IBM Informix Guide to SQL: Reference

Total Page:16

File Type:pdf, Size:1020Kb

IBM Informix Guide to SQL: Reference IBM Informix Version 11.70 IBM Informix Guide to SQL: Reference SC27-3524-00 IBM Informix Version 11.70 IBM Informix Guide to SQL: Reference SC27-3524-00 Note Before using this information and the product it supports, read the information in “Notices” on page D-1. Edition This publication contains proprietary information of IBM. It is provided under a license agreement and is protected by copyright law. The information contained in this publication does not include any product warranties, and any statements provided in this manual should not be interpreted as such. When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright IBM Corporation 1996, 2010. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Introduction ..................................ix About This Publication................................ix Types of Users .................................ix Software Dependencies ..............................ix Assumptions About Your Locale............................x Demonstration Database ..............................x What's New in SQL Reference for IBM Informix, Version 11.70 ..................x Example code conventions ..............................xi Additional documentation ..............................xii Compliance with industry standards ...........................xii Syntax diagrams .................................xiii How to read a command-line syntax diagram ......................xiv Keywords and punctuation .............................xv Identifiers and names ...............................xv How to Provide Documentation Feedback .........................xv Chapter 1. System Catalog Tables........................1-1 Objects That the System Catalog Tables Track ........................1-1 Using the System Catalog ..............................1-1 Accessing the System Catalog ............................1-6 Update System Catalog Data ............................1-6 Structure of the System Catalog ............................1-7 SYSAGGREGATES.................................1-9 SYSAMS ....................................1-9 SYSATTRTYPES .................................1-11 SYSBLOBS ...................................1-12 SYSCASTS ...................................1-12 SYSCHECKS ..................................1-13 SYSCHECKUDRDEP ...............................1-14 SYSCOLATTRIBS .................................1-14 SYSCOLAUTH .................................1-15 SYSCOLDEPEND.................................1-15 SYSCOLUMNS .................................1-16 Opaque Data Types ...............................1-18 Storing Column Length..............................1-18 Storing Maximum and Minimum Values ........................1-19 SYSCONSTRAINTS ................................1-20 SYSDEFAULTS .................................1-20 SYSDEPEND ..................................1-21 SYSDIRECTIVES .................................1-22 SYSDISTRIB ..................................1-22 SYSDOMAINS..................................1-24 SYSERRORS ..................................1-24 SYSEXTCOLS ..................................1-24 SYSEXTCOLS (XPS) ................................1-25 SYSEXTDFILES .................................1-26 SYSEXTDFILES (XPS) ...............................1-26 SYSEXTERNAL .................................1-26 SYSEXTERNAL (XPS) ...............................1-27 SYSFRAGAUTH .................................1-27 SYSFRAGDIST..................................1-28 SYSFRAGMENTS.................................1-30 SYSINDEXES ..................................1-31 SYSINDICES ..................................1-33 SYSINHERITS ..................................1-35 © Copyright IBM Corp. 1996, 2010 iii SYSLANGAUTH .................................1-35 SYSLOGMAP ..................................1-35 SYSNEWDEPEND (XPS) ..............................1-36 SYSOBJSTATE ..................................1-36 SYSOPCLASSES .................................1-37 SYSOPCLSTR ..................................1-37 SYSPROCAUTH .................................1-38 SYSPROCBODY .................................1-39 SYSPROCCOLUMNS...............................1-40 SYSPROCEDURES ................................1-40 SYSPROCPLAN .................................1-43 SYSREFERENCES ................................1-43 SYSREPOSITORY (XPS)...............................1-44 SYSROLEAUTH .................................1-44 SYSROUTINELANGS ...............................1-45 SYSSECLABELCOMPONENTS ............................1-45 SYSSECLABELCOMPONENTELEMENTS ........................1-45 SYSSECPOLICIES.................................1-46 SYSSECPOLICYCOMPONENTS ............................1-46 SYSSECPOLICYEXEMPTIONS ............................1-47 SYSSECLABELAUTH ..............................1-47 SYSSECLABELNAMES ...............................1-47 SYSSECLABELS .................................1-48 SYSSEQUENCES .................................1-48 SYSSYNONYMS .................................1-48 SYSSYNTABLE .................................1-49 SYSTABAMDATA ................................1-49 SYSTABAUTH..................................1-50 SYSTABLES...................................1-50 SYSTRACECLASSES................................1-53 SYSTRACEMSGS .................................1-54 SYSTRIGBODY .................................1-54 SYSTRIGGERS..................................1-55 SYSUSERS ...................................1-55 SYSVIEWS ...................................1-56 SYSVIOLATIONS.................................1-56 SYSXADATASOURCES ...............................1-57 SYSXASOURCETYPES ...............................1-57 SYSXTDDESC ..................................1-58 SYSXTDTYPEAUTH ................................1-58 SYSXTDTYPES .................................1-59 Information Schema ................................1-60 Generating the Information Schema Views .......................1-60 Accessing the Information Schema Views ........................1-60 Structure of the Information Schema Views .......................1-61 Chapter 2. Data Types .............................2-1 Summary of Data Types ...............................2-1 Description of Data Types ..............................2-5 BIGINT ...................................2-5 BIGSERIAL ..................................2-6 BLOB ....................................2-6 BOOLEAN ..................................2-7 BYTE ....................................2-8 CHAR(n) ...................................2-8 CHARACTER(n) ................................2-10 CHARACTER VARYING(m,r) ...........................2-10 CLOB....................................2-10 DATE....................................2-11 DATETIME ..................................2-11 DEC....................................2-14 iv IBM Informix Guide to SQL: Reference DECIMAL ..................................2-14 DISTINCT ..................................2-16 DOUBLE PRECISION ..............................2-17 FLOAT(n) ..................................2-17 IDSSECURITYLABEL ..............................2-17 INT....................................2-18 INT8 ....................................2-18 INTEGER ..................................2-18 INTERVAL ..................................2-18 LIST(e) ...................................2-20 LVARCHAR(m) ................................2-22 MONEY(p,s) .................................2-22 MULTISET(e) .................................2-23 Named ROW .................................2-24 NCHAR(n) ..................................2-24 NUMERIC(p,s) ................................2-24 NVARCHAR(m,r)................................2-24 OPAQUE ..................................2-25 REAL....................................2-25 ROW, Named .................................2-25 ROW, Unnamed ................................2-26 SERIAL(n) ..................................2-28 SERIAL8(n) ..................................2-29 SET(e) ...................................2-30 SMALLFLOAT.................................2-31 SMALLINT ..................................2-31 TEXT data type ................................2-32 Unnamed ROW ................................2-33 VARCHAR(m,r) ................................2-33 Built-In Data Types ................................2-35 Character Data Types ..............................2-35 Large-Object Data Types .............................2-37 Time Data Types ................................2-39 Extended Data Types ...............................2-43 Complex Data Types...............................2-44 Distinct Data Types ...............................2-46 Opaque Data Types ...............................2-46 Data Type Casting and Conversion ...........................2-47 Using Built-in Casts ...............................2-47 Using User-Defined Casts .............................2-49 Determining Which Cast to Apply ..........................2-50 Casts for Distinct Types..............................2-51 What Extended Data Types Can Be Cast? ........................2-51 Operator Precedence................................2-52 Chapter 3. Environment Variables ........................3-1 Types of Environment Variables ............................3-1 Limitations on Environment Variables ..........................3-2 Using Environment Variables on UNIX ..........................3-2 Where
Recommended publications
  • Tempest™ DCS Toolkit Version 5.0 DECODES
    Tempest™ DCS Toolkit Version 5.0 DECODES (Device Conversion and Delivery System) Reference Manual Document Revision 1.0 September, 2011 Copyright 2011 Sutron Corporation Sutron Corporation, ILEX Division 22400 Davis Drive Sterling, VA 20164 Tel: (703) 406-2800 Email: [email protected] Table of Contents Contents 1. INTRODUCTION TO DCS TOOLKIT / DECODES RELEASE ................................................. 1 1.1 INTRODUCTION TO DECODES ......................................................................................................... 1 1.2 WHAT’S NEW? .................................................................................................................................. 3 1.2.1 DCS Toolkit 5.0 ...................................................................................................................... 3 1.2.2 DCS Toolkit 4.9 ...................................................................................................................... 3 1.2.3 DCS Toolkit 4.6 ...................................................................................................................... 3 1.2.4 DCS Toolkit 4.5 ...................................................................................................................... 3 1.2.5 New for DECODES 7.5 .......................................................................................................... 3 1.2.6 New for DECODES 7.4 .......................................................................................................... 3 1.2.7 New Features
    [Show full text]
  • The Netminder System's Network Trouble Patterning (NTP) Feature
    The NetMinder® System’s Network Trouble Patterning (NTP) Feature Set Release 9.2 System Administration Guide Lucent Technologies — Proprietary This document contains proprietary information of 190-405-553 Lucent Technologies and is not to be disclosed or used except in accordance with applicable agreements Issue 1.0 November 2002 Copyright© 2002 Lucent Technologies Unpublished and Not for Publication All Rights Reserved Copyright Copyright© 2002 Lucent Technologies. All Rights Reserved. This material is protected by the copyright and trade secret laws of the United States and other countries. It may not be reproduced, distributed or altered in any fashion by any entity, including other Lucent Technologies Business Units or Divisions, without expressed permission in the Software Right to Use contract or the expressed written consent of the Lucent Learning Organization (LLO) organization. Notice Every effort was made to ensure that the information in this document was complete and accurate at the time of printing. However, information is subject to change. This product has been produced and distributed by Lucent Technologies. Trademarks 4ESS is a trademark of Lucent Technologies. 5ESS is a registered trademark of Lucent Technologies. 7R/E is a trademark of Lucent Technologies. Adobe is registered trademark of Adobe. Acrobat is a registered trademark of Adobe. AXE is a registered trademark of Telefonaktiebolaget L.M. Ericsson (Sweden). BILLDATS Data Manager is a trademark of Lucent Technologies. CLLI, CLEI, CLCI, and CLFI are trademarks of Bellcore Research. Datakit is a registered trademark of Lucent Technologies. DMS is a registered trademark of NORTEL Northern Telecom. DMS 10, DMS 100, DMS 200, and DMS 250 are trademarks of NORTEL Northern Telecom.
    [Show full text]
  • A Model-Driven Architecture Based Evolution Method and Its Application in an Electronic Learning System
    A Model-Driven Architecture based Evolution Method and Its Application in An Electronic Learning System PhD Thesis Yingchun Tian Software Technology Research Laboratory De Montfort University October, 2012 To my husband, Delin Jing and my mum, Ning Zhang for their love and support Declaration Declaration I declare that the work described in this thesis was originally carried out by me during the period of registration for the degree of Doctor of Philosophy at De Montfort University, U.K., from October 2008 to December 2011. It is submitted for the degree of Doctor of Philosophy at De Montfort University. Apart from the degree that this thesis is currently applying for, no other academic degree or award was applied for by me based on this work. I Acknowledgements Acknowledgements For many years I had been dreaming about receiving a PhD, I would like to thank many people who helped me in achieving this dream in different ways since I undertook the work of this thesis. My deepest gratitude goes to my supervisor, Professor Hongji Yang, for his guidance, support and encouragement throughout my PhD career. He always provided me with many invaluable comments and suggestions for the improvement of the thesis. I am grateful for his leading role fostering my academic, professional and personal growth. Many thanks go to Professor Hussein Zedan and Doctor Wenyan Wu, for examining my PhD thesis and providing many helpful suggestions. My research career will benefit tremendously from the research methodologies to which Professor Zedan and Doctor Wu introduced me. I would like to thank colleagues in Software Technology Research Laboratory at De Montfort University, for their support and feedback, and for providing such a stimulating working atmosphere, Professor Hussein Zedan, Doctor Feng Chen, Doctor Amelia Platt, Doctor Antonio Cau, and many other colleagues.
    [Show full text]
  • OPENDCS 6 (Open Source Data Collection System) LRGS (9.0)
    OPENDCS 6 (Open Source Data Collection System) LRGS (9.0) (Local Readout Ground System) User’s & Administrator’s Guide Document Revision 5 January, 2016 Prepared under contract to the U.S. Government by: Cove Software, LLC 6030 Marshalee Drive, Ste 607 Elkridge, MD 21075-5935, USA (410) 715-1117 [email protected] 1 This document is based upon an open-source document delivered to U.S. Geological Survey as part of the open source LRGS development effort of many years. Cove Software has customized and enhanced the content to conform to the OPENDCS LRGS release. Table of Contents 1. INTRODUCTION ................................................................................................................... 5 2. GOES DATA COLLECTION SYSTEM OVERVIEW ...................................................... 6 2.1 THE NOAA/NESDIS DATA COLLECTION SYSTEM ............................................................ 6 2.2 THE ROLE OF THE LRGS ..................................................................................................... 8 2.3 DCP MESSAGE CONTENT .................................................................................................... 9 2.3.1 Failure Code ................................................................................................................ 9 2.3.2 Signal Strength ........................................................................................................... 10 2.3.3 Frequency Offset .......................................................................................................
    [Show full text]
  • 190-405-573R13.4 Alcatel-Lucent – Proprietary Use Pursuant to Applicable Agreements Issue 1 January 2012 Use Pursuant to Applicable Agreements
    Use pursuant to applicable agreements Title page Network Operating Software 8920 Network Trouble Patterning | Release 13.4 System Administration Guide 190-405-573R13.4 Alcatel-Lucent – Proprietary Use pursuant to applicable agreements Issue 1 January 2012 Use pursuant to applicable agreements Legal notice Legal notice Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright © 2012 Alcatel-Lucent. All rights reserved. Contains proprietary/trade secret information which is the property of Alcatel-Lucent and must not be made available to, or copied or used by anyone outside Alcatel-Lucent without its written authorization. Not to be used or disclosed except in accordance with applicable agreements. Limited warranty Alcatel-Lucent provides no warranty to this product. Licenses This product incorporates a number of open-source third-party software packages. See the "Open-Source Software Licenses" appendix at the end of this document for license information about these packages. Alcatel-Lucent – Proprietary Use pursuant to applicable agreements Contents About this document Purpose ....................................................................................................................................................................................... xxviixxvii Audience ...................................................................................................................................................................................
    [Show full text]
  • (MS Access) 95/97/2000/XP/2002/2003/2007/2010/2013/2016 V6.0
    index.html - HXTT Access JDBC Drivers for Microsoft Access (MS Access) 95/97/2000/XP/2002/2003/2007/2010/2013/2016 v6.0 HXTT's HXTT Access Packages Welcome to the HXTT Access pages You should read carefully License, Introduction, and Components first. If you have JDBC programming experience and SQL92 knowledge, you can start easily your project after you know com.hxtt.sql.access.AccessDriver (the suitable JDBC driver class name) and jdbc:access:///[DatabasePath] (the correct embedded JDBC url) from here. You will get up to date information relating to the HXTT Access, and look at current documentation from here. JDBC 4.2 packages are for JDK1.8.X. JDBC 4.1 packages are for JDK 1.7.X, and 1.8.X. JDBC 4.0 packages are for JDK 1.6.X, 1.7.X, and 1.8.X. JDBC 3.0 packages are for JDK 1.3.X, 1.4.X, 1.5.X, 1.6.X, 1.7.X, and 1.8.X. JDBC 2.0 packages are for JDK 1.2.X, and 1.3.X. JDBC 1.2 packages are for JDK1.1.X, and Personal Java. For questions and general support, you should submit your request at HXTT's technical support site. License Introduction Components Development Document Download JDBC4.2 packages, JDBC4.2 demo, JDBC4.1 packages, JDBC4.1 demo, JDBC4.0 packages, JDBC4.0 demo, JDBC3.0 packages, JDBC3.0 demo, JDBC2.0 packages, JDBC2.0 demo, JDBC1.2 packages, JDBC1.2 demo, Development Documentation, and so on Offline Order(Bank Transfer) Online Order FAQ Released Version Log Copyright © 2003-2018 Heng Xing Tian Tai Lab | All Rights Reserved.
    [Show full text]
  • Stored Procedures As an Implementation Tool Business Logic in Applications of Databases*
    57 Stored Procedures as an Implementation Tool Business Logic in Applications of Databases* Tatyana N. Filimonenkova1[0000-0002-7968-9028] 1 V.I. Vernadsky Crimean Federal University, Yalta, Russia [email protected] Abstract. The article discusses a database object such as a stored procedure and the advantages of using such an approach when developing software in a client- server architecture. The definition of stored procedures is given, the features of their creation and compilation are listed. The syntax of creating stored procedures in the client-server database management system MySQL is considered. The ex- amples of stored procedures developed for the database for accounting student performance, which demonstrate the feasibility of their use and advantages com- pared with the usual queries are given. The article provides an example of using the stored procedure on the client side of an application developed in the Embar- cadero RAD Studio integrated environment using BDE (Borland Database En- gine) technology as a tool for accessing the database. Keywords: information systems, client-server architecture, databases, CASE, ER-modeling, SQL-query, stored procedure, MySQL. 1 Introduction In applications that implement the client-server architecture, and now, this is the most common architecture for both web-based and desktop applications, data processing is distributed in such a way that the data presentation program is located on the user's machine (on the client), and the data management program and the data itself are placed on the server. The server software accepts requests from client software and returns to it the results of processing these requests. The popularity of client-server technology is inextricably linked with IBM's inven- tion of the query language to SQL relational databases – Structured Query Language, which is currently the universal standard for working with databases.
    [Show full text]
  • Open Source Projects
    Y L F M A E T Brought to you by Team FLY® Team-Fly® Page i Managing Open Source Projects A Wiley Tech Brief Jan Sandred Wiley Computer Publishing John Wiley & Sons, Inc. NEW YORK • CHICHESTER • WEINHEIM • BRISBANE • SINGAPORE • TORONTO Page ii Publisher: Robert Ipsen Editor: Cary Sullivan Assistant Editor: Christina Berry Managing Editor: Marnie Wielage New Media Editor: Brian Snapp Text Design & Composition: Pronto Design, Inc. Designations used by companies to distinguish their products are often claimed as trademarks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration. Copyright © 2001 by Jan Sandred. All rights reserved. Published by John Wiley & Sons, Inc. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail: PERMREQ @ WILEY.COM. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered.
    [Show full text]
  • Web Applications P=PHP/Python/Perl M = Mysql/Mariadb/Mongodb a = Apache L = Linux
    Role Name Affiliation Principal Investigator Dr. Savita Gandhi Professor, Dept. of Computer Science, Gujarat University, Ahmedabad Content Writer Mr. Hardik Joshi Asst. Professor, Dept. of Computer Science, Gujarat University, Ahmedabad Content Reviewer Dr. Hiren Joshi Professor, Dept. of Computer Science, Gujarat University, Ahmedabad Item Description Subject Name Information Technology Paper Name Open Source Software Module No 21 Module Name LAMP Stack Pre-requisite Basics of Linux Objectives Get an overview of LAMP Stack, Understand the features of Apache, MySQL and PHP Keywords LAMP, WAMP, Linux, Apache, MySQL, PHP, Mariadb, Perl, Python LAMP STACK Overview and LAMP A "LAMP" stack refers to a group of open source software, originally the LAMP stack was popularized from acronym that represents the Linux OS, Apache web server, data is stored in MySQL database and the dynamic content is processed by PHP. The LAMP stack is usually installed together to enable a server to host dynamic websites and web apps. LAMP stack uses the software that is free and open source software. Today, LAMP stack does not restrict itself to four different software listed above but is a generic term where the combination of different software provides a platform to run web applications. Web Applications P=PHP/Python/Perl M = MySQL/MariaDb/MongoDb A = Apache L = Linux Figure 1: LAMP Stack Software 1 LAMP stacks servers as a platform to host websites and web applications over it. Usually, dynamic websites require databases and scripting at server side. LAMP stack provides both the database and the scripting support. With the help of LAMP model, we can deploy applications like Content Management Systems, Learning Management Systems, Wikis, Helpdesk systems, Open Journal Systems etc.
    [Show full text]
  • Mysql Is a Relational Database Management System (RDBMS)[1] That Runs As a Server Providing Multi-User Access to a Number of Databases
    MySQL is a relational database management system (RDBMS)[1] that runs as a server providing multi-user access to a number of databases. MySQL is officially pronounced /maųŤskju:Ťl/ ("My S-Q-L"),[2] but is often also pronounced /maųsi:kwĽl/ ("My Sequel"). It is named for original developer Michael Widenius' daughter My. The SQL phrase stands for Structured Query Language.[3] The MySQL development project has made its source code available under the terms of the GNU General Public License, as well as under a variety of proprietary agreements. MySQL was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now owned by Oracle Corporation.[4] Members of the MySQL community have created several forks (variations) such as Drizzle, OurDelta, Percona Server, and MariaDB. All of these forks were in progress before the Oracle acquisition (Drizzle was announced 8 months before the Sun acquisition). Free-software projects that require a full-featured database management system often use MySQL. Uses MySQL is a popular choice of database for use in web applications, and is a central component of the widely-used LAMP web application software stack²LAMP is an acronym for "Linux, Apache, MySQL, PHP". Its popularity is closely tied to the popularity of PHP. MySQL is used in some of the most frequently visited web sites on the internet including Flickr,[7] Facebook,[8][9] Wikipedia,[10] Google²though not for searches,[11] Nokia.com[12] and YouTube.[13] [edit] Platforms and interfaces MySQL is written in C, and C++. Its SQL parser is written in yacc, and a home-brewed lexical analyzer named sql_lex.cc[14] MySQL works on many different system platforms, including AIX, BSDi, FreeBSD, HP-UX, i5/OS, Linux, Mac OS X, NetBSD, Novell NetWare, OpenBSD, OpenSolaris, eComStation, OS/2 Warp, QNX, IRIX, Solaris, Symbian, SunOS, SCO OpenServer, SCO UnixWare, Sanos, Tru64 and Microsoft Windows.
    [Show full text]
  • IBM Informix DB-Access User's Guide
    IBM Informix DB-Access User’s Guide IBM Informix Extended Parallel Server, Version 8.4 IBM Informix Dynamic Server, Version 9.4 March 2003 Part No. CT1SKNA Note: Before using this information and the product it supports, read the information in the appendix entitled “Notices.” This document contains proprietary information of IBM. It is provided under a license agreement and is protected by copyright law. The information contained in this publication does not include any product warranties, and any statements provided in this manual should not be interpreted as such. When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1996, 2003. All rights reserved. US Government User Restricted Rights—Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. ii IBM Informix DB-Access User’s Guide Table of Contents Table of Contents Introduction In This Introduction ................. 3 About This Manual.................. 3 Types of Users .................. 3 Software Dependencies ............... 4 Assumptions About Your Locale............ 4 New Features .................... 5 Documentation Conventions .............. 5 Typographical Conventions ............. 6 Icon Conventions ................. 7 Command-Line Conventions ............. 8 Sample-Code Conventions .............. 10 Additional Documentation ............... 11 Related Reading ................... 13 Compliance with Industry Standards ........... 14 IBM Welcomes Your Comments ............. 14 Chapter 1 Getting Started with DB-Access In This Chapter ................... 1-3 What Is DB-Access? ................. 1-3 Using DB-Access .................. 1-4 Setting Up DB-Access ................. 1-6 Pre-DB-Access Installation .............. 1-6 Environment Variables ............... 1-7 Creating and Working with the Demonstration Databases ...
    [Show full text]
  • Solicitation 8300001112 Appendix D
    J.1. APPENDIX D - INFRASTRUCTURE TECHNICAL SPECIFICATIONS J.1.1. Summary J.1.1.1. This document describes the current infrastructure technical specifications applicable to the OKDHS Information Technology environment. It is intended to provide Contractor a fundamental knowledge base and understanding of the current information technology supporting the OKDHS business organization. J.1.2. Scope J.1.2.1. The technical specifications contained in this document shall be utilized by Contractor as a basis for the minimum requirements that must be met or exceeded when proposing any new technology solution. J.1.2.2. The current technical infrastructure has been architected using industry best practices and has demonstrated satisfactory operational performance criteria supporting a large production environment. J.1.2.3. All information contained in this document is current as and is subject to change based on the needs of OKDHS. J.1.3. Hardware J.1.3.1. Server (Wintel – x86) J.1.3.1.1. USB 2.0 Support J.1.3.1.2. Interface – EIDE (ATAPI) J.1.3.1.3. Processor- 2.66 GHz or greater J.1.3.1.4. Memory- 4GB or greater J.1.3.1.5. Cache Memory - 2MB Integrated Cache J.1.3.1.6. Optical Drive- 48X or greater J.1.3.1.7. Network Interface – 10/100/1000-T Ethernet J.1.3.1.8. Data Transfer Method – PCI Express x 4 J.1.3.1.9. Network Transfer Rate – 10 Mb/s to 2000 Mb/s J.1.3.1.10. Network Connector – RJ 45 J.1.3.2.
    [Show full text]