Programming Client Applications

Total Page:16

File Type:pdf, Size:1020Kb

Programming Client Applications IBM® DB2 Universal Database™ Application Development Guide: Programming Client Applications Ve r s i o n 8 SC09-4826-00 IBM® DB2 Universal Database™ Application Development Guide: Programming Client Applications Ve r s i o n 8 SC09-4826-00 Before using this information and the product it supports, be sure to read the general information under Notices. This document contains proprietary information of IBM. It is provided under a license agreement and is protected by copyright law. The information contained in this publication does not include any product warranties, and any statements provided in this manual should not be interpreted as such. You can order IBM publications online or through your local IBM representative. v To order publications online, go to the IBM Publications Center at www.ibm.com/shop/publications/order v To find your local IBM representative, go to the IBM Directory of Worldwide Contacts at www.ibm.com/planetwide To order DB2 publications from DB2 Marketing and Sales in the United States or Canada, call 1-800-IBM-4YOU (426-4968). When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1993-2002. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About This Book..........xiii Programming a Standalone Application . 30 Creating the Declaration Section of a Part 1. Introduction........1 Standalone Application .......31 Declaring Variables That Interact with the Database Manager .........32 Chapter 1. Overview of Supported Declaring Variables That Represent SQL Programming Interfaces ........3 Objects.............33 DB2 Developer’s Edition ........3 Declaring Host Variables with the DB2 Developer’s Edition Products ....3 db2dclgn Declaration Generator ....35 Instructions for Installing DB2 Developer’s Relating Host Variables to an SQL Edition Products ..........5 Statement............36 DB2 Universal Database Tools for Developing Declaring the SQLCA for Error Handling 37 Applications ............5 Error Handling Using the WHENEVER Supported Programming Interfaces.....6 Statement............38 DB2 Supported Programming Interfaces . 6 Adding Non-Executable Statements to an DB2 Application Programming Interfaces . 8 Application ...........40 Embedded SQL ..........9 Connecting an Application to a Database 40 DB2 Call Level Interface .......10 Coding Transactions ........41 DB2 CLI versus Embedded Dynamic SQL 12 Ending a Transaction with the COMMIT Java Database Connectivity (JDBC) . 14 Statement............42 Embedded SQL for Java (SQLj) ....15 Ending a Transaction with the ROLLBACK ActiveX Data Objects and Remote Data Statement............43 Objects.............16 Ending an Application Program ....44 PerlDBI............17 Implicit Ending of a Transaction in a ODBC End-User Tools .......17 Standalone Application .......45 Web Applications ..........17 Application Pseudocode Framework . 45 Tools for Building Web Applications . 17 Facilities for Prototyping SQL Statements 46 WebSphere Studio .........18 Administrative APIs in Embedded SQL or XMLExtender..........19 DB2CLIPrograms.........48 MQSeries Enablement........19 Definition of FIPS 127-2 and ISO/ANS Net.Data............20 SQL92 .............48 ProgrammingFeatures........20 Controlling Data Values and Relationships . 48 DB2ProgrammingFeatures......20 Data Value Control.........49 DB2StoredProcedures.......22 Data Value Control Using Data Types . 49 DB2 User-Defined Functions and Methods 22 Data Value Control Using Unique DevelopmentCenter........23 Constraints ...........49 User-Defined Types (UDTs) and Large Data Value Control Using Table Check Objects (LOBs) ..........24 Constraints ...........50 OLEAutomationRoutines......26 Data Value Control Using Referential OLEDBTableFunctions.......26 Integrity Constraints ........50 DB2Triggers...........27 Data Value Control Using Views with CheckOption..........51 Chapter 2. Coding a DB2 Application . 29 Data Value Control Using Application Prerequisites for Programming ......30 Logic and Program Variable Types . 51 DB2 Application Coding Overview ....30 Data Relationship Control ......51 © Copyright IBM Corp. 1993-2002 iii Data Relationship Control Using Compilation and Linkage of Source Files Referential Integrity Constraints ....52 Containing Embedded SQL ......81 Data Relationship Control Using Triggers 52 Package Creation Using the BIND Data Relationship Control Using Before Command...........83 Triggers............53 Package Versioning ........83 Data Relationship Control Using After Effect of Special Registers on Bound Triggers............53 Dynamic SQL ..........85 Data Relationship Control Using Resolution of Unqualified Table Names . 85 Application Logic .........54 Additional Considerations when Binding 86 Application Logic at the Server ....54 Advantages of Deferred Binding ....87 Authorization Considerations for SQL and BindFileContents.........87 APIs..............55 Application, Bind File, and Package Authorization Considerations for Relationships...........88 EmbeddedSQL..........55 Precompiler-Generated Timestamps . 88 Authorization Considerations for Dynamic Package Rebinding.........90 SQL..............57 Authorization Considerations for Static Chapter 4. Writing Static SQL Programs. 93 SQL..............58 Characteristics and Reasons for Using Static Authorization Considerations for APIs . 58 SQL...............93 Testing the Application ........59 Advantages of Static SQL .......94 Setting up the Test Environment for an Example Static SQL Program ......95 Application ...........59 Data Retrieval in Static SQL Programs . 97 Debugging and Optimizing an Application 63 Host Variables in Static SQL Programs . 97 IBM DB2 Universal Database Project Add-In HostVariablesinStaticSQL.....97 forMicrosoftVisualC++........64 Declaring Host Variables in Static SQL The IBM DB2 Universal Database Project Programs............99 Add-InforMicrosoftVisualC++....64 Referencing Host Variables in Static SQL IBM DB2 Universal Database Project Programs...........101 Add-In for Microsoft Visual C++ Indicator Variables in Static SQL Programs 101 Terminology...........66 Including Indicator Variables in Static Activating the IBM DB2 Universal SQLPrograms..........101 Database Project Add-In for Microsoft Data Types for Indicator Variables in VisualC++...........67 StaticSQLPrograms........104 Activating the IBM DB2 Universal Example of an Indicator Variable in a Database Tools Add-In for Microsoft Visual StaticSQLProgram........106 C++..............68 Selecting Multiple Rows Using a Cursor . 108 Selecting Multiple Rows Using a Cursor 108 Part 2. Embedded SQL......69 Declaring and Using Cursors in Static SQLPrograms..........109 Chapter 3. Embedded SQL Overview . 71 Cursor Types and Unit of Work Considerations..........110 Embedding SQL Statements in a Host Example of a Cursor in a Static SQL Language .............71 Program............112 Source File Creation and Preparation....73 Manipulating Retrieved Data ......113 Packages, Binding, and Embedded SQL . 76 Updating and Deleting Retrieved Data in Package Creation for Embedded SQL . 76 StaticSQLPrograms........114 Precompilation of Source Files Containing CursorTypes..........114 EmbeddedSQL..........78 Example of a Fetch in a Static SQL Source File Requirements for Embedded Program............115 SQL Applications .........80 iv Programming Client Applications Scrolling Through and Manipulating Processing the Cursor in a Dynamic SQL Retrieved Data ...........117 Program............145 Scrolling Through Previously Retrieved Allocating an SQLDA Structure for a Data.............117 Dynamic SQL Program .......145 Keeping a Copy of the Data .....117 Transferring Data in a Dynamic SQL Retrieving Data a Second Time ....118 Program Using an SQLDA Structure . 149 Row Order Differences Between the First Processing Interactive SQL Statements in andSecondResultTable......119 Dynamic SQL Programs ......150 Positioning a Cursor at the End of a Table 120 Determination of Statement Type in Updating Previously Retrieved Data . 121 Dynamic SQL Programs ......151 Example of an Insert, Update, and Delete Processing Variable-List SELECT inaStaticSQLProgram.......121 Statements in Dynamic SQL Programs . 151 Diagnostic Information ........123 Saving SQL Requests from End Users . 152 Return Codes ..........123 Parameter Markers in Dynamic SQL Error Information in the SQLCODE, Programs............153 SQLSTATE, and SQLWARN Fields . 123 Providing Variable Input to Dynamic SQL Token Truncation in the SQLCA Structure 124 Using Parameter Markers ......153 Exception, Signal, and Interrupt Handler Example of Parameter Markers in a Considerations..........125 Dynamic SQL Program .......154 ExitListRoutineConsiderations....125 DB2 Call Level Interface (CLI) Compared to Error Message Retrieval in an Application 126 Dynamic SQL ...........155 DB2 Call Level Interface (CLI) versus Chapter 5. Writing Dynamic SQL Embedded Dynamic SQL ......155 Programs ............127 Advantages of DB2 CLI over Embedded Characteristics and Reasons for Using SQL.............157 Dynamic SQL ...........127 When to Use DB2 CLI or Embedded SQL 159 Reasons for Using Dynamic SQL....127 Dynamic SQL Support Statements . 128 Chapter 6. Programming in C and C++ 161 Dynamic SQL Versus Static SQL ....129 Programming Considerations for C/C++ . 161 Cursors
Recommended publications
  • Derivation of the Required Elements for a Definition of the Term Middleware
    Rochester Institute of Technology RIT Scholar Works Theses 2002 Derivation of the required elements for a definition of the term middleware Maya Mathew Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Mathew, Maya, "Derivation of the required elements for a definition of the term middleware" (2002). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Derivation of the Required Elements for a Definition of the Term Middleware By Maya Mathew Thesis submitted in partial fulfillment ofthe requirements for the degree ofMaster ofScience in Information Technology Rochester Institute ofTechnology B. Thomas Golisano College Of Computing and Information Sciences May 2002 - 1 - Rochester Institute of Technology B. Thomas Golisano College Of Computing and Information Sciences Master of Science in Information Technology Thesis Approval Form Student Name: Maya Mathew Thesis Title: Derivation of the Required Elements for a Definition of the Term Middleware Thesis Committee Name Signature Date Prof. William Stratton Chair Prof. Andy Phelps ?-/ z /qL-.-- Committee Member I I :-.P.:...::ro~f.~J~e;.:..:.ff...::L:.:::a.=..:sk~y ~ 17, d-fIoJ--. Committee Member ~ Thesis Reproduction Permission Form Rochester Institute of Technology B. Thomas Golisano College Of Computing and Information Sciences Derivation of the Required Elements For a Definition of the Term Middleware I, Maya Mathew, hereby grant permission to the Wallace Library of the Rochester Institute of Technology to reproduce my thesis in whole or in part.
    [Show full text]
  • Distributed Communication Methods and Role-Based Access Control For
    Distributed Communication Methods and Role*Based Access Controi for Use in Heaith Care Applications Joseph Poole John Barkley Kevin Brady Anthony Cincotta Wayne Salamon U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Gaithersburg, MD 20899 QC 100 .U56 NIST NO. 5820 1996 if 1 •t r i I i j •? f Distributed Communication Methods and Roie-Based Access Controi for Use in Health Care Appiications Joseph Poole John Barkley Kevin Brady Anthony Cincotta Wayne Salamon U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Gaithersburg, MD 20899 April 1996 U.S. DEPARTMENT OF COMMERCE Michael Kantor, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director Abstract The use of software in the health care industry is becoming of increasing importance. One of the major roadblocks to efficient health care is the fact that important information is distributed across many sites. These sites can be located across a significant area. The problem is to provide a uniform mechanism to integrate this information. This paper documents the results of an investigation into the suitability of several different distributed access mechanisms. Five methods were examined: the Common Object Request Broker (CORBA), Object Linking and Embedding (OLE), remote procedure call (RPC), remote database access (SQL/RDA) and Protocol Independent Interfaces (PH, we specifically examined sockets). These mechanisms were compared with regard for use in health care applications. In particular, the following capabilities were compared: • Ease of use by the developer • Class of applications for which the technology is particularly effective in developing • Security capabilities • Protocols utilized • Performance of the transport mechanism.
    [Show full text]
  • Teradata Call-Level Interface Version 2 Reference for Channel-Attached Systems
    Teradata Call-Level Interface Version 2 Reference for Channel-Attached Systems Release 13.10 B035-2417-020A February 2010 The product or products described in this book are licensed products of Teradata Corporation or its affiliates. Teradata, BYNET, DBC/1012, DecisionCast, DecisionFlow, DecisionPoint, Eye logo design, InfoWise, Meta Warehouse, MyCommerce, SeeChain, SeeCommerce, SeeRisk, Teradata Decision Experts, Teradata Source Experts, WebAnalyst, and You’ve Never Seen Your Business Like This Before are trademarks or registered trademarks of Teradata Corporation or its affiliates. Adaptec and SCSISelect are trademarks or registered trademarks of Adaptec, Inc. AMD Opteron and Opteron are trademarks of Advanced Micro Devices, Inc. BakBone and NetVault are trademarks or registered trademarks of BakBone Software, Inc. EMC, PowerPath, SRDF, and Symmetrix are registered trademarks of EMC Corporation. GoldenGate is a trademark of GoldenGate Software, Inc. Hewlett-Packard and HP are registered trademarks of Hewlett-Packard Company. Intel, Pentium, and XEON are registered trademarks of Intel Corporation. IBM, CICS, RACF, Tivoli, and z/OS are registered trademarks of International Business Machines Corporation. Linux is a registered trademark of Linus Torvalds. LSI and Engenio are registered trademarks of LSI Corporation. Microsoft, Active Directory, Windows, Windows NT, and Windows Server are registered trademarks of Microsoft Corporation in the United States and other countries. Novell and SUSE are registered trademarks of Novell, Inc., in the United States and other countries. QLogic and SANbox are trademarks or registered trademarks of QLogic Corporation. SAS and SAS/C are trademarks or registered trademarks of SAS Institute Inc. SPARC is a registered trademark of SPARC International, Inc. Sun Microsystems, Solaris, Sun, and Sun Java are trademarks or registered trademarks of Sun Microsystems, Inc., in the United States and other countries.
    [Show full text]
  • Database Administration Guide for SAP on IBM Db2 for Linux, UNIX, and Windows Company
    Administration Guide | PUBLIC Document Version: 2.5 – 2021-09-23 Database Administration Guide for SAP on IBM Db2 for Linux, UNIX, and Windows company. All rights reserved. All rights company. affiliate THE BEST RUN 2021 SAP SE or an SAP SE or an SAP SAP 2021 © Content 1 Introduction................................................................7 1.1 Document History............................................................ 8 1.2 Naming Conventions..........................................................10 2 Administration Tools and Tasks.................................................12 2.1 Administration Tools..........................................................12 2.2 Administration Tasks..........................................................13 3 Architectural Overview.......................................................16 3.1 SAP Application Server for ABAP.................................................16 3.2 SAP Application Server for Java..................................................17 3.3 Db2 Components............................................................18 3.4 Db2 Client Connectivity........................................................19 4 User Management and Security................................................ 21 4.1 SAP System Users and Groups...................................................21 Access Authorizations for Db2 Directories and Database-Related Files....................25 4.2 Role-Based Security Concept for Database Users..................................... 27 Database Roles for
    [Show full text]
  • Welcome to Discussion on Ingres Code Architecture
    Welcome to discussion on Ingres Code Architecture. In this presentation we will discuss the • Various components of Ingres database, • Their interrelationship and • Their code architecture. 1 To an Ingres user, an Ingres database stores and retrieves data based on an SQL query. For example here is a screen shot of Ingres Terminal monitor session connected to database testdb. Here we wish to retrieve the details of all employees in a company. We enter our SQL query <Click To Animate > “Select * from emp” The database server processes the query <Click to Animate> 2 We obtain the results of our query. To understand the code architecture of Ingres. <Click Here> let us examine how Ingres processes this query <Click Here> 3 1. The Query is processed by Global Communications facility which communicates the data and results between the terminal monitor to the DBMS server. <Click Here to Animate> 2. The DBMS server and its associated processes process the query and send the results to the client through GCF. <Click Here to Animate> 3. Broadly categorizing we can summarize the code into • User interface facilities • Connectivity and Communications • DBMS server • And Utility libraries to interact with Operating system. 1. Ingres has several kinds of user interface for example 1. Embedded SQL precompiler for programmatic operations of database. 2. Ingres applications like, SQL Terminal Monitor, Query by forms (QBF), Report by Forms (RBF), VISION etc. 3. We have Ingres Internet Commerce (ICE) for web deployment. These user interfaces and others can be commonly grouped as Front End for Ingres. • Similarly in connectivity tools we have • Java Database connectivity (JDBC) driver • Open Database connectivity driver (ODBC) driver • Dot Net Data provider • Open API a C api to Ingres etc.
    [Show full text]
  • The US Government's Open System Environment Profile OSE/1 Version
    C NIST Special Publication 500-21 Computer Systems APPLICATION PORTABILITY PROFILE Technology (APP) The U.S. Government's U.S. DEPARTMENT OF COMMERCE Technology Administration Open System Environment Profile National Institute of Standards and Technology OSE/1 Version 2.0 Nisr NAT L !NST."OF STAND i TECH R.I.C. llllllllllllllllllll NIST PUBLICATIONS AlllDM QEETfll APPLICA TION PORTABILITYPROFILE j)JT)) The U S. Government's ^ k^Open System Environment IL Profile OSE/1 Version 2.0 -QG 100 .U57 #500-210 1993 7he National Institute of Standards and Technology was established in 1988 by Congress to "assist industry in the development of technology . needed to improve product quality, to modernize manufacturing processes, to ensure product reliability . and to facilitate rapid commercialization ... of products based on new scientific discoveries." NIST, originally founded as the National Bureau of Standards in 1901, works to strengthen U.S. industry's competitiveness; advance science and engineering; and improve public health, safety, and the environment. One of the agency's basic functions is to develop, maintain, and retain custody of the national standards of measurement, and provide the means and methods for comparing standards used in science, engineering, manufacturing, commerce, industry, and education with the standards adopted or recognized by the Federal Government. As an agency of the U.S. Commerce Department's Technology Administration, NIST conducts basic and applied research in the physical sciences and engineering and performs related services. The Institute does generic and precompetitive work on new and advanced technologies. NIST's research facilities are located at Gaithersburg, MD 20899, and at Boulder, CO 80303.
    [Show full text]
  • MLS DBMS Interoperability Study*
    MLS DBMS Interoperability Study* Rae K. Burns, AGCS, Inc. Yi-Fang Koh, Raytheon Electronic Systems ESC/AXS, Building 1704, Hanscom AFB, MA 01731 burns/[email protected] Interoperability among heterogeneous databases is a fundamental requirement of many emerging Department of Defense (DoD) systems. Often these systems also have requirements for Multilevel-Secure (MLS) operation, where data is labeled to reflect its sensitivity level (e.g., UNCLASSIFIED, SECRET, etc.). The Air Force Rome Laboratory MLS Database Management System (DBMS) Interoperability Study has surveyed the available Commercial- Off-The-Shelf (COTS) products supporting interoperability and tested several of them in a multilevel environment. We selected representative products and implemented test scenarios in the ESC/AXS Security Products Transition Analysis Facility (STAF). Our test environment included three commercial MLS DBMS products (Trusted ORACLE7, Informix Online/Secure, and Sybase Secure SQL Server) on several different MLS Operating System (OS) platforms. We also employed “system high” platforms running standard versions of the DBMS and OS products. We successfully moved data to and from the MLS databases using different COTS interoperability solutions. This paper describes our testing efforts and summarizes the lessons learned. 1. Introduction The Multilevel Secure Database Management System Interoperability Study was initiated by Air Force Rome Laboratory to expedite the transition of trusted database technology into operational Air Force C4I environments. The overall goal of the study is twofold: 1) To examine the theoretical basis for heterogeneous trusted database interoperability, identify issues, and transition findings to the communities involved in future development (vendors, DoD users, and applicable standards groups). 2) To develop demonstrable examples of database interoperability that illustrate the advantages of MLS DBMS products in support of Air Force operational requirements for multilevel security.
    [Show full text]
  • Embedded SQL Precompiling Embedded SQL Call Level Interface
    Embedded SQL Call level interface (CLI) Extract from C program: An application programming interface (API), i.e.itprovides a set of EXEC SQL BEGIN DECLARE SECTION; function calls. short DEPT, DNO; In the SQL standards wor ld, ‘‘CLI’’means ‘‘not Embedded SQL’’ char NAME[26]; EXEC SQL END DECLARE SECTION; (which is also referred to as and API). main() •aclean separation between the application programand SQL. { GetInput(&DEPT); EXEC SQL DECLARE C1 CURSOR FOR •building a programissimpler ; no preprocessor (although calls to SELECT ENAME, DEPTNO FROM EMP WHERE DEPTNO = :DEPT; the DBMS runtime librar y are the same). EXEC SQL OPEN C1 while (SQLCODE == 0) { EXEC SQL FETCH C1 INTO :NAME, :DNO •debugging is simpler;you debug your own code rather than code } generated byaprecompiler. EXEC SQL CLOSE C1 } Precompilers from different vendors will produce different code. Graham Kemp,University of Aberdeen Graham Kemp,University of Aberdeen Precompiling Embedded SQL Programming models for relational systems The precompiler and DBMS interact in severalways: What if wewant to change the DBMS that our application uses? Embedded SQL •The DBMS parser checks the syntax of the SQL statements. Requires compiling application programusing newDBMS vendor’s precompiler.Wemight not have the source code (e.g. ‘‘shr ink- •The DMBS checks the semantics of the SQL statements (table wrapped’’applications). and column names are correct, data types of host language variables are correct, etc.) Vendor-specific API Requires changing the source code to use the newDBMS vendor’s •Ifthe SQL statements are OK, optimise them to produce an API, and recompiling with the newDBMS vendor’slibrar ies.Again, access plan, which is stored in the database.
    [Show full text]
  • SQL ENVIRONMENTS FEDERAL INFORMATIONPROCESSINGSTANDARDSPUBLICATION 1995 FEBRUARY3 FIPS PUB193 National Instituteofstandardsandtechnology U.S
    REFERENCE U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology ItL'S FIPS PUB 193 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION SQL ENVIRONMENTS Category: Software Standard Subcategory: Database 1995 FEBRUARY 3 193 PUB FIPS . A8A3 NO.193 1995 i - ( FIPS PUB 193 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION SQL ENVIRONMENTS Category: Software Standard Subcategory: Database Computer Systems Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-0001 Issued February 3, 1995 U.S. Department of Commerce Ronald H. Brown, Secretary Technology Administration Mary L. Good, Under Secretary for Technology National Institute of Standards and Technology Arati Prabhakar, Director Foreword The Federal Information Processing Standards Publication Series of the National Institute of Standards and Technology (NIST) is the official publication relating to standards and guidelines adopted and promulgated under the provisions of Section 111 (d) of the Federal Property and Administrative Services Act of 1949 as amended by the Computer Security Act of 1987, Public Law 100-235. These mandates have given the Secretary of Commerce and NIST important responsibilities for improving the utilization and management of computer and related telecommunications systems in the Federal Government. The NIST, through its Computer Systems Laboratory, provides leadership, technical guidance, and coordination of Government efforts in the development of stan¬ dards and guidelines in these areas.
    [Show full text]
  • Acu4gl® Version 8.1.3
    User’s Guide Acu4GL® Version 8.1.3 Micro Focus (IP) Ltd. 9920 Pacific Heights Blvd, Suite 150 San Diego, CA 92121 858.795.1900 © Copyright Micro Focus (IP) Ltd, 1998-2010. All rights reserved. Acucorp, ACUCOBOL-GT, Acu4GL, AcuBench, AcuConnect, AcuServer, AcuSQL, AcuXDBC, extend, and “The new face of COBOL” are registered trademarks or registered service marks of Micro Focus (IP) Ltd. “COBOL Virtual Machine” is a trademark of Micro Focus (IP) Ltd. Acu4GL is protected by U.S. patent 5,640,550, and AcuXDBC is protected by U.S. patent 5,826,076. Microsoft and Windows are registered trademarks of Microsoft Corporation in the United States and/or other countries. UNIX is a registered trademark of the Open Group in the United States and other countries. Solaris is a trademark of Sun Microsystems, Inc., in the United States and other countries. Other brand and product names are trademarks or registered trademarks of their respective holders. DB2 Connect is a trademark, and IBM, AIX, DB2, Informix, MQSeries, AS/400, OS/390, PowerPC, RS/6000, WebSphere, pSeries, and zSeries are registered trademarks of IBM in the United States. E-01-UG-100501-Acu4GL-8.1.3 Contents Chapter 1: Acu4GL Overview 1.1 Welcome to Acu4GL .......................................................................................................1-2 1.2 Document Overview ........................................................................................................ 1-3 1.3 Accessing Data ...............................................................................................................
    [Show full text]
  • ARIS Release Notes
    ARIS Release Notes Version 10.0 - Service Release 14 April 2021 Software AG Dieses Dokument gilt für ARIS ab Version 10.0. Hierin enthaltene Beschreibungen unterliegen Änderungen und Ergänzungen, die in nachfolgenden Release Notes oder Neuausgaben bekanntgegeben werden. Urheberrechtlich geschützt © 2010 – 2021 Software AG, Darmstadt, Deutschland und/oder Software AG USA Inc., Reston VA, USA und/oder ihre Tochtergesellschaften und/oder ihre Lizenzgeber. Der Name Software AG und die Namen der Software AG Produkte sind Marken der Software AG und/oder Software AG USA Inc., einer ihrer Tochtergesellschaften oder ihrer Lizenzgeber. Namen anderer Gesellschaften oder Produkte können Marken ihrer jeweiligen Schutzrechtsinhaber sein. Genaue Informationen über die geschützten Marken und Patente der Software AG und ihrer Tochtergesellschaften sind veröffentlicht unter http://softwareag.com/licenses. Die Nutzung dieser Software unterliegt den Lizenzbedingungen der Software AG. Diese Bedingungen sind Bestandteil der Produktdokumentation und befinden sich unter http://softwareag.com/licenses und/oder im Wurzelverzeichnis des lizenzierten Produkts. Diese Software kann Teile von Software-Produkten Dritter enthalten. Urheberrechtshinweise, Lizenzbestimmungen sowie zusätzliche Rechte und Einschränkungen dieser Drittprodukte können dem Abschnitt „License Texts, Copyright Notices and Disclaimers of Third Party Products“ entnommen werden. Diese Dokumente enthalten den von den betreffenden Lizenzgebern oder den Lizenzen wörtlich vorgegebenen Wortlaut und werden daher in der jeweiligen Ursprungsprache wiedergegeben. Für einzelne, spezifische Lizenzbeschränkungen von Drittprodukten siehe PART E der Legal Notices, abrufbar unter dem Abschnitt „License Terms and Conditions for Use of Software AG Products / Copyrights and Trademark Notices of Software AG Products“. Diese Dokumente sind Teil der Produktdokumentation, die unter http://softwareag.com/licenses oder im Verzeichnis der lizenzierten Produkte zu finden ist.
    [Show full text]
  • IDL Dataminer Guide
    IDL DataMiner Guide © 2018 Harris Geospatial Solutions, Inc. This information is not subject to the controls of the International Traffic in Arms Regulations (ITAR) or the Export Administration Regulations (EAR). However, this information may be restricted from transfer to various embargoed countries under U.S. laws and regulations. IDL DataMiner Guide Legal and Copyright Notices The IDL® and ENVI® software programs and the accompanying procedures, functions, and documentation described herein are sold under license agreements. Their use, duplication, and disclosure are subject to the restrictions stated in the license agreement. Harris Geospatial Solutions, Inc. reserves the right to make changes to this document at any time and without notice. Limitation of Warranty Harris Geospatial Solutions makes no warranties, either express or implied, as to any matter not expressly set forth in the license agreement, including without limitation the condition of the software, merchantability, or fitness for any particular purpose. Harris Geospatial Solutions shall not be liable for any direct, consequential, or any other damages, suffered by the licensed user or any other users resulting from the use of the software packages or the software documentation. Permission to Reproduce Manuals If you are a licensed user of Harris Geospatial Solutions software, Harris Geospatial Solutions grants you a limited, nontransferable license to reproduce its software’s manuals provided such copies are for your use only and are not sold or distributed to third parties. All such copies must contain the title page and Harris Geospatial Solutions copyright notice. Export Control Information Harris Geospatial Solutions Software and its associated technology are subject to U.S.
    [Show full text]