissions 10-3

tasks of 10-2

System databases 7-1 to 7-3

System datatypes 7-8

System procedures 7-10 to 7-17

for adding users 10-6

database 7-2

list of 7-10 to 7-16

sp_volchanged 11-5

Systems

networked 1-7

System Security Officer 10-3

permissions 10-3

tasks of 10-3

System tables 7-3 to 7-6

master database 7-5 to 7-6

and storage management 9-2 to 9-3

T

table count 6-10

Table locks 3-10

Tables 7-7

defined 7-7

partitioning xv, 9-15

system 7-3 to 7-6

system procedures for managing 7-11

Table scans

large I/O for 4-8

Tabular Data Stream 4-10

Tasks 2-3, 4-3

client 2-2

execution 2-10

in queue 2-6

queued 2-5

scheduling 2-5

TDS 4-10

Telecommute 1-1

tempdb database

named caches and 3-5

text datatype 5-9

large I/O for 4-8

@@textsize 6-12

Third party tools 1-5

Third tier 1-12

Threads 2-2, 2-2 to 2-4

switching context 2-3

versus processes 2-2

Three-by-three matrix 1-2

Three-tier model 1-11 to 1-21

Thresholds

system procedures for managing 7-13

Throughput 3-1

monitoring 6-2

Tiers 1-12

Timeslice 2-5

Tools 1-2

for tuning 6-1

layer 1-2

Tools layer 1-4, 1-12

Topologies 1-20

@@total_read 6-12

@@total_write 6-12

TPC-C benchmark xvi

Tracking cursor actions 6-12

Tracking transactions 3-7

@@trancount 6-12

Transaction logs 3-7, 11-3

contention 3-9

database device placement 9-6

named cache binding 3-5

Transaction management 3-7 to 3-9, 11-2

Transactions 3-7

and consistency 11-2

performance and 6-2

and recovery 11-2

Transact-SQL debugger 5-9

Transition 1-1

Transparent server

examples 1-21

Triggers 1-12, 5-5, 8-6 to 8-7

conditional 8-7

functions 8-6

and multiple row data modifications 8-7

nesting 8-7

and optimizer 4-4

recursion 8-7

Truncation points 11-3

trunc log on chkpt 6-11

Trusted Computer System Evaluation Criteria (TCSEC) xvi

Tunable block I/O xv, 4-7

Tuning

monitoring performance 6-2

Two-tier model 1-10, 1-11

U

ULC. See User log cache (ULC)

Uniprocessor system 2-2

Updates xv, 4-4

cheap direct 4-5

deferred 4-6

expensive direct 4-5

in place 4-4

update statistics command 6-13

update statistics command

large I/O for 4-8

User databases

creating 7-6

master database control of 7-1

ownership 7-6

User-defined caches. See Named caches

User-defined datatypes 7-10

system procedures for managing 7-15

User environment parameters 6-19

User log cache (ULC) xv, 3-9

User login 2-6

Users

aliases 10-7

dropping from servers 10-6

system procedures for managing 7-16

User statistics

system procedures for managing 7-16

V

Validation 1-5

Values

configuration parameters 6-14 to 6-19

VAX OpenVMS 9-9

@@version 6-12

version 6-12

Views 5-6, 5-7

and database security 10-11

defined 5-6

permissions for 10-11

Virtual Server Architecture (VSA) 2-4

W

Wake up 2-10

web.sql 1-5

Windows NT 1-22

Work models 1-1

Write-ahead log 3-7, 11-3

X

X/OPEN X/A xvi



[Top] [Prev] [Next] [Bottom]