Glossary of terms used in Adaptive Server® Enterprise ADO.NET Data
Provider.
- Adaptive Server Enterprise – A server in Sybase’s client/server
architecture. Adaptive Server Enterprise manages multiple databases
and multiple users, keeps track of the actual location of data on
disks, maintains mapping of logical data description to physical
data storage, and maintains data and procedure caches in memory.
- ADO .Net (ActiveX Data Objects for
.NET) – ADO .Net (ActiveX Data Objects for .NET) is a
set of computer software components that programmers can use to
access data and data services. It is a part of the base class library
that is included with the Microsoft .NET Framework. It is commonly
used by programmers to access and modify data stored in relational
database systems, though it can also access data in non-relational
sources.
- ADO.NET data provider – An ADO.NET data provider is a software component
enabling an ADO.NET consumer to interact with a data source.
- BLOB – Binary large object
- CipherSuite – A preferential list of key-exchange algorithms,
hashing methods, and encryption methods used by SSL-enabled
applications.
- CLR (Common Language Runtime) – The CLR is the
virtual machine component of Microsoft's .NET framework and is responsible
for managing the execution of .NET programs.
- connection failover – Connection failover allows a client application
to switch to an alternate Adaptive Server if the primary server
becomes unavailable due to an unplanned event, like power outage
or a socket failure.
- connection migration – Connection migration allows a server in a Cluster
Edition environment to dynamically distribute load, and seamlessly
migrate an existing client connection and its context to another
server within the cluster.
- connection pooling – A connection pool is a cache of database connections
maintained so that the connections can be reused when future requests
to the database are required.
- DAAB (Data Access Application Block) – DAAB is a collection
of classes that simplifies common database functions such as creating
database instances and updating database records.
- data provider – Allows you to access data from server using any
language supported by .Net.
- data retrieval – Data retrieval, in database management, involves
extracting the wanted data from a database.
- decryption – The process of converting cipher text messages
back to their plain text form.
- distributed transaction – A distributed transaction is an operations bundle,
in which two or more network hosts are involved.
- encryption – The process that converts a plain text message
to cipher text.
- error handling – Techniques available to Transact-SQL programmers on which to base
code anddisplay errors and error messages.
- GAC (Global Assembly Cache ) – The GAC is a
machine-wide .NET assemblies cache for Microsoft's platform.
- Kerberos – Kerberos is an industry standard network authentication
system that provides simple login authentication as well as mutual
login authentication.
- LDAP (Lightweight Directory Access Protocol) – LDAP is an industry
standard for accessing directory services.
- LINQ (Language-Integrated Query) – LINQ is a programming
model that introduces queries as a first-class concept into any
Microsoft .NET language.
- object – A passive entity that contains or receives information,
and that cannot change the information it contains. In Adaptive
Server, objects include rows, tables, databases, stored procedures,
triggers, defaults, and views. See also database object.
- ODBC (open database connectivity) – The ODBC interface,
defined by Microsoft Corporation, is a standard interface to database
management systems in the Windows and Windows NT environments.
- OLE DB provider – An OLE DB provider
is a software component enabling an OLE
DB consumer to interact with a data source.
- parameter – A parameter is a special kind of variable, used
in a subroutine to refer to arguments of data provided as input
to the subroutine.
- password expiration – Every company has a specific set of password policies
for its database system. Depending on the policies, the password
expires at a specific date and time.
- private key – The secret key that must be kept secret in asymmetric
algorithms.
- public key – The secret key that can be public in asymmetric
algorithms.
- schema – A collection of objects associated with a particular
schema name and schema authorization identifier. The objects can
be tables, views, domains, constraints, assertions, privileges,
and so on. A schema is created by a create schemastatement.
- SSL (Secure Sockets Layer) – SSL is an industry
standard for sending wire- or socket-level encrypted data over client-to-server
and server-to-server connections.
- transaction processing – Transaction processing is information processing
that is divided into individual, indivisible operations, called
transactions. Each transaction must succeed or fail as a complete
unit; it cannot remain in an intermediate state.
- zero-downtime – A migration or upgradation of a system or a database
that is done less time .