SAP Adaptive Server Enterprise 16.0
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux
  Release Bulletin SAP Adaptive Server Enterprise 16.0 Solaris
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows
  Release Bulletin SAP Control Center 3.3
    Product Summary
    Installation and Upgrade
      Installation and Implementation of SAP Control Center
      Choosing an Installer
      Supported Server Versions
      Supported Product Modules and Release Documents
    Known Issues
      Known Issues for Installation, Upgrade, and Deployment
      Known Issues for SAP Control Center
      Known Issues for SAPĀ® Adaptive ServerĀ® Enterprise
      Known Issues for Data Assurance
      Known Issues for Replication
      Known Issues for SAP Sybase Event Stream Processor
      Known Issues for SAP Sybase IQ
      Known Issues for Accessibility
    Documentation Changes
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      SAP Control Center Accessibility Information
  Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX
    Conventions
    Installation Task Overview
      Installation Workflows
    SAP ASE Components
      SAP ASE Editions
        Determining the Edition You Have
      SAP ASE Options
      Managing SAP ASE with SAP Control Center
      Client Components and Utilities
    System Requirements
      Memory Requirements
      System Requirements for Clients
    Planning Your SAP ASE Installation
      SAP ASE Release Bulletin
      Obtaining a License
        Comparing License Deployment Models
        SySAM License Server
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Generating Licenses
          Generating License Keys at SMP
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity Licensing
      Installation Directory Contents and Layout
      Creating the Sybase User Account
      Preparing to Install SAP ASE
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing SAP ASE
      Installing SAP ASE in GUI Mode
      Installing SAP ASE in Console Mode
      Minimally Configuring an SAP ASE Server
      Installing SAP ASE Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling SAP ASE
        Removing an Existing SAP ASE Server
    Starting and Stopping SAP Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    SAP ASE Upgrades
      Considerations When Upgrading from SAP ASE 15.0.x or Earlier
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in SAP ASE Directories
      Preupgrade Tasks
        Upgrade Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to SAP ASE 16.0
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading SAP ASE
      Postupgrade Tasks
        Restoring Functionality in SAP ASE After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      SAP ASE Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading SAP ASE
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Downgrading SAP ASE
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for SAP ASE Servers
      Troubleshooting Common Installation Problems
        If the Installation Quits While You Are Configuring an SAP ASE Server
      Stopping a SAP ASE Server After a Failure
      If SAP ASE Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX
    Conventions
    Installation Task Overview
      Installation Workflows
    SAP ASE Components
      SAP ASE Editions
        Determining the Edition You Have
      SAP ASE Options
      Managing SAP ASE with SAP Control Center
      Client Components and Utilities
    System Requirements
      Making Input/Output Completion Port API Available
      Memory Requirements
      System Requirements for Clients
    Planning Your SAP ASE Installation
      SAP ASE Release Bulletin
      Obtaining a License
        Comparing License Deployment Models
        SySAM License Server
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Generating Licenses
          Generating License Keys at SMP
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity Licensing
      Installation Directory Contents and Layout
      Creating the Sybase User Account
      Preparing to Install SAP ASE
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing SAP ASE
      Installing SAP ASE in GUI Mode
      Installing SAP ASE in Console Mode
      Minimally Configuring an SAP ASE Server
      Installing SAP ASE Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling SAP ASE
        Removing an Existing SAP ASE Server
    Starting and Stopping SAP Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      The System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    SAP ASE Upgrades
      Considerations When Upgrading from SAP ASE 15.0.x or Earlier
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in SAP ASE Directories
      Preupgrade Tasks
        Upgrade Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to SAP ASE 16.0
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading SAP ASE
      Postupgrade Tasks
        Restoring Functionality in SAP ASE After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      SAP ASE Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading SAP ASE
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Downgrading SAP ASE
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for SAP ASE Servers
      Troubleshooting Common Installation Problems
        If the Installation Quits While You Are Configuring an SAP ASE Server
      Stopping a SAP ASE Server After a Failure
      If SAP ASE Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris
    Conventions
    Installation Task Overview
      Installation Workflows
    SAP ASE Components
      SAP ASE Editions
        Determining the Edition You Have
      SAP ASE Options
      Managing SAP ASE with SAP Control Center
      Client Components and Utilities
    System Requirements
      Memory Requirements
      System Requirements for Clients
    Planning Your SAP ASE Installation
      SAP ASE Release Bulletin
      Obtaining a License
        Comparing License Deployment Models
        SySAM License Server
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Generating Licenses
          Generating License Keys at SMP
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity Licensing
      Installation Directory Contents and Layout
      Creating the Sybase User Account
      Preparing to Install SAP ASE
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing SAP ASE
      Installing SAP ASE in GUI Mode
      Installing SAP ASE in Console Mode
      Minimally Configuring an SAP ASE Server
      Installing SAP ASE Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling SAP ASE
        Removing an Existing SAP ASE Server
    Starting and Stopping SAP Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    SAP ASE Upgrades
      Considerations When Upgrading from SAP ASE 15.0.x or Earlier
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in SAP ASE Directories
      Preupgrade Tasks
        Upgrade Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to SAP ASE 16.0
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading SAP ASE
      Postupgrade Tasks
        Restoring Functionality in SAP ASE After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      SAP ASE Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading SAP ASE
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Downgrading SAP ASE
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for SAP ASE Servers
      Troubleshooting Common Installation Problems
        If the Installation Quits While You Are Configuring an SAP ASE Server
      Stopping a SAP ASE Server After a Failure
      If SAP ASE Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows
    Conventions
    Installation Task Overview
      Installation Workflows
    SAP ASE Components
      SAP ASE Editions
        Determining the Edition You Have
      SAP ASE Options
      Managing SAP ASE with SAP Control Center
      Client Components and Utilities
    System Requirements
      System Requirements for Clients
    Planning Your SAP ASE Installation
      SAP ASE Release Bulletin
      Obtaining a License
        Comparing License Deployment Models
        SySAM License Server
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Generating Licenses
          Generating License Keys at SMP
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity Licensing
      Installation Directory Contents and Layout
      Preparing to Install SAP ASE
        Managing Java in the Database During Installations and Upgrades
    Installing SAP ASE
      Installing SAP ASE in GUI Mode
      Installing SAP ASE in Console Mode
      Minimally Configuring an SAP ASE Server
      Installing SAP ASE Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling SAP ASE
        Removing an Existing SAP ASE Server
    Starting and Stopping SAP Control Center
    Postinstallation Tasks
      Set Up sybase User in Windows
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
        Adding a Server to the Interfaces File
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    SAP ASE Upgrades
      Considerations When Upgrading from SAP ASE 15.0.x or Earlier
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in SAP ASE Directories
      Preupgrade Tasks
        Upgrade Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to SAP ASE 16.0
        Upgrading SAP ASE on Windows
        Testing the SAP ASE Upgrade
        Manually Upgrading SAP ASE
      Postupgrade Tasks
        Restoring Functionality in SAP ASE After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
      SAP ASE Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading SAP ASE
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Downgrading SAP ASE
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for SAP ASE Servers
      Troubleshooting Common Installation Problems
        If the Installation Quits While You Are Configuring an SAP ASE Server
      Stopping a SAP ASE Server After a Failure
      If SAP ASE Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide SAP Control Center 3.3
    About SAP Control Center
    Installation Task Flows for SAP Control Center
    Planning Your Installation
      Obtaining a License
      System Requirements
      SAP Control Center Network Ports
      Installation Considerations
      Preparing to Roll Back from an Upgrade
    Preinstallation Tasks
    Installing SAP Control Center
      Installing with the SAP Installer
      Installing with a Response File
        Creating a Response File
        Installing in Unattended (Silent) Mode
      Uninstalling
    Upgrading SAP Control Center
      Upgrading a Singleton SAP Control Center
      Upgrading Shared-Disk Instances
    Installing JDBC Drivers for Third-Party Replicate Databases
    Starting and Stopping SAP Control Center
      Registering the ODBC Driver in Windows
      Starting and Stopping SAP Control Center in Windows
      Starting and Stopping SAP Control Center in UNIX
    Getting Started After Installing
      Configuring the SSL Certificate
      Setting Passwords or Disabling Default Login Accounts
        Encrypting a Password
      Enabling Incremental Backups
      Configuring SAP Control Center
    Troubleshooting Installation
  Configuration Guide for UNIX Adaptive Server Enterprise 16.0
    About SAP ASE
      System-Specific Issues
      System User Roles
      Environment Variables
    SAP ASE Devices and System Databases
      The master Device
      The sybsystemdb Device
      The sysprocsdev Device
      Optional Devices and Databases
        Pluggable Component Interface (PCI) Database
        Sample Databases
        sybsecurity Device and Database
        dbccdb Database
        sybmgmtdb Database
      Using Operating System Files as Database Devices
        The directio Parameter
        The dsync Parameter
      Determine the Size of a Database Device
        Support for Raw Partitions or Files
        Preparation of a Raw Partition Device
          Choosing a Raw Partition
    Client/Server Communication
    About Changing SAP ASE Configuration
    Languages Other Than US English
    SAP ASE Specifications
      Database Specifications
      Table Specifications
      Procedure Specifications
      Query Specifications
      Maximum Column Sizes
      Database Requirements for Varying Page Sizes
      Data Limits for Tables According to Page Size
    Start and Stop Servers
      Start Servers
        Server Start-up Parameters
        RUN_server_name File
        Using the startserver Command
      Start Servers When the Operating System Restarts
        Creating a System Restart Script for HP-UX
        Creating a System Restart Script for IBM RS/6000
        Creating a System Restart Script for Sun Solaris and Linux
      Starting XP Server After Initial Installation
      Stop Servers
        Stopping SAP ASE
        Stopping Backup Server
        Using the kill Command
        Shutdown and Shared Memory Files
    Huge Pages on Linux
    Configure the Operating System
      Verifying Environment Variables
      Using the stty Setting
      Restore Correct Permissions
      File Descriptors and User Connections
        File Descriptors and User Connections for HP-UX
        File Descriptors and User Connections for AIX
        File Descriptors and User Connections for Linux
        File Descriptors and User Connections for Sun Solaris
        Displaying Current Soft and Hard Limits
        Increasing the Soft Limit
        Increasing the Hard Limit
      Enable Asynchronous Disk I/O
        Enabling Asynchronous Disk I/O on Linux
        Enabling Asynchronous Disk I/O on IBM AIX
        Enabling Asynchronous Disk I/O HP-UX
        Enabling Asynchronous I/O for File System Devices
        Enabling Asynchronous I/O for File Systems
      Adjust the Client Connection Timeout Period
        Adjusting the Client Connection Timeout for HP-UX
        Adjusting the Client Connection Timeout for IBM RS/6000
        Adjusting the Client Connection Timeout for Linux
      Check for Hardware Errors
      Monitor the Use of Operating System Resources
        Monitor Operating System Resources for HP-UX
        Monitor Operating System Resources for IBM RS/6000
        Monitor Operating System Resources for Sun Solaris and Linux
      Check Database Integrity
    Configuring New Servers with srvbuild
    Optimize the SAP ASE Configuration
    SAP ASE Default Configuration
      Default Settings
    Set Up Communications Across the Network
      How SAP ASE Determines Which Directory Service Entry to Use
      How a Client Uses Directory Services
      Create a Directory Services Entry
      Supported Directory Drivers
      Contents of the interfaces File
      interfaces File Format
        Components of an interfaces File Entry
      Create a Master interfaces File
        Using dsedit or dscp to Create a Master interfaces File
        Using a Text Editor to Create a Master interfaces File
      Configure the interfaces File for Multiple Networks
        Configuring the Server for Multiple Network Handlers
        Configure Client Connections
          Manage One Network-Independent DSQUERY Name
          Using Different DSQUERY Names
        Configuring for Query Port Backup
      IPv6 Support
        IPv6 Infrastructure
    Troubleshoot
      Troubleshooting when the Server Fails to Start
      Troubleshooting an Error when Executing an ESP
    Use the Lightweight Directory Access Protocol as a Directory Service
      LDAP Directory Services Versus the SAP Interfaces File
      The libtcl*.cfg File
      Enabling LDAP Directory Services
      Keywords for the LDAP URL Variables
      Adding a Server to the Directory Services
      Multiple Directory Services
      Encrypting the Password
      Performance
      Migrating from the interfaces File to LDAP
    Localization Support
      Language Modules
      Default Character Sets
      Supported Character Sets
        Arabic Character Sets
        Baltic Character Set
        Simplified Chinese Character Sets
        Traditional Chinese Character Set
        Cyrillic Character Sets
        Eastern European Character Sets
        Greek Character Sets
        Hebrew Character Sets
        Japanese Character Sets
        Korean Character Set
        Thai Character Sets
        Turkish Character Sets
        Unicode Character Set
        Vietnamese Character Set
        Western European Character Sets
      Character Set Names
      Load Character Sets
      Language Definition Files Sort Order
      Character Set Conversion
        Conversions Between Server and Client
      Sort Orders
        Available Sort Orders for Character Sets
      Language Modules
        Installing a New Language Module
        Message Languages
      Localization Directories
        About the locales Directory
        About the charsets Directory
        Format of locales.dat File Entries
        How Client Applications Use locales.dat
      Changing SAP ASE Localization Configuration
        Configuring SAP ASE for Other Character Sets
        Editing the locales.dat File
        Changing Backup Server Localization Configuration
    SAP ASE Error Logging
      Set Error Log Paths
        Set the SAP ASE Error Log Path
      Manage Messages
        Log User-Defined Messages
        Log Auditing Events
    Manage Database Devices
      Device Requirements
      Create Files for Database Devices
    Database Management System Auditing
      Audit System Devices and Databases
    Install Online Help for Transact-SQL Syntax
      Default Device for the sybsyntax Database
      Installing sybsyntax
  Configuration Guide for Windows Adaptive Server Enterprise 16.0
    About SAP ASE
      System-Specific Issues
      User Roles
      Environment Variables
    SAP ASE Devices and System Databases
      The master Device
      The sybsystemdb Device
      The sysprocsdev Device
      Optional Devices and Databases
        Pluggable Component Interface (PCI) Database
        Sample Databases
        sybsecurity Device and Database
        dbccdb Database
      Using Operating System Files as Database Devices
        The dsync Parameter
        The directio Parameter
    Client/Server Communication
    About Changing SAP ASE Configurations
    Languages Other Than US English
    SAP ASE Specifications
      Database Specifications
      Table Specifications
      Query Specifications
      Procedure Specifications
      Extended-Limit Capabilities
    Start and Stop Servers
      Server Start-up Parameters
        Specifying Additional Start-up Parameters
      Starting and Stopping Servers Using Unified Agent
      Start and Stop Servers Using the Control Panel
        Starting Servers as an Automatic Service
          Setting Up SAP ASE as an Automatic Service
        Starting, Stopping, and Pausing Servers Manually
      Stopping Backup Server
      Stopping SAP ASE
    Monitor Servers
      Monitoring Servers with the Control Panel
    SAP ASE Configurations
      Default SAP ASE Configuration
        Default SAP ASE Parameter Settings
        Default Backup and XP Server Settings
      Change SAP ASE Configurations
        Starting Server Config
        Configuring SAP ASE
          Setting SAP ASE Parameters
          Changing the Default Backup Server
          Changing the Default XP Server
        Configuring Backup Server
        Configuring Job Scheduler and Self Management
        Optimize the SAP ASE Configuration
    Network Communications Using sql.ini
      Client Connections to SAP ASE
      Determine the Address to Listen for Client Connections
      Client Access to SAP ASE
        Enabling Client Access to a Server
        Changing the Server Entries in sql.ini
      Components in the sql.ini File
        Server Name
        Network Driver
        Service Type
        Server Address
          Address Format
          IP Address
          Named Pipes Format
          Windows Sockets Format
            Increasing Windows Sockets Connections
              Modifying an Existing TcpNumConnections Value
              Adding a TcpNumConnections Value
            Using Multiple TCP/IP Network Interface Cards
            Controlling the Connection Timeout
              Increasing the TcpKeepTries Value
          NWLink IPX/SPX Format
            Available NWLink IPX/SPX Connection Formats
            Selecting Valid Connection Formats
      Share Network Configuration Information
        Creating a Master sql.ini File
        Windows Registry as a Directory Service
          Using Windows Registry as a Directory Service
      Verify Server Connections
      Configure ODBC Connections
        Configuring the ODBC Driver
      IPv6 Support
        IPv6 Infrastructure
    Lightweight Directory Access Protocol in SAP ASE
      LDAP Directory Services versus the SAP Interfaces File
      The libtcl.cfg File
      Enabling LDAP Directory Services
      Adding a Server to the Directory Services
        Adding a Server Entry to the Directory Service Using dsedit
      Multiple Directory Services
      Encrypting the Password
      Performance with LDAP
      Migrating from the sql.ini File to LDAP
    Localization Support
      Language Modules
      Default Character Sets for Servers
        Changing the Default Character Set for Servers
      Supported Character Sets
        Arabic Character Sets
        Baltic Character Set
        Simplified Chinese Character Sets
        Traditional Chinese Character Set
        Cyrillic Character Sets
        Eastern European Character Sets
        Greek Character Sets
        Hebrew Character Sets
        Japanese Character Sets
        Korean Character Set
        Thai Character Sets
        Turkish Character Sets
        Unicode Character Set
        Vietnamese Character Set
        Western European Character Sets
      Character Set Conversion
        Conversions Between Server and Client
      Sort Orders
        Available Sort Orders
      Language Modules
        Installing a New Language Module
        Message Languages
      Localization
        Localization Directories
        charsets and locales Directories
          Format of locales.dat File Entries
          Client Application Use of locales.dat
          Editing the locales.dat File
      Changing SAP ASE and Backup Server Localization Configuration
        Completing SAP ASE Localization Changes
        Completing Backup Server Localization Changes
        Configuring SAP ASE for Other Character Sets
      Language-Specific Sort Orders
      SAP ASE Character Set Names
      charset Utility
    Log Error Messages and Events
      SAP ASE Error Logging
      Windows Event Logging
        Setting Up Windows Event Logging
        Enable and Disable Windows Event Logging
          Enabling or Disabling Event Logging Using Server Config Utility
          Enabling or Disabling Event Logging Using sp_configure
        Windows Event Log Information
      Manage Logs
      Set Error Log Paths
        Setting the SAP ASE Error Log Path
        Setting the Backup Server Error Log Path
      Manage Messages
        Log User-Defined Messages
          New Messages
          Existing Messages
        Log Auditing Events
        Log User-Defined Events
      Using a Remote Log
      Central Logging Site
        Log Messages from Multiple SAP ASEs
        Set Up a Local Central Logging Site
          Creating a Registry key
          Defining a Registry Key
      View Messages
        Viewing Messages in the Windows Event Log
        Viewing Messages in the SAP ASE Error Log
    Security Services with Windows LAN Manager
      How Login Authentication Works
      Administering Security Services Using LAN Manager
      Modify Configuration Files Required for a Unified Login
        Set Up Drivers for Network-Based Security
          Entries for Network Drivers
          Entries for Directory Services
          Entries for Security Drivers
            Editing the libtcl.cfg File
        Checking the LAN Manager's Local Name
        Specifying Security Information for SAP ASE
      Identify Users and Servers to LAN Manager
      Configure SAP ASE for LAN Manager Security
        Enabling and Disabling External Security Services
        Manage Unified Login
          Requiring Unified Login
          Establishing a Secure Default Login
          Map LAN Manager Login Names to Server Names
        Data Integrity Check
        Ensure Adequate Memory for Security Services
      Add Logins to Support Unified Login
        Adding Logins
      Define the Connection to a Server for Security Services
        Specifying the Principal Name
        Specifying Network-Based User Authentication
        Specifying the Name Assigned to LAN Manager
      Determining the Status of Security Services
      Configuration Parameters Used in Security Services
        Data Integrity Check
        Message Sequence Check
        Detect Interception or Replay
        Specify a Login
        Control User Authentication
      Manage Login Security on an Windows Computer
        SAP ASE Security
        Combined SAP ASE and Windows Login Security
          Trusted Connections and Combined Login Security
        Login Security Modes
          Standard Mode
          Integrated Mode
          Mixed Mode
        Manage the Login Security Features
          Permit Trusted Connections
          Windows Registry Parameters
            Default Login
            Default Domain
            SetHostName
            Character Mappings
            Modify the Parameter Values
        Administer Login Security Using System Procedures
          Assigning Trusted Connection Permissions
          Display the Current Registry Values
          Display Permissions and User Names
          Revoke Permissions Granted with sp_grantlogin
        Configuring Login Security
          Creating Windows Users and Groups
          Configuring Mapping and Default Domain Values
          Setting Login Security Mode
          Adding Network Login Names to syslogins
          Assigning Roles
        Change Login Security Options
          Enabling Standard Login Security Mode
          Enabling Integrated or Mixed Login Security Mode
    Manage SAP ASE Databases
      Manage Database Devices
        Device Requirements
        Creating .dat Files for Database Devices
      Back Up and Restore Data
        Backing Up Data with a Tape Drive
          Windows Tape Drive Names
          Set the Maximum Capacity for a Tape Drive
        Backing Up Data Using a Hard Disk
        Dumping Across a Network
        Examples of Backing Up and Restoring User Databases
          Back Up and Restore to a Database and Device
          Back Up and Restore on a Remote Backup Server
          Backup File Names
          Additional Dump Devices
          Tape Handling Options
          Get Information About Files
        Backing Up and Restoring System Databases
      Optimize SAP ASE Performance and Tuning
        Using Dedicated SAP ASE Operation
        Disk Drives and SAP ASE Performance
          Monitor Disk Usage
      Monitoring SAP ASE Statistics
    Database Management System Auditing
      Audit System Devices and Databases
    Install Online Help for Transact-SQL Syntax
      Default Device for the sybsyntax Database
      Installing sybsyntax
    Troubleshoot Network Connections
      Running Server Ping
      Troubleshoot Connection Failures
        Using Returned Messages to Diagnose a Failure
          Troubleshooting a Connection Failure to SAP ASE
          Failure to Load Net-Library DLLs
        Troubleshooting Failure of Other Applications
          Before Calling Technical Support
    SAP ASE Registry Keys
      \SOFTWARE\SYBASE\Server\server_name
      \SOFTWARE\SYBASE\SQLServer\server_name\parameter
      \SOFTWARE\SYBASE\SQLServer
      \SYSTEM\CurrentControlSet\Services\SYBSQL_server_name
  New Features Summary SAP Adaptive Server Enterprise 16.0
    Version 16.0
      Increased Data Availability with Partition Locking
      CIS Support for HANA Server
      Relaxed Query Limits
      Query Plan Optimization with Star Joins
      Query Performance Improvements
      Full-Text Auditing
      Auditing for Authorization Checks Inside Stored Procedures
      Replacing Object Definitions
      Query Plan and Execution Statistics in HTML
      Index Compression
      SAP JVM Support
      Full Database Encryption
      Scalability Enhancements and Features
      Monitoring Threshold-Based Events
      Multiple Triggers
      Residual Data Removal
      Configuration History Tracking
      Cyclic Redundancy Checks for dump database
      Calculating the Transaction Log Growth Rate
      System Changes for SAP ASE Version 16.0
    Version 15.7 SP100
      Adaptive Server 15.7 SP100 Feature and Platform Matrix
      Shrinking Databases
      Enhancements to Backup and Restore
      Aggregating Metrics from Syntactically Similar Queries
      Updates to Precomputed Result Sets
      Improved Data Load Performance
      Incremental Reorganization
      Creating Indexes Without Blocking Access to Data
      Query Plan and Execution Statistics in HTML
      Gathering Hash-Based Statistics with create index
      Query Plan Optimization with Bloom Filters
      Support for Replication by Column Value
      Support for Multiple Scanner Threads
      Sybase Central Adaptive Server Plug-in
      Running Adaptive Server on VMware vSphere
      Support for OData
      Support for NTLM and MIT Kerberos on Windows 64-bit
      Properties Added to Responses File
      Automatic Physical Database Rearrangement
      System Changes for Adaptive Server Version 15.7 SP100
        Commands
        Functions
        System Stored Procedures
        Configuration Parameters
        System Tables
        Utilities
        Monitoring Table Changes
        Permission Changes for Commands and Functions
    Version 15.7 ESD #4
      15.7 ESD #4.2
        Improved Rollback Reporting
      15.7 ESD #4
        Remote Backup Server Maximum Name Length
        Support for Query Plan Pinning
        AF_UNIX Support
        Changes to sp_addthreshold and Roles
        System Changes for Adaptive Server Version 15.7 ESD #4
          Utilities
          Configuration Parameters
    Version 15.7 ESD #3
      sybrestore Utility
      System Changes for Adaptive Server Version 15.7 ESD #3
        Commands
        Functions
        System Stored Procedures
        Monitoring Table Changes
    Version 15.7 ESD #2
      Granular Permissions
      Predicated Privileges
      Deferred Table Creation
      Online Utilities
      Merging and Splitting Partitions
      Maximum Size of Query in the Statement Cache
      Enhancements to show_cached_plan_in_xml
      Fast-Logged Bulk Copy
      Precomputed Result Sets
      Concurrent dump database and dump transaction Commands
      Hash-Based Update Statistics
      Enhancements to dump and load
      alter table drop column without datacopy
      Expanded Maximum Database Size
      User-Defined Optimization Goal
      Shared Query Plans
      Initializing Databases Asynchronously
      In-Row Large Object Compression
      Configuring Shared Memory Dumps
      System Changes for Adaptive Server Version 15.7 ESD #2
        Commands
        Functions
        System Stored Procedures
        Configuration Parameters
        System Tables
        Utilities
        Monitoring Table Changes
    Version 15.7 ESD #1
      Proxy Table Support for In-row LOB Columns
      Support for System Procedures in Replicated Master Database
      Increased Number of Parameters
      Multiple Listeners on Windows
      Windows Supports Adaptive Server High Availability
      New and Changed Configuration Parameters
    Version 15.7
      Application Functionality Configuration Group
      New Adaptive Server Kernel
      Compressing Data in Adaptive Server
      New Security Features
        End-to-End CIS Kerberos Authentication
        Dual Control of Encryption Keys and Unattended Startup
        Securing Logins, Roles, and Password Management Extensions
        Login Profiles
        Employee Lifecycle Management
        External Passwords and Hidden Text
      Abstract Plans in Cached Statements
      Shrink Log Space
      Displaying Currently Set Switches with sysoptions
      Changes for Large Objects
        In-Row Off-Row LOB
        Using Large Object text, unitext, and image Datatypes in Stored Procedures
        Using LOB Locators in Transact-SQL Statements
        Extension to where Clause for Large Objects
      Showing Cached Plans in XML
      Padding a Character Field Using str
      Changes to select for update
      Creating Nonmaterialized, Non-null Columns
      Sharing Inline Defaults
      Retain Monitoring Data
      Analyze Dynamic Parameters
      Monitor Lock Timeouts
      Truncate Trailing Zeros
      Fully Recoverable DDL
      Transfer Rows from Source to Target Table Using merge
      View Statistics and Histograms with sp_showoptstats
      Changes to Cursors
        Release Cursor Locks at Cursor Close
        Enhanced Transaction Support for Cursors
        Monitor Cursor Statements
      Nested select Statement Enhancements
      Changes to Commands and System Procedures in Chained Transaction
      Expanded Variable-Length Rows
      Changes to like Pattern Matching
      Changes to Quoted Identifiers
      Allowing Unicode Noncharacters
      Reduce Query Processing Latency
      The sybdiag Utility
      The Optimizer Diagnostic Utility
      System Changes for Adaptive Server Version 15.7
        Commands
        Functions
        System Stored Procedures
        Configuration Parameters
        System Tables
        Utilities
        Monitoring Table Changes
          New Monitoring Tables
          Changes to Monitoring Tables
        Global Variables
    Version 15.5 Cluster Edition
      Adaptive Server 15.5 Cluster Edition Feature and Platform Matrix
      Multiple simultaneous failover
      Adding space to an archive database
      Distributed transaction management in the shared-disk cluster
      System Changes for Adaptive Server Version 15.5 Cluster Edition
        Changed commands
        Monitoring Tables
        Configuration Parameters
        Functions
    Version 15.5
      Adaptive Server 15.5 Feature and Platform Matrix
      In-Memory and Relaxed-Durability Databases
      Faster Compression for Backups
      Backup Server Support for the IBMĀ® TivoliĀ® Storage Manager
      Deferred Name Resolution for User-Defined Stored Procedures
      FIPS 140-2 Login Password Encryption
      Incremental Data Transfer
      bigdatetime and bigtime Datatypes
      Creating and Managing tempdb Groups
      System Changes for Adaptive Server Version 15.5
        Datatypes
        Functions
        System Stored Procedures
        Commands
        Configuration Parameters
        Monitoring Tables
        System Tables
        Utilities
        Auditing
    Version 15.0.3
      SQL Statement Replication
      Security Enhancements
        LDAPS User Authentication Enhancement
        Automatic LDAP User Authentication and Failback
        Login Mapping of External Authentication
        Using SSL to Specify a Common Name
        Concurrent Kerberos Authentication
      Virtually Hashed Tables
      Huge Pages
      Upgrading During a High Availability Configuration
        Reinstalling System Stored Procedures
      Distributed Transaction Management (DTM)
      Adaptive Server Plug-in Updates
      The Java Interface
      System Changes for Adaptive Server Version 15.0.3
        Functions
        System Stored Procedures
        Commands
        Configuration Parameters
        Monitoring Tables
        System Tables
    Version 15.0.2
      Encrypted Columns
      Archive Database Access
      Finding Slow-Running Queries
      Deferred Compilation
      Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
      Statistical Aggregate Functions
        Standard Deviation and Variance
      Eager and Lazy Aggregation
        Vector and Scalar Aggregation
      Improved Performance for Data Insertion
        Using Asynchronous Writes During a Page Split
        Improving Throughput of tempdb Transactions
        Post-commit Optimization
      Changes to the Query Processor
        Deferred Compilation
        Non-binary Character Set Histogram Interpolation
        Expression Histogramming Selectivity Estimates
      Viewing Current Optimizer Settings
      New Security Features
        PAM Support in 64-bit Adaptive Server on AIX
        Global Login Triggers Set Automatically
        SSL Support
        Improved Password Security
        Auditing Enhancements
          Hiding System Stored Procedure and Command Password Parameters
          Monitoring Failed Login Attempts
        High Availability Considerations
      Installing and Editing Monitoring Tables
      Monitoring Tables for the Statement Cache
      Row-Level Locking for System Tables
      The xmltable() Function
      Relocated Joins
      User-Defined SQL Functions
      instead of Triggers
      System Changes for Adaptive Server Version 15.0.2
        Trace Flags
        Commands
        Changes to the set Command
        Utilities
        System Stored Procedures
        System Tables
        Configuration Parameters
        Functions
        Global Variables
    Version 15.0.1
      Changes to Abstract Plans
        New Query-Level Settings
        Operator Name Alignment for the Abstract Plan and the Optimizer Criteria
        Extending the Optimizer Criteria Set Syntax
      Literal Parameterization
      System Changes for Adaptive Server Version 15.0.1
        Functions
        Configuration Parameters
        Commands
        Monitoring Tables
    Version 15.0
      Partition Support
      Row-Locked System Catalogs
      Query Processor
      Large Identifiers
      Computed Columns
        Differences Between Computed Columns and Function-Based Indexes
        Differences Between Materialized and Not Materialized Computed Columns
      Scrollable Cursors
      unitext Datatype Support
      big int Datatype Support
      Unsigned Integer Datatype Support
      Integer Identity
      Enhancements to XML Services
      Adaptive Server Plug-in Enhancements
      Interactive SQL
      User-Defined Web Services
      Very Large Storage Support
      Automatic Running of update statistics
      SySAM License Management
      Query Processing Metrics (qp Metrics)
      Updates to Abstract Plans
      showplan Changes
      Secure Socket Layer Uses FIPS 140-2
      System Changes for Adaptive Server Version 15.0
        Utilities
        Reserved Words
        Global Variables
        Configuration Parameters
        Functions
        Commands
        System Stored Procedures
        System Tables
        Monitoring Tables
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  New Features Guide SAP Adaptive Server Enterprise 16.0
    Overview of Version 16.0
    Increased Data Availability with Partition Locking
      Partition Locks
        Partition Lock Name
        Enabling Partition Locking
        View Partition Locks with sp_lock
        View Partition Locks with sp_familylock
        View Partition Locks with monLocks and monDeadLock
        Deadlocks and Lock Timeouts
      Partition Lock Promotion
        Setting Partition Lock Promotion Thresholds
        Dropping Partition Lock Promotion Thresholds
      Lock Compatibility and Lock Sufficiency
        Partition Lock Compatibility
        Partition Lock Sufficiency
        Schema Lock Compatibility
        Schema Lock Sufficiency
      Improved Concurrency for Partition-Level Online Operations
        Partition-Level Online Operation Syntax
        Concurrency with Partition-Level Online Operations
        Partition-Level Online Operations with Global Index
        Schema Locks
    Component Integration Services Support for HANA Server
      Configuring CIS for HANA
        Creating SAP HANA as an ODBC Data Source on Windows
        Adding SAP HANA to the SAP ASE Interfaces File
        Configuring the PCI Bridge and PCA/ODBC
      Adding Server Class HANAODBC
      Datatype Mapping Between SAP ASE and HANA
      Restrictions
    Relaxed Query Limits
    Query Plan Optimization with Star Joins
      Star Join Hint
      Star Join Query Plans Under the use fact_table Hint
    Query Performance Improvements
      Dynamic Thread Assignment
      SORT Operator Performance Improvement
      Hash Join Operator Performance Improvement
    Full-Text Auditing
    Auditing for Authorization Checks Inside Stored Procedures
    Replacing Object Definitions
      Install Script Changes
      Data and Log Segment Changes
    Query Plan and Execution Statistics in HTML
      Option for Prefix of Generated File
    Index Compression
      Enabling Index Compression
      Creating an Index Compressed Table
      Creating a Compressed Index
      Changing the Compression State
    SAP JVM Support
    Full Database Encryption
      Full Database Encryption Versus Encrypted Columns
      Creating the Database Encryption Key
        Changing a Database Encryption Key
        Dropping a Database Encryption Key
      Create an Encrypted Database
      Encrypt an Existing Database
      Encryption Status and Progress
      Performance Considerations
      Suspend the Encryption Process
        The quiesce database Command and Fully Encrypted Databases
      Resume the Encryption Process
      Decrypt an Encrypted Database
      Recover Fully Encrypted Databases
      Back Up (Dump) a Fully Encrypted Database
        Back Up the Database Encryption Key
      Restore (Load) Backups of Fully Encrypted Databases
        Loading Behavior of Encrypted Databases
      Dropping a Database That is Being Encrypted
      Mounting and Unmounting a Fully Encrypted Database
      Archive Databases and Full Encryption
      Full Database Encryption and System Changes
    Scalability Enhancements and Features
      Run-Time Logging Enhancements
      Lock Management Enhancements
      Metadata and Latch Management Enhancements
    Monitoring Threshold-Based Events
    Multiple Triggers
      Creating Multiple Triggers
      Changing the Order of When a Trigger is Fired
      Order of Triggers in Merge Statements
      Transactional Behavior with Multiple Triggers
      Disabling and Reenabling Triggers
      @@trigger_name Global Variable
    Residual Data Removal
    Configuration History Tracking
      Configuring SAP ASE to Track Configuration Changes
      Changes Captured
      Querying ch_events to View Changes
    Cyclic Redundancy Checks for dump database
    Calculating the Transaction Log Growth Rate
    System Changes
      Configuration Parameters
        New Configuration Parameters
        Changed Configuration Parameters
      Built-In Functions
        dbencryption_status
      Commands
        alter database for Full Database Encryption
        alter index
        alter table for Index Compression
        alter table for Multiple Triggers
        alter table for Residual Data Removal
        create archive database for Full Database Encryption
        create database for Full Database Encryption
        create default
        create encryption key
        create function
        create function (SQLJ)
        create index
        create procedure
        create procedure (SQLJ)
        create rule
        create table for Index Compression
        create table for Residual Data Removal
        create trigger for Multiple Triggers
        create trigger for or replace
        create view
        drop encryption key
        drop trigger
        dump database
        kill
        load database
        select
        select into
        set
      System Procedures
        Changed System Procedures
          sp_audit
          sp_chgattribute
          sp_clusterlockusage
          sp_dboption
          sp_depends
          sp_encryption
          sp_familylock
          sp_helpdb
          sp_lock
        New System Procedures
          sp_confighistory
          sp_ dropglockpromote_ptn
          sp_droprowlockpromote_ptn
          sp_helptrigger
          sp_jsconfigure
          sp_logging_rate
          sp_setpglockpromote_ptn
          sp_setrowlockpromote_ptn
      System Tables
        Changed System Tables
        New System Tables
          ch_events
        Changed Monitoring Tables
        New Monitoring Tables
          monThresholdEvent
      Utilities
        ddlgen
        sybmigrate
        sybrestore
      Global Variables
  Security Administration Guide SAP Adaptive Server Enterprise 16.0
  SAP Control Center 3.3 for SAP Adaptive Server Enterprise
    About SAP Control Center for SAP Adaptive Server Enterprise
      New Features in SAP Control Center for SAP Adaptive Server Enterprise
      User Interface Overview
      Toolbar Icons
      Status Icons
      Display and Copy Options in SAP Adaptive Server Enterprise Monitors
      Common Display Options
      Keyboard Shortcuts
      Displaying the Versions of SCC Components
      Style and Syntax Conventions
      SAP Control Center Accessibility Information
    Get Started
      Quick Start for an Evaluation
      Get Started in a Production Environment
      Deploying an Instance from a Shared Disk Installation
        Enabling and Disabling Shared-Disk Mode
        Shared-Disk Mode
        sccinstance Command
      Launching SAP Control Center
        Registering the ODBC Driver in Windows
        Starting and Stopping SAP Control Center in Windows
        Starting and Stopping SAP Control Center in UNIX
        Configuring Memory Usage
          Changing a Memory Option on the Command Line
          Changing a Memory Option for an SAP Control Center Windows Service
          Changing a Memory Option for an SCC UNIX Service
        scc Command
      Logging in to SAP Control Center
      Logging out of SAP Control Center
      Setting Up Security
        Security
        Configuring Authentication for Windows
        Configuring a Pluggable Authentication Module (PAM) for UNIX
        Configuring an LDAP Authentication Module
          LDAP Configuration Properties
        Mapping SAP Control Center Roles to LDAP or OS Groups
        Encrypting a Password
        Configuring Ports
      Configuring the E-mail Server
      Configuring the Automatic Logout Timer
      Configuring Retrieval Thresholds for the Administration Console
      User Authorization
        Assigning a Role to a Login or a Group
        Removing a Role from a Login or a Group
        Adding a Group
        Removing a Group
        Adding a Login Account to a Group
        Removing a Login Account from a Group
        Adding a Login Account to the System
        Removing a Login Account from the System
        Modifying a User Profile
        Logins, Roles, and Groups
    Configure
      Configuring SAP Adaptive Server Enterprise for Monitoring
      Registering an SAP ASE Server
      Importing Resources for Batch Registration
      Registering the Agent for an SAP ASE Server
      Authenticating a Login Account for a Managed Resource
        Role Assignment in SAP Control Center for SAP ASE
        Encrypted Authentication for SAP ASE
      Setting Up Statistics Collection
        About Statistics
        SAP ASE Data Collections
        Key Performance Indicators for SAP ASE
      Creating an Alert
        SAP ASE Alerts
        Alert Types, Severities, and States for SAP ASE
        Alert-Triggered Scripts
        Alert-Triggered Script Examples
        Substitution Parameters for Scripts
      Setting Display Options for SAP ASE Performance Data
      Optional Configuration Steps
    Manage and Monitor
      Displaying Resource Availability: the Heat Chart
      Graphing Performance Counters: the Statistics Chart
      Manage SAP Control Center
        Administration Console
          Browsing and Managing Resources
          Searching and Filtering Resources
          Searching for Objects in SAP ASE
            Manage Message Rows for Search Requests
          Configuring Retrieval Thresholds for the Administration Console
        Job Scheduling
          Executing and Stopping a Data Collection Job
          Deleting a Data Collection Job
          Resuming and Suspending a Data Collection Job
          Adding a New Schedule to a Job
          Viewing or Deleting a Schedule
          Modifying the Data Collection Interval for a Job
          Resuming and Suspending the Scheduler
          Viewing the Job Execution History
        Alerts
          SAP ASE Alerts
          Alert Types, Severities, and States for SAP ASE
          Creating an SAP ASE Alert
          Displaying SAP ASE Alerts
          Modifying an Alert
          Deleting an Alert
          Alert Subscriptions
            Adding or Modifying an Alert Subscription
            Unsubscribing from an Alert
            Enabling and Disabling Alert Subscription
          Alert Notifications
            Displaying Alert History and Resolutions
            Resolving Alerts
          Alert-Triggered Scripts
            Substitution Parameters for Scripts
            Testing an Alert-Triggered Script
            Alert-Triggered Script Examples
        Resources
          Unregistering a Resource
          Adding a Resource to a Perspective
          Removing a Resource from a Perspective
          Modifying a Resource’s Name and Connection Properties
          Searching for Resources in the Resource Explorer
        Perspectives
          Creating a Perspective
          Removing a Perspective
          Renaming a Perspective
        Views
          Managing a View
          Arranging View Layout in a Perspective
        Instances
          Enabling and Disabling Shared-Disk Mode
          Deploying an Instance from a Shared Disk Installation
          Refreshing or Converting an Instance
          Removing an Instance
          Shared-Disk Mode
          sccinstance Command
        Repository
          Scheduling Backups of the Repository
          Modifying the Backup Schedule
          Forcing an Immediate Backup
          Restoring the Repository from Backups
          Configuring Repository Purging
        Logging
          Viewing the SAP ASE Component Log
          Viewing SAP Control Center Server Logs
          Viewing the SAP Control Center Client Log
          Changing the Logging Level
          Logging or Message Levels
          Changing Logging Configuration
        SAP Control Center Console
          Console Commands
            help Command
            info Command
            shutdown command
            status Command
        Setting SAP ASE Parameters in the Configuration File
          Configuration Parameters for SAP ASE
      Manage and Monitor the SAP ASE Environment
        Managing an SAP ASE server
          Executing SQL Statements
          Registering the Agent for an SAP ASE Server
          Authenticating the Unified Agent
          Authenticating the SCC Agent
          Starting an SAP ASE Server
          Stopping an SAP ASE Server
          Configuring Retrieval Thresholds for the Administration Console
          SAP ASE Error Log
            Viewing the SAP ASE Error Log
            Searching the Error Log for Messages
            Managing Flag Definitions
              Importing Flag Definitions
              Exporting Flag Definitions
          Server Configuration
            Displaying Configuration Values
            Modifying Server Configuration Parameters
            Server Configuration Statistics and Details
            Server Monitor Settings
          Server Properties
          Activating a Role
          Managing Permissions
            Enabling Granular Permissions
          Replacing Compiled Object Definitions
        Displaying the Performance Overview
          Performance Overview Statistics and Details
        Caches
          Monitor Caches
            Monitoring SAP ASE Data Caches
            Modifying Data Cache Sizes
            Adding Data Cache Buffer Pools
            Data Cache Statistics and Details
            Monitoring the SAP ASE Procedure Cache
            Procedure Cache Statistics and Details
            Monitoring the SAP ASE Statement Cache
              Setting the Statement Cache Size
            Statement Cache Statistics and Details
            Monitoring SAP ASE In-memory Storage
          In-memory Storage Statistics and Details
          Manage Caches
            Creating a Cache
            Cache Properties
            Managing Binding Options
            Managing Buffer Pools
            Managing Cache Configurations
            Generating DDL for a Cache
            Deleting a Cache
        Clusters
          Monitor Clusters
            Cluster Instances
              Monitoring Cluster Instances in Cluster Configurations
              Cluster Instances Statistics and Details
            Cluster Interconnect
              Displaying the Cluster Overview
              Cluster Interconnect Statistics and Details
              Monitoring Interprocess Communication in Cluster Configurations
            Workload Management
              Monitoring Workloads in Cluster Configurations
              Workload Management Statistics and Details
          Manage Clusters
            Starting the SCC agent for a Cluster
            Starting the Unified Agent for a Cluster
            Preparing to Create a Cluster
            Creating a Cluster
            Registering a Cluster
            Registering the Agent and Starting a Cluster
            Displaying Cluster Configuration Values
            Starting a Cluster
            Stopping a Cluster
            Dropping a Cluster
            Viewing a Cluster Log
            Cluster Properties
            Manage Logical Clusters
              Adding a Logical Cluster
              Designating a Failover Logical Cluster
              Designating a Failback Logical Cluster
              Logical Cluster States
                Changing the State of a Logical Cluster
              Deleting a Logical Cluster
              Generating a DDL Script for a Logical Cluster
              Logical Cluster Properties
            Manage Cluster Instances
              Displaying Instance Configuration Values
              Starting an Instance
              Adding an Instance to a Cluster
              Stopping an Instance
              Deleting an Instance
              Instance Properties
              Viewing an Instance Log
            Manage Load Profiles
              Adding a Load Profile
              Deleting a Load Profile
              Generating a DDL Script for a Load Profile
              Load Profile Properties
            Manage Routes
              Adding a Route
              Deleting a Route
              Route Properties
            Manage Auxiliary Servers
              Configuring a Backup Server
              Deleting a Backup Server
              Backup Server Properties
              Configuring an XP Server
              Deleting an XP Server
              XP Server Properties
        Databases
          Monitor Databases
            Determining the Backup Status of a Database
            Displaying Resources Used by a Database
            Modifying Database Sizes
            Database Statistics and Details
            Displaying Information About Segments Used by a Database
          Manage Databases
            Creating a User Database
            Creating a Proxy Database
            Creating a Temporary Database
            Creating an Archive Database
            Creating an In-Memory Database
            Creating an In-Memory Temporary Database
            Creating an Encrypted Database
              Encrypting an Existing Database
              Suspending the Encryption Process
              Resuming the Encryption Process
              Decrypting an Encrypted Database
                Suspending the Decryption Process
                Resuming the Decryption Process
            Creating a Temporary Database Group
            Shrinking a Database
            Backing Up (Dumping) a Database
              Viewing Available Dump Configurations
              Creating a Dump Configuration
              Backing Up a Database Using a Dump Configuration
              Dump Configuration Properties
              Deleting a Dump Configuration
              Backing Up a Database or Transaction Log to Multiple Stripes
              Backing Up a Database Incrementally
              Backing Up a Database Incrementally Using a Dump Configuration
              Viewing Dump Records
              Purging Dump Records from Dump History
              Generating Database-Creation SQL for a Target Database
              Generating Database-Creation SQL from a Dump Image
              Backing Up Server Configuration Files
            Scheduling a Database Backup
              Requirements and Permissions for Scheduling Backups
              Creating a Schedule for Backups
              Schedule Properties
              Deleting a Schedule
              Scheduling a Backup Job in the Backup Wizard
              Creating a New Scheduled Backup Job
              Properties of a Scheduled Backup Job
              Manage a Scheduled Backup Job
                Enabling Scheduled Jobs
                Deleting a Backup Job from the Schedule
                Disabling Scheduled Jobs
                Running a Scheduled Job Now
                Rescheduling a Backup Job
                Terminating a Scheduled Job in Progress
              Viewing the Execution History of a Scheduled Backup Job
                Job History Properties
                Viewing the Contents of the Execution History Log
                Deleting the Execution History of a Scheduled Backup Job
              Job Scheduler Administration
              Set Up an Alert for When a Backup Job Fails
            Restoring (Loading) a Database
              Generating a Database Load Sequence
              Generating a Database Load Sequence for a Target Database from Dump History
              Restoring a Database from a Cumulative Dump
              Restoring a Database from a SQL Script
              Restoring a Database from a Point in Time
            Viewing Database Statistics
            Checkpointing Databases
            Checking Database Consistency
            Placing a Database in Quiesce-Hold
            Placing a Database in Quiesce-Release
            Mounting an SAP ASE Database
            Unmounting an SAP ASE Database
            Database Properties
              Changing Database Ownership
              Modifying Database Storage Allocations
              Modifying the Transaction Log Cache and the Log I/O Buffer Size
              Changing Database Options
            Generating DDL for a Database
            Deleting a Database
        Defaults
          Creating a Default
          Defaults Properties
          Replacing a Default Definition
          Deleting a Default
        Devices
          Monitor Devices
            Determining Device I/O Response and I/O per Second
            Modifying Device Sizes
            Device Statistics and Details
          Manage Devices
            Displaying a Device Object
            Creating a Database Device
            Creating an In-Memory Device
            Creating a Dump Device
            Database Device Properties
            In-Memory Device Properties
            Dump Device Properties
            Generating DDL for a Device
            Deleting a Database, In-Memory, or Dump Device
        Engines
          Monitor Engines
            Displaying Engine CPU Utilization
            Engine Statistics and Details
          Manage Engine Groups
            Creating Engine Groups
            Engine Groups Properties
            Deleting an Engine Group
            Generating DDL for an Engine Group
        Execution Classes
          Creating Execution Classes
          Execution Classes Properties
          Modifying Bindings to Execution Classes
        Extended Stored Procedures
          Creating an Extended Stored Procedure
          Replacing an Extended Stored Procedure Definition
          Extended Stored Procedures Properties
          Granting Execute Permission on an Extended Stored Procedure
          Revoking Execute Permission on an Extended Stored Procedure
          Deleting an Extended Stored Procedure
          Generating DDL for an Extended Stored Procedure
        Functions
          Manage Scalar Functions
            Creating a Scalar Function
            Replacing a Scalar User Defined Function Definition
            Scalar Function Properties
            Granting Execute Permission on a Scalar Function
            Revoking Execute Permission on a Scalar Function
            Deleting a Scalar Function
            Generating DDL for a Scalar Function
          Manage SQLJ Functions
            Creating a SQLJ Function
            Replacing a SQLJ Function Definition
            SQLJ Function Properties
            Deleting a SQLJ Function
            Generating DDL for a SQLJ Function
        Networks
          Managing Remote Servers
            Configuring a Server for Remote Procedure Calls
            Adding a Remote Server
            Deleting a Remote Server
            Remote Server Properties
              Testing a Remote Server Connection
              Setting Options for a Remote Server
              Managing Remote Server Login Mappings
              Managing CIS Roles and Logins Mappings
        Precomputed Result Sets
          Configuring SAP ASE to Use Precomputed Result Sets
          Viewing Precomputed Result Sets
          Creating a Precomputed Result Set
          Deleting a Precomputed Result Set
          Altering a Precomputed Result Set
          Refreshing Precomputed Result Sets
          Truncating a Precomputed Result Set
          Granting Permissions on Precomputed Result Sets
          Revoking Permissions on Precomputed Result Sets
          Granting Precomputed Result Set Permissions to a Specific User
          Revoking Precomputed Result Set Permissions from a Specific User
          Displaying Information About Precomputed Result Sets
          Generating DDL for a Precomputed Result Set
        Procedures
          Manage Stored Procedures
            Creating a Stored Procedure
            Replacing a Stored Procedure Definition
            Stored Procedure Properties
            Granting Execute Permission on a Stored Procedure
            Revoking Execute Permission on a Stored Procedure
            Deleting a Stored Procedure
            Generating DDL for a Stored Procedure
          Manage SQLJ Procedures
            Creating a SQLJ Procedure
            Replacing a SQLJ Procedure Definition
            SQLJ Procedure Properties
            Deleting a SQLJ Procedure
            Generating DDL for a SQLJ Procedure
        Processes
          Identifying Resource-Intensive Processes
          Identifying Blocked Processes and Blocking Processes
          Terminating Blocking Processes
          Identifying the Lead Blocker in a Chain
          Displaying the SQL Query Associated with a Process
          Displaying Wait Events for a Process
          Process Statistics and Details
        Replication Agents
          Monitoring RepAgent Threads
          Replication Agent Statistics and Details
        Rules
          Manage Rules
            Creating a Rule
            Replacing a Rule Definition
            Rule Properties
            Deleting a Rule
            Generating DDL for a Rule
        Security
          Manage Encryption Keys
            Modifying and Deleting a System Encryption Password
            Creating a System Encryption Password
            Creating a Master Key
            Master Key Properties
            Modifying, Regenerating, and Deleting a Master Key
            Dual Control and Split Knowledge
            Creating a Column Encryption Key
            Column Encryption Keys Properties
            Creating a Key Copy
            Modifying and Deleting a Column Encryption Key
            Creating a Database Encryption Key
            Database Encryption Keys Properties
            Granting Encryption Permissions to a Role, User, or Group
            Modifying a Database Encryption Key
            Deleting an Encryption Key
            Generate DDL for an Encryption Key
          Manage Login Profiles
            Creating a Login Profile
            Login Profile Properties
            Removing Roles Granted to a Login Profile
            Granting Roles to a Login Profile
            Deleting a Login Profile
            Displaying Logins Assigned to a Login Profile
            Transferring Login Attributes to a Login Profile
          Manage Logins
            Creating a Login
            Login Properties
            Managing Users Mapped to Logins
            Removing Roles from a Login
            Granting Roles to a Login
            Configuring Login Password Properties
            Changing a Login Password
            Displaying Login Account Properties
            Assigning Login Profiles to a Login
            Deleting a Login
          Manage Groups
            Creating a Group
            Adding or Removing Users to or from a Group
            Group Properties
            Setting Command Permissions for a Group
            Granting Object Permissions to a Group
            Revoking Object Permissions from a Group
            Granting Privileges to a Group
            Revoking Privileges from a Group
            Deleting a Group
            Generate DDL for a Group
          Manage Users
            Creating a User
            Transferring Ownership of a Database Object
            Users Properties
            Granting Object Permissions to a User
            Revoking Object Permissions from a User
            Granting Privileges to a User
            Revoking Privileges from a User
            Setting Command Permissions for a User
            Deleting a User
          Manage Roles
            Expiring a Role Password
            Creating a Role
            Restoring System Roles
            Role Properties
            Revoking Object Permission from a Role
            Granting Object Permissions to a Role
            Revoking Privileges from a Role
            Granting Privileges to a Role
            Creating Role Hierarchy
            Managing Mutually Exclusive Roles
            Removing Login Profiles Assigned to a Role
            Assigning Login Profiles to a Role
            Removing Logins Assigned to a Role
            Assigning Logins to a Role
            Setting Command Permissions for a Role
        Segments
          Monitor Segments
            Determining the Space Used by a Table on a Segment
            Extending a Segment in SAP ASE
            Segment Statistics and Details
          Manage Segments
            Displaying Segments
            Creating a Segment
            Segment Properties
            Removing a Threshold from a Segment
            Adding a Threshold to a Segment
            Removing a Database Device from a Segment
            Adding a Database Device to a Segment
            Deleting a Segment
            Generating DDL for a Segment
        Statistics
          Interpreting Statistics
          Updating Statistics on a Table
          Updating Statistics on Specific Columns
          Updating Statistics on an Index
          Updating Statistics for a Data Partition
          Updating Statistics on an Index Partition
          Deleting Statistics from a Table
          Deleting Statistics from a Column
          Deleting Statistics from a Data Partition
        SQL Activity
          Monitoring SQL Queries
          Executing SQL Statements
        Tables
          Creating a User or Proxy Table
          Creating a Column
          Creating an Index
          Restoring Table Data
          Creating a Foreign Key
          Creating a Check Constraint
          Checking Table Consistency
          Binding Defaults and Rules to a Column
          Placing a Table on a Segment
          Setting the Table Locking Scheme
          Creating a Unique Constraint or Primary Key
          Manage Table Compression
            Identifying Table Compression Candidates
            Initiating a Compression Estimate
            Applying Compression Settings
          Manage Index Compression
            Setting Index Compression on an Index
            Setting Index Compression on a Local Index Partition
            Setting Index Compression on a Table
          Manage Triggers
            Creating a Trigger
            Trigger Properties
            Replacing a Trigger Definition
          Incrementally Transferring Data
            Enabling Incremental Transfer
            Incrementally Transferring Data In
            Incrementally Transferring Data Out
          Bulk Copying Data
            Bulk Copying Data Into or Out of Tables
          Setting Table or Column Permissions
            Granting Table Permissions
            Revoking Table Permissions
            Granting Column Permissions
            Revoking Column Permissions
          Manage Partitions
            Partition Locking
              Enabling Partition Locking
            Enabling Semantic-based Partitioning
            Using a Hash Partition
            Using a Range Partition
            Using a List Partition
            Using a Round-Robin Partition
            Splitting a Partition
            Merging Partitions
            Moving a Partition
            Deleting a Partition
          Reorganize Tables and Table Objects
            Reorganizing Tables at the Database Level
            Reorganizing Tables
            Reorganizing Table Partitions
            Reorganizing Indexes
            Reorganizing Index Partitions
            Status Messages
          Table Properties
          Column Properties
          Index Properties
          Foreign Key Properties
          Check Constraint Properties
          Partition Properties
          Deleting a Table
          Deleting an Index
        Thread Pools
          Monitor Threads
            Identifying the Threads in a Thread Pool
            Thread Statistics and Details
          Manage Thread Pools
            Creating a Thread Pool
            Thread Pool Properties
        Transactions
          Identifying a Transaction’s Process
          Transaction Statistics and Details
        User-Defined Datatypes
          Adding a User-Defined Datatype
          User-Defined Datatypes Properties
          Deleting a User-Defined Datatype
        Views
          Creating a View
          Replacing a View Definition
          View Properties
          Granting Permissions on Views
          Revoking Permissions on Views
          Deleting a View
    Troubleshoot SAP Control Center for SAP ASE
      Data Display Problems
        Cannot Monitor SAP ASE or Display Statistics Chart
        Data on Screens or Charts Is Missing
        Database Objects Are Not Updated
        Error: No Result Set for this Query
        Error: No Data Was Found For Statistic
        Error: Unable to Format the Date String
        Properties for Engine Groups Incorrectly Displayed
        Same Name Engine Groups Are Not Selectable
        "Number of Transactions" KPI Is Not Updated
        Cannot Find Error Information For Monitor View
        Display Large Number of Objects in Administration Console
      Data Collection and Alert Problems
        Collection Job for SAP ASE Fails
        Alerts Are Configured But Do Not Fire
        Data Collections Fail to Complete
        Alerts Are Not Generated
      Authentication and Access Problems
        Cannot Log In
        SAP Control Center Fails to Start
        Browser Refresh (F5) Causes Logout
        Invalid Connection Profile
        Cannot Authenticate Server Configured with a Multibyte Character Set
        Features Are Not Enabled Although You Have sa_role
        Resetting the Online Help
      Performance Problems
        SAP ASE is Responding Slowly
        Memory Warnings at Startup
        SCC Out of Memory Errors
        Performance Statistics Do Not Cover Enough Time
      Collect Diagnostic Data
        Preparing to Collect Diagnostic Data
        Collecting Field Diagnostic Data
        Collecting Optimizer Diagnostic Data
        Upload Diagnostic Data
          Uploading Diagnostic Data Via FTP
          Submitting Diagnostic Data via E-mail Message
        Deleting a Diagnostic Data File
    Glossary: SAP Control Center for SAP ASE
  Utility Guide SAP Adaptive Server Enterprise 16.0
    Types of Utilities
      Threaded Versions of Utilities
      Installation or Configuration Utilities
      Utilities for Languages, Character Sets, and Sort Orders
      Utilities to Start Servers
      Database Creation and Manipulation Utilities
      Utilities to Gather Information
      Tuning Utility
      Utility to Manage a Cluster
    Utility Commands Reference
      auditinit
      backupserver
      bcp
        Usage for bcp
          Copying Tables with Indexes or Triggers Using bcp
          Using bcp with Compressed Data
      buildmaster
      certauth
      certpk12
      certreg
      charset
      cobpre
      cpre
      dataserver
        Usage for dataserver
          Dependencies and Conditions of dataserver -b and -w Options
          Potential Issues of Using dataserver -f and -w Options Together
      ddlgen
        Usage for ddlgen
          Hiding Passwords in ddlgen
          ddlgen and Encryption
            ddlgen for Encrypted Columns
            Encrypted Columns and Specifying the -XOD Flag in ddlgen
            ddlgen Support for Key Copies
            EKC Encryption Key Copy Filter and ddlgen
          Create Table DDL
      defncopy
      dscp
      dsedit
      extractjava
      installjava
        Usage for installjava
          Cases When Adding New JARs Causes Exceptions
          Updating JARs and Classes
          Locks
      isql
        Usage for isql
          Interactive isql Commands
          isql Session Commands
          Prompt Labels and Double Wildcards in an isql Session
          Command History in isql
      langinstall
      optdiag
        Usage for optdiag
          Byte Ordering and Binary optdiag Files
          optdiag Input Mode
      preupgrade
        Usage for preupgrade
          The preupgrade -D Parameter
      pwdcrypt
      qptune
      qrmutil
      showserver
      sqldbgr
        Usage for sqldbgr
          Error Messages in sqldbgr
      sqlloc
      sqllocres
      sqlsrvr
        Usage for sqlsrvr
          Starting an SAP ASE Server
          startsrvr Dependencies and Conditions with -b and -w
      sqlupgrade
      sqlupgraderes
      srvbuild
        Usage for srvbuild
          Using LDAP with srvbuild in a 64-bit Environment
      srvbuildres
      startserver
        Usage for startserver
          The Runserver File
      sybatch
      sybcluster
      syconfig
      sybdiag
        Usage for sybdiag
          Viewing sybdiag Output
          Configuration Options for sybdiag
      sybdumptran
        Usage for sybdumptran
      sybmigrate
      sybrestore
      sybtsmpasswd
      updatease
      xpserver
    Using bcp to Transfer Data to and from SAP ASE
      Methods for Moving Data
        Import and Export Data with bcp
      bcp Modes
      bcp Requirements
        bcp Permissions
        Before You Transfer
      Copy Data to Partitions Using bcp
      Improve bcp Performance
        Fast, Fast-logged, and Slow bcp
          Slow bcp
          Fast bcp
          Fast-logged bcp
          Copying Tables with Indexes
            Locking Scheme and Fast bcp
          Space Requirements for Copying
        Summary of Steps for Fast and Fast-logged bcp
        Bulk Copying Data into Partitioned Tables
          Copying Data Randomly Into Partitions
          Monitoring bcp Sessions with dbcc checktable and sp_helpsegment
          Reducing Logging by Increasing Page Allocations
        Using Parallel Bulk Copy to Copy Data into a Specific Partition
          bcp in and Locks
          Parallel Bulk Copy Methods
          Parallel Bulk Copy Syntax
          Using Parallel Bulk Copy on Round-robin Partitioned Tables
          Parallel Bulk Copy and IDENTITY Columns
            Retaining Sort Order
            Specifying the Value of a Table’s IDENTITY Column
      Bulk Copying Encrypted Data
      bcp Options
        Using the Default Formats
          Native Format
          Character Format
        Change Terminators from the Command Line
      Change the Defaults in Interactive bcp
        Respond to bcp Prompts
        File Storage Type
        Prefix Length
        Field length
        Field and Row Terminators
          Choose Terminators
      Format Files
      Examples of Copying Out Data Interactively
      Examples of Copying In Data Interactively
      bcp and Alternate Languages
      Support for Initialization Strings
      bcp and Row-Level Access Rules
      Copy In and Batch Files
        Improve Recoverability
        Batches and Partitioned Tables
      Copy Out and Text and Image Data
      Specify a Network Packet Size
      Copy In and Error Files
      Copy Out and Error Files
      Data Integrity for Defaults, Rules, and Triggers
      How bcp Differs from Other Utilities
    Using dataserver Build Servers
      Building a New Master Device
        Environments When Using dataserver
        Specifying Device and Logical Page Sizes When Building a New SAP ASE Server
        Starting an Existing a SAP ASE Server
        Upgrading to a Server With Larger Page Sizes
        Viewing the Current Server Limits
    Using dscp to View and Edit Server Entries
      Starting dscp
        Working with Server Entries
          Adding and Modifying Server Entries
            Adding a Server Entry
            Modifying or Deleting a Server Entry
          Copy Server Entries
          List and View Contents of Server Entries
          Delete Server Entries
        Exiting dscp
    Using dsedit to View and Edit Server Entries
      Add, View, and Edit Server Entries
      Using dsedit in UNIX
        Starting dsedit in UNIX
        Open an Editing Session in UNIX
        Modify Server Entries in UNIX
          Adding a New Server Entry in UNIX
          Viewing or Modifying a Server Entry in UNIX
          Add or Edit Network Transport Addresses
            TCP/IP Addresses
            SPX/IPX Addresses
        Copying a Server Entry to Another Interfaces File in UNIX
        Copying Server Entries Within the Current Session
        Copying Server Entries Between Sessions
      Using dsedit in Windows
        Starting dsedit in Windows
        Open an Editing Session in Windows
          Opening a Session in Windows
          Opening Additional Sessions in Windows
          Switching Between Sessions in Windows
        Modify Server Entries in Windows
          Adding a Server Entry
          Modifying a Server Attribute
          Renaming a Server Entry
          Deleting a Server Entry
        Copying Server Entries Within the Current Session in Windows
        Copying Server Entries Between Sessions in Windows
      Troubleshooting dsedit
    Using Interactive isql from the Command Line
      Starting isql
      Stopping isql
      Using Transact-SQL in isql
        Formatting isql Output
        Correcting isql Input
        set Options that Affect Output
      Changing the Command Terminator
      Performance Statistics Interaction with Command Terminator Values
      Input and Output Files
        UNIX command line redirection
    Using Interactive SQL in Graphics Mode
      Starting Interactive SQL
      The Main Interactive SQL Window
        Plan Dialog Tab
      The Interactive SQL Toolbar
      Open Multiple Windows
      Keyboard Shortcuts
      Display Data Using Interactive SQL
      Edit Table Values in Interactive SQL
        Copying Rows from the Interactive SQL Result Set
        Editing Rows from the Interactive SQL Result Set
        Inserting Rows into the Database from the Interactive SQL Result Set
        Deleting Rows from the Database Using Interactive SQL
      SQL Statements in Interactive SQL
        Canceling an Interactive SQL Command
        Combining Multiple Statements
        Looking Up Tables, Columns, and Procedures
        Recall Commands
        Logging Commands
      Configure Interactive SQL
        General Dialog Box
        Result Dialog Box
        Import/Export Dialog Box
        Messages Dialog Tab
        Editor Dialog Box
        Query Editor Dialog Box
      Processing Command Files
        Saving SQL Statements to a File
        Executing Command Files
        Saving, Loading, and Running Command Files
      The SQL Escape Syntax in Interactive SQL
      Interactive SQL Commands
    Interactive sybcluster Commands Reference
      Commands Active Before Connecting to a Cluster
      Commands Active After Connecting to a Cluster
      add backupserver
      add instance
      connect
      create backupserver
      create cluster
      create xpserver
      deploy plugin
      diagnose cluster
      diagnose instance
      disconnect
      drop backupserver
      drop cluster
      drop instance
      drop xpserver
      exit
      help
      localize
      quit
      set backupserver
      set cluster
      set instance
      set xpserver port
      show agents
      show backupserver config
      show cluster
      show instance
      show membership mode
      show session
      show xpserver
      shutdown cluster
      shutdown instance
      start cluster
      start instance
      upgrade server
      use
    Using sybmigrate to Migrate Data
      What sybmigrate Does
      What sybmigrate Does Not Do
      Before You Begin
        Permissions
          Changing Target Login Accounts
        Platforms
        Environment Settings
        Migrating Proxy Tables
      Migration process
        Overview of the Migration Process
        Pre-migration Considerations
        Configuration and Tuning for Higher Performance
          Configuration Considerations for SAP ASE
        Possible Errors to Avoid
        Auto-select Dependent Objects for Migration
        Migrating an Archive Database
          Upgrading an SAP ASE Server with an Archive Database
          Downgrading an SAP ASE Server with an Archive Database
        GUI Mode
          Setting Up Source Databases for Migration
          Begin the Migration
          Validating the Migration
          Migration and Validation Progress
        Resource File Mode
      Using sybmigrate with Encrypted Columns
      Post-migration Activities
      Migrate Databases in the Replication Server Domain
        Preparing for Migration
        Postmigration Procedures
          Restoring Primary Databases
          Restoring the RSSD
          Amending System Tables When the Logical Page Size Changes
          Restoring Replicate Databases
          Logs
        Migrating Databases That Support Wide Data
      Limitations
        Stopping High Availability
        Other Limitations
      Troubleshooting and Error Messages
    Using sybrestore to Restore Databases
      Before You Begin
      sybrestore Checks
        Compatibility Geometry Check
      sybrestore Syntax
      Restoring a Database in Noninteractive Mode
      Restoring a Database in Interactive Mode
        Interactive Menu Options
        Logging sybrestore Output
        Providing a Mapping Directory
        Restoring a Database to a Point In Time
          Example of Restoring a Database to a Point In Time
        Restoring User and System Databases
        Master Database Restore
          Prerequisites for Restoring a Master Database
          Configuration and Resource Files
            Creating or Editing the Restore Utility Configuration File
            Creating or Editing Resource Files
            Resource File Examples
          Restoring a Master Database
  Transact-SQL Users Guide 16.0
    SQL Building Blocks
      Tables, Columns, and Rows
      Queries, Data Modification, and Commands
      Relational Operations
      Compiled Objects
        Save or Restore Source Text
        Verify and Encrypt Source Text
        Replacing Object Definitions
      Compliance to ANSI Standards
        Federal Information Processing Standards (FIPS) Flagger
        Chained Transactions and Isolation Levels
        Identifier Compliance to ANSI Standards
        SQL Standard-Style Comments
        Right Truncation of Character Strings
        Permissions Required for update and delete Statements
        Arithmetic Errors
        Synonymous Keywords
        Treatment of Nulls
      Data and Language Characters
        Naming Convention Identifiers
          Multibyte Character Sets
          Delimited Identifiers
          Uniqueness and Qualification Conventions
          Remote Servers
      Expressions in SAP ASE
        Arithmetic Operators
        Bitwise Operators
        The String Concatenation Operator
        The Comparison Operators
        Nonstandard Operators
        Character Expression Comparisons
        Empty Strings
        Quotation Marks
        Relational and Logical Expressions
      Transact-SQL Extensions
        compute Clause
        Control-of-Flow Language
        Stored Procedures
        Extended Stored Procedures
        Triggers
        Defaults and Rules
        Error Handling and set Options
        Additional SAP ASE Extensions to SQL
      SAP ASE Login Accounts
      isql Utility
        Default Databases
        Network-Based Security Services with isql
      Displaying SQL Text
    Databases and Tables
      Databases
      Create a User Database
        The on Clause
        The log on Clause
        for load Option
      Choose a Database
      Permissions Within Databases
      Initialize Databases Asynchronously
        Determine If There is Space to be Initialized
        Restrictions for Initializing Databases Asynchronously
      Drop Databases
      Change the Database Size
      Enforce Data Integrity in Databases
      quiesce database Command
      Tables
      Designing and Creating a Table
        Table Names
        Create the User-Defined Datatypes
        Choose Columns That Accept Null Values
        Sample Table Design Sketch
          Define the Sample Table
      Create Tables in Different Databases
      Create New Tables from Query Results: select into
        Check for Errors
      Temporary Tables Usage
        Unique Temporary Table Names
        Manipulate Temporary Tables in Stored Procedures
        General Rules for Temporary Tables
      Deferred Table Creation
        Deferred Table Creation at the Database Level
        Create Deferred Tables
        Explicitly Materialize Deferred Tables
        Identify Deferred Tables
        Roll Back for Deferred Tables
        Command Behavior in Deferred Tables
      IDENTITY Columns Usage
        Create IDENTITY Columns with User-Defined Datatypes
        Reference IDENTITY Columns
        Refer to IDENTITY Columns with syb_identity
        Automatically Create ā€œhiddenā€ IDENTITY Columns
        Using select into with IDENTITY Columns
          Select an IDENTITY Column into a New Table
          Select the IDENTITY Column More Than Once
          Add a New IDENTITY Column with select into
          Define a Column for Which the Value Must Be Computed
          IDENTITY Columns Selected into Tables with Unions or Joins
      Allow Null Values in a Column
        Constraints and Rules Used with Null Values
        Defaults and Null Values
        Nulls Require Variable-Length Datatypes
        text, unitext, and image Columns
      Alter Existing Tables
        Objects Using select * Do Not List Changes to Table
        Use alter table on Remote Tables
        Add Columns
          Add Columns Appends Column IDs
          Add NOT NULL Columns
          Add Constraints
        Drop Columns
          Drop Columns Renumbers the Column ID
          Drop Columns Without Performing a Data Copy
            Restrictions for no datacopy Parameter
          Drop Constraints
        Modify Columns
          Convert Datatypes
          Modifying Tables and Using Bulk Copy
          Decreased Column Length May Truncate Data
          Modify datetime Columns
          Modify the NULL Default Value of a Column
          Check Columns That Have Precision or Scale
          Modify text, unitext, and image Columns
        Add IDENTITY Columns
        Drop IDENTITY Columns
        Modify IDENTITY Columns
        Data Copying
          Change exp_row_size
        Modifying Locking Schemes and Table Schema
        Add, Drop, or Modify Columns with User-Defined Datatypes
        Errors and Warnings from alter table
          Errors and Warnings Generated by alter table modify
          Scripts Generated by if exists()...alter table
        Rename Tables and Other Objects
          Rename Dependent Objects
      Drop Tables
      Manage Identity Gaps in Tables
        Parameters for Controlling Identity Gaps
        Comparison of identity burning set factor and identity_gap
        Set the Table-Specific Identity Gap
        Change the Table-Specific Identity Gap
        Display Table-Specific Identity Gap Information
        Gaps from Other Causes
        IDENTITY Column Maximum Value
      Define Integrity Constraints for Tables
        Table and Column Level Constraints
        Create Error Messages for Constraints
        Check Constraints
        Default Column Values
        unique and primary key Constraints
        Referential Integrity Constraints
          Table and Column Level Referential Integrity Constraints
          Using Create Schema for Cross-Referencing Constraints
          General Rules for Creating Referential Integrity Constraints
          Designing Applications That Use Referential Integrity
      Computed Columns
        Computed Columns Usage
          Computed Columns Example
        Indexes on Computed Columns
        Deterministic Property
          Effects of Deterministic Property on Computed Columns
          Effects of Deterministic Property on Materialized Computed Columns
          Effects of Deterministic Property on Virtual Computed Columns
          Effects of Deterministic Property on Function-Based Indexes
          Examples of Nondeterministic Computed Columns
      Retrieve Information About Databases and Tables
        Help on Databases
        Help on Database Objects
          sp_help Usage on Database Objects
          Use sp_helpconstraint to Find Table Constraint Information
          Determining Much Space a Table Uses
          List Tables, Columns, and Datatypes
          Find an Object Name and ID
    SQL-Derived Tables
      SQL-Derived Tables and Optimization
      SQL-Derived Table Syntax
        Derived Column Lists
        Correlated SQL-Derived Tables Are Not Supported
      SQL-Derived Tables Usage
        Nesting
        Subqueries Using SQL-Derived Tables
        Unions in Derived-Table Expressions
        Unions in Subqueries
        Rename Columns with SQL-Derived Tables
        Constant Expressions
        Aggregate Functions
        Joins with SQL-Derived Tables
        Create a Table From a SQL-Derived Table
        Views with SQL-Derived Tables
        Correlated Attributes
    Partition Tables and Indexes
      Partitioning Types
        Range Partitioning
        Hash Partitioning
        List Partitioning
        Round-Robin Partitioning
      Partition Pruning
      Composite Partitioning Keys
      Indexes and Partitions
        Global Indexes
        Local Indexes
        Guarantee a Unique Index
      Create and Manage Partitions
        Partitioning Tasks
        Create a Range-Partitioned Table
          Restrictions on Partition Keys and Bound Values for Range-Partitioned Tables
        Create a Hash-Partitioned Table
        Create a List-Partitioned Table
        Create a Round-Robin–Partitioned Table
        Create Partitioned Indexes
        Create a Partitioned Table From an Existing Table
      Change Data Partitions
        Split, Merge, and Move Partitions
          Partition Schemes Available for Splitting or Merging
          Split Partitions
          Merge Partitions
          Move Partitions
          Effect of Split or Merged Partitions on Indexes
        Add Partitions to a Partitioned Table
        Change the Partitioning Type or Key
        Unpartition Round-Robin–Partitioned Tables
        partition Parameter Usage
        Change Partition-Key Columns
      Configure Partitions
      update, delete, and insert in Partitioned Tables
      Update Values in Partition-Key Columns
      Display Information About Partitions
        Function Usage
      Truncate a Partition
      Using Partitions to Load Table Data
      Update Partition Statistics
      Improved Concurrency for Partition-Level Online Operations
        Partition-Level Online Operation Syntax
        Concurrency with Partition-Level Online Operations
        Partition-Level Online Operations with Global Index
    Virtually Hashed Tables
      Structure of a Virtually Hashed Table
      Create a Virtually Hashed Table
      Limitations for Virtually Hashed Tables
      Commands that Support Virtually Hashed Tables
      Query Processor Support
      Monitor Counter Support
      System Procedure Support
    Create Indexes on Tables
      Guidelines for Using Indexes
      Methods of Creating Indexes
      Create Indexes
        Issue create index in Parallel
          Configuring enhanced parallel create index
          Enhanced Parallel create index Usage
          View Parallel create index Commands with showplan
        Function-Based Indexes
        Create Indexes Without Blocking Access to Data
        Unique Indexes
        IDENTITY Columns in Nonunique Indexes
        Ascending and Descending Index-Column Values
        Using fillfactor, max_rows_per_page, and reservepagegap
      Indexes on Computed Columns
      Clustered or Nonclustered Index Usage
        Create Clustered Indexes on Segments
      Index Options
        ignore_dup_key Option
        ignore_dup_row and allow_dup_row
        sorted_data Option
        on segment_name Option
      Drop Indexes
      Identifying the Indexes on a Table
      Update Statistics for Indexes
    Datatypes
      System-Supplied Datatypes
        Exact Numeric Types: Integers
        Exact Numeric Types: Decimal Numbers
        Approximate Numeric Datatypes
        Money Datatypes
        Date and Time Datatypes
        Character Datatypes
          unichar Datatype
            Relational Expressions
            Join Operators
            Union Operators
            Clauses and Modifiers
          text Datatype
          unitext Datatype
        Binary Datatypes
          image Datatype
        bit Datatype
        timestamp Datatype
        sysname and longsysname Datatype
      LOB Locators in Transact-SQL Statements
        Implicitly Create a Locator
        Explicitly Create a Locator
        Convert the Locator Value to the LOB Value
        Locator Scope
      Convert Between Datatypes
      Mixed-Mode Arithmetic and Datatype Hierarchy
        Working with money Datatypes
        Determine Precision and Scale
      User-Defined Datatypes
        Length, Precision, and Scale
        Null Type
        Associate Rules and Defaults with User-Defined Datatypes
        Create User-Defined Datatype with IDENTITY Property
        Create IDENTITY Columns from User-Defined Datatypes
        Drop a User-Defined Datatype
      Datatype Entry Rules
        char, nchar, unichar, univarchar, varchar, nvarchar, unitext, and text
        Date and Time
          Enter Times
          Enter Dates
            Date Formats
          Search Dates and Times
        binary, varbinary, and image
        money and smallmoney
        float, real, and double precision
        decimal and numeric
        Integer Types and Their Unsigned Counterparts
        timestamp
      Get Information About Datatypes
    Queries: Selecting Data from a Table
      select Syntax
        Check for Identifiers in a select Statement
      Choose Columns Using the select Clause
        Choose all Columns Using select *
        Choose Specific Columns
        Rearrange the Column Order
        Rename Columns in Query Results
        Expressions
          Quoted Strings in Column Headings
          Character Strings in Query Results
          Computed Values in the select List
          Arithmetic Operator Precedence
        Select Text, Unitext, and Image Values
          readtext Usage
        select List Summary
      select for update
        Use select for update in Cursors and DML
        Concurrency Issues
      Eliminate Duplicate Query Results with Distinct
      Specify Tables with the from Clause
      Select Rows Using the where Clause
        Comparison Operators in where Clauses
        Ranges (between and not between)
        Lists (in and not in)
        Matching Character Strings: like
          not like Usage
          Different Results Using not like and ^
          Use Wildcard Characters as Literal Characters
          Interaction of Wildcard Characters and Square Brackets
          Use Trailing Blanks and %
          Use Wildcard Characters in Columns
        ā€œUnknownā€ Values: NULL
          SQL Standard for NULL Concatenation
          Test a Column for Null Values
          Difference Between False and Unknown
          Substitute a Value for NULLs
          Expressions that Evaluate to NULL
          Concatenate Strings and NULL
          System-Generated NULLs
        Connect Conditions with Logical Operators
          Logical Operator Precedence
      Multiple select Items in a Nested exists Query
      Use a Column Alias in Nested select Statements
    Subqueries: Queries Within Other Queries
      Subquery Restrictions
      Qualify Column Names
      Subqueries with Correlation Names
      Multiple Levels of Nesting
      Using an Asterisk in Nested select Statements
        Use Table-Name Qualifiers
        Use Nested Queries with group by
        Usage and Examples of Asterisks in select Statements
      Subqueries in update, delete, and insert Statements
      Subqueries in Conditional Statements
      Subqueries Instead of Expressions
      Types of Subqueries
        Expression Subqueries
          Use Scalar Aggregate Functions to Guarantee a Single Value
          Use group by and having in Expression Subqueries
          Use distinct with Expression Subqueries
        Quantified Predicate Subqueries
          Subqueries with any and all
            > all Means Greater Than All Values
            = all Means Equal to Every Value
            > any Means Greater Than at Least One Value
            = any Means Equal to Some Value
        Subqueries Used with in
        Subqueries Used with not in
        Subqueries Using not in with NULL
        Subqueries Used with exists
        Subqueries Used with not exists
        Find Intersection and Difference with exists
        Subqueries Using SQL Derived Tables
      Correlated Subqueries
        Correlated Subqueries with Correlation Names
        Correlated Subqueries with Comparison Operators
        Correlated Subqueries in a having Clause
    Aggregates, Grouping, and Sorting
      Aggregate Functions and Datatypes
      count versus count (*)
      Aggregate Functions with distinct
      Null Values and the Aggregate Functions
      Using Statistical Aggregates
      Organize Query Results into Groups: the group by Clause
        group by and SQL Standards
        Nest Groups with group by
        Reference Other Columns in Queries Using group by
        Expressions and group by
        group by in Nested Aggregates
        Null Values and group by
        where Clause and group by
        group by and all
        Aggregates Without group by
      Select Groups of Data: the having Clause
        Interactions between having, group by, and where Clauses
        having Without group by
      Sort Query Results: the order by Clause
        order by and group by
        order by and group by Used with select distinct
      Summarize Groups of Data: the compute Clause
        Row Aggregates and compute
          Rules for compute Clauses
        Specify More Than One Column After compute
        Use More Than One compute Clause
        Apply an Aggregate to More Than One Column
        Use Different Aggregates in the Aame compute Clause
        Generate Totals: compute Without by
      Combine Queries: the union Operator
        Guidelines for union Queries
    Joins: Retrieve Data from Several Tables
      Join Syntax
      Joins and the Relational Model
      How Joins are Structured
        The from Clause
        The where Clause
          Join Operators
          Datatypes in Join Columns
          Joins and Text and Image Columns
      How Joins are Processed
      Equijoins and Natural Joins
      Joins with Additional Conditions
      Joins Not Based on Equality
      Self-Joins and Correlation Names
      The Not-Equal Join
        Not-Equal Joins and Subqueries
      Join More Than Two Tables
      Star Joins
      Outer Joins
        Inner and Outer Tables
        Outer Join Restrictions
        Views Used with Outer Joins
        ANSI Inner and Outer Joins
          Correlation Name and Column Referencing Rules for ANSI Joins
          ANSI Inner Joins
            The Join Table of an Inner Join
            The on Clause of an ANSI Inner Join
        ANSI outer joins
          Placement of the Predicate in the on or where Clause
          Nested ANSI Outer Joins
        Transact-SQL Outer Joins
          Outer Joins and Aggregate Extended Columns
      Relocated Joins
        Configuring Relocated Joins
      How Null Values Affect Joins
      Determine Which Table Columns to Join
    Managing Data
      Referential Integrity
      Transactions
      Sample Databases
      Add New Data
        Add New Rows with Values
        Insert Data into Specific Columns
          Restrict Column Data: Rules
          The NULL Character String
          Insert NULLs into Columns That Do Not Allow Them
          Add Rows Without Values in All Columns
          Change a Column’s Value to NULL
          SAP ASE-generated values for IDENTITY columns
          Explicitly Insert Data into an IDENTITY Column
          Retrieve IDENTITY Column Values with @@identity
          Reserve a Block of IDENTITY Column Values
          Maximum Value of the IDENTITY Column
            Modify the Maximum Value of the IDENTITY Column
            Creating a New Table with a Larger Precision
            Renumbering the Table IDENTITY Columns with bcp
        Add New Rows with select
          Use Computed Columns
          Insert Data into Some Columns
          Insert Data from the Same Table
      Create Nonmaterialized, Non-Null Columns
        Add Nonmaterialized Columns
        Tables That Already Have Nonmaterialized Columns
        Nonmaterialized Column Storage
        Alter Nonmaterialized Columns
        Limitations for Nonmaterialized Columns
      Change Existing Data
        Use the set Clause with Update
          Assign Variables in the set Clause
        Use the where Clause with update
        Use the from Clause with update
        Perform updates with joins
        Update IDENTITY Columns
      Change text, unitext, and image data
      Truncate Trailing Zeros
      Transfer Data Incrementally
        Mark Tables for Incremental Transfer
        Transfer Tables from a Destination File
        Convert SAP ASE Datatypes to SAP IQ
        Store Transfer Information
        Exceptions and Errors
        Sample Incremental Transfer
          Replacing Data with New Rows
      Delete Data
        Use the from Clause with delete
        Delete from IDENTITY Columns
      Delete All Rows from a Table
        truncate table Syntax
    Views: Limit Access to Data
      Advantages of Views
      Security
      Logical Data Independence
      Create Views
        create view Syntax
        select Statement Usage with create view
          View Definition with Projection
          View Definition with a Computed Column
          View Definition with an Aggregate or Built-In Function
          View Definition with a Join
          Views Used with Outer Joins
          Views Derived From Other Views
          Distinct Views
          Views That Include IDENTITY Columns
        Validate a View’s Selection Criteria
          Views Derived from Other Views
      Retrieve Data Through Views
        View Resolution
        Redefine Views
        Rename Views
        Alter or Drop Underlying Objects
      Modify Data Through Views
        Restrictions on Updating Views
      Drop Views
      Use Views as Security Mechanisms
      Get Information About Views
    Defining Defaults and Rules for Data
      Create Defaults
        Bind Defaults
        Unbind Defaults
        How Defaults Affect NULL Values
      Drop Defaults
      Create Rules
        Bind Rules
          Rules Bound to Columns
          Rules Bound to User-Defined Datatypes
          Precedence of Rules
        Rules and NULL Values
        Unbind Rules
      Drop Rules
      Retrieve Information About Defaults and Rules
      Share Inline Defaults
        Create an Inline Shared Default
        Unbind a Shared Inline Default
        Limitations for Shared Inline Defaults
    Precomputed Result Sets
      Benefits of Precomputed Result Sets
      Configuring SAP ASE for Precomputed Result Sets
      Creating Precomputed Result Sets
      Identifying Precomputed Result Sets
      Refreshing Precomputed Result Sets
      Altering Precomputed Result Sets
      Dropping or Truncating Precomputed Result Sets
      Configuring Staleness
      Querying Precomputed Result Sets
      Rewriting Queries
      Replicating Precomputed Result Sets
      Restrictions for Precomputed Result Sets
    Batches and Control-of-Flow Language
      Rules Associated with Batches
        Examples of Using Batches
        Batches Submitted as Files
      Control-of-Flow Language Usage
        if...else
        case Expression
          case Expression for Alternative Representation
          case and Division by Zero
          rand Functions in case Expressions
          case Expression Results
          case Expressions and set ansinull
          case Expression Requires at Least one Non-Null Result
          Determining the Result Set
          case and Value Comparisons
          coalesce
          nullif
        begin...end
        while and break...continue
        declare and Local Variables
        goto
        return
        print
        raiserror
        Create Messages for print and raiserror
        waitfor
        Comments
          Slash-Asterisk Style Comments
          Double-Hyphen Style Comments
      Local Variables
        Local Variables and select Statements
        Local Variables and update Statements
        Local Variables and Subqueries
        Local Variables and while Loops and if…else Blocks
        Variables and Null Values
      Global Variables
        Transactions and Global Variables
          Check for Errors with @@error
          Check IDENTITY Values with @@identity
          Check the Transaction Nesting Level with @@trancount
          Check the Transaction State with @@transtate
          Check the Nesting Level with @@nestlevel
          Check the Status From the Last Fetch
    Transact-SQL Functions
      Built-In Functions
        System Functions
        String Functions
          Concatenating Expressions
            Concatenation Operators and LOB Locators
          Nest String Functions
          Limits on String Functions
        Text and Image Functions
          readtext on unitext Columns Usage
        Aggregate Functions
          Aggregate Functions Used with the group by Clause
          Aggregate Functions and Null Values
          Vector and Scalar Aggregates
          Aggregate Functions as Row Aggregates
        Statistical Aggregate Functions
          Formulas for Computing Standard Deviations
        Mathematical Functions
        Date Functions
        Datatype Conversion Functions
          convert Function Usage for Explicit Conversions
          Datatype Conversion Guidelines and Constraints
            Convert Character Data to a Noncharacter Type
            Convert from One Character Type to Another
            Convert Numbers to a Character Type
            Convert to or from unitext
            Rounding During Conversion To and From Money Types
            Convert Date and Time Information
            Convert Between Numeric Types
            Convert Between Binary and Integer Types
            Convert Between Binary and Numeric or Decimal Types
            Convert Image Columns to Binary Types
            Convert Other Types to bit
            Convert Hexadecimal Data
            Convert bigtime and bigdatetime Data
            Convert NULL Value
          Change the Date Format
          Conversion Error Handling
        Security Functions
        XML Functions
      User-Created Functions
    Stored Procedures
      Examples
      Permissions
      Performance
      Create and Execute Stored Procedures
        Deferred Name Resolution Usage
        Parameters
        Default Parameters
          Default Parameters Usage
          NULL as the Default Parameter
          Wildcard Characters in the Default Parameter
        Using Multiple Parameters
        LOB Datatypes in Stored Procedures
        Procedure Groups
        with recompile in create procedure
        with recompile in execute
        Nesting Procedures
        Temporary Tables in Stored Procedures
        Set Options in Stored Procedures
          Query Optimization Settings
          Maximum Number of Arguments
          Maximum Size for Expressions, Variables, and Arguments
        Execution of Stored Procedures
          Execute Procedures After a Time Delay
          Execute Procedures Remotely
          Execute a Procedure with execute as owner or execute as caller
            Example with execute as Omitted
            Example of Procedure with execute as
      Deferred Compilation in Stored Procedures
      Information Returned From Stored Procedures
        Return Status
          Reserved Return Status Values
          User-Generated Return Values
        Check Roles in Procedures
        Return Parameters
          Pass Values in Parameters
          The Output Keyword
      Restrictions Associated with Stored Procedures
        Qualify Names Inside Procedures
      Rename Stored Procedures
        Rename Objects Referenced by Procedures
      Stored Procedures as Security Mechanisms
      Dropping Stored Procedures
      System Procedures
        Execute System Procedures
        Permissions on System Procedures
        Types of System Procedures
        Other SAP ASE-Supplied Stored Procedures
      Get Information About Stored Procedures
        Get a Report with sp_help
        View the Source Text of a Procedure with sp_helptext
        Identify Dependent Objects with sp_depends
          Use sp_depends with deferred_name_resolution
        Identify Permissions with sp_helprotect
    Extended Stored Procedures Usage
      XP Server
        CIS RPC Mechanism
        sybesp_dll_version
      Dynamic Link Library Support
      Open Server API
      ESPs and Permissions
      ESPs and Performance
      Create Functions for ESPs
        Files for ESP Development
        Open Server Data Structures
        Open Server Return Codes
        Outline of a Simple ESP Function
        ESP Function Example
        Building the DLL
      Registering ESPs
        create procedure Usage
        sp_addextendedproc Usage
      Remove ESPs
        Renaming ESPs
      Execute ESPs
      System ESPs
      Get Information About ESPs
      ESP Exceptions and Messages
    Cursors: Accessing Data
      Types of Cursors
      Cursor Scope
      Cursor Scans and the Cursor Result Set
      Make Cursors Updatable
        Determine Which Columns Can Be Updated
      How SAP ASE Processes Cursors
      Monitor Cursor Statements
      declare cursor
        cursor_scrollability
        Cursor Sensitivity
        read_only Option
      Open Cursors
      Fetch Data Rows Using Cursors
        fetch Syntax
        into Clause Usage
        Check Cursor Status
        Get Multiple Rows With Each Fetch
        Check the Number of Rows Fetched
      Update and Delete Rows Using Cursors
        Update Cursor Result Set Rows
        Delete Cursor Result Set Rows
      Close and Deallocate Cursors
      Cursor Examples
      Cursors in Stored Procedures
      Cursors and Locking
        Cursor-Locking Options
      Transaction Support for Updatable Cursors
      Get Information About Cursors
      Browse Mode Versus Cursors
    Triggers: Enforce Referential Integrity
      Use Triggers Versus Integrity Constraints
      Create Triggers
        create trigger Syntax
      Use Triggers to Maintain Referential Integrity
        Test Data Modifications Against the Trigger Test Tables
        Insert Trigger Example
        Delete Trigger Examples
        Update Trigger Examples
      Multirow Considerations
        Insert Trigger Example Using Multiple Rows
        Delete Trigger Example Using Multiple Rows
        Update Trigger Example Using Multiple Rows
        Conditional Insert Trigger Example Using Multiple Rows
      Roll Back Triggers
      Global Login Triggers
      Nesting Triggers
        Trigger Self-Recursion
      Rules Associated with Triggers
        Triggers and Permissions
        Trigger Restrictions
        Implicit and Explicit Null Values
        Triggers and Performance
        set Commands in Triggers
        Renaming and triggers
      Disable Triggers
      Drop Triggers
      Multiple Triggers
        Changing the Order of When a Trigger Is Fired
        Order of Triggers in Merge Statements
        Transactional Behavior with Multiple Triggers
        Disabling and Reenabling Triggers
      Get Information About Triggers
        sp_help
        sp_helptext
        sp_depends
      instead of Triggers
        Inserted and Deleted Logical Tables
        Triggers and Transactions
        Nesting
        Recursion
        instead of insert Triggers
        instead of update Trigger
        instead of delete Trigger
        Searched and Positioned update and delete
        Get Information About instead of Triggers
    In-Row Off-Row LOB
      In-Row LOB Columns Compression
      Migrate Off-Row LOB Data to In-Row Storage
        In-Row LOB Columns and Bulk Copy
        Methods for Migrating Existing Data
          Set Up the mymsgs Example Table
          Migrate Using Update Statement
          Use reorg rebuild
          Migrate Using alter table with Data Copy
        Guidelines for Selecting the In-Row LOB Length
        Identifying In-Row LOB Length Selection
      Downgrading Tables Containing In-Row LOB Columns
    Transactions: Maintain Data Consistency and Recovery
      Transactions and Consistency
      Transactions and Recovery
      Transaction Usage
        Allow Data Definition Commands in Transactions
        System Procedures That Are Not Allowed in Transactions
        Begin and Commit Transactions
        Roll Back and Save Transactions
        Transaction States
        Nested Transactions
        Example of a Transaction
      Transaction Mode and Isolation Level
        Choose a Transaction Mode
          Transaction Modes and Nested Transactions
          Find the Status of the Current Transaction Mode
        Choose an Isolation Level
          Default Isolation Levels for SAP ASE and ANSI SQL
          Dirty Reads
          Repeatable Reads
          Find the Status of the Current Isolation Level
          Change the Isolation Level for a Query
          Isolation Level Precedences
          Cursors and Isolation Levels
          Stored Procedures and Isolation Levels
          Triggers and Isolation Levels
        Compliance with SQL Standards
        Use the Lock Table Command to Improve Performance
      Transactions in Stored Procedures and Triggers
        Errors and Transaction Rollbacks
        Transaction Modes and Stored Procedures
          Run System Procedures in Chained Mode
          Set Transaction Modes for Stored Procedures
      Use Cursors in Transactions
      Issues to Consider When Using Transactions
      Backup and Recovery of Transactions
    Locking Commands and Options
      wait/nowait Option of the Lock Table Command
      Session-Level Lock-Wait Limit
      Server-Wide Lock-Wait Limit
      Information on the Number of Lock-Wait Timeouts
      Readpast Locking for Queue Processing
        Incompatible Locks During readpast Queries
        Allpages-Locked Tables and readpast Queries
        Effects of Isolation Levels Select Queries with readpast
        Data Modification Commands with readpast and Isolation Levels
        text, unitext, and image columns and readpast
    The pubs2 Database
      Tables in the pubs2 Database
        publishers Table
        authors Table
        titles Table
        titleauthor Table
        salesdetail Table
        sales Table
        stores Table
        roysched Table
        discounts Table
        blurbs Table
        au_pix Table
      Diagram of the pubs2 Database
    The pubs3 Database
      Tables in the pubs3 Database
        publishers Table
        authors Table
        titles Table
        titleauthor Table
        salesdetail Table
        sales Table
        stores Table
        store_employees Table
        roysched Table
        discounts Table
        blurbs Table
      Diagram of the pubs3 Database
  System Administration Guide 16.0: Volume 1
    Overview of System Administration
      Roles Required for System Administration Tasks
        Database Owner
        Database Object Owner
      Performing System Administration Tasks
      System Tables
        Querying the System Tables
        Keys in System Tables
        Updating System Tables
      System Procedures
        Using System Procedures
        System Procedure Tables
        Creating Stored Procedures
      System Extended Stored Procedures
        Creating System ESPs
      Logging Error Messages
      Connecting to SAP ASE
        The interfaces File
        Directory Services
        LDAP as a Directory Service
          Multiple Directory Services
          LDAP Directory Services Versus the SAP Interfaces File
            LDAP Performance
      Security Features Available in SAP ASE
    System and Optional Databases
      Overview of System Databases
      The master Database
        Controlling Object Creation in the master Database
        Backing Up Master and Keeping Copies of System Tables
      model Database
      sybsystemprocs Database
      tempdb database
        Creating Temporary Tables
      sybsecurity Database
      sybsystemdb Database
      sybmgmtdb Database
      pubs2 and pubs3 Sample Databases
        Maintaining the Sample Databases
        pubs2 Image Data
      dbccdb Database
      sybdiag Database
      Determining the Version of the Installation Scripts
    System Administration for Beginners
      Logical Page Sizes
      Using ā€œTestā€ Servers
        Planning Resources
        Achieving Performance Goals
      Considerations When Installing SAP Products
      Allocating Physical Resources
        Dedicated Versus Shared Servers
        Decision-Support and OLTP Applications
        Advance Resource Planning
        Operating System Configuration
      Backup and Recovery
        Keep Up-To-Date Backups of the master Database
          Keep Offline Copies of System Tables
        Automating Backup Procedures
        Verify Data Consistency Before Backing Up a Database
        Monitor the Log Size
      Ongoing Maintenance and Troubleshooting
        Starting and Stopping SAP ASE
        Viewing and Pruning the Error Log
      Keeping Records
        Contact Information
        Configuration Information
        Maintenance Schedules
        System Information
        Disaster Recovery Plan
      Additional Resources
    Managing and Monitoring SAP ASE
      SAP Control Center for SAP ASE
      Configuration History Tracking
        Configuring SAP ASE to Track Configuration Changes
        Changes Captured
        Querying ch_events
    Setting Configuration Parameters
      Modifying Configuration Parameters
      Required Roles for Modifying Configuration Parameters
      Unit Specification Using sp_configure
      Global Versus Session Settings
      Getting Help Information on Configuration Parameters
      Using sp_configure
        sp_configure Syntax Elements
        Issue sp_configure with the Configuration File
          Configuration File Naming Recommendations
          Read or Write the Configuration File with sp_configure
          Edit the Configuration File
            Permissions for Configuration Files
            Backing Up Configuration Files
            Verify the Name of the Configuration File Currently in Use
          Start SAP ASE Using a Configuration File
            Configuration File Errors
        The Parameter Hierarchy
        User-Defined Subsets of the Parameter Hierarchy: Display Levels
          The Effect of the Display Level on sp_configure Output
        Performance Tuning with sp_configure and sp_sysmon
        Using Configuration Parameters in a Clustered Environment
      sp_configure Output
      sysconfigures and syscurconfigs Tables
        Example syscurconfigs and sysconfigures Query
      Named Cache Configuration Parameter Group
      Dump Configuration Parameter Group
      Configuration Parameters
        Alphabetical Listing of Configuration Parameters
          abstract plan cache
          abstract plan dump
          abstract plan load
          abstract plan replace
          abstract plan sharing
          additional network memory
          aggresive task stealing
          allocate max shared memory
          allow backward scans
          allow nested triggers
          allow procedure grouping
          allow remote access
          allow resource limits
          allow sendmsg
          allow sql server async i/o
          allow updates to system tables
          average cap size
          audit queue size
          auditing
          automatic cluster takeover
          builtin date strings
          caps per ccb
          capture compression statistics
          capture missing statistics
          check password for digit
          CIPC large message pool size
          CIPC regular message pool size
          cis bulk insert array size
          cis bulk insert batch size
          cis connect timeout
          cis cursor rows
          cis idle connection timeout
          cis packet size
          cis rpc handling
          cluster heartbeat interval
          cluster heartbeat retries
          cluster redundancy level
          cluster vote timeout
          column default cache size
          compression info pool size
          compression memory size
          configuration file
          cost of a logical io
          cost of a physical io
          cost of a cpu unit
          cpu accounting flush interval
          cpu grace time
          current audit table
          deadlock checking period
          deadlock pipe active
          deadlock pipe max messages
          deadlock retries
          default character set id
          default database size
          default exp_row_size percent
          default fill factor percent
          default language id
          default network packet size
            Requesting a Larger Packet Size at Login
          default sortorder id
          default unicode sortorder
          default XML sortorder
          deferred name resolution
          disable character set conversions
          disable disk mirroring
          disable jsagent core dump
          disable varbinary truncation
          disk i/o structures
          DMA object pool size
          dtm detach timeout period
          dtm lock timeout period
          dump history filename
          dump on conditions
          dynamic allocation on demand
          dynamic SQL plan pinning
          early row send increment
          enable async database init
          enable backupserver HA
          enable cis
          enable compression
          enable concurrent dump tran
          enable console logging
          enable DTM
          enforce dump configuration
          enable dump history
          enable encrypted columns
          enable enterprise java beans
          enable file access
          enable full-text search
          enable functionality group
          enable inline default sharing
          enable HA
          enable housekeeper GC
          enable hp posix async i/o
          enable HugePages
          enable i/o fencing
          enable ISM
          enable java
          enable job scheduler
          enable js restart logging
          enable large chunk elc
          enable large pool for load
          enable ldap user auth
          enable literal autoparam
          engine local cache percent
          enable logins during recovery
          enable merge join
          enable metrics capture
          enable monitoring
          enable pam user auth
          enable pci
          enable permissive unicode
          enable plan sharing
          enable predicated privileges
          enable query tuning mem limit
          enable query tuning time limit
          enable rapidlog
          enable real time messaging
          enable rep agent threads
          enable row level access control
          enable semantic partitioning
          enable sort-merge join and JTC
          enable sql debugger
          enable ssl
          enable stmt cache monitoring
          enable surrogate processing
          enable unicode conversion
          enable unicode normalization
          enable utility lvl 0 scan wait
          enable webservices
          enable xact coordination
          enable xml
          engine memory log size
          errorlog pipe active
          errorlog pipe max messages
          esp execution priority
          esp execution stacksize
          esp unload dll
          event buffers per engine
          event log computer name (Windows only)
          event logging
          executable codesize + overhead
          extended cache size
          FIPS login password encryption
          global async prefetch limit
          global cache partition number
          heap memory per user
          histogram tuning factor
          housekeeper free write percent
          i/o accounting flush interval
          i/o batch size
          i/o polling process count
          identity burning set factor
          identity grab size
          identity reservation size
          idle migration timeout
          job scheduler interval
          job scheduler tasks
          js heartbeat interval
          js job output width
          kernel mode
          kernel resource memory
          large allocation auto tune
          license information
          lock address spinlock ratio
          lock hashtable size
          lock scheme
          lock shared memory
          lock spinlock ratio
          lock table spinlock ratio
          lock timeout pipe active
          lock timeout pipe max messages
          lock wait period
          log audit logon failure
          log audit logon success
          max async i/os per engine
            On the Linux Platform
          max async i/os per server
          max buffers per lava operator
            Differences Between number of sort buffers and max data buffers per lava sort
          max cis remote connections
          max concurrently recovered db
          max js restart attempts
          max memory
            If SAP ASE Cannot Start
          max native threads per engine
          max nesting level
          max network packet size
            Choosing Packet Sizes
          max network peek depth
          max number network listeners
          max online engines
          max online Q engines
          max parallel degree
          max pci slots
          max query parallel degree
          max repartition degree
          max resource granularity
          max scan parallel degree
          max SQL text monitored
          max transfer history
          max utility parallel degree
          maximum dump conditions
          maximum failed logins
          maximum job output
          memory alignment boundary
          memory dump compression level
          memory per worker process
          messaging memory
          metrics elap max
          metrics exec max
          metrics lio max
          metrics pio max
          min pages for parallel scan
          minimum password length
          mnc_full_index_filter
          msg confidentiality reqd
          msg integrity reqd
          net password encryption reqd
          network polling mode
            In-Line Network Polling
          number of alarms
          number of aux scan descriptors
            Monitoring and Estimating Scan Descriptor Usage
          number of backup connections
          number of ccbs
          number of checkpoint tasks
          number of devices
            Setting the number of devices on UNIX
          number of disk tasks
          number of dtx participants
            Optimizing the Number of DTX Participants for Your System
          number of dump threads
          number of early send rows
          number of engines at startup
          number of histogram steps
          number of index trips
          number of java sockets
          number of large i/o buffers
          number of locks
          number of mailboxes
          number of messages
          number of network tasks
          number of oam trips
          number of open databases
            Optimizing the number of open databases
          number of open indexes
            Optimizing number of open indexes
          number of open objects
            Optimizing number of open objects
          number of open partitions
          number of pre-allocated extents
            Using a Value of 32 for the number of pre-allocated extents
          number of Q engines at startup
          number of remote connections
          number of remote logins
          number of remote sites
          number of sort buffers
          number of user connections
          number of worker processes
          o/s file descriptors
          object lockwait timing
          open index hash spinlock ratio
          open index spinlock ratio
          open object spinlock ratio
          optimization goal
          optimize temp table resolution
          optimization timeout limit
          optimizer level
          page lock promotion HWM
          page lock promotion LWM
          page lock promotion PCT
          page utilization percent
          partition groups
          partition spinlock ratio
          pci memory size
          per object statistics active
          percent database for history
          percent database for output
          percent history free
          percent output free
          performance monitoring option
          permission cache entries
          plan text pipe active
          plan text pipe max messages
          print deadlock information
          print recovery information
          procedure cache size
          procedure deferred compilation
          process wait events
          prod-consumer overlap factor
          quorum heartbeat interval
          quorum heartbeat retries
          quoted identifier enhancements
          rapidlog buffer size
          rapidlog max files
          read committed with lock
          recovery interval in minutes
          recovery prefetch size
          remote server pre-read packets
          restricted decrypt permission
          row lock promotion HWM
          row lock promotion LWM
          row lock promotion PCT
          rtm thread idle wait period
          runnable process search count
            runnable process search count versus idle timeout
          sampling percent
          secure default login
          select for update
          select on syscomments.text
          send doneinproc tokens
          session migration timeout
          session tempdb log cache size
          shared memory starting address
          size of auto identity column
          size of global fixed heap
          size of process object heap
          size of shared class heap
          size of unilib cache
          solaris async i/o mode
          sproc optimize timeout limit
          SQL batch capture
          SQL Perfmon Integration
          sql server clock tick length
          sql text pipe active
          sql text pipe max messages
          stack guard size
          stack size
          start mail session
          start xp server during boot
          startup delay
          statement cache size
          statement pipe active
          statement pipe max messages
          statement statistics active
          streamlined dynamic SQL
          strict dtm enforcement
          suppress js max task message
          suspend audit when device full
          syb_sendmsg port number
          sysstatistics flush interval
          systemwide password expiration
          tape retention in days
          tcp no delay
          text prefetch size
          threshold event max messages
          threshold event monitoring
          time slice
          total data cache size
          total logical memory
          total physical memory
          transfer utility memory size
          txn to pss ratio
            Optimizing the txn to pss ratio for your system
          unified login required
          update statistics hashing
          upgrade version
          use security services
          user log cache queue size
          user log cache size
          user log cache spinlock ratio
            utility statistics hashing
          wait event timing
          wait on uncommitted insert
          workload manager cache size
          xact coordination interval
          xp_cmdshell context
    Disk Resource Issues
      Device Allocation and Object Placement
      Commands for Managing Disk Resources
      Considerations in Storage Management Decisions
        Recovery
        Performance
      Status and Defaults at Installation
      System Tables That Manage Storage
        The sysdevices Table
        The sysusages Table
        The syssegments Table
        The sysindexes Table
        The syspartitions Table
    Managing Remote Servers
      Adding Remote Logins
        Map Users’ Server IDs
        Map Remote Logins to Particular Local Names
        Map All Remote Logins to One Local Name
        Keeping Remote Login Names for Local Servers
        Example of Remote User Login Mapping
      Password Checking for Remote Users
        Effects of Using the Untrusted Mode
      Getting Information About Remote Logins
      Configuration Parameters for Remote Logins
    Initializing Database Devices
      Using the disk init command
      Getting Information about Devices
      Dropping devices
      Designating Default Devices
        Choosing Default and Nondefault Devices
      Increasing the Size of Devices with disk resize
        Insufficient Disk Space
    Setting Database Options
      Database Option Descriptions
      Viewing the Options on a Database
      Displaying Currently Set Switches with sysoptions
    Configuring Character Sets, Sort Orders, and Languages
      Advantages of Internationalized Systems
        A Sample Internationalized System
        Elements of an Internationalized System
      Selecting the Character Set for Your Server
        Unicode
          Configuration Parameters
          Functions
          Using unichar Columns
          Using unitext
          Open Client Interoperability
          Java Interoperability
        Selecting the Server Default Character Set
      Selecting the Sort Order
        Different Types of Sort Orders
        Selecting the Default Sort Order
          Chinese Pinyin Sort Order
          Selecting Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
          Selecting the Default Unicode Sort Order
      Select a Language for System Messages
      A Spanish-Version Server
      A US-based company in Japan
      A Japan-Based Company with Multinational Clients
      Changing the character set, sort order, or message language
        Changing the default character set
        Changing the sort order with a resources file
        Change the Default Sort Order
        Reconfiguring the Character Set, Sort Order, or Message Language
        Example: Converting a Unicode Database to UTF-8
          Migrating Selected Columns to unichar
          Migrating to or from unitext
        Before Changing the Character Set or Sort Order
        Set the User’s Default Language
        Manage Suspect Partitions
      Installing Date Strings for Unsupported Languages
        Server Versus Client Date Interpretation
      Internationalization and localization files
        Character sets directory structure
        Types of localization files
        Software Messages Directory Structure
        Global variables for Languages and Character Sets
    Configuring Client/Server Character Set Conversions
      Supported Character Set Conversions
        Conversion for Native Character Sets
        Conversion in a Unicode System
        SAP ASE Direct Conversions
        Unicode Conversions
          Allowing Unicode noncharacters
      Choosing a Conversion Type
      Enabling and Disabling Character Set Conversion
        Characters That Cannot Be Converted
      Error handling in character set conversion
      Conversions and Changes to Data Lengths
      Specify the Character Set for Utility Programs
        Display and file character set command line options
    Diagnosing System Problems
      How SAP ASE Uses Error Messages
        Error Log Format
        Error Messages and Message Numbers
        Variables in Error Message Text
      SAP ASE error logging
        Severity Levels
        Severity Levels 10 – 18
          Level 10: Status Information
          Level 11: Specified Database Object Not Found
          Level 12: Wrong Datatype Encountered
          Level 13: User Transaction Syntax Error
          Level 14: Insufficient Permission to Execute Command
          Level 15: Syntax Error in SQL Statement
          Level 16: Miscellaneous User Error
          Level 17: Insufficient Resources
          Level 18: Nonfatal Internal Error Detected
        Severity Levels 19 – 26
          Level 19: SAP ASE Fatal Error in Resource
          Level 20: SAP ASE Fatal Error in Current Process
          Level 21: SAP ASE Fatal Error in Database Processes
          Level 22: SAP ASE Fatal Error: Table Integrity Suspect
          Level 23: Fatal Error: Database Integrity Suspect
          Level 24: Hardware Error or System Table Corruption
          Level 25: SAP ASE Internal Error
          Level 26: Rule Error
      Backup Server Error Logging
      Killing Processes
        Using kill with statusonly
        Using sp_lock to Examine Blocking Processes
      Using Shared Memory Dumps
        Configuring Shared Memory Dump Conditions
        System-Wide Default Settings
      Housekeeper functionality
        Housekeeper wash
        Housekeeper chores
        Housekeeper Garbage Collection
          Configure SAP ASE Priority Level
        Configuring enable housekeeper GC
          Using The reorg Command
      Shutting Down Servers
        Shutting Down SAP ASE
        Shutting down a Backup Server
          Using nowait on a Backup Server
      Learning about known problems
  System Administration Guide 16.0: Volume 2
    Limiting Access to Server Resources
      Resource Limits
      Plan Resource Limits
      Enable Resource Limits
      Define Time Ranges
        Determe the Time Ranges You Need
        Modifying a Named Time Range
        Dropping a Named Time Range
        When Do Time Range Changes Take Effect?
      Identify Users and Limits
        Identifying Heavy-Usage Users
        Identifying Heavy-Usage Applications
        Choosing a Limit Type
        Determining Time of Enforcement
        Determining the Scope of Resource Limits
      Understanding Limit Types
        Limiting I/O Cost
          Identify I/O Costs
          Calculate the I/O Cost of a Cursor
          Scope of the io_cost Limit Type
        Limiting Elapsed Time
          Scope of the elapsed_time Limit Type
        Limiting the Size of the Result Set
          Scope of the row_count Limit Type
        Setting Limits for tempdb Space Usage
        Limiting Idle Time
      Creating a Resource Limit
        Resource Limit Examples
      Getting Information on Existing Limits
      Modifying Resource Limits
      Dropping Resource Limits
      Resource Limit Precedence
    Mirroring Database Devices
      Determining Which Devices to Mirror
        Mirroring Using Minimal Physical Disk Space
        Mirroring for Nonstop Recovery
      Conditions That Do Not Disable Mirroring
      Disk Mirroring Commands
        Initializing Mirrors
        Unmirroring a Device
          Effects on System Tables
        Restarting Mirrors
        waitfor mirrorexit
        Mirroring the Master Device
        Getting Information About Devices and Mirrors
      Disk Mirroring Tutorial
      Disk Resizing and Mirroring
    Configuring Memory
      How SAP ASE Allocates Memory
        Disk Space Allocation
        How SAP ASE Allocates Buffer Pools
        Heap Memory
          Calculating Heap Memory
      Memory Management in SAP ASE
      Determining the Amount of Memory SAP ASE Needs
        Determine the SAP ASE Memory Configuration
        If You Are Upgrading
      Determining the Amount of Memory SAP ASE Can Use
      Configuration Parameters That Affect Memory Allocation
      Dynamically Allocating Memory
        If SAP ASE Cannot Start
        Dynamically Decreasing Memory Configuration Parameters
      Configuring Thread Pools
        Determining the Total Number of Threads
        Tuning the syb_blocking_pool
      System Procedures for Configuring Memory
        Viewing the Configuration Parameters for Memory
          Memory Available for Dynamic Growth
        Using sp_helpconfig
        Using sp_monitorconfig
      Configuration Parameters That Control SAP ASE Memory
        SAP ASE Executable Code Size
        Data and Procedure Caches
          Determining the Procedure Cache Size
          Determining the Default Data Cache Size
          Monitoring Cache Space
          Modify the ELC Size
        Kernel Resource Memory
        User Connections
        Open Databases, Open Indexes, and Open Objects
        Number of Locks
        Database Devices and Disk I/O Structures
      Parameters That Use Memory
        Parallel Processing
        Remote Servers
        Referential Integrity
        Parameters That Affect Memory
      The Statement Cache
        Setting the Statement Cache
          Performing Ad Hoc Query Processing
            Statement Matching Criteria
            Caching Conditions
            Statement Cache Sizing
          Monitoring the Statement Cache
          Aggregating Metrics from Syntactically Similar Queries
          Purging the Statement Cache
          Printing Statement Summaries
          Displaying the SQL Plan for Cached Statements
    Configuring Data Caches
      The SAP ASE Data Cache
      Cache Configuration Commands and System Procedures
      Viewing Information About Data Caches
      Configuring Data Caches
        Creating a New Cache
          Insufficient Space for New Cache
        Adding Memory to an Existing Named Cache
        Decreasing the Size of a Cache
        Deleting a Cache
        Explicitly Configuring the Default Cache
        Changing the Cache Type
        Improving the Recovery Log Scan During load database and load tran
      Configuring a Cache Replacement Policy
      Dividing a Data Cache into Memory Pools
        Matching Log I/O Size for Log Caches
      Binding Objects to Caches
      Getting Information About Cache Bindings
        Checking Cache Overhead
        Effects of Overhead on Total Cache Space
      Dropping Cache Bindings
      Changing the Wash Area for a Memory Pool
        When the Wash Area Is Too Small
        When the Wash Area is Too Large
        Setting the Housekeeper to Avoid Washes for Cache
      Changing the Asynchronous Prefetch Limit for a Pool
      Changing the Size of Memory Pools
        Moving Space from the Memory Pool
        Moving Space from Other Memory Pools
      Adding Cache Partitions to Reduce Spinlock
      Dropping a Memory Pool
        When Pools Cannot Be Dropped Due to Page Use
      Cache Binding Effects on Memory and Query Plans
      Configuring Data Caches Using the Configuration File
        Cache and Pool Entries in the Configuration File
        Cache Configuration Guidelines
          Configuration File Errors
    Managing Multiprocessor Servers
      SAP ASE Kernels
      Target Architecture
      Kernel Modes
        Switching Kernel Modes
      Tasks
        Using Threads to Run Tasks
      Configuring an SMP Environment
        Thread Pools
          Dynamic Thread Assignment
        Managing Engines
          Configuring Engines in Process Mode
          Configuring Engines in Threaded Mode
          Choosing the Right Number of Engines
        Starting and Stopping Engines
          Monitoring Engine Status
          Starting and Stopping Engines with sp_engine
            Relationship Between Network Connections and Engines
            Logical Process Management and dbcc engine(offline)
        Managing User Connections
        Configuration Parameters That Affect SMP Systems
          Configuring Spinlock Ratio Parameters
            Round-Robin Assignment
            Sequential Assignment
    Creating and Managing User Databases
      Permissions for Managing User Databases
      Using the create database Command
      Assigning Space and Devices to Databases
        Default Database Size and Devices
        Estimating the Required Space
      Placing a Transaction Log on a Separate Device
        Estimating the Transaction Log Size
        Default Log Size and Device
        Moving the Transaction Log to Another Device
      Shrinking Log Space
        Using dump and load database When Shrinking Log Space
          Shrinking a Log Before a dump and load database
        Using dump and load transaction When Shrinking Log Space
          Shrinking Log Space
      Calculating the Transaction Log Growth Rate
      Database Recovery with the for load Parameter
      Using the with override Option with create database
      Changing Database Ownership
      Altering Databases
        Using alter database
      Using the drop database Command
      System Tables That Manage Space Allocation
        The sysusages Table
          The segmap Column
        The lstart, size, and vstart Columns
      SAP ASE Support for Replication by Column Value
      Getting Information about Database Storage
        Using sp_helpdb to Find Database Device Names and Options
        Checking the Amount of Space Used
          Checking Space Used in a Database
          Checking Summary Information for a Table
          Checking Information for a Table and Its Indexes
        Querying System Table for Space Usage Information
    Database Mount and Unmount
      Manifest File
      Operations That Copy and Move Databases
      Performance Considerations
      Device Verification
      Mounting and Unmounting Databases
        Unmounting a Database
        Mounting a Database
        Moving Databases from One SAP ASE to Another
        System Restrictions
        quiesce database Extension
    Distributed Transaction Management
      Configuration Considerations
        Behavior for Transaction Manager-Coordinated Transactions
        Enhanced Transaction Manager for SAP ASE Versions 15.0.3 or Later
        RPC and CIS Transactions
        SYB2PC Transactions
      Enabling DTM Features
        Configuring Transaction Resources
          Calculating the Number of Required Transaction Descriptors
          Setting the Number of Transaction Descriptors
      Using SAP ASE Coordination Services
        Overview of Transaction Coordination Services
          Hierarchical Transaction Coordination
          X/Open XA-Compliant Behavior in DTP Environments
        Requirements and Behavior
        Ensuring Sufficient Resources for Updates
          number of dtx participants Parameter
          Optimizing the number of dtx participants
        Using Transaction Coordination Services on Remote Servers
          Set the strict dtm enforcement Parameter
        Monitoring Coordinated Transactions and Participants
      DTM Administration and Troubleshooting
        Transactions and Threads of Control
          Lock Manager Support for Detached Transactions
        Getting Information About Distributed Transactions
          Transaction Identification in systransactions
            Transaction Keys
          Viewing active transactions with sp_transactions
            Identify Local, Remote, and External Transactions
            Identify the Transaction Coordinator
            View the Transaction Thread of Control
            Understanding Transaction State Information
            Limiting sp_transactions Output to Specific States
            Transaction Failover Information
          Determining the Commit Node and gtrid with sp_transactions
            Commit and Parent Nodes
            Global Transaction ID
        Executing External Transactions
        Crash Recovery Procedures for Distributed Transactions
          Transactions Coordinated with MSDTC During Crash Recovery
          Transactions Coordinated by SAP ASE or X/Open XA During Crash Recovery
          Transactions Coordinated with SYB2PC During Crash Recovery
        Heuristically Completing Transactions
          Completing Prepared Transactions
            Maintaining a Transaction's Commit Status
            Manually Clearing the Commit Status
          Completing Transactions That Are Not Prepared
          Determining the Commit Status for SAP ASE Transactions
        Troubleshooting for Transactions Coordinated by External Transaction Managers
          SAP ASE Implicit Rollback in External Transactions
    Support for OData
      OData Server Architecture
      OData Server Limitations
        Unsupported OData Protocol Features
      Security Considerations for OData Server
      Configuring OData Server
      Setting Up an HTTP Server for OData
      Create an OData Producer Service Model
      OData Server Sample Files
      Starting and Stopping OData Server
    Creating and Using Segments
      System-Defined Segments
      Segment Usage in SAP ASE
        Controlling Space Usage
        Use Segments to Allocate Database Objects
          Separating Tables, Indexes, and Logs
          Splitting Tables
        Moving a Table to Another Device
      Creating Segments
      Changing the Scope of Segments
        Extending the Scope of Segments
          Automatically Extending the Scope of a Segment
        Reducing the Scope of a Segment
      Assigning Database Objects to Segments
        Creating New Objects on Segments
        Placing Existing Objects on Segments
        Placing Text Pages on a Separate Device
        Creating Clustered Indexes on Segments
      Dropping Segments
      Getting Information About Segments
        sp_helpsegment
        sp_helpdb
        sp_help and sp_helpindex
      Segments and System Tables
      A Segment Tutorial
    Using the reorg Command
      reorg Command and Its Parameters
        Running reorg rebuild Concurrently
        Using the optdiag Utility to Assess the Need for a reorg
      Moving Forwarded Rows to Home Pages
        Use reorg compact to Remove Row Forwarding
      Reclaiming Unused Space from Deletions and Updates
        Reclaming Space Without the reorg Command
      Reclaiming Unused Space and Undoing Row Forwarding
      Rebuilding a Table
        Prerequisites for Running reorg rebuild
          Changing Space Management Settings Before Using reorg rebuild
      Using the reorg rebuild Command on Indexes
        Rebuilding Indexes with reorg rebuild index_name partition_name
        Space Requirements for Rebuilding an Index
        Status Messages
      resume and time Options for Reorganizing Large Tables
      Incremental Reorganization
        Checking the Reorganization Status
        Clearing reorg defrag Information from sysattributes
        Logging Behavior
    Checking Database Consistency
      Page and Object Allocation
        Understanding the Object Allocation Map (OAM)
        Understanding Page Linkage
      dbcc Checks
        dbcc Command Output
      Checking Database and Table Consistency
        dbcc checkstorage
          Understanding the dbcc checkstorage Operation
          Performance and Scalability
        dbcc checktable
        dbcc checkindex
        dbcc checkdb
      Checking Page Allocation
        dbcc checkalloc
        dbcc indexalloc
        dbcc tablealloc
        dbcc textalloc
      Correcting Allocation Errors Using the fix | nofix Options
      Generate Reports with dbcc tablealloc and dbcc indexalloc
      Checking Consistency of System Tables
      Strategies for Using Consistency Checking Commands
        Using Large I/O and Asynchronous Prefetch
        Scheduling Database Maintenance at Your Site
          Database Use
          Backup Schedule
          Size of Tables and Importance of Data
        Errors Generated by Database Consistency Problems
        Reporting on Aborted checkstorage and checkverify Operations
          Aborting with Error 100032
        Comparison of Soft and Hard Faults
          Soft Faults
          Hard Faults
      Verifying Faults with dbcc checkverify
        Scheduling dbcc checkverify
        Executing dbcc checkverify
      Preparing to Use dbcc checkstorage
        Planning Resources
          Planning Workspace Size
            Number of Concurrent Workspaces
            Automatic Workspace Expansion
        Configuring Worker Processes
        Setting a Named Cache for dbcc
        Configuring an 8-page I/O Buffer Pool
        Disk Space for dbccdb
        Segments for Workspaces
        Creating the dbccdb Database
      Updating the dbcc_config Table
        Viewing the Current Configuration Values
        Default Configuration Values
        Deleting Configuration Values
      dbccdb Maintenance Tasks
        Reevaluating and Updating the dbccdb Configuration
        Cleaning Up dbccdb
        Performing Consistency Checks on dbccdb
      Generating Reports from dbccdb
        Reporting a Summary of dbcc checkstorage Operations
      Upgrading Compiled Objects with dbcc upgrade_object
        Finding Compiled Object Errors Before Production
          Reserved Word Errors
          Missing, Truncated, or Corrupted Source Text
          Temporary Table References
          Resolving select * Potential Problem Areas
        Using Database Dumps in Upgrades
          Upgrading Compiled Objects in Database Dumps
    Developing a Backup and Recovery Plan
      Tracking Database Changes
        Getting Information About the Transaction Log
        Determining When Log Records Are Committed
          Changes to Logging Behavior
          Risks of Using delayed_commit
          Enabling set delayed_commit
        Designating Responsibility for Backups
      Checkpoints: Synchronizing a Database and Its Log
        Setting the Recovery Interval
        Automatic Checkpoint Procedure
        Truncating the Log After Automatic Checkpoints
        Free Checkpoints
        Manually Requesting a Checkpoint
      Automatic Recovery After a System Failure or Shutdown
      Fast Recovery
        SAP ASE Start-up Sequence
        Bringing Engines Back Online
        Parallel Recovery
        Database Recovery
        Specifying the Recovery Order
          Changing or Deleting the Recovery Position of a Database
          Listing the User-Assigned Recovery Order of Databases
        Parallel Checkpoints
        Recovery State
        Tuning for Fast Recovery
      The sybdumptran Utility
      Fault Isolation During Recovery
        Persistence of Offline Pages
        Configuring Recovery Fault Isolation
          Isolating Suspect Pages
          Raising the Number of Suspect Pages Allowed
        Getting Information About Offline Databases and Pages
        Bringing Offline Pages Online
        Index-Level Fault Isolation for Data-Only-Locked Tables
        Side Effects of Offline Pages
        Recovery Strategies Using Recovery Fault Isolation
          Reload Strategy
          Repair Strategy
        Assessing the Extent of Corruption
      Using the dump and load Commands
        dump database: Making Routine Database Dumps
        dump transaction: Making Routine Transaction Log Dumps
        dump tran with no_truncate: Copying the Log After Device Failure
        load database: Restoring the Entire Database
        load transaction: Applying Changes to the Database
        online database: Making the Database Available to Users
        Dumping and Loading Databases Across Platforms
          Dumping a Database
          Loading a Database
        Restrictions for Dumping and Loading Databases and Transactions
        Improving Recovery Prefetch
        Performance Notes
        Moving a Database to Another SAP ASE
        Upgrading a User Database
        Using the Special Load Options to Identify Dump Files
        Restoring a Database from Backups
      Suspending and Resuming Updates to Databases
        Guidelines for using quiesce database
        Maintaining Server Roles in a Primary and Secondary Relationship
        Starting the Secondary Server with the -q Option
        ā€œin quiesceā€ Database Log Record Value Updated
        Updating the Dump Sequence Number
        Backing up Primary Devices with quiesce database
          Recovery of Databases for Warm Standby Method
        Making Archived Copies During the Quiescent State
      The mount and unmount Commands
      Using Backup Server for Backup and Recovery
        Requirements for Communicating with Backup Server
        Mounting a New Volume
        Starting and Stopping Backup Server
        Configuring Your Server for Remote Access
        Choosing Backup Media
          Protecting Backup Tapes from Being Overwritten
          Dumping to Files or Disks
      Creating Logical Device Names for Local Dump Devices
        Adding a Backup Device
      Scheduling backups of user databases
        Other Times to Back Up a Database
      Scheduling Backups of master
        Dump the master Database After Each Change
        Save Scripts and System Tables
        Truncate the master Database Transaction Log
        Avoid Volume Changes and Recovery
      Scheduling Backups of the model Database
        Truncate the model Database’s Transaction Log
      Schedule Backups of the sybsystemprocs Database
      Configuring SAP ASE for Simultaneous Loads
      Gather Backup Statistics
    Backing Up and Restoring User Databases
      Specifying the Database and Dump Device
        Rules for Specifying Database Names
        Rules for Specifying Dump Devices
        Tape Device Determination by Backup Server
          Tape Device Configuration File
      Compressing a Dump
        Backup Server Dump Files and Compressed Dumps
        Loading Compressed Dumps
        Cyclic Redundancy Checks for dump database
      Dump History File
      Backups for the Dump Configuration Files
      Performing Cumulative Dumps
        Dump and Load Sequences
        Partially Logged Operations and Cumulative Dumps
        Restrictions
      Specifying a Remote Backup Server
      Remote Dump Host Control
      Specifying Tape Density, Block Size, and Capacity
        Overriding the Default Density
        Overriding the Default Block Size
          Specifying a Larger Block Size Value
        Specifying Tape Capacity for Dump Commands
        Nonrewinding Tape Functionality for Backup Server
          Tape Operations
          Dump Version Compatibility
      Apply Source Database Attributes to the Target Database
      Generate SQL for a Different Target Database
      Specifying the Volume Name
        Loading from a Multifile Volume
      Identifying a Dump
      Improving Dump or Load Performance
        Compatibility with Prior Versions
        Reducing load database Time
        Concurrent dump database and dump transaction Commands
          Configure SAP ASE to Run Concurrent Dumps
        Labels Stored in Integer Format
        Configure Local and Remote Backup Servers
          Setting Shared Memory Usage
          Configuring Shared Memory Dumps
          Setting the Maximum Number of Stripes
          Setting the Maximum Number of Network Connections
          Setting the Maximum Number of Service Threads
      Automatic Physical Database Rearrangement on Load
      Specify Additional Dump Devices with the stripe on Clause
        Dumps to, and Loads from, Multiple Devices
        Using Fewer Devices to Load Than to Dump
        Specifying the Characteristics of Individual Devices
      Tape Handling Options
        Prevent Dump Files from Being Overwritten
        Reinitializing a Volume Before a Dump
      Dumping and Loading Databases with Password Protection
      Overriding the Default Message Destination
      Bringing Databases Online with standby_access
      Getting Information About Dump Files
        Requesting Dump Header Information
        Determining the Database, Device, File Name, and Date
      Copying the Log After a Device Failure
      Responding to Volume Change Requests
        Volume Change Prompts for Dumps
        Volume Change Prompts for Loads
      Recovering a Database: Step-By-Step Instructions
        Getting a Current Dump of the Transaction Log
        Examining the Space Usage
        Dropping the Databases
        Re-creating the Databases
        Loading the Database
        Loading the Transaction Logs
          Loading a Transaction Log to a Point in Time
        Bringing the Databases Online
          Replicated Databases
      Loading Database Dumps from Older Versions
        Upgrading a Dump to the Current Version of SAP ASE
        The Database Offline Status Bit
        Version Identifiers and Automatic Upgrade
      Cache Bindings and Loading Databases
        Databases and Cache Bindings
        Database Objects and Cache Bindings
          Checking on Cache Bindings
      Cross-Database Constraints and Loading Databases
    Restoring the System Databases
      Recovering the master Database
        Recovery Procedure
        Finding Copies of System Tables
        Building a New Master Device
          Replacing the Master Device
          Rebuilding the Configuration Area
        Starting SAP ASE in Master-Recover Mode
        Re-creating Device Allocations for master
        Checking Your Backup Server sysservers Information
        Verifying That Your Backup Server Is Running
        Loading a Backup of master
        Updating the number of devices Configuration Parameter
        Restarting SAP ASE in Master-Recover Mode
        Checking System Tables to Verify Current Backup of master
        Restarting SAP ASE
        Restoring Server User IDs
        Restoring the model Database
        Checking SAP ASE
        Backing Up master
      Recovering the model Database
      Recovering the sybsystemprocs Database
        Restoring sybsystemprocs with installmaster
        Restoring sybsystemprocs with load database
      Reducing the Size of tempdb
        Reset tempdb to Default Size
      Restoring System Tables with disk reinit and disk refit
        Restoring sysdevices with disk reinit
        Restoring sysusages and sysdatabase with disk refit
    Archive Database Access
      Components of an Archive Database
        The Database Dump
        The Modified Pages Section
        The sysaltusages Table and the Scratch Database
      Working With an Archive Database
        DDLGen Support for Archive Database Access
      Configuring an Archive Database
        Sizing the Modified Pages Section
        Increasing the Amount of Space Allocated to the Modified Pages Section
        Materializing an Archive Database
          Using load database with norecovery
          Using Logical Devices with an Archive Database
          load database Limitations with an Archive Database
        Bringing an Archive Database Online
        Loading a Transaction Log into an Archive Database
        Dropping an Archive Database
      SQL Commands for Archive Databases
      dbcc Commands for Archive Databases
      Issuing a Typical Archive Database Command Sequence
      Compressed Dumps for an Archive Database
        Creating a Compression Memory Pool
      Upgrading and Downgrading an SAP ASE with Archive Databases
        Limitations for Downgrading an SAP ASE with an Archive Database
      Compatibility Issues for a Compressed Dump
      Archive Database Limitations
    Shrinking Databases
      Shrinking a Database
      How SAP ASE Shrinks the Database
      Shrink Operations on Databases That Contain Text or Image Data
        Shrink Database Backlink Performance Improvements
      Restarting Partially Completed Shrink Operations
      Moving Data Before Shrinking the Database
        Restrictions for Moving the Transaction Log
        Locks Held During Data Movement
      Determine the Status of a Shrink Operation
      Upgrading or Downgrading Shrunken Databases
      Restrictions
    Expanding Databases Automatically
      Layouts for Disks, Devices, Databases, and Segments
      Threshold Action Procedures
      Installing Automatic Database Expansion Procedures
      Running sp_dbextend
        Validating Current Thresholds
      Configuring a Database for Automatic Expansion
      Restrictions and Limitations
    Managing Free Space with Thresholds
      Monitoring Free Space with the Last-Chance Threshold
        Controlling How Often sp_thresholdaction Executes
      Rollback Records and the Last-Chance Threshold
        Calculating the Space for Rollback Records
          Using lct_admin to Determine the Free Log Space
        Determining the Current Space for Rollback Records
        Effect of Rollback Records on the Last-Chance Threshold
        User-Defined Thresholds
      Last-Chance Threshold and User Log Caches for Shared Log and Data Segments
        Using lct_admin abort to Abort Suspended Transactions
      Add Space to the Master Database’s Transaction Log
      Automatically Aborting or Suspending Processes
        Using abort tran on log full to Abort Transactions
      Waking Suspended Processes
      Adding, Changing, and Deleting Thresholds
        Displaying Information About Existing Thresholds
        Thresholds and System Tables
        Creating Free-Space Thresholds
        Changing or Specifying a New Free-Space Threshold
        Dropping a Threshold
      Creating a Free-Space Threshold for the Log Segment
        Usage Scenario: Testing and Adjusting the New Threshold
      Creating Additional Thresholds on Data and Log Segments
        Determining Threshold Placement
      Creating Threshold Procedures
        Parameters for Threshold Procedures
        Generating Error Log Messages
        sp_thresholdaction Procedures that Include a dump transaction
        A Simple Threshold Procedure
        A More Complex Procedure
        Placement for Threshold Procedures
      Disabling Free-Space Accounting for Data Segments
    Transaction Log Space Management
      Transaction Log Space
      Automating Transaction Log Management
        Rescue Scenario Use Case
        Monitoring Use Case
        Monitoring and Control Use Case
      Analyzing and Managing Transaction Log Space
        Viewing the Span of a Transaction
        Viewing the Oldest Active Transactions
      Truncating a Log that Is Not on A Separate Segment
      Truncating the Log in Early Development Environments
      Truncating a Log that Has No Free Space
        Dangers of Using with truncate_only and with no_log
        Provide Sufficient Log Space
          Querying the syslogshold Table
  Migration Technology Guide 15.5
    About this book
    Migration Strategy
      Preupgrade considerations
        Understanding optimization goals
          Optimization criteria
        Resource recommendations for Adaptive Server 15.0
        Incorporating statistics in Adaptive Server 15.0
        Recommended testing before upgrade
      Migrating to Adaptive Server 15.0 features
        Upgrading, and using new features immediately
        Upgrading, and using new features later
        Upgrading, but not using new features
      Troubleshooting
        Query processing tips
        Information to capture before contacting Technical Support
          701 errors
          Performance problems with a limited number of queries
          System-wide performance issues
          Uploading diagnostics to Technical Support
    QPTune
      Setting up your system
      Using QPTune to fix missing statistics
        Starting QPTune to fix missing statistics
        Collecting statistics
        Fixing statistics
        Using undo_fix_stats
      Using QPTune to tune queries or applications
        Starting QPTune to tune queries or applications
          Simple start
          Custom start
        Collecting metrics
        Comparing metrics
        Applying the best results
      Configuration file
      Examples
      Upgrade issues
      Localization
      QPTune GUI
        Environment and system requirements
        Starting the QPTune GUI
        Fixing missing statistics
        Tuning Task
      QPTune reference information
    Running the Query Processor in Compatibility Mode
      Enabling compatibility mode
      Feature support in compatibility mode
      Additional trace flag for diagnostics
      New stored procedure sp_compatmode
      Changes to @@qpmode global variable
      Diagnostic tool
  Performance and Tuning Series: Basics 16.0
  Performance and Tuning Series: Improving Performance with Statistical Analysis 16.0
  Performance and Tuning Series: Locking and Concurrency Control 16.0
  Performance and Tuning Series: Monitoring Adaptive Server with sp_sysmon 16.0
  Performance and Tuning Series: Monitoring Tables 16.0
  Performance and Tuning Series: Physical Database Tuning 16.0
  Performance and Tuning Series: Query Processing and Abstract Plans 16.0
  Glossary 16.0
  Quick Reference Guide 15.7
    Quick Reference Guide
      Datatypes
      Standards and compliance
      Datatypes and encrypted columns
      Adaptive Server global variables
      Reserved words
        Transact-SQL reserved words
        ANSI SQL reserved words
        Potential ANSI SQL reserved words
      Functions
        XML functions
      Commands
      Interactive dbsql commands
      System procedures
      Catalog stored procedures
      Extended stored procedures
      dbcc stored procedures
      System tables
      DBCC tables
      Monitoring tables
      sybpcidb tables
      Utilities
  System Tables Diagram 16.0
  Monitoring Tables Diagram 16.0
  Troubleshooting: Error Messages Advanced Resolutions 15.0
    About this book
    Introduction
      Understanding error message severity levels
        Notifying the System Administrator
      Variables in error message text
      Finding object names in error message text
      Finding the Adaptive Server version
        Understanding the field order in the version string
      Creating error messages
      Reporting errors
        Sybase Technical Support checklist
        Sending error log fragments
        Reproducing problems
    Parser Errors (100s, 7380)
      Error 102
      Error 107
      Error 195
      Error 7380
    Sequencer Errors (200s, 7783, 7788, 11000s, 14200)
      Error 207
      Error 208
      Error 213
      Error 216
      Error 225
      Error 226
      Error 229
      Error 232
      Error 233
      Error 241
      Error 247
      Error 257
      Error 259
      Error 265
      Error 266
      Error 268
      Error 277
      Error 7783
      Error 7788
      Error 11018
      Error 11068
      Error 11072
      Error 14200
    Query Processor Errors (300s, 400s, 500s)
      Error 311
      Error 313
      Error 314
      Error 403
      Error 414
      Error 428
      Error 511
      Error 512
      Error 515
      Error 530
      Error 539
      Error 540
      Error 546
      Error 547
      Error 551
      Error 584
    Access Method Errors (600s)
      Error 601
      Error 603
      Error 605
      Error 611
      Error 614
      Error 622
      Error 623
      Error 624
      Error 625
      Error 629
      Error 631
      Error 644
      Error 678
      Error 691
      Error 692
      Error 693
      Error 694
      Error 695
      Error 696
      Error 697
    Memory Manager Errors (700s)
      Error 701
      Error 702
      Error 703
      Error 706
      Error 707
      Error 709
      Error 714
      Error 715
      Error 717
      Error 718
      Error 719
      Error 720
      Error 721
    Buffer Manager Errors (800s)
      Error 803
      Error 804
      Error 806
      Error 813
      Error 820
      Error 821
      Error 822
      Error 823
      Error 832
      Error 834
      Error 835
      Error 840
      Error 842
      Error 847
      Error 849
      Error 852
      Error 855
      Error 861
      Error 863
      Error 881
      Error 890
    Open Database Manager Errors (900s)
      Error 903
      Error 905
      Error 906
      Error 908
      Error 911
      Error 913
      Error 916
      Error 921
      Error 924
      Error 925
      Error 926
      Error 930
      Error 935
      Error 940
      Error 941
      Error 945
      Error 950
      Error 965
    Abstract Plan Manager Errors (1000s)
      Error 1024
    Page Manager Errors (1100s)
      Error 1105
      Error 1108
      Error 1120
      Error 1124
      Error 1127
      Error 1129
      Error 1131
      Error 1133
      Error 1141
      Error 1142
      Error 1143
      Error 1159
      Error 1161
    Lock Manager Errors (1200s)
      Error 1203
      Error 1204
      Error 1205
      Error 1243
      Error 1244
      Error 1249
      Error 1251
      Error 1265
      Error 1279
    Sort Manager Errors (1500s)
      Error 1501
      Error 1505
      Error 1506
      Error 1508
      Error 1509
      Error 1510
      Error 1514
      Error 1530
      Error 1531
    Initialization Errors (1600s)
      Error 1601
      Error 1602
      Error 1603
      Error 1605
      Error 1608
      Error 1613
      Error 1621
      Error 1622
      Error 1623
    Create Utilities Errors (1700 - 1900s, 2100s, 2700s, 12800s)
      Error 1702
      Error 1708
      Error 1732
      Error 1803
      Error 1808
      Error 1809
      Error 1810
      Error 1813
      Error 1820
      Error 1902
      Error 1903
      Error 1916
      Error 1928
      Error 2110
      Error 2714
      Error 2729
      Error 2753
      Error 2762
      Error 12818
      Error 12842
      Error 12881
    High Availability Errors (2200s)
      Error 2243
    Character Set Conversion Errors (2400s)
      Error 2401
      Error 2402
      Error 2409
    dbcc Errors (2500s, 7900s, 12000s, 15000s)
      Error 2501
      Error 2502
      Error 2503
      Error 2507
      Error 2509
      Error 2510
      Error 2511
      Error 2513
      Error 2514
      Error 2517
      Error 2520
      Error 2521
      Error 2524
      Error 2525
      Error 2529
      Error 2540
      Error 2546
      Error 2547
      Error 2550
      Error 2558
      Error 2559
      Error 2572
      Error 2573
      Error 2574
      Error 2575
      Error 2578
      Error 2582
      Error 2583
      Error 2591
      Error 2596
      Error 7901
      Error 7902
      Error 7928
      Error 7930
      Error 7939
      Error 7940
      Error 7949
      Error 7989
      Error 9961
      Error 12964
      Error 15056
      Error 15080
      Error 15082
      Error 15084
    insert Errors (2600s)
      Error 2601
      Error 2610
      Error 2615
      Error 2619
      Error 2620
      Error 2626
      Error 2628
      Error 2630
      Error 2631
    Procedure Manager Errors (2800s)
      Error 2805
      Error 2806
      Error 2811
      Error 2812
      Error 2824
      Error 2835
      Error 2844
    dump and load Errors (3000s - 3200s, 4200s - 4300s)
      Error 3019
      Error 3020
      Error 3021
      Error 3105
      Error 3120
      Error 3143
      Error 3144
      Error 3161
      Error 3162
      Error 3201
      Error 3203
      Error 3211
      Error 3212
      Error 3216
      Error 3225
      Error 3230
      Error 3233
      Error 3240
      Error 4204
      Error 4205
      Error 4207
      Error 4216
      Error 4221
      Error 4222
      Error 4305
      Error 4322
    commit and abort Errors (3300s)
      Error 3301
      Error 3307
      Error 3321
      Error 3322
    Recovery Errors (3400s, 12500s)
      Error 3401
      Error 3403
      Error 3404
      Error 3414
      Error 3429
      Error 3434
      Error 3445
      Error 3446
      Error 3447
      Error 3452
      Error 3454
      Error 3462
      Error 3470
      Error 12546
      Error 12547
      Error 12551
      Error 12583
      Error 12587
    Exception Handling Errors (3600s)
      Error 3604
      Error 3621
      Error 3624
      Error 3626
      Error 3641
      Error 3642
      Error 3643
      Error 3644
      Error 3646
      Error 3648
    drop Errors (3700s)
      Error 3701
      Error 3702
      Error 3703
    Transaction Errors (3900s)
      Error 3904
      Error 3905
      Error 3906
      Error 3908
      Error 3917
      Error 3949
    dataserver Errors (4000s)
      Error 4001
      Error 4002
      Error 4020
    View Resolution Manager Errors (4400s)
      Error 4430
    truncate table Errors (4700s)
      Error 4716
    Bulk Copy Utility Errors (4800s)
      Error 4801
      Error 4806
    alter table Errors (4900s)
      Error 4951
      Error 4953
      Error 4954
      Error 4956
      Error 4964
    alter database Errors (5000s)
      Error 5006
      Error 5013
      Error 5018
      Error 5034
    Disk Errors (5100s)
      Error 5115
      Error 5123
      Error 5142
    Transaction Coordinator Errors (5600s)
      Error 5602
    Open Client Errors (5700s)
      Error 5701
      Error 5704
    Configuration Errors (5800s, 10800s)
      Error 5806
      Error 5808
      Error 5824
      Error 5846
      Error 5847
      Error 5848
      Error 5849
      Error 5850
      Error 5851
      Error 5852
      Error 5853
      Error 5854
      Error 5857
      Error 5859
      Error 5861
      Error 5863
      Error 5865
      Error 5866
      Error 5867
      Error 5868
      Error 5893
      Error 10841
      Error 10865
    Process Kill Errors (6100s)
      Error 6103
      Error 6107
    Timestamp Errors (6900s)
      Error 6901
      Error 6902
    Distributed Database Network Errors (7200s)
      Error 7201
      Error 7205
      Error 7207
      Error 7211
      Error 7212
      Error 7214
      Error 7215
      Error 7218
      Error 7220
      Error 7221
      Error 7223
      Error 7227
      Error 7234
      Error 7235
    Text Manager Errors (7100s)
      Error 7101
      Error 7105
      Error 7114
      Error 7130
      Error 7134
    Threshold Manager Errors (7400s)
      Error 7401
      Error 7402
      Error 7403
      Error 7404
      Error 7406
      Error 7407
      Error 7408
      Error 7409
      Error 7410
      Error 7411
      Error 7412
      Error 7413
      Error 7414
      Error 7415
      Error 7417
      Error 7418
      Error 7438
    Auditing Errors (7600s)
      Error 7618
    Remote Procedure Call Errors (8000s)
      Error 8006
      Error 8009
    Descriptor Manager Errors (8200s)
      Error 8201
      Error 8203
      Error 8204
      Error 8207
      Error 8210
      Error 8211
      Error 8219
      Error 8239
      Error 8241
    sysindexes Manager Errors (8400s)
      Error 8402
      Error 8419
    Process Status Structure Errors (8600s)
      Error 8601
    Site Buffer Manager Errors (8700s)
      Error 8704
    Disk Manager Errors (9000s)
      Error 9004
    Replication Agent Manager Errors (9100s - 9200s)
      Error 9122
      Error 9287
      Error 9289
      Error 9290
    Component Integration Services Errors (11200s)
      Error 11201
      Error 11202
      Error 11203
    Configurable Shared Memory Dump Manager (12000s, 12300s)
      Error 12036
      Error 12326
      Error 12328
      Error 12329
      Error 12330
      Error 12333
      Error 12334
      Error 12335
    Fault Isolation Utility Errors (12700s)
      Error 12716
      Error 12717
    Partition (14100s) and Partition Key Manager (14300s) Errors
      Error 14100
      Error 14108
      Error 14120
      Error 14124
      Error 14126
      Error 14313
    mount database Errors (14500s)
      Error 14503
      Error 14504
      Error 14511
      Error 14513
      Error 14560
      Error 14561
    Anchor Manager Errors (14600s)
      Error 14605
      Error 14618
      Error 14619
      Error 14620
      Error 14621
      Error 14622
      Error 14623
    XML Utility Manager Errors (14900s)
      Error 14901
    Message Service Errors (15100s)
      Error 15101
      Error 15105
    Web Services Errors (15200s)
      Error 15219
    Encryption Errors (15400s)
      Error 15402
      Error 15403
      Error 15412
      Error 15413
      Error 15417
    Statistics Errors (15600s)
      Error 15600
      Error 15601
    System Procedure Errors (17000s, 18000s)
      Error 17461
      Error 17715
      Error 17716
      Error 17737
      Error 17870
      Error 17871
      Error 17872
      Error 17873
      Error 17874
      Error 17875
      Error 17903
      Error 17904
      Error 17905
      Error 17906
      Error 17910
      Error 18031
      Error 18032
      Error 18033
      Error 18123
      Error 18750
    Kernel Errors
      Asynchronous I/O not available
      Buffer mismatch
      Could not create shared memory
      Current process infected
      dopen error
      dstart I/O request repeatedly delayed
      Failed to open device
      Feature is not licensed
      File already in use
      Memory too fragmented
      Memory usage in procedure headers
      Network information message
      No more alarms available
      Open objects parameter may be too low
      os_attach_region errors
      os_create_region errors
      Read/write errors
      Server is unnamed
      Stack guardword corrupted
      time slice error
      t_rcvconnect error
      udunmirror errors
      No more engines can be offlined
  Reference Manual: Building Blocks 16.0
    About These Topics
    System and User-Defined Datatypes
      Datatype Categories
        Exact Numeric Datatypes
          Integer Types
          Decimal Datatypes
        Approximate Numeric Datatypes
          Understanding Approximate Numeric Datatypes
          Range, Precision, and Storage Size
          Entering Approximate Numeric Data
          NaN and Inf Values
        Money Datatypes
          Accuracy
          Range and Storage Size
          Entering Monetary Values
        timestamp Datatype
          Creating a timestamp Column
        Date and Time Datatypes
          Range and Storage Requirements
          Entering Date and Time Data
            Entering the Date
            Entering the Time
            Displaying Formats for datetime, smalldatetime, and date Values
            Display Formats for bigdatetime and bigtime
            Displaying Formats for time Value
            Finding Values That Match a Pattern
            Manipulating Dates
          Standards and Compliance
        Character Datatypes
          unichar and univarchar
          Length and Storage Size
            Determining Column Length with System Functions
          Entering Character Data
            Entering Unicode Characters
          Example of Treatment of Blanks
          Manipulating Character Data
          Standards and Compliance for Character Datatypes
        Binary Datatypes
          Valid binary and varbinary Entries
          Entries of More than the Maximum Column Size
          Treatment of Trailing Zeros
          Platform Dependence
        bit Datatype
        sysname and longsysname Datatypes
        text, image, and unitext Datatypes
          Data Structures Used for Storing text, unitext, and image Data
          Initialize text, unitext, and image Columns
            Define unitext Columns
          Save Space by Allowing NULL
          Obtain Information from sysindexes
          Using readtext and writetext
          Determine How Much Space a Column Uses
          Restrictions on text, image, and unitext Columns
          Selecting text, unitext, and image Data
          Converting text and image Datatypes
          Converting to or from Unitext
          Pattern Matching in text Data
          Duplicate Rows
          Using Large Object text, unitext, and image Datatypes in Stored Procedures
            Declaring a LOB Datatype
            Creating a LOB Parameter
            Examples for Using LOB Datatypes
          Standards and Compliance
      Range and Storage Size
      Datatypes of Columns, Variables, or Parameters
        Declaring Datatypes for a Column in a Table
        Declaring Datatypes for Local Variable in a Batch or Procedure
        Declaring Datatypes for a Parameter in a Stored Procedure
        Determine the Datatype of Numeric Literals
        Determine the Datatype of Character Literals
      Datatypes of Mixed-Mode Expressions
        Determine the Datatype Hierarchy
        Determine Precision and Scale
      Datatype Conversions
        Automatic Conversion of Fixed-Length NULL Columns
        Handling Overflow and Truncation Errors
      Datatypes and Encrypted Columns
      User-Defined Datatypes
      Standards and Compliance
    Transact-SQL Functions
      abs
      acos
      allocinfo
      ascii
      asehostname
      asin
      atan
      atn2
      avg
      audit_event_name
      authmech
      biginttohex
      bintostr
      cache_usage
      case
      cast
        Usage for cast
          Conversions Involving Java Classes
          Implicit Conversion
          Explicit Conversion
      ceiling
      char
        Usage for char
          Reformatting Output With char
      char_length
      charindex
      coalesce
      col_length
      col_name
      compare
        Usage for compare
          Maximum Row and Column Length for APL and DOL
      convert
        Usage for convert
          Conversions Involving Java classes
          Implicit Conversion
          Explicit Conversion
      cos
      cot
      count
      count_big
      create_locator
      current_bigdatetime
      current_bigtime
      current_date
      current_time
      curunreservedpgs
      data_pages
      datachange
        Usage for datachange
          Restrictions for datachange
      datalength
      dateadd
      datediff
      datename
      datepart
      day
      db_attr
      db_id
      db_instanceid
      db_name
      db_recovery_status
      dbencryption_status
      defrag_status
      degrees
      derived_stat
      difference
      dol_downgrade_check
      exp
      floor
      get_appcontext
      get_internal_date
      getdate
      getutcdate
      has_role
      hash
      hashbytes
      hextobigint
      hextoint
      host_id
      host_name
      instance_id
      identity_burn_max
      index_col
      index_colorder
      index_name
      inttohex
      isdate
      is_quiesced
      is_sec_service_on
      is_singleusermode
      isnull
      isnumeric
      instance_name
      lc_id
      lc_name
      lct_admin
      left
      len
      license_enabled
      list_appcontext
      locator_literal
      locator_valid
      lockscheme
      log
      log10
      loginfo
      lower
      lprofile_id
      lprofile_name
      ltrim
      max
      migrate_instance_id
      min
      month
      mut_excl_roles
      newid
      next_identity
      nullif
      object_attr
      object_id
      object_name
      object_owner_id
      pagesize
      partition_id
      partition_name
      partition_object_id
      password_random
      patindex
      pi
      power
      proc_role
      pssinfo
      radians
      rand
      rand2
      replicate
      reserve_identity
      reserved_pages
      return_lob
      reverse
      right
      rm_appcontext
      role_contain
      role_id
      role_name
      round
      row_count
      rtrim
      sdc_intempdbconfig
      set_appcontext
      setdata
      shrinkdb_status
      show_cached_plan_in_xml
      show_cached_text
      show_cached_text_long
      show_condensed_text
      show_dynamic_params_in_xml
      show_plan
      show_role
      show_sec_services
      sign
      sin
      sortkey
        Usage for sortkey
          Collation Tables
          Collation Names and IDs
      soundex
      space
      spaceusage
      spid_instance_id
      square
      sqrt
      stddev
      stdev
      stdevp
      stddev_pop
      stddev_samp
      str
      str_replace
      strtobin
      stuff
      substring
      sum
      suser_id
      suser_name
      syb_quit
      syb_sendmsg
      sys_tempdbid
      tan
      tempdb_id
      textptr
      textvalid
      to_unichar
      tran_dumpable_status
      tsequal
        Usage for tsequal
          Adding a Timestamp to a New Table for Browsing
      uhighsurr
      ulowsurr
      upper
      uscalar
      used_pages
      user
      user_id
      user_name
      valid_name
      valid_user
      var
      var_pop
      var_samp
      variance
      varp
      workload_metric
      xa_bqual
      xa_gtrid
      xact_connmigrate_check
      xact_owner_instance
      xmlextract
      xmlparse
      xmlrepresentation
      xmltable
      xmltest
      xmlvalidate
      year
    Global Variables
      Using Global Variables in a Clustered Environment
    Expressions, Identifiers, and Wildcard Characters
      Expressions
        Size of Expressions
        Arithmetic and Character Expressions
        Relational and Logical Expressions
        Operator Precedence
        Arithmetic Operators
        Bitwise Operators
        String Concatenation Operator
        Comparison Operators
        Nonstandard Operators
        Using any, all, and in
        Negating and Testing
        Ranges
        Using Nulls in Expressions
          Comparisons That Return TRUE
          Difference Between FALSE and UNKNOWN
          Using ā€œNULLā€ as a Character String
          NULL Compared to the Empty String
        Connecting Expressions
        Using Parentheses in Expressions
        Comparing Character Expressions
        Using the Empty String
        Including Quotation Marks in Character Expressions
        Using the Continuation Character
      Identifiers
        Short Identifiers
        Tables Beginning With # (Temporary Tables)
        Case Sensitivity and Identifiers
        Uniqueness of Object Names
        Using Delimited Identifiers
          Enabling Quoted Identifiers
        Identifying Tables or Columns by Their Qualified Object Name
          Using Delimited Identifiers Within an Object Name
          Omitting the Owner Name
          Referencing Your Own Objects in the Current Database
          Referencing Objects Owned by the Database Owner
          Using Qualified Identifiers Consistently
        Determining Whether an Identifier is Valid
        Renaming Database Objects
        Using Multibyte Character Sets
      like Pattern Matching
        Using not like
      Pattern Matching with Wildcard Characters
        Case and Accent Insensitivity
        Using Wildcard Characters
          The Percent Sign (%) Wildcard Character
          The Underscore (_) Wildcard Character
          Bracketed ([ ]) Characters
          The Caret (^) Wildcard Character
        Using Multibyte Wildcard Characters
        Using Wildcard Characters as Literal Characters
          Using Square Brackets ( [ ] ) as Escape Characters
          Using the escape Clause
        Using Wildcard Characters With datetime Data
    Reserved Words
      Transact-SQL Reserved Words
      ANSI SQL Reserved Words
      Potential ANSI SQL Reserved Words
    SQLSTATE Codes and Messages
      SQLSTATE Warnings
      Exceptions
        Cardinality Violations
        Data Exceptions
        Integrity Constraint Violations
        Invalid Cursor States
        Syntax Errors and Access Rule Violations
        Transaction Rollbacks
        with check option Violation
  Reference Manual: Commands 16.0
    Commands
      alter database
        alter database Restrictions
        Using alter database for Archive Databases
        Altering In-Memory and Relaxed Durability Databases
        Backing Up master After Allocating More Space
        Placing the Log on a Separate Device
        Altering Databases for Compression
        In-row LOB Columns
        Shrinking Log Space
        Getting Help on Space Usage
        The system and default Segments
        Using alter database to Awaken Sleeping Processes
        Using the alter database for proxy_update Parameter
        Fully Encrypting Databases
      alter encryption key
      alter login
      alter index
      alter login profile
      alter precomputed result set
      alter...modify owner
      alter role
        Changing Passwords for Roles
        Mutually Exclusive Roles
      alter table
        Restrictions for alter table
        alter table and Encrypted Columns
        Altering a Table’s Compression
        Interactions Between Compression and Other alter table Parameters
        Altering the Compression Level for a Table Using Large Objects
        Getting Information About Tables
        Specifying Ascending or Descending Ordering in Indexes
        Using Cross-Database Referential Integrity Constraints
        Changing Defaults
        Setting Space Management Properties for Indexes
        Conversion of max_rows_per_page to exp_row_size
        Using reservepagegap
        Partitioning Tables for Improved Performance
        Using Computed Columns
        Adding IDENTITY Columns
        Altering Table Schema
        Restrictions for Modifying a Table Schema
        Restrictions for Modifying text and image Columns
        Modifying Tables With Unitext Columns
        Changing Locking Schemes
        Adding Java-SQL Columns
        Restrictions for Shared-Disk Clusters
      alter thread pool
      begin...end
      begin transaction
      break
      checkpoint
      close
      commit
      compute Clause
        compute Clause Restrictions
        compute Results Appear as a New Row or Rows
        Case-Sensitivity
      connect to...disconnect
      continue
      create archive database
      create database
        Restrictions for create database
        Temporary Databases
        Creating Compressed Databases
        Creating Databases With In-Row LOBs
        Creating In-Memory and Relaxed Durability Databases
        New Databases Created from model
        Ensuring Database Recoverability
        Using the for load Option
        Getting Information About Databases
        Using with default_location and for proxy_update
      create default
        create default Restrictions
        Datatype Compatibility
        Getting Information about Defaults
        Defaults and Rules
        Defaults and Nulls
        Specifying a Default Value in create table
        Objects Dependent on Replaced Defaults
      create encryption key
      create existing table
        Datatype Conversions
        Changes by Server Class
        Remote Procedures
        Encrypted Columns
      create function
        Objects Dependent on Replaced Functions
      create function (SQLJ)
      create index
        Creating Indexes Efficiently
        Creating Clustered Indexes
        Creating Indexes on Compressed Table
        Creating Indexes on Encrypted Columns
        Specifying Ascending or Descending Ordering in Indexes
        Space Requirements for Indexes
        Duplicate Rows
        Using Unique Constraints in Place of Indexes
        Using the sorted_data Option to Speed Sorts
        Specifying the Number of Histogram Steps
        Space Management Properties
        Index Options and Locking Modes
        Using the sorted_data Option on Data-Only-Locked Tables
        Getting Information About Tables and Indexes
        Creating Indexes on Computed Columns
        Creating Partitioned Indexes
        Creating Function-Based Indexes
        create index and Stored Procedures
      create login
      create login profile
      create plan
      create precomputed result set
      create procedure
        create procedure Restrictions
        execute as Stored Procedure
        System Procedures
        Nested Procedures
        Procedure Return Status
        Object Identifiers
        Temporary Tables and Procedures
        Setting Options in Procedures
        Extended Stored Procedures
        Objects Dependent on Replaced Procedures
        Getting Information About Procedures
      create procedure (SQLJ)
      create proxy_table
      create role
      create rule
        create rule Restrictions
        Binding Rules
      create schema
      create service
      create table
        Restrictions for create table
        Creating Compressed Tables
        Restrictions for Compression
        Using Indexes
        Renaming a Table or Its Columns
        Restrictions on Compressing Tables That Use Large Object (LOB) Data
        Column Definitions
        Temporary Tables
        Defining Integrity Constraints
        Unique and Primary-Key Constraints
        Referential Integrity Constraints
        Using Cross-Database Referential Integrity Constraints
        check Constraints
        IDENTITY Columns
        Specifying a Locking Scheme
        Getting Information About Tables
        Creating Tables with Partitions
        Creating Tables With Computed Columns
        Creating Tables with Encrypted Columns
        Limitations When Creating Virtually Hashed Tables
        Creating Tables for In-Memory and Relaxed Durability Databases
        Restrictions for Shared-Disk Clusters
        Space Management Properties
        Using reservepagegap
        Java-SQL Columns
        Determining Values for hash_factor
      create thread pool
      create trigger
        Triggers and Referential Integrity
        The deleted and inserted Logical Tables
        Trigger Restrictions
        Triggers and Performance
        Setting Options Within Triggers
        Dropping a Trigger
        Actions That Do Not Cause Triggers to Fire
        Nesting Triggers and Trigger Recursion
        Restrictions for instead of
        Getting Information About Triggers
        Triggers and Transactions
        Inserting and Updating Triggers
        instead of and for Triggers
      create view
        Restrictions on Views
        View Resolution
        Modifying Data Through Views
        IDENTITY Columns and Views
        group by Clauses and Views
        distinct Clauses and Views
        Creating Views from SQL-Derived Tables
        Objects Dependent on Replaced Views
      dbcc
        Using dbcc quorum (clusters only)
        Restrictions on dbcc checkstorage for Shared-Disk Clusters
        Using dbcc complete_xact
        Checking Performed by dbcc checkcatalog
        Using dbcc checktable
      deallocate cursor
      deallocate locator
      declare
      declare cursor
        Using Scrollable Cursors
        Cursor select Statements
        Cursor Scope
        Result Set
        Updatable Cursors
        Releasing Locks at Cursor Close
      delete
        delete Restrictions
        Deleting All Rows from a Table
        delete and Transactions
        Using the where current of Parameter
        Using readpast
      delete statistics
      disk init
        Using dsync with disk init
        Creating Devices for In-Memory and Relaxed Durability Databases
      disk mirror
      disk refit
      disk reinit
        Using dsync with Disk Reinit
      disk remirror
      disk resize
      disk unmirror
      drop database
      drop default
      drop encryption key
      drop function
      drop function (SQLJ)
      drop index
      drop login
      drop login profile
      drop precomputed result set
      drop procedure
      drop role
      drop rule
      drop service
      drop table
        Restrictions for drop table
        Dropping Tables with Cross-Database Referential Integrity Constraints
      drop thread pool
      drop trigger
      drop view
      dump configuration
      dump database
        Commands and System Procedures Used to Back Up Databases
        Scheduling Dumps
        Specifying Dump Devices
        Restrictions for dump database
        Dumping Databases with Devices That Are Mirrored
        Dumping the System Databases
        Dump Files
        Volume Names
        Changing Dump Volumes
        Appending to or Overwriting a Volume
        File Names and Archive Names
        dump database Performance
        Compressed Dumps for an Archive Database
        Compatibility Issues for a Compressed Dump
        Encrypted Columns and dump database
      dump transaction
        dump transaction Restrictions
        Copying the Log After Device Failure
        Dumping Databases Without Separate Log Segments
        Dumping Only Complete Transactions
        Dumping Without the Log
        Scheduling Dumps
        Using Thresholds to Automate dump transaction
        Specifying Dump Devices
        Determining Tape Device Characteristics
        Backup Servers
        Dump Files
        Volume Names
        Changing Dump Volumes
        Appending To or Overwriting a Volume
        Dumping Logs Stored on Mirrored Devices
        Fully Recoverable DDL and dump transaction
      execute
      fetch
        Status Information
        fetch Restrictions
        Using Scrollable Cursors with fetch_direction
        Multiple Rows per Fetch
        Rules for Positioning the Scrollable Cursor
      goto label
      grant
        grant all Object Creation Privileges
        Using the with grant option Parameter
        Users and User Groups
        Using the grant Command's granted by Option
        Privileges for grant
        Grant Access to Roles
        Granting Default Permissions on System Tables
        Granting Permissions for update statistics, delete statistics, and truncate table
        Granting Proxies and Session Authorizations
        Granting a Privilege to a Role
      grant role
      group by and having Clauses
        How group by and having Queries with Aggregates Work
        Standard group by and having Queries
        Transact-SQL Extensions to group by and having
        group by and having Clauses and Sort Orders
        How group by Works With the Optimizer
      if...else
      insert
        The Column List
        Validating Column Values
        Treatment of Blanks
        Inserting Rows Selected from Another Table
        Inserting Rows in Bulk
        Transactions and insert
        Inserting Values into IDENTITY Columns
        Inserting Data Through Views
        Partitoning Tables for Improved Insert Performance
      kill
      load database
        Commands and System Procedures to Restore Databases
        Restrictions for load database
        Locking Out Users During Loads
        Upgrading Database and Transaction Log Dumps
        Specifying Dump Devices
        Backup Servers
        Volume Names
        Changing Dump Volumes
        Restoring the System Databases
        Disk Mirroring
        Materializing an Archive Database
        Using load database with norecovery
        Using Logical Devices with an Archive Database
        load database Limitations with an Archive Database
        load database and Encrypted Columns
        Loading Compressed Data
      load transaction
        load transaction Restrictions
        Restoring a Database
        Recovering a Database to a Specified Time
        Locking Users Out During Loads
        Upgrading Database and Transaction Log Dumps
        Specifying Dump Devices
        Backup Servers
        Volume Names
        Changing Dump Volumes
        Disk Mirroring
        Loading a Transaction Log into an Archive Database
      lock table
      merge
      mount
      online database
      open
      order by clause
        order by Clause Restrictions
        Behavior of order by When Identical Table Column Name and Column Alias Name Exist
        Collating Sequences
        Sort Rules
        Descending Scans
      prepare transaction
      print
      quiesce database
        Encrypted Columns and quiesce database
        quiesce database in a Clustered Environment
      raiserror
      readtext
        Using the readpast Option
        Using readtext with unitext Columns
      reconfigure
      refresh precomputed result set
      remove java
      reorg
      return
      revoke
        Using the revoke Command's granted by Option
        Revoking set proxy and set session authorization
        Revoking Default Permissions on System Tables
        Revoking Permissions for update statistics, delete statistics, and truncate table
        Using the cascade Option
      revoke role
      rollback
      rollback trigger
      save transaction
      select
        Using select into
        Converting the NULL Properties of a Target Column with select...into
        Specifying a Compression Level
        Parameter Interactions with Data Compression
        Using select for update
        Specifying in-row LOB Columns
        Specifying a Lock Scheme Using select...into
        Specifying a Partition Strategy Using select...into
        Using index, prefetch, and lru | mru
        Using Encrypted Columns
        Using parallel
        Using readpast
        Expanded select * Syntax
        Using select with Variables, Global Variables, and Constants
      set
        set Options That Can Be Grouped Together
        Compile-Time Changes for Some set Parameters
        Aggregate Behavior
        Comparison Behavior
        Roles and set Options
        In-Memory and Relaxed-Durability Databases
        Setting Compression for a Session
        Using Predicated Privileges
        Distributed Transactions, CIS, and set Options
        Using Proxies
        Using lock wait
        Repeatable-Reads Transaction Isolation Level
        Using Simulated Statistics
        Global Variables Affected by set Options
        Using fipsflagger with Java in the Database
        Restrictions for set tracefile
        set Options That Save Diagnostic Information to a Trace File
        Restrictions for show_sqltext
        Exporting set Options from a Login Trigger
        Delimited Identifiers
          Bracketed Identifiers
      setuser
      shutdown
        Specifying a Wait Time
      transfer table
      truncate lob
      truncate precomputed result set
      truncate table
      union operator
      unmount
      update
        Using update with Transactions
        Using Joins in Updates
        Using update with Character Data
        Using update with Cursors
        Updating IDENTITY Columns
        Updating Data Through Views
        Using index, prefetch, or lru | mru
        Using readpast
        Using Variables in update Statements
      update all statistics
      update index statistics
      update statistics
        Types of Scans Performed During update statistics
        update statistics and Sampling
        create index and Stored Procedures
        Using Hash-Based Statistics
      update table statistics
      use
      waitfor
      where clause
      while
      writetext
    Interactive SQL Commands
      clear
      configure
      connect
      disconnect
      exit
      input
      output
      parameters
      read
      set connection
      start logging
      stop logging
      system
  Reference Manual: Procedures 16.0
    System Procedures
      Permissions on System Procedures
      Auditing System Procedures
      Executing System Procedures
      Entering Parameter Values
      Messages
      System Procedure Tables
      sp_activeroles
      sp_add_qpgroup
      sp_add_resource_limit
      sp_add_time_range
      sp_addalias
      sp_addauditrecord
      sp_addaudittable
      sp_addengine
      sp_addexeclass
      sp_addextendedproc
      sp_addexternlogin
      sp_addgroup
      sp_addlanguage
        System Table Changes
        Dates for Languages Added with sp_addlanguage
      sp_addlogin
      sp_addmessage
      sp_addobjectdef
      sp_addremotelogin
      sp_addsegment
      sp_addserver
      sp_addthreshold
        Creating Additional Thresholds
        Executing Threshold Procedures
        Changing or Deleting Thresholds
        Disabling Free-Space Accounting
        The Last-Chance Threshold
        Creating Threshold Procedures
      sp_addtype
      sp_addumpdevice
      sp_adduser
      sp_altermessage
      sp_audit
        sp_audit and Security
      sp_autoconnect
      sp_autoformat
      sp_bindcache
      sp_bindefault
      sp_bindexeclass
      sp_bindmsg
      sp_bindrule
      sp_cacheconfig
        Data Cache Memory
        Creating Cache for In-Memory or Relaxed Durability Databases
        Changing Existing Caches
        Using Cache Partitions
        Dropping Caches
      sp_cachestrategy
        Overrides
      sp_changedbowner
      sp_changegroup
      sp_checknames
      sp_checkreswords
        Handling Reported Instances of Reserved Words
        Changing Identifiers
        Using sp_rename to Change Identifiers
        Changing Other Identifiers
        Using Delimited Identifiers
      sp_checksource
      sp_chgattribute
      sp_cleanpwdchecks
      sp_clearpsexe
      sp_clearstats
      sp_client_addr
      sp_cluster
      sp_clusterlockusage
      sp_cmp_all_qplans
      sp_cmp_qplans
      sp_commonkey
      sp_companion
      sp_compatmode
      sp_config_dump
      sp_confighistory
      sp_configure
        The sp_configure number of checkpoint tasks Parameter
        The sp_configure max concurrently recovered db Parameter
        Setting Configuration Parameters for Clusters Using sp_configure
      sp_copy_all_qplans
      sp_copy_qplan
      sp_countmetadata
      sp_cursorinfo
      sp_dbextend
      sp_dboption
        Full Logging and sp_dboption
        Shrinking the Log
        Allowing Wide Rows Using sp_dboption
        Asynchronous Log Service (ALS) Options
        Considerations for Using enforce dump tran sequence
        Database Options and sp_dboption
      sp_dbrecovery_order
      sp_dbremap
      sp_defaultloc
      sp_deletesmobj
      sp_depends
        Java Methods
      sp_deviceattr
      sp_diskdefault
      sp_displayaudit
      sp_displaylevel
      sp_displaylogin
      sp_displayroles
      sp_downgrade
      sp_dropalias
      sp_drop_all_qplans
      sp_drop_qpgroup
      sp_drop_qplan
      sp_drop_resource_limit
      sp_drop_time_range
      sp_dropdevice
      sp_dropengine
      sp_dropexeclass
      sp_dropextendedproc
      sp_dropexternlogin
      sp_dropglockpromote
      sp_ dropglockpromote_ptn
      sp_dropgroup
      sp_dropkey
      sp_droplanguage
      sp_droplogin
      sp_dropmessage
      sp_dropobjectdef
      sp_dropremotelogin
      sp_droprowlockpromote
      sp_droprowlockpromote_ptn
      sp_dropsegment
      sp_dropserver
      sp_dropthreshold
      sp_droptype
      sp_dropuser
      sp_dump_history
      sp_dump_info
      sp_dumpoptimize
        Thresholds and sp_dumpoptimize
      sp_encryption
      sp_engine
        Using sp_engine ā€œofflineā€ Versus sp_engine ā€œshutdownā€
      sp_errorlog
      sp_estspace
        Estimating the Extra Space Required by a Column
      sp_export_qpgroup
      sp_extendsegment
      sp_extengine
      sp_extrapwdchecks
      sp_familylock
      sp_find_qplan
      sp_fixindex
      sp_flushstats
      sp_forceonline_db
      sp_forceonline_object
      sp_forceonline_page
      sp_foreignkey
      sp_freedll
      sp_getmessage
      sp_grantlogin
      sp_ha_admin
      sp_help
        Rules for Finding Objects
        Precomputed Result Sets and sp_help
      sp_help_resource_limit
      sp_help_qpgroup
      sp_help_qplan
      sp_helpapptrace
      sp_helpartition
        Accuracy of Results and sp_helpartition
      sp_helpcache
      sp_helpcomputedcolumn
      sp_helpconfig
        Planning Metadata Cache Configuration with sp_helpconfig
        Estimate Memory Requirements for compression info pool size
        Using sp_helpconfig with sybdiagdb (SAP Product Support Only)
      sp_helpconstraint
      sp_helpdb
      sp_helpdefrag
      sp_helpdevice
      sp_helpextendedproc
      sp_helpexternlogin
      sp_helpgroup
      sp_helpindex
      sp_helpjava
      sp_helpjoins
      sp_helpkey
      sp_helplanguage
      sp_helplog
      sp_helpmaplogin
      sp_helpobjectdef
      sp_helpremotelogin
      sp_helprotect
      sp_helpsegment
      sp_helpserver
      sp_helpsort
      sp_helptext
      sp_helpthread
      sp_helpthreshold
      sp_helptrigger
      sp_helpuser
      sp_hidetext
      sp_import_qpgroup
      sp_indsuspect
      sp_jreconfig
      sp_ldapadmin
      sp_listener
      sp_listsuspect_db
      sp_listsuspect_object
      sp_listsuspect_page
      sp_lmconfig
      sp_lock
      sp_locklogin
      sp_logdevice
      sp_logging_rate
      sp_loginconfig
      sp_logininfo
      sp_logiosize
      sp_logintrigger
      sp_maplogin
      sp_merge_dup_inline_default
      sp_metrics
      sp_modify_resource_limit
      sp_modify_time_range
      sp_modifylogin
      sp_modifystats
      sp_modifythreshold
        Crossing a Threshold
        The Last-Chance Threshold
        Create Threshold Procedures with sp_modifythreshold
        Execute Threshold Procedures with sp_modifythreshold
        Disable Free-Space Accounting
      sp_monitor
      sp_monitorconfig
      sp_monitor_server
      sp_object_stats
      sp_objectsegment
      sp_opt_querystats
      sp_optgoal
      sp_options
      sp_passthru
        Return Parameters and sp_passthru
      sp_password
      sp_passwordpolicy
        Login Password Complexity Checks and sp_passwordpolicy
        High-Availability and Password Policy Options
      sp_pciconfig
      sp_placeobject
      sp_plan_dbccdb
      sp_poolconfig
        Wash Percentage and sp_poolconfig
        Local Asynchronous Prefetch Percentage and sp_poolconfig
      sp_post_xpload
        Handling Suspect Partitions in Cross-Platform Dump and Load Operations
      sp_primarykey
      sp_processmail
      sp_procxmode
      sp_querysmobj
      sp_recompile
      sp_refit_admin
      sp_remoteoption
      sp_remotesql
      sp_rename
      sp_rename_qpgroup
      sp_renamedb
      sp_reportstats
      sp_restore_system_role
      sp_revokelogin
      sp_role
      sp_securityprofile
      sp_sendmsg
      sp_serveroption
      sp_set_qplan
      sp_setlangalias
      sp_setpglockpromote
      sp_setpglockpromote_ptn
      sp_setpsexe
      sp_setrowlockpromote
      sp_setrowlockpromote_ptn
      sp_setsuspect_granularity
      sp_setsuspect_threshold
      sp_setup_table_transfer
      sp_shmdumpconfig
      sp_show_options
      sp_showcontrolinfo
      sp_showexeclass
      sp_showoptstats
      sp_showplan
      sp_showpsexe
      sp_spaceusage
        Interpreting PctBloatUsedPages and PctBloatReservedPages Values
        Output Columns from sp_spaceusage
      sp_spaceused
      sp_ssladmin
        Using lsciphers and setciphers to Set Cipher Suites
      sp_syntax
      sp_sysmon
      sp_tab_suspectptn
      sp_tempdb
      sp_tempdb_markdrop
      sp_thresholdaction
      sp_tran_dumpable_status
      sp_transactions
      sp_unbindcache
      sp_unbindcache_all
      sp_unbindefault
      sp_unbindexeclass
      sp_unbindmsg
      sp_unbindrule
      sp_version
      sp_volchanged
        When Backup Server Detects a Problem
        Changing Tape Volumes on UNIX
      sp_webservices
      sp_who
      sp_xact_loginfo
      sp_xmlschema
    Catalog Stored Procedures
      Specifying Optional Parameters
      Pattern Matching
      System Procedure Tables
      ODBC Datatypes
      sp_column_privileges
      sp_columns
      sp_databases
      sp_datatype_info
      sp_fkeys
      sp_pkeys
      sp_server_info
      sp_special_columns
      sp_sproc_columns
      sp_statistics
      sp_stored_procedures
      sp_table_privileges
      sp_tables
    System Extended Stored Procedures
      xp_cmdshell
      xp_deletemail
      xp_enumgroups
      xp_findnextmsg
      xp_logevent
      xp_readmail
      xp_sendmail
      xp_startmail
      xp_stopmail
    dbcc Stored Procedures
      Specifying the Object Name and Date
        Specifying the Object Name
        Specifying the Date
      sp_dbcc_alterws
      sp_dbcc_configreport
      sp_dbcc_createws
      sp_dbcc_deletedb
      sp_dbcc_deletehistory
      sp_dbcc_differentialreport
      sp_dbcc_evaluatedb
      sp_dbcc_exclusions
      sp_dbcc_faultreport
      sp_dbcc_fullreport
      sp_dbcc_help_fault
      sp_dbcc_patch_finishtime
      sp_dbcc_recommendations
      sp_dbcc_runcheck
      sp_dbcc_statisticsreport
      sp_dbcc_summaryreport
      sp_dbcc_updateconfig
  Reference Manual: Tables 16.0
    System Tables
      Locations of System Tables
        System Tables in master
        System Tables in sybsecurity
        System Table in sybsystemdb
        System Tables in All Databases
        The sybdiagdb Database
        The syblicenseslog Table
      Using System Tables in the Cluster Edition
        timestamp Columns
        Changed Identity Values
        Controlling Fake-Table Materialization
      Rules for Using System Tables
        Permissions on System Tables
        Locking Schemes Used for System Tables
        Reserved Columns
        Updating System Tables
        Triggers on System Tables
      ch_events
      sysdams
      syblicenseslog
      sysalternates
      sysaltusages
      sysattributes
      sysauditoptions
      sysaudits_01 – sysaudits_08
      syscacheinfo
      syscachepoolinfo
      syscharsets
      syscolumns
      syscomments
      sysconfigures
      sysconstraints
      syscoordinations
      syscurconfigs
      sysdatabases
      sysdepends
      sysdevices
      sysencryptkeys
      sysengines
      sysgams
      sysindexes
      sysinstances
      sysjars
      syskeys
      syslanguages
      syslisteners
      syslocks
      sysloginroles
      syslogins
      syslogs
      syslogshold
      sysmessages
      sysmonitors
      sysobjects
      sysoptions
      syspartitionkeys
      syspartitions
      syspoolinfo
      sysprocedures
      sysprocesses
      sysprotects
      sysquerymetrics
      sysqueryplans
      sysreferences
      sysremotelogins
      sysresourcelimits
      sysroles
      syssecmechs
      syssegments
      sysservers
      syssessions
      sysslices
      syssrvroles
      sysstatistics
      systabstats
      systhresholds
      systimeranges
      systransactions
      systypes
      sysusages
      sysusermessages
      sysusers
      sysxtypes
    dbccdb Tables
      dbccdb Workspaces
      dbccdb Log
      dbcc_config
      dbcc_counters
      dbcc_exclusions
      dbcc_fault_params
      dbcc_faults
      dbcc_operation_log
      dbcc_operation_results
      dbcc_types
    Monitoring Tables
      monCachedObject
      monCachePool
      monCachedProcedures
      monCachedStatement
      monCIPC
      monCIPCEndpoints
      monCIPCLinks
      monCIPCMesh
      monCLMObjectActivity
      monClusterCacheManager
      monCMSFailover
      monDataCache
      monDBRecovery
      monDBRecoveryLRTypes
      monDeadLock
      monDeviceIO
      monDeviceSpaceUsage
      monEngine
      monErrorLog
      monFailoverRecovery
      monInmemoryStorage
      monIOController
      monIOQueue
      monLicense
      monLocks
      monLockTimeout
      monLogicalCluster
      monLogicalClusterAction
      monLogicalClusterInstance
      monLogicalClusterRoute
      monMemoryUsage
      monNetworkIO
      monOpenDatabases
      monOpenObjectActivity
      monOpenPartitionActivity
      monPCIBridge
      monPCIEngine
      monPCISlots
      monPCM
      monProcedureCache
      monProcedureCacheMemoryUsage
      monProcedureCacheModuleUsage
      monProcess
      monProcessActivity
      monProcessLookup
      monProcessMigration
      monProcessNetIO
      monProcessObject
      monProcessProcedures
      monProcessSQLText
      monProcessStatement
      monProcessWaits
      monProcessWorkerThread
      monRepCoordinator
      monRepLogActivity
      monRepScanners
      monRepScannersTotalTime
      monRepSchemaCache
      monRepSenders
      monSpinlockActivity
      monSQLRepActivity
      monSQLRepMisses
      monState
      monStatementCache
      monSysExecutionTime
      monSysLoad
      monSysPlanText
      monSysSQLText
      monSysStatement
      monSysWaits
      monSysWorkerThread
      monTableColumns
      monTableCompression
      monTableParameters
      monTables
      monTableTransfer
      monTask
      monTempdbActivity
      monThread
      monThreadPool
      monThresholdEvent
      monWaitClassInfo
      monWaitEventInfo
      monWorkload
      monWorkloadPreview
      monWorkloadProfile
      monWorkloadRaw
      monWorkQueue
    sybpcidb Tables
      pca_jre_arguments
      pca_jre_directives
      pci_arguments
      pci_directives
      pci_slotinfo
      pci_slot_syscalls
  Active Messaging Users Guide 15.7
    Introduction
      Active Messaging concepts
      Automatic decisions in real time
      Messaging models
        JMS
        WebSphere MQ messaging models
      Message format
        JMS message properties
        MQ message topics
      Message selectors
    Understanding Active Messaging
      Sending and receiving messages from a queue
      Publishing and consuming messages from a JMS topic
      Working with message properties
      Previewing the messaging interface
      MQ overview
      Securing channels with SSL
      MQ publish/subscribe
        Syntax for topics
        Publisher and subscriber identities
        MQ publish/subscribe examples
      Working with MQ cluster queue objects
      Working with remote queue objectsļæ½
      Working with text messaging
        Text messages and JMS
        Text messages and MQ
      Adaptive Server Cluster Edition support
        Login redirection
        Extended high availability
      Active Messaging support for the threaded kernel
      Internationalization support
      Transactional message behavior
        Transactional messaging set option
      MQ security
        Connecting to the MQ queue manager
      Installing MQ client on Adaptive Server host machines
      MQ authorizations
      Querying MQ information
    SQL Reference
      Message-related global variables
      <msgheader> and <msgproperties> documents
      Adaptive Server-specific message properties
      Keywords
      Stored procedures
      Built-in functions
      Syntax segments
      sp_configure 'enable real time messaging'
      sp_engine
      sp_msgadmin
      msgconsume
      msgpropcount
      msgproplist
      msgpropname
      msgproptype
      msgpropvalue
      msgpublish
      msgrecv
      msgsend
      msgsubscribe
      msgunsubscribe
      endpoint
      option_string
      sizespec
      timespec
    Samples
      Sybase directories
      Using code samples with SQL
      Using code samples with Java/JDBC
    Glossary
  Component Integration Services Users Guide 16.0
    Introduction to Component Integration Services
    Component Integration Services Concepts
      Proxy Tables
        Using the create table Command
        Using the create existing table Command
          Datatype Conversions
        Using the create proxy_table Command
        Remote Procedures as Proxy Tables
        Server Limits
        Cascading Proxy Tables
      Proxy Databases
        User Proxy Databases
          User Proxy Database Schema Synchronization
        System Proxy Databases
          System Proxy Database Creation
          Schema Synchronization When Current Database Has a System Proxy Database
          Stored Procedure Execution Within a System Proxy Database
      File System Access
        Directory Access
        Recursion Through Subordinate Directories
        File Access
      Remote Servers
        Connection Management
        Connecting to Remote Servers Without the Interfaces File
        LDAP Directory Services
        Secure Communication with SSL
          Using Trusted Roots Files
        Secure Communication Using Kerberos
          Configuring Kerberos security services
          Configuring the Remote SAP ASE Kerberos Principal Name
          Configuring Component Integration Services Remote Procedure Calls
        Security Issues
          Using Encrypted Columns in CIS
        Remote Server Logins
          Connecting to Backup Server and XP Server
        Mapping External Logins
        Configuring Failover for Remote Server Connections
        Remote Server Capabilities
      Query Processing
      RPC handling and Component Integration Services
        Site Handler and Outbound RPCs
        Configuring Component Integration Services for Outbound RPCs
        Text Parameters for RPCs
        Text Parameter Support for XJS/390
      Distributed Transaction Management
        DTM-Enabled Servers
        Pre-DTM servers
        strict DTM enforcement
        Enable Component Integration Services
        Transactional RPCs
        Restrictions on Transaction Management
      SAP ASE to SAP ASE update statistics
      Updating Statistics on Non-SAP ASE Backends
      Java in the Database
        Constraints on Java Class Columns
        Java Abstract Datatypes (ADTs)
          Java Class Definitions
      Datatypes
        Unicode support
        Datatype Conversions
        text and image Datatypes
          Limits of @@textsize
          Odd Bytes Padded
          Converting text and image Datatypes
          Pattern Matching with text and unitext Data
          Entering text and image Values
          readtext using bytes
          Restriction for text, image, and unitext with bulk copy
          Considerations for Using text, unitext, and image data with Server Classes
      Configuration and Tuning
        Using sp_configure
          sysconfigures Table
          Changing the Configuration Parameters
        Using Global Variables to Determine Status
    CIS Support for HANA Server
      Configuring CIS for HANA
        Creating SAP HANA as an ODBC Data Source on Windows
        Adding SAP HANA to the SAP ASE Interfaces File
        Configuring the PCI Bridge and PCA/ODBC
      Adding Server Class HANAODBC
      Datatype Mapping Between SAP ASE and HANA
      Restrictions
    SQL Reference
      dbcc Commands
        dbcc Options
        Trace Flags
      Functions
        Aggregate Functions
        Datatype Conversion Functions
        Date Functions
        Mathematical Functions
        Security Functions
        String Functions
        System Functions
        Text and Image Functions
      Transact-SQLCommands
        alter table
        case
        connect to...disconnect
        create existing table
        create index
        create table
        delete
        drop index
        fetch
        insert
        readtext
        select
        truncate table
        update
        update statistics
        writetext
      Passthrough Mode
        The connect to Command
        The sp_autoconnect System Procedure
        The sp_passthru System Procedure
        The sp_remotesql System Procedure
      Quoted Identifier Support
      Delimited Identifier Support
      auto identity Option
      Triggers
    Tutorial
      Adding a Remote Server
        Creating Server Entries in System Tables
        Adding an Alternate Login and Password
        Verifying Connectivity
      Performing a Join Between Two Remote Tables
    Troubleshooting
      Problems Accessing Component Integration Services
      Problems Using Component Integration Services
        Unable to Access Remote Server
        Unable to Access Remote Objects
        Problem Retrieving Data from Remote Objects
      If You Need Help
  Compression Users Guide 16.0
    Data Compression Overview
      Enabling Data Compression
      Selecting Data into Compressed Tables
      Administering Compressed Databases
        Session-Level Data Compression
        Copy, Dump, and Load Compressed Data
      Limits for Database Compression
    Levels of Data Compression
      Row-Level Compression
      Page-Level Compression
    Creating Databases for Data Compression
      Altering the Compression Level of a Database
    Creating a Compressed Table
      Disabling Compression
      Altering the Compression Level of a Table or Partition
    Index Compression
      Enabling Index Compression
      Creating an Index Compressed Table
      Creating a Compressed Index
      Changing the Index Compression State
    Datatypes Available for Compression
    Compressed Data Storage Strategies
    Compressed Columns with Large Objects
      Creating a Compressed Database with LOB Datatypes
      Creating Compressed Tables with LOB Datatypes
      Altering Tables with Compressed LOB Datatypes
    Administering Compressed Databases
      Session-Level Data Compression
      Copy, Dump, and Load Compressed Data
    Limits for Database Compression
  Database Encryption 16.0
    Overview of Encryption
      Full Database Encryption
      Column Encryption
    Protect Data with Encryption Keys
      Creating the Database Encryption Key
        Dropping a Database Encryption Key
        Changing a Database Encryption Key
      Creating Column Encryption Keys
        Dropping Column Encryption Keys
        Changing the Column Encryption Key
      Key Protection
        Grant Access to Keys
        Separate Keys from Data
    Key Encryption
      Protect Encryption Keys with the Master Key
      Protect Encryption Keys with the System-Encryption Password
      Protect Keys with User-Specified Passwords
      Protect Encryption Keys with Dual Control
    Database-Level Master and Dual Master Keys
      Creating the Master and Dual Master Keys
        Creating Master Key Copies
      Setting Passwords for the Master and Dual Master Keys
      Altering Passwords and Key Encryption Keys for Master Key Copies
      Regenerate Master Keys
      Dropping Master Keys and Key Copies
      Recovering the Master Key and Dual Master Key
      Starting SAP ASE in Unattended Start-Up mode
        Configure Unattended Start-Up Mode
        Create the Master Key Start-Up File
        How SAP ASE Uses the Master Key Start-Up File
    Secure External Passwords and Hidden Text
      Service Keys
        Creating Service Keys
        Dropping Service Keys
        Modify Service Keys
          Changing the syb_extpasswdkey
          Changing the syb_syscommkey
        Service Keys with External Passwords
          SSL Passwords
          LDAP Passwords
          Replication Agent Passwords
      Service Keys Encrypted with the Master Key
    Database Encryption
      Create an Encrypted Database
      Encrypt an Existing Database
      Encryption Status and Progress
      Performance Considerations
      Suspend the Encryption Process
        The quiesce database Command and Fully Encrypted Databases
      Resume the Encryption Process
      Decrypt an Encrypted Database
      Recover Fully Encrypted Databases
      Back Up (Dump) a Fully Encrypted Database
      Back Up the Database Encryption Key
      Restore (Load) Backups of Fully Encrypted Databases
      Loading Behavior of Encrypted Databases
      Dropping a Database That is Being Encrypted
      Mounting and Unmounting a Fully Encrypted Database
      Archive Databases and Full Encryption
    Column Encryption
      Encrypting Columns on New Tables
        Specifying Encryption on select into
      Encrypting Columns in Existing Tables
      Index Creation and Constraints on Encrypted Columns
      Domain Creation and Access Rules on Encrypted Columns
      Decrypt Permission
        Revoking Decryption Permission
      Restrict Decrypt Permission
      Default Values Returned Instead of Decrypted Data
        Defining Decrypt Defaults
        Permissions and Decrypt Default
        Columns with Decrypt Default Values
        Decrypt Default Columns and Query Qualifications
        decrypt default and Implicit Grants
        decrypt default and insert, update, and delete Statements
        Removing Decrypt Defaults
      Length of Encrypted Columns
      Encrypted Columns Audits
        Event Names and Numbers
        Passwords Masked in Command Text Auditing
        Auditing Actions of the Key Custodian
      Performance Considerations
        Indexes on Encrypted Columns
        Sort Orders and Encrypted Columns
        Joins on Encrypted Columns
        Search Arguments and Encrypted Columns
        Movement of Encrypted Data as Cipher Text
      Access Encrypted Data
        Encrypted Columns Process
        Permissions for Decryption
        Drop Encryption
    Role of the Key Custodian
      Users, Roles, and Data Access
    Key Protection Using User-Specified Passwords
      Change a Key’s Protection Method
      Create Key Copies
      Change Passwords on Key Copies
      Access Encrypted Data with a User Password
      Application Transparency Using Login Passwords on Key Copies
      Login Password Change and Key Copies
      Dropping a Key Copy
    Key Recovery from Lost Passwords
      Loss of Password on Key Copy
      Loss of Login Password
      Loss of Password on Base Key
      Key Recovery Commands
      Ownership Change of Encryption Keys
  In-Memory Database Users Guide 15.7
    In-Memory Databases
      Cache and buffer support
      Durability levels
        Temporary databases and in-memory temporary databases
        Multidatabase transactions and database types
      Template databases
        Altering the database to use a new template
      Minimally logged commands
      Limits for in-memory and relaxed-durability databases
        Changed system procedures
    Managing In-Memory and Relaxed-Durability Databases
      Specifying named caches for in-memory databases
      Verifying changes to the configuration file
        Changing static configuration parameters for in-memory databases
      Creating in-memory devices
      Creating in-memory databases
      Creating disk-resident databases with relaxed durability
      Administering in-memory databases
        Resizing in-memory storage caches
        Deleting in-memory storage caches
        Increasing the size of in-memory databases
        Dumping and loading in-memory databases
          Configuring number of backup connections
        Dropping in-memory databases
        Dropping in-memory devices
    Minimally Logged DML
      Types of DML logging settings
        Database-level logging
        Table-level logging
        Session-level logging
        Additional minimal logging rules
      Transactional semantics
      Logging concurrent transactions
      Minimal logging with ddl in tran set to true
      Effect of referential integrity constraints
      Multistatement transactions in minimally logged mode
      Stored procedures and minimally logged DML
      Including set dml_logging in a trigger
      Using deferred updates
      Obtaining diagnostic information
    Performance and Tuning for In-Memory Databases
      Configuring in-memory storage cache
        Cache layout
      sp_sysmon output for in-memory databases
      Monitoring the default data cache performance
      Organizing physical data for in-memory devices
      Performance optimization for low-durability databases
        Tuning checkpoint intervals
      Minimally logged DML
      Dumping and loading in-memory databases
      Tuning for spinlock contention and network connections
        Improving contention for lock manager hashtable spinlock ratios
        Determining the number of network connections
  Java in Adaptive Server Enterprise 15.7
    An Introduction to Java in the Database
      Advantages of Java in the database
      Capabilities of Java in the database
        Invoking Java methods in the database
        Storing Java classes as datatypes
        Storing and querying XML in the database
      Java components
      Functional changes in Adaptive Server 15.0.3 and later
        Changes in class distribution
        The PCA/JVM runs in headless mode
        Changes in memory management
        Changes in ClassLoader behavior
      Standards
      Java in the database: questions and answers
        What are the key features?
        How are Java instructions stored in the database?
        How is Java executed in the database?
        Which Java Virtual Machines (JVMs) are supported?
        What is headless mode?
        What about JDBC?
        How can Java and SQL be used together?
        What is the Java API?
        Which Java classes are supported in the Java API?
        Can user-defined classes be installed in the database?
        Can data be accessed using Java?
        Can the same classes be used on the client and the server?
        How to use Java classes in SQL
        Where can information about Java in the database be found?
        What you cannot do with Java in the database
    Managing the Java Environment
      Components of the Java environment
        The JVM pluggable component
        Pluggable component adapter JVM (PCA/JVM)
        Pluggable component interface (PCI) and the PCI Bridge
        The PCI memory pool
        The sybpcidb database
        How configuration values are organized in sybpcidb
      When to change configuration values
        Server-level options
        Configuration options for the PCI Bridge
        Configuration options for the PCA/JVM
      Changing configuration values in a running server
        Changing configuration values by restarting Adaptive Server
        Changing configuration values before the JVM is initialized
        Changing configuration values after the JVM is initialized
      Restoring default configuration values to sybpcidb
      Using monitor tables to display information about the PCI Bridge
    Preparing for and Maintaining Java in the Database
      The Java runtime environment
        Java classes in the database
          Sybase runtime Java classes
          User-defined Java classes
        JDBC drivers
        The JVM
      Enabling Java
      Installing Java classes in the database
        Using installjava
          Installing uncompressed JARs
          Retaining the JAR file
          Updating installed classes
        Referencing other Java-SQL classes
      Viewing information about installed classes and JARs
      Downloading installed classes and JARs
      Removing classes and JARs
        Retaining classes
    Using Java Classes in SQL
      General concepts
        Java considerations
        Java-SQL names
      Using Java classes as datatypes
        Creating and altering tables with Java-SQL columns
          Altering partitioned tables
        Selecting, inserting, updating, and deleting Java objects
      Invoking Java methods in SQL
        Sample methods
        Exceptions in Java-SQL methods
      Representing Java instances
      Assignment properties of Java-SQL data items
      Datatype mapping between Java and SQL fields
      Character sets for data and identifiers
      Subtypes in Java-SQL data
        Widening conversions
        Narrowing conversions
        Runtime versus compile-time datatypes
      Treatment of nulls in Java-SQL data
        References to fields and methods of null instances
        Null values as arguments to Java-SQL methods
        Null values when using the SQL convert function
      Java-SQL string data
        Zero-length strings
      Type and void methods
        Java void instance methods
        Java void static methods
      Equality and ordering operations
      Evaluation order and Java method calls
        Columns
        Variables and parameters
        Deterministic Java functions in expressions
      Static variables in Java-SQL classes
        Changes for static variables for Adaptive Server 15.0.3 and later
        Changes for static variables for the Cluster Edition
      Java classes in multiple databases
        Scope
        Cross-database references
        Inter-class transfers
        Passing inter-class arguments
        Temporary and work databases
      Java classes
    Data Access Using JDBC
      Overview
      JDBC concepts and terminology
      Differences between client- and server-side JDBC
      Permissions
      Using JDBC to access data
        Overview of the JDBCExamples class
        The main( ) and serverMain( ) methods
          Using main( )
          Using serverMain( )
        Obtaining a JDBC connection: the Connecter( ) method
        Routing the action to other methods: the doAction( ) method
        Executing imperative SQL operations: the doSQL( ) method
        Executing an update statement: the updater( ) method
        Executing a select statement: the selecter( ) method
        Calling a SQL stored procedure: the caller( ) method
      Error handling in the native JDBC driver
      The JDBCExamples class
        The main( ) method
        The serverMain( ) method
        The connecter( ) method
        The doAction( ) method
        The doSQL( ) method
        The updater( ) method
        The selecter( ) method
        The caller( ) method
    SQLJ Functions and Stored Procedures
      Overview
        Compliance with SQLJ Part 1 specifications
        General issues
        Security and permissions
        SQLJ Examples
      Invoking Java methods in Adaptive Server
      Using Sybase Central to manage SQLJ functions and procedures
      SQLJ user-defined functions
        Handling null argument values
          Handling nulls when creating the function
          Handling nulls in the function call
        Deleting a SQLJ function name
      SQLJ stored procedures
        Modifying SQL data
        Using input and output parameters
        Returning result sets
          Deleting a SQLJ stored procedure name
      Viewing information about SQLJ functions and procedures
      Advanced topics
        Mapping Java and SQL datatypes
        Using the command main method
      SQLJ and Sybase implementation: a comparison
      SQLJExamples class
    Debugging Java in the Database
      Supported Java debuggers
      Setting up Java debugging
        Configuring the server to support debugging
        Attaching the remote debugger to the JVM debug agent
    File and Network Access Using Java
      File access using java.io
        User identity and permissions
        Specifying directories for file I/O: UNIX platforms
          Mask syntax
          Examples
        Specifying directories for file I/O: Windows platforms
          Mask syntax
          Examples
        File I/O changes
        Rules for opening existing files
          UNIX platforms
          Windows platforms
        Rules for creating files with a file open operation
        Final file check
      File access using java.net
        Examples
          Using socket classes
          Using the URL classes
    Additional Topics
      JDK requirement for Java classes in the server
      Assignments
        Assignment rules at compile-time
        Assignment rules at runtime
      Allowed conversions
      Transferring Java-SQL objects to clients
      Suggestions for improving performance
        Minimize the number of calls from SQL to the JVM
        Use the java.lang.Thread class with care
        Determine if you are running within the PCA/JVM
        Avoid SQL loops in a multi-engine environment
      Controlling access to native methods in the PCA/JVM
      Unsupported Java API packages, classes, and methods
        Restricted Java packages, classes, and methods
        Unsupported java.sql methods and interfaces
      Invoking SQL from Java
        Special considerations
      Transact-SQL commands from Java methods
      Datatype mapping between Java and SQL
      Java-SQL identifiers
      Java-SQL class and package names
      Java-SQL column declarations
      Java-SQL variable declarations
      Java-SQL column references
      Java-SQL member references
      Java-SQL method calls
    Glossary
  Job Scheduler Users Guide 16.0
  Unified Agent and Agent Management Console Users Guide 2.0.2
    About this book
    Overview
      What is Unified Agent?
      Services provided
      Agent Management Console
    Installing and Configuring Unified Agent and Agent Management Console
      Pre-installation tasks
      Installing Unified Agent
        Starting the JINI server
        Starting and stopping Unified Agent
        Starting Unified Agent as a service on UNIX platforms
        Starting Unified Agent as a service on Windows platforms
        Installing the Agent Management Console
      Configuring Unified Agent
        Post-configuration tasks
    Security
      Unified Agent security
        Encryption
        Authentication
          Login modules
          Security module control flags
        Authorization
        Role mappings
        Permissions
    Agent Management Console Features and Functionality
      Managing look-up services
        Creating a network lookup profile
        Discovering Unified Agents
        Deleting a network look-up profile
        Changing a network look-up profile
        Specifying a network plug-in name filter
      Managing Unified Agents
        Manually adding an agent
        Connecting to an agent
        Adding credentials
        Disconnecting from an agent
        Restarting an agent
        Retrieving the agent log
        Viewing and changing agent properties
      Managing discovery adaptors
        Creating a discovery adaptor
        Deleting a discovery adaptor
        Viewing and changing discovery adaptor properties
        Setting discovery adaptor password
      Managing security modules
        Creating a security module
        Deleting a security module
        Ordering the security module authentication
        Viewing and changing security module properties
        Setting a security module password
      Managing role mappings
        Creating a role mapping
      Managing agent services
        Starting an agent service
        Restarting an agent service
        Stopping an agent service
        Viewing agent service properties
      Managing agent plug-ins
        Loading an agent plug-in
        Unloading an agent plug-in
        Reloading an agent plug-in
        Viewing agent plug-in properties
        Server-based plug-ins
          Pinging the server
          Starting the server
          Restarting the server
          Stopping the server
          Retrieving the server log
      Managing attributes
        Viewing attributes
        Updating attribute values
        Viewing properties and changing permissions
      Managing operations
        Viewing operations
    Password Encryption and Security Configuration
      Password encryption utility
      Enabling Rivest-Shamir-Adleman (RSA) encryption
      Adaptive Server agent plug-in server password encryption
      Pluggable Authentication Module (PAM) configuration
    SNMP Agent Plug-in
      Overview
      Terminology
      Sybase Adaptive Server MIB
      Unified Agent SNMP services and plug-ins
        UAF SNMP Service
        UAF SNMP Service MIBs
      Adaptive Server-to-SNMP client architecture
      Security
        Security for connections from Adaptive Server
        Security for connections from SNMP
      Configuring Adaptive Server for the SNMP Agent Plug-in
      TDS services
      UAF SNMP Agent Service
      Adaptive Server runtime
      Using the Adaptive Server SNMP Agent Plug-in
        Viewing the SNMP information from NET-SNMP
      Sybase MIB
    Tabular Data Stream (TDS) Service
      What is TDS?
      Using the TDS service
      UAF services
        uaf_list_service_operations
        uaf_list_services
        uaf_list_service_operation_arguments
        uaf_invoke_service_operation
        uaf_list_service_attributes
        uaf_get_service_attribute
        uaf_set_service_attribute
      UAF plug-ins
        uaf_list_plugins
        uaf_list_plugin_operations
        uaf_list_plugin_operation_arguments
        uaf_invoke_plugin_operation
        uaf_list_plugin_attributes
        uaf_get_plugin_attribute
        uaf_set_plugin_attribute
      TDS listener client examples
        Setting up examples for the Adaptive Server client
        Examples for configuring the Adaptive Server client
        Examples for using the Adaptive Server client
        Examples for configuring the Adaptive Server client
      Reporting functionality and error recovery
  Using Backup Server with IBM Tivoli Storage Manager 16.0
  Using SAP Failover in a High Availability System 16.0
  Web Services Users Guide 15.7 ESD #2
    Understanding Adaptive Server Enterprise Web Services
      Overview
      Adaptive Server Enterprise Web Services
      Advantages of ASE Web Services
        Stored procedures and functions
        SQL
        Security
        LDAP
        User-defined Web services
      Web services standards
        XML
          Example
          XML document structure
        WSDL
        SOAP
          SOAP message structure
    Understanding the ASE Web Services Engine
      Producer of Web services
        Producer components
        Producer Web methods
        User-defined Web services
      Consumer of Web services
        Consumer components
          SDS server
          SOAP stack
        Proxy tables
      Web Services engine as a consumer versus producer
    Installing and Configuring ASE Web Services
      Installing Web Services
      Configuring Web Services
        Configuring during installation
        Configuring after installation
      Licensing
      Configuration files
      Security
        Configuring SSL
        Installing a certificate for Microsoft .NET
    Using ASE Web Services
      Using the ASE Web Services Engine
        Starting and stopping the ASE Web Services Engine
          Conditions
          Verification
        ASE Web Services methods
          execute
          login
          logout
        Using sp_webservices
          add
          help
          list
          modify
          remove
        Invoking a Web service
      Using user-defined Web services
        Commands for user-defined Web services
          create service
          drop service
        Using sp_webservices with user-defined Web services
          addalias
          deploy
          dropalias
          listudws
          listalias
          undeploy
        Security for user-defined Web services
        Auditing for user-defined Web services
          Auditing sp_webservices ā€˜deploy’
          Auditing sp_webservices ā€˜undeploy’
      ASE Web Services logging
        Rolling over log files
      Using Sybase Central
    Sample Applications
      Apache sample client
        Creating the sample client
        Using runexecute
      Microsoft .NET sample client
        Creating the sample client
        Using Execute.exe
    Troubleshooting
      Troubleshooting issues
        Remote server class definition setting
        Unmapped RPC/encoded Web method
        Truncated document/literal results
        Starting ASE Web Services Engine
        Locating WSDL
        Specifying entries in ws.properties
        Windows NT command-line arguments
        Run or stop scripts fail
        Null passwords
        Specifying SOAP endpoints with SSL
        Abnormal termination of sp_webservices ā€˜add’
        Web Services proxy table restrictions
        sysattributes table entry
      Diagnostic tools
        Detailed logging
        Enabling JDBC-level tracing
      Messages
    Installation Contents
      ASE Web Services directory tree
    Configuration Properties
      ws.properties
      myres.properties
      Specifying properties file entries
    SOAP and Adaptive Server Enterprise Datatype Mapping
      Datatype mapping
        SOAP-to-ASE datatype mappings
        ASE-to-SOAP datatype mappings for the create service command
    Glossary
  XA Interface Integration Guide for CICS, Encina, and TUXEDO 15.7
    The Sybase XA Environment
      Definitions
      Overview of the X/Open DTP model
        Components of the model
        How the components communicate
        How the components interact
        Recovery
      The Sybase XA environment
        Components of the Sybase XA environment
      Connections in the Sybase XA environment
        Identifying connections via LRMs
          Where is the connection information stored?
        Establishing connections
        Distributing work across LRMs
    Configuring the XA Environment
      Configuring Adaptive Server
      Open string parameters for the DTM XA Interface
        Open string parameters
        dtm_tm_role required for username
        Log file and trace flag parameters
          Labels for logfile entries
        xa_open() function behavior
      XA configuration file for DTM XA Interface
        Environment variable for specifying the configuration file
        [all] section for defining common LRM parameters
          Parameter definitions for [all] section
        Editing the XA configuration file
        Additional capabilities, properties, and options
      Using the DTM XA Interface with CICS
        Building the switch-load file
          Compiling the switch-load file on IBM RISC System/6000 AIX
          Compiling the switch-load file on HP9000 Series 800 HP-UX
          Compiling the switch-load file on Sun Solaris 2.x (SPARC)
        Adding a Sybase stanza to the CICS region XAD definition
      Using the DTM XA Interface with Encina
        Assigning an open string with monadmin create rm
        Initializing LRMs with mon_RegisterRmi
        Linking applications with DTM XA Interface libraries
        Establishing connections
      Using the DTM XA Interface with TUXEDO
        Linking
        Setting up the UBBCONFIG file
        Creating the TUXEDO configuration file
        Building the TMS
      Building the COBOL runtime environment
    Application Programming Guidelines
      X/Open DTP versus traditional Sybase transaction processing
      Managing transactions and connections
        Managing transactions
        Managing connections
        The current connection
        Nontransactional connections
      Deallocating cursor function with Client-Library
      Dynamic SQL
      Obtaining a Client-Library connection handle
      Multiple-thread environment issues
        Caveats of thread use
        Embedded SQL thread-safe code
        Tightly coupled transactions
      Linking with CT Library
      Sample embedded SQL COBOL fragment
      Sample embedded SQL C fragment
  XML Services 15.7
    Introduction to XML Services
      XML capabilities
      Overview
        XML in the database
        A sample XML document
          HTML display of Order data
        XML document types
    XML Query Functions
      XML query functions
        Example sections
      xmlextract
      xmltest
      xmlparse
      xmlrepresentation
      xmlvalidate
      option_strings: general format
        Option values for query functions.
    XML Language and XML Query Language
      Character set support
      URI support
      Namespace support
      XML schema support
      Predefined entities in XML documents
      Predefined entities in XPath queries
      White space
      Empty elements
      XML Query Language
        XPath-supported syntax and tokens
        XPath operators
          XPath basic operators
          XPath set operators
          XPath comparison operators
        XPath functions
          General guidelines and examples
          Functions
      Parenthesized expressions
        Parentheses and subscripts
        Parentheses and unions
    for xml Mapping Function
      for xml clause
        for xml subqueries
        for xml schema and for xml all
    XML Mappings
      SQLX options
        SQLX option definitions
      SQLX data mapping
        Mapping duplicate column names and unnamed columns
        Mapping SQL names to XML names
        Mapping SQL values to XML values
          Numeric values
          Character values
          Binary values
    XML Support for I18N
      Overview
        Unicode datatypes
        Surrogate pairs
        Numeric character representation
        Client-server conversions
        Character sets and XML data
      I18N in for xml
        Option strings
        Numeric Character Representation in for xml
        header option
        Exceptions
        Examples
          Example 1
          Example 2
          Example 3
          Example 4
          Example 5
          Example 6
          Example 7
      I18N in xmlparse
        Options
          Sort ordering in xmlparse
      I18N in xmlextract
        NCR option
        Sort ordering in xmlextract
        Sort ordering in XML Services
      I18n in xmlvalidate
        NCR option
    xmltable()
      Introduction
      xmltable and derived table syntax
      xmltable
    The sample_docs Example Table
      sample_docs table columns and rows
        Sample_docs table columns
        sample_docs table rows
      sample_docs tables
        Table script (for publishers table)
      Publishers table representation
      Titles table representation
    XML Services and External File System Access
      Getting Started
        Enabling XML services and External File System Access
        Character set conversions with external file systems
        Examples
        Setting up your XML documents and creating the proxy table
        Example: extracting the book title from the XML documents
        Example: importing XML documents or XML query results to an Adaptive Server table
        Example: storing parsed XML documents in the file system
        Example: 'xmlerror' option capabilities with External File Access
        Example: specifying the 'xmlerror=message’ option in xmlextract
        Example: parsing XML and non-XML documents with the 'xmlerror=message' option
        Example: using the option 'xmlerror=null' for non-XML documents
    Migrating Between the Java-based XQL Processor and the Native XML Processor
      Introduction
      Migrating documents and queries
        Migrating documents between the Java-based XQL processor and the native XML processor
        Migrating text documents between the Java-based XQL processor and the native XML processor
        Migrating documents from regenerated copies
        Regenerating text documents from the Java-based XQL processor
        Regenerating text documents from the native XML processor
        Migrating queries between the native XML processor and the Java-based XQL processor
    Sample Application for xmltable()
      Sample table
      Using the depts document
        The depts document structure
        Creating SQL tables from the depts document
          Normalizing the data from the depts document
          Generating tables using select
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux
  Release Bulletin SAP Adaptive Server Enterprise 16.0 Solaris
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows
  Release Bulletin SAP Control Center 3.3
    Product Summary
    Installation and Upgrade
      Installation and Implementation of SAP Control Center
      Choosing an Installer
      Supported Server Versions
      Supported Product Modules and Release Documents
    Known Issues
      Known Issues for Installation, Upgrade, and Deployment
      Known Issues for SAP Control Center
      Known Issues for SAPĀ® Adaptive ServerĀ® Enterprise
      Known Issues for Data Assurance
      Known Issues for Replication
      Known Issues for SAP Sybase Event Stream Processor
      Known Issues for SAP Sybase IQ
      Known Issues for Accessibility
    Documentation Changes
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      SAP Control Center Accessibility Information
  Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX
    Conventions
    Installation Task Overview
      Installation Workflows
    SAP ASE Components
      SAP ASE Editions
        Determining the Edition You Have
      SAP ASE Options
      Managing SAP ASE with SAP Control Center
      Client Components and Utilities
    System Requirements
      Memory Requirements
      System Requirements for Clients
    Planning Your SAP ASE Installation
      SAP ASE Release Bulletin
      Obtaining a License
        Comparing License Deployment Models
        SySAM License Server
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Generating Licenses
          Generating License Keys at SMP
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity Licensing
      Installation Directory Contents and Layout
      Creating the Sybase User Account
      Preparing to Install SAP ASE
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing SAP ASE
      Installing SAP ASE in GUI Mode
      Installing SAP ASE in Console Mode
      Minimally Configuring an SAP ASE Server
      Installing SAP ASE Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling SAP ASE
        Removing an Existing SAP ASE Server
    Starting and Stopping SAP Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    SAP ASE Upgrades
      Considerations When Upgrading from SAP ASE 15.0.x or Earlier
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in SAP ASE Directories
      Preupgrade Tasks
        Upgrade Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to SAP ASE 16.0
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading SAP ASE
      Postupgrade Tasks
        Restoring Functionality in SAP ASE After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      SAP ASE Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading SAP ASE
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Downgrading SAP ASE
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for SAP ASE Servers
      Troubleshooting Common Installation Problems
        If the Installation Quits While You Are Configuring an SAP ASE Server
      Stopping a SAP ASE Server After a Failure
      If SAP ASE Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX
    Conventions
    Installation Task Overview
      Installation Workflows
    SAP ASE Components
      SAP ASE Editions
        Determining the Edition You Have
      SAP ASE Options
      Managing SAP ASE with SAP Control Center
      Client Components and Utilities
    System Requirements
      Making Input/Output Completion Port API Available
      Memory Requirements
      System Requirements for Clients
    Planning Your SAP ASE Installation
      SAP ASE Release Bulletin
      Obtaining a License
        Comparing License Deployment Models
        SySAM License Server
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Generating Licenses
          Generating License Keys at SMP
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity Licensing
      Installation Directory Contents and Layout
      Creating the Sybase User Account
      Preparing to Install SAP ASE
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing SAP ASE
      Installing SAP ASE in GUI Mode
      Installing SAP ASE in Console Mode
      Minimally Configuring an SAP ASE Server
      Installing SAP ASE Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling SAP ASE
        Removing an Existing SAP ASE Server
    Starting and Stopping SAP Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      The System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    SAP ASE Upgrades
      Considerations When Upgrading from SAP ASE 15.0.x or Earlier
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in SAP ASE Directories
      Preupgrade Tasks
        Upgrade Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to SAP ASE 16.0
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading SAP ASE
      Postupgrade Tasks
        Restoring Functionality in SAP ASE After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      SAP ASE Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading SAP ASE
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Downgrading SAP ASE
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for SAP ASE Servers
      Troubleshooting Common Installation Problems
        If the Installation Quits While You Are Configuring an SAP ASE Server
      Stopping a SAP ASE Server After a Failure
      If SAP ASE Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris
    Conventions
    Installation Task Overview
      Installation Workflows
    SAP ASE Components
      SAP ASE Editions
        Determining the Edition You Have
      SAP ASE Options
      Managing SAP ASE with SAP Control Center
      Client Components and Utilities
    System Requirements
      Memory Requirements
      System Requirements for Clients
    Planning Your SAP ASE Installation
      SAP ASE Release Bulletin
      Obtaining a License
        Comparing License Deployment Models
        SySAM License Server
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Generating Licenses
          Generating License Keys at SMP
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity Licensing
      Installation Directory Contents and Layout
      Creating the Sybase User Account
      Preparing to Install SAP ASE
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing SAP ASE
      Installing SAP ASE in GUI Mode
      Installing SAP ASE in Console Mode
      Minimally Configuring an SAP ASE Server
      Installing SAP ASE Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling SAP ASE
        Removing an Existing SAP ASE Server
    Starting and Stopping SAP Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    SAP ASE Upgrades
      Considerations When Upgrading from SAP ASE 15.0.x or Earlier
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in SAP ASE Directories
      Preupgrade Tasks
        Upgrade Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to SAP ASE 16.0
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading SAP ASE
      Postupgrade Tasks
        Restoring Functionality in SAP ASE After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      SAP ASE Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading SAP ASE
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Downgrading SAP ASE
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for SAP ASE Servers
      Troubleshooting Common Installation Problems
        If the Installation Quits While You Are Configuring an SAP ASE Server
      Stopping a SAP ASE Server After a Failure
      If SAP ASE Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows
    Conventions
    Installation Task Overview
      Installation Workflows
    SAP ASE Components
      SAP ASE Editions
        Determining the Edition You Have
      SAP ASE Options
      Managing SAP ASE with SAP Control Center
      Client Components and Utilities
    System Requirements
      System Requirements for Clients
    Planning Your SAP ASE Installation
      SAP ASE Release Bulletin
      Obtaining a License
        Comparing License Deployment Models
        SySAM License Server
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Generating Licenses
          Generating License Keys at SMP
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity Licensing
      Installation Directory Contents and Layout
      Preparing to Install SAP ASE
        Managing Java in the Database During Installations and Upgrades
    Installing SAP ASE
      Installing SAP ASE in GUI Mode
      Installing SAP ASE in Console Mode
      Minimally Configuring an SAP ASE Server
      Installing SAP ASE Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling SAP ASE
        Removing an Existing SAP ASE Server
    Starting and Stopping SAP Control Center
    Postinstallation Tasks
      Set Up sybase User in Windows
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
        Adding a Server to the Interfaces File
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    SAP ASE Upgrades
      Considerations When Upgrading from SAP ASE 15.0.x or Earlier
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in SAP ASE Directories
      Preupgrade Tasks
        Upgrade Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to SAP ASE 16.0
        Upgrading SAP ASE on Windows
        Testing the SAP ASE Upgrade
        Manually Upgrading SAP ASE
      Postupgrade Tasks
        Restoring Functionality in SAP ASE After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
      SAP ASE Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading SAP ASE
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Downgrading SAP ASE
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for SAP ASE Servers
      Troubleshooting Common Installation Problems
        If the Installation Quits While You Are Configuring an SAP ASE Server
      Stopping a SAP ASE Server After a Failure
      If SAP ASE Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide SAP Control Center 3.3
    About SAP Control Center
    Installation Task Flows for SAP Control Center
    Planning Your Installation
      Obtaining a License
      System Requirements
      SAP Control Center Network Ports
      Installation Considerations
      Preparing to Roll Back from an Upgrade
    Preinstallation Tasks
    Installing SAP Control Center
      Installing with the SAP Installer
      Installing with a Response File
        Creating a Response File
        Installing in Unattended (Silent) Mode
      Uninstalling
    Upgrading SAP Control Center
      Upgrading a Singleton SAP Control Center
      Upgrading Shared-Disk Instances
    Installing JDBC Drivers for Third-Party Replicate Databases
    Starting and Stopping SAP Control Center
      Registering the ODBC Driver in Windows
      Starting and Stopping SAP Control Center in Windows
      Starting and Stopping SAP Control Center in UNIX
    Getting Started After Installing
      Configuring the SSL Certificate
      Setting Passwords or Disabling Default Login Accounts
        Encrypting a Password
      Enabling Incremental Backups
      Configuring SAP Control Center
    Troubleshooting Installation
  Configuration Guide for UNIX Adaptive Server Enterprise 16.0
    About SAP ASE
      System-Specific Issues
      System User Roles
      Environment Variables
    SAP ASE Devices and System Databases
      The master Device
      The sybsystemdb Device
      The sysprocsdev Device
      Optional Devices and Databases
        Pluggable Component Interface (PCI) Database
        Sample Databases
        sybsecurity Device and Database
        dbccdb Database
        sybmgmtdb Database
      Using Operating System Files as Database Devices
        The directio Parameter
        The dsync Parameter
      Determine the Size of a Database Device
        Support for Raw Partitions or Files
        Preparation of a Raw Partition Device
          Choosing a Raw Partition
    Client/Server Communication
    About Changing SAP ASE Configuration
    Languages Other Than US English
    SAP ASE Specifications
      Database Specifications
      Table Specifications
      Procedure Specifications
      Query Specifications
      Maximum Column Sizes
      Database Requirements for Varying Page Sizes
      Data Limits for Tables According to Page Size
    Start and Stop Servers
      Start Servers
        Server Start-up Parameters
        RUN_server_name File
        Using the startserver Command
      Start Servers When the Operating System Restarts
        Creating a System Restart Script for HP-UX
        Creating a System Restart Script for IBM RS/6000
        Creating a System Restart Script for Sun Solaris and Linux
      Starting XP Server After Initial Installation
      Stop Servers
        Stopping SAP ASE
        Stopping Backup Server
        Using the kill Command
        Shutdown and Shared Memory Files
    Huge Pages on Linux
    Configure the Operating System
      Verifying Environment Variables
      Using the stty Setting
      Restore Correct Permissions
      File Descriptors and User Connections
        File Descriptors and User Connections for HP-UX
        File Descriptors and User Connections for AIX
        File Descriptors and User Connections for Linux
        File Descriptors and User Connections for Sun Solaris
        Displaying Current Soft and Hard Limits
        Increasing the Soft Limit
        Increasing the Hard Limit
      Enable Asynchronous Disk I/O
        Enabling Asynchronous Disk I/O on Linux
        Enabling Asynchronous Disk I/O on IBM AIX
        Enabling Asynchronous Disk I/O HP-UX
        Enabling Asynchronous I/O for File System Devices
        Enabling Asynchronous I/O for File Systems
      Adjust the Client Connection Timeout Period
        Adjusting the Client Connection Timeout for HP-UX
        Adjusting the Client Connection Timeout for IBM RS/6000
        Adjusting the Client Connection Timeout for Linux
      Check for Hardware Errors
      Monitor the Use of Operating System Resources
        Monitor Operating System Resources for HP-UX
        Monitor Operating System Resources for IBM RS/6000
        Monitor Operating System Resources for Sun Solaris and Linux
      Check Database Integrity
    Configuring New Servers with srvbuild
    Optimize the SAP ASE Configuration
    SAP ASE Default Configuration
      Default Settings
    Set Up Communications Across the Network
      How SAP ASE Determines Which Directory Service Entry to Use
      How a Client Uses Directory Services
      Create a Directory Services Entry
      Supported Directory Drivers
      Contents of the interfaces File
      interfaces File Format
        Components of an interfaces File Entry
      Create a Master interfaces File
        Using dsedit or dscp to Create a Master interfaces File
        Using a Text Editor to Create a Master interfaces File
      Configure the interfaces File for Multiple Networks
        Configuring the Server for Multiple Network Handlers
        Configure Client Connections
          Manage One Network-Independent DSQUERY Name
          Using Different DSQUERY Names
        Configuring for Query Port Backup
      IPv6 Support
        IPv6 Infrastructure
    Troubleshoot
      Troubleshooting when the Server Fails to Start
      Troubleshooting an Error when Executing an ESP
    Use the Lightweight Directory Access Protocol as a Directory Service
      LDAP Directory Services Versus the SAP Interfaces File
      The libtcl*.cfg File
      Enabling LDAP Directory Services
      Keywords for the LDAP URL Variables
      Adding a Server to the Directory Services
      Multiple Directory Services
      Encrypting the Password
      Performance
      Migrating from the interfaces File to LDAP
    Localization Support
      Language Modules
      Default Character Sets
      Supported Character Sets
        Arabic Character Sets
        Baltic Character Set
        Simplified Chinese Character Sets
        Traditional Chinese Character Set
        Cyrillic Character Sets
        Eastern European Character Sets
        Greek Character Sets
        Hebrew Character Sets
        Japanese Character Sets
        Korean Character Set
        Thai Character Sets
        Turkish Character Sets
        Unicode Character Set
        Vietnamese Character Set
        Western European Character Sets
      Character Set Names
      Load Character Sets
      Language Definition Files Sort Order
      Character Set Conversion
        Conversions Between Server and Client
      Sort Orders
        Available Sort Orders for Character Sets
      Language Modules
        Installing a New Language Module
        Message Languages
      Localization Directories
        About the locales Directory
        About the charsets Directory
        Format of locales.dat File Entries
        How Client Applications Use locales.dat
      Changing SAP ASE Localization Configuration
        Configuring SAP ASE for Other Character Sets
        Editing the locales.dat File
        Changing Backup Server Localization Configuration
    SAP ASE Error Logging
      Set Error Log Paths
        Set the SAP ASE Error Log Path
      Manage Messages
        Log User-Defined Messages
        Log Auditing Events
    Manage Database Devices
      Device Requirements
      Create Files for Database Devices
    Database Management System Auditing
      Audit System Devices and Databases
    Install Online Help for Transact-SQL Syntax
      Default Device for the sybsyntax Database
      Installing sybsyntax
  Configuration Guide for Windows Adaptive Server Enterprise 16.0
    About SAP ASE
      System-Specific Issues
      User Roles
      Environment Variables
    SAP ASE Devices and System Databases
      The master Device
      The sybsystemdb Device
      The sysprocsdev Device
      Optional Devices and Databases
        Pluggable Component Interface (PCI) Database
        Sample Databases
        sybsecurity Device and Database
        dbccdb Database
      Using Operating System Files as Database Devices
        The dsync Parameter
        The directio Parameter
    Client/Server Communication
    About Changing SAP ASE Configurations
    Languages Other Than US English
    SAP ASE Specifications
      Database Specifications
      Table Specifications
      Query Specifications
      Procedure Specifications
      Extended-Limit Capabilities
    Start and Stop Servers
      Server Start-up Parameters
        Specifying Additional Start-up Parameters
      Starting and Stopping Servers Using Unified Agent
      Start and Stop Servers Using the Control Panel
        Starting Servers as an Automatic Service
          Setting Up SAP ASE as an Automatic Service
        Starting, Stopping, and Pausing Servers Manually
      Stopping Backup Server
      Stopping SAP ASE
    Monitor Servers
      Monitoring Servers with the Control Panel
    SAP ASE Configurations
      Default SAP ASE Configuration
        Default SAP ASE Parameter Settings
        Default Backup and XP Server Settings
      Change SAP ASE Configurations
        Starting Server Config
        Configuring SAP ASE
          Setting SAP ASE Parameters
          Changing the Default Backup Server
          Changing the Default XP Server
        Configuring Backup Server
        Configuring Job Scheduler and Self Management
        Optimize the SAP ASE Configuration
    Network Communications Using sql.ini
      Client Connections to SAP ASE
      Determine the Address to Listen for Client Connections
      Client Access to SAP ASE
        Enabling Client Access to a Server
        Changing the Server Entries in sql.ini
      Components in the sql.ini File
        Server Name
        Network Driver
        Service Type
        Server Address
          Address Format
          IP Address
          Named Pipes Format
          Windows Sockets Format
            Increasing Windows Sockets Connections
              Modifying an Existing TcpNumConnections Value
              Adding a TcpNumConnections Value
            Using Multiple TCP/IP Network Interface Cards
            Controlling the Connection Timeout
              Increasing the TcpKeepTries Value
          NWLink IPX/SPX Format
            Available NWLink IPX/SPX Connection Formats
            Selecting Valid Connection Formats
      Share Network Configuration Information
        Creating a Master sql.ini File
        Windows Registry as a Directory Service
          Using Windows Registry as a Directory Service
      Verify Server Connections
      Configure ODBC Connections
        Configuring the ODBC Driver
      IPv6 Support
        IPv6 Infrastructure
    Lightweight Directory Access Protocol in SAP ASE
      LDAP Directory Services versus the SAP Interfaces File
      The libtcl.cfg File
      Enabling LDAP Directory Services
      Adding a Server to the Directory Services
        Adding a Server Entry to the Directory Service Using dsedit
      Multiple Directory Services
      Encrypting the Password
      Performance with LDAP
      Migrating from the sql.ini File to LDAP
    Localization Support
      Language Modules
      Default Character Sets for Servers
        Changing the Default Character Set for Servers
      Supported Character Sets
        Arabic Character Sets
        Baltic Character Set
        Simplified Chinese Character Sets
        Traditional Chinese Character Set
        Cyrillic Character Sets
        Eastern European Character Sets
        Greek Character Sets
        Hebrew Character Sets
        Japanese Character Sets
        Korean Character Set
        Thai Character Sets
        Turkish Character Sets
        Unicode Character Set
        Vietnamese Character Set
        Western European Character Sets
      Character Set Conversion
        Conversions Between Server and Client
      Sort Orders
        Available Sort Orders
      Language Modules
        Installing a New Language Module
        Message Languages
      Localization
        Localization Directories
        charsets and locales Directories
          Format of locales.dat File Entries
          Client Application Use of locales.dat
          Editing the locales.dat File
      Changing SAP ASE and Backup Server Localization Configuration
        Completing SAP ASE Localization Changes
        Completing Backup Server Localization Changes
        Configuring SAP ASE for Other Character Sets
      Language-Specific Sort Orders
      SAP ASE Character Set Names
      charset Utility
    Log Error Messages and Events
      SAP ASE Error Logging
      Windows Event Logging
        Setting Up Windows Event Logging
        Enable and Disable Windows Event Logging
          Enabling or Disabling Event Logging Using Server Config Utility
          Enabling or Disabling Event Logging Using sp_configure
        Windows Event Log Information
      Manage Logs
      Set Error Log Paths
        Setting the SAP ASE Error Log Path
        Setting the Backup Server Error Log Path
      Manage Messages
        Log User-Defined Messages
          New Messages
          Existing Messages
        Log Auditing Events
        Log User-Defined Events
      Using a Remote Log
      Central Logging Site
        Log Messages from Multiple SAP ASEs
        Set Up a Local Central Logging Site
          Creating a Registry key
          Defining a Registry Key
      View Messages
        Viewing Messages in the Windows Event Log
        Viewing Messages in the SAP ASE Error Log
    Security Services with Windows LAN Manager
      How Login Authentication Works
      Administering Security Services Using LAN Manager
      Modify Configuration Files Required for a Unified Login
        Set Up Drivers for Network-Based Security
          Entries for Network Drivers
          Entries for Directory Services
          Entries for Security Drivers
            Editing the libtcl.cfg File
        Checking the LAN Manager's Local Name
        Specifying Security Information for SAP ASE
      Identify Users and Servers to LAN Manager
      Configure SAP ASE for LAN Manager Security
        Enabling and Disabling External Security Services
        Manage Unified Login
          Requiring Unified Login
          Establishing a Secure Default Login
          Map LAN Manager Login Names to Server Names
        Data Integrity Check
        Ensure Adequate Memory for Security Services
      Add Logins to Support Unified Login
        Adding Logins
      Define the Connection to a Server for Security Services
        Specifying the Principal Name
        Specifying Network-Based User Authentication
        Specifying the Name Assigned to LAN Manager
      Determining the Status of Security Services
      Configuration Parameters Used in Security Services
        Data Integrity Check
        Message Sequence Check
        Detect Interception or Replay
        Specify a Login
        Control User Authentication
      Manage Login Security on an Windows Computer
        SAP ASE Security
        Combined SAP ASE and Windows Login Security
          Trusted Connections and Combined Login Security
        Login Security Modes
          Standard Mode
          Integrated Mode
          Mixed Mode
        Manage the Login Security Features
          Permit Trusted Connections
          Windows Registry Parameters
            Default Login
            Default Domain
            SetHostName
            Character Mappings
            Modify the Parameter Values
        Administer Login Security Using System Procedures
          Assigning Trusted Connection Permissions
          Display the Current Registry Values
          Display Permissions and User Names
          Revoke Permissions Granted with sp_grantlogin
        Configuring Login Security
          Creating Windows Users and Groups
          Configuring Mapping and Default Domain Values
          Setting Login Security Mode
          Adding Network Login Names to syslogins
          Assigning Roles
        Change Login Security Options
          Enabling Standard Login Security Mode
          Enabling Integrated or Mixed Login Security Mode
    Manage SAP ASE Databases
      Manage Database Devices
        Device Requirements
        Creating .dat Files for Database Devices
      Back Up and Restore Data
        Backing Up Data with a Tape Drive
          Windows Tape Drive Names
          Set the Maximum Capacity for a Tape Drive
        Backing Up Data Using a Hard Disk
        Dumping Across a Network
        Examples of Backing Up and Restoring User Databases
          Back Up and Restore to a Database and Device
          Back Up and Restore on a Remote Backup Server
          Backup File Names
          Additional Dump Devices
          Tape Handling Options
          Get Information About Files
        Backing Up and Restoring System Databases
      Optimize SAP ASE Performance and Tuning
        Using Dedicated SAP ASE Operation
        Disk Drives and SAP ASE Performance
          Monitor Disk Usage
      Monitoring SAP ASE Statistics
    Database Management System Auditing
      Audit System Devices and Databases
    Install Online Help for Transact-SQL Syntax
      Default Device for the sybsyntax Database
      Installing sybsyntax
    Troubleshoot Network Connections
      Running Server Ping
      Troubleshoot Connection Failures
        Using Returned Messages to Diagnose a Failure
          Troubleshooting a Connection Failure to SAP ASE
          Failure to Load Net-Library DLLs
        Troubleshooting Failure of Other Applications
          Before Calling Technical Support
    SAP ASE Registry Keys
      \SOFTWARE\SYBASE\Server\server_name
      \SOFTWARE\SYBASE\SQLServer\server_name\parameter
      \SOFTWARE\SYBASE\SQLServer
      \SYSTEM\CurrentControlSet\Services\SYBSQL_server_name
  New Features Summary SAP Adaptive Server Enterprise 16.0
    Version 16.0
      Increased Data Availability with Partition Locking
      CIS Support for HANA Server
      Relaxed Query Limits
      Query Plan Optimization with Star Joins
      Query Performance Improvements
      Full-Text Auditing
      Auditing for Authorization Checks Inside Stored Procedures
      Replacing Object Definitions
      Query Plan and Execution Statistics in HTML
      Index Compression
      SAP JVM Support
      Full Database Encryption
      Scalability Enhancements and Features
      Monitoring Threshold-Based Events
      Multiple Triggers
      Residual Data Removal
      Configuration History Tracking
      Cyclic Redundancy Checks for dump database
      Calculating the Transaction Log Growth Rate
      System Changes for SAP ASE Version 16.0
    Version 15.7 SP100
      Adaptive Server 15.7 SP100 Feature and Platform Matrix
      Shrinking Databases
      Enhancements to Backup and Restore
      Aggregating Metrics from Syntactically Similar Queries
      Updates to Precomputed Result Sets
      Improved Data Load Performance
      Incremental Reorganization
      Creating Indexes Without Blocking Access to Data
      Query Plan and Execution Statistics in HTML
      Gathering Hash-Based Statistics with create index
      Query Plan Optimization with Bloom Filters
      Support for Replication by Column Value
      Support for Multiple Scanner Threads
      Sybase Central Adaptive Server Plug-in
      Running Adaptive Server on VMware vSphere
      Support for OData
      Support for NTLM and MIT Kerberos on Windows 64-bit
      Properties Added to Responses File
      Automatic Physical Database Rearrangement
      System Changes for Adaptive Server Version 15.7 SP100
        Commands
        Functions
        System Stored Procedures
        Configuration Parameters
        System Tables
        Utilities
        Monitoring Table Changes
        Permission Changes for Commands and Functions
    Version 15.7 ESD #4
      15.7 ESD #4.2
        Improved Rollback Reporting
      15.7 ESD #4
        Remote Backup Server Maximum Name Length
        Support for Query Plan Pinning
        AF_UNIX Support
        Changes to sp_addthreshold and Roles
        System Changes for Adaptive Server Version 15.7 ESD #4
          Utilities
          Configuration Parameters
    Version 15.7 ESD #3
      sybrestore Utility
      System Changes for Adaptive Server Version 15.7 ESD #3
        Commands
        Functions
        System Stored Procedures
        Monitoring Table Changes
    Version 15.7 ESD #2
      Granular Permissions
      Predicated Privileges
      Deferred Table Creation
      Online Utilities
      Merging and Splitting Partitions
      Maximum Size of Query in the Statement Cache
      Enhancements to show_cached_plan_in_xml
      Fast-Logged Bulk Copy
      Precomputed Result Sets
      Concurrent dump database and dump transaction Commands
      Hash-Based Update Statistics
      Enhancements to dump and load
      alter table drop column without datacopy
      Expanded Maximum Database Size
      User-Defined Optimization Goal
      Shared Query Plans
      Initializing Databases Asynchronously
      In-Row Large Object Compression
      Configuring Shared Memory Dumps
      System Changes for Adaptive Server Version 15.7 ESD #2
        Commands
        Functions
        System Stored Procedures
        Configuration Parameters
        System Tables
        Utilities
        Monitoring Table Changes
    Version 15.7 ESD #1
      Proxy Table Support for In-row LOB Columns
      Support for System Procedures in Replicated Master Database
      Increased Number of Parameters
      Multiple Listeners on Windows
      Windows Supports Adaptive Server High Availability
      New and Changed Configuration Parameters
    Version 15.7
      Application Functionality Configuration Group
      New Adaptive Server Kernel
      Compressing Data in Adaptive Server
      New Security Features
        End-to-End CIS Kerberos Authentication
        Dual Control of Encryption Keys and Unattended Startup
        Securing Logins, Roles, and Password Management Extensions
        Login Profiles
        Employee Lifecycle Management
        External Passwords and Hidden Text
      Abstract Plans in Cached Statements
      Shrink Log Space
      Displaying Currently Set Switches with sysoptions
      Changes for Large Objects
        In-Row Off-Row LOB
        Using Large Object text, unitext, and image Datatypes in Stored Procedures
        Using LOB Locators in Transact-SQL Statements
        Extension to where Clause for Large Objects
      Showing Cached Plans in XML
      Padding a Character Field Using str
      Changes to select for update
      Creating Nonmaterialized, Non-null Columns
      Sharing Inline Defaults
      Retain Monitoring Data
      Analyze Dynamic Parameters
      Monitor Lock Timeouts
      Truncate Trailing Zeros
      Fully Recoverable DDL
      Transfer Rows from Source to Target Table Using merge
      View Statistics and Histograms with sp_showoptstats
      Changes to Cursors
        Release Cursor Locks at Cursor Close
        Enhanced Transaction Support for Cursors
        Monitor Cursor Statements
      Nested select Statement Enhancements
      Changes to Commands and System Procedures in Chained Transaction
      Expanded Variable-Length Rows
      Changes to like Pattern Matching
      Changes to Quoted Identifiers
      Allowing Unicode Noncharacters
      Reduce Query Processing Latency
      The sybdiag Utility
      The Optimizer Diagnostic Utility
      System Changes for Adaptive Server Version 15.7
        Commands
        Functions
        System Stored Procedures
        Configuration Parameters
        System Tables
        Utilities
        Monitoring Table Changes
          New Monitoring Tables
          Changes to Monitoring Tables
        Global Variables
    Version 15.5 Cluster Edition
      Adaptive Server 15.5 Cluster Edition Feature and Platform Matrix
      Multiple simultaneous failover
      Adding space to an archive database
      Distributed transaction management in the shared-disk cluster
      System Changes for Adaptive Server Version 15.5 Cluster Edition
        Changed commands
        Monitoring Tables
        Configuration Parameters
        Functions
    Version 15.5
      Adaptive Server 15.5 Feature and Platform Matrix
      In-Memory and Relaxed-Durability Databases
      Faster Compression for Backups
      Backup Server Support for the IBMĀ® TivoliĀ® Storage Manager
      Deferred Name Resolution for User-Defined Stored Procedures
      FIPS 140-2 Login Password Encryption
      Incremental Data Transfer
      bigdatetime and bigtime Datatypes
      Creating and Managing tempdb Groups
      System Changes for Adaptive Server Version 15.5
        Datatypes
        Functions
        System Stored Procedures
        Commands
        Configuration Parameters
        Monitoring Tables
        System Tables
        Utilities
        Auditing
    Version 15.0.3
      SQL Statement Replication
      Security Enhancements
        LDAPS User Authentication Enhancement
        Automatic LDAP User Authentication and Failback
        Login Mapping of External Authentication
        Using SSL to Specify a Common Name
        Concurrent Kerberos Authentication
      Virtually Hashed Tables
      Huge Pages
      Upgrading During a High Availability Configuration
        Reinstalling System Stored Procedures
      Distributed Transaction Management (DTM)
      Adaptive Server Plug-in Updates
      The Java Interface
      System Changes for Adaptive Server Version 15.0.3
        Functions
        System Stored Procedures
        Commands
        Configuration Parameters
        Monitoring Tables
        System Tables
    Version 15.0.2
      Encrypted Columns
      Archive Database Access
      Finding Slow-Running Queries
      Deferred Compilation
      Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
      Statistical Aggregate Functions
        Standard Deviation and Variance
      Eager and Lazy Aggregation
        Vector and Scalar Aggregation
      Improved Performance for Data Insertion
        Using Asynchronous Writes During a Page Split
        Improving Throughput of tempdb Transactions
        Post-commit Optimization
      Changes to the Query Processor
        Deferred Compilation
        Non-binary Character Set Histogram Interpolation
        Expression Histogramming Selectivity Estimates
      Viewing Current Optimizer Settings
      New Security Features
        PAM Support in 64-bit Adaptive Server on AIX
        Global Login Triggers Set Automatically
        SSL Support
        Improved Password Security
        Auditing Enhancements
          Hiding System Stored Procedure and Command Password Parameters
          Monitoring Failed Login Attempts
        High Availability Considerations
      Installing and Editing Monitoring Tables
      Monitoring Tables for the Statement Cache
      Row-Level Locking for System Tables
      The xmltable() Function
      Relocated Joins
      User-Defined SQL Functions
      instead of Triggers
      System Changes for Adaptive Server Version 15.0.2
        Trace Flags
        Commands
        Changes to the set Command
        Utilities
        System Stored Procedures
        System Tables
        Configuration Parameters
        Functions
        Global Variables
    Version 15.0.1
      Changes to Abstract Plans
        New Query-Level Settings
        Operator Name Alignment for the Abstract Plan and the Optimizer Criteria
        Extending the Optimizer Criteria Set Syntax
      Literal Parameterization
      System Changes for Adaptive Server Version 15.0.1
        Functions
        Configuration Parameters
        Commands
        Monitoring Tables
    Version 15.0
      Partition Support
      Row-Locked System Catalogs
      Query Processor
      Large Identifiers
      Computed Columns
        Differences Between Computed Columns and Function-Based Indexes
        Differences Between Materialized and Not Materialized Computed Columns
      Scrollable Cursors
      unitext Datatype Support
      big int Datatype Support
      Unsigned Integer Datatype Support
      Integer Identity
      Enhancements to XML Services
      Adaptive Server Plug-in Enhancements
      Interactive SQL
      User-Defined Web Services
      Very Large Storage Support
      Automatic Running of update statistics
      SySAM License Management
      Query Processing Metrics (qp Metrics)
      Updates to Abstract Plans
      showplan Changes
      Secure Socket Layer Uses FIPS 140-2
      System Changes for Adaptive Server Version 15.0
        Utilities
        Reserved Words
        Global Variables
        Configuration Parameters
        Functions
        Commands
        System Stored Procedures
        System Tables
        Monitoring Tables
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  New Features Guide SAP Adaptive Server Enterprise 16.0
    Overview of Version 16.0
    Increased Data Availability with Partition Locking
      Partition Locks
        Partition Lock Name
        Enabling Partition Locking
        View Partition Locks with sp_lock
        View Partition Locks with sp_familylock
        View Partition Locks with monLocks and monDeadLock
        Deadlocks and Lock Timeouts
      Partition Lock Promotion
        Setting Partition Lock Promotion Thresholds
        Dropping Partition Lock Promotion Thresholds
      Lock Compatibility and Lock Sufficiency
        Partition Lock Compatibility
        Partition Lock Sufficiency
        Schema Lock Compatibility
        Schema Lock Sufficiency
      Improved Concurrency for Partition-Level Online Operations
        Partition-Level Online Operation Syntax
        Concurrency with Partition-Level Online Operations
        Partition-Level Online Operations with Global Index
        Schema Locks
    Component Integration Services Support for HANA Server
      Configuring CIS for HANA
        Creating SAP HANA as an ODBC Data Source on Windows
        Adding SAP HANA to the SAP ASE Interfaces File
        Configuring the PCI Bridge and PCA/ODBC
      Adding Server Class HANAODBC
      Datatype Mapping Between SAP ASE and HANA
      Restrictions
    Relaxed Query Limits
    Query Plan Optimization with Star Joins
      Star Join Hint
      Star Join Query Plans Under the use fact_table Hint
    Query Performance Improvements
      Dynamic Thread Assignment
      SORT Operator Performance Improvement
      Hash Join Operator Performance Improvement
    Full-Text Auditing
    Auditing for Authorization Checks Inside Stored Procedures
    Replacing Object Definitions
      Install Script Changes
      Data and Log Segment Changes
    Query Plan and Execution Statistics in HTML
      Option for Prefix of Generated File
    Index Compression
      Enabling Index Compression
      Creating an Index Compressed Table
      Creating a Compressed Index
      Changing the Compression State
    SAP JVM Support
    Full Database Encryption
      Full Database Encryption Versus Encrypted Columns
      Creating the Database Encryption Key
        Changing a Database Encryption Key
        Dropping a Database Encryption Key
      Create an Encrypted Database
      Encrypt an Existing Database
      Encryption Status and Progress
      Performance Considerations
      Suspend the Encryption Process
        The quiesce database Command and Fully Encrypted Databases
      Resume the Encryption Process
      Decrypt an Encrypted Database
      Recover Fully Encrypted Databases
      Back Up (Dump) a Fully Encrypted Database
        Back Up the Database Encryption Key
      Restore (Load) Backups of Fully Encrypted Databases
        Loading Behavior of Encrypted Databases
      Dropping a Database That is Being Encrypted
      Mounting and Unmounting a Fully Encrypted Database
      Archive Databases and Full Encryption
      Full Database Encryption and System Changes
    Scalability Enhancements and Features
      Run-Time Logging Enhancements
      Lock Management Enhancements
      Metadata and Latch Management Enhancements
    Monitoring Threshold-Based Events
    Multiple Triggers
      Creating Multiple Triggers
      Changing the Order of When a Trigger is Fired
      Order of Triggers in Merge Statements
      Transactional Behavior with Multiple Triggers
      Disabling and Reenabling Triggers
      @@trigger_name Global Variable
    Residual Data Removal
    Configuration History Tracking
      Configuring SAP ASE to Track Configuration Changes
      Changes Captured
      Querying ch_events to View Changes
    Cyclic Redundancy Checks for dump database
    Calculating the Transaction Log Growth Rate
    System Changes
      Configuration Parameters
        New Configuration Parameters
        Changed Configuration Parameters
      Built-In Functions
        dbencryption_status
      Commands
        alter database for Full Database Encryption
        alter index
        alter table for Index Compression
        alter table for Multiple Triggers
        alter table for Residual Data Removal
        create archive database for Full Database Encryption
        create database for Full Database Encryption
        create default
        create encryption key
        create function
        create function (SQLJ)
        create index
        create procedure
        create procedure (SQLJ)
        create rule
        create table for Index Compression
        create table for Residual Data Removal
        create trigger for Multiple Triggers
        create trigger for or replace
        create view
        drop encryption key
        drop trigger
        dump database
        kill
        load database
        select
        select into
        set
      System Procedures
        Changed System Procedures
          sp_audit
          sp_chgattribute
          sp_clusterlockusage
          sp_dboption
          sp_depends
          sp_encryption
          sp_familylock
          sp_helpdb
          sp_lock
        New System Procedures
          sp_confighistory
          sp_ dropglockpromote_ptn
          sp_droprowlockpromote_ptn
          sp_helptrigger
          sp_jsconfigure
          sp_logging_rate
          sp_setpglockpromote_ptn
          sp_setrowlockpromote_ptn
      System Tables
        Changed System Tables
        New System Tables
          ch_events
        Changed Monitoring Tables
        New Monitoring Tables
          monThresholdEvent
      Utilities
        ddlgen
        sybmigrate
        sybrestore
      Global Variables
  Security Administration Guide SAP Adaptive Server Enterprise 16.0
  SAP Control Center 3.3 for SAP Adaptive Server Enterprise
    About SAP Control Center for SAP Adaptive Server Enterprise
      New Features in SAP Control Center for SAP Adaptive Server Enterprise
      User Interface Overview
      Toolbar Icons
      Status Icons
      Display and Copy Options in SAP Adaptive Server Enterprise Monitors
      Common Display Options
      Keyboard Shortcuts
      Displaying the Versions of SCC Components
      Style and Syntax Conventions
      SAP Control Center Accessibility Information
    Get Started
      Quick Start for an Evaluation
      Get Started in a Production Environment
      Deploying an Instance from a Shared Disk Installation
        Enabling and Disabling Shared-Disk Mode
        Shared-Disk Mode
        sccinstance Command
      Launching SAP Control Center
        Registering the ODBC Driver in Windows
        Starting and Stopping SAP Control Center in Windows
        Starting and Stopping SAP Control Center in UNIX
        Configuring Memory Usage
          Changing a Memory Option on the Command Line
          Changing a Memory Option for an SAP Control Center Windows Service
          Changing a Memory Option for an SCC UNIX Service
        scc Command
      Logging in to SAP Control Center
      Logging out of SAP Control Center
      Setting Up Security
        Security
        Configuring Authentication for Windows
        Configuring a Pluggable Authentication Module (PAM) for UNIX
        Configuring an LDAP Authentication Module
          LDAP Configuration Properties
        Mapping SAP Control Center Roles to LDAP or OS Groups
        Encrypting a Password
        Configuring Ports
      Configuring the E-mail Server
      Configuring the Automatic Logout Timer
      Configuring Retrieval Thresholds for the Administration Console
      User Authorization
        Assigning a Role to a Login or a Group
        Removing a Role from a Login or a Group
        Adding a Group
        Removing a Group
        Adding a Login Account to a Group
        Removing a Login Account from a Group
        Adding a Login Account to the System
        Removing a Login Account from the System
        Modifying a User Profile
        Logins, Roles, and Groups
    Configure
      Configuring SAP Adaptive Server Enterprise for Monitoring
      Registering an SAP ASE Server
      Importing Resources for Batch Registration
      Registering the Agent for an SAP ASE Server
      Authenticating a Login Account for a Managed Resource
        Role Assignment in SAP Control Center for SAP ASE
        Encrypted Authentication for SAP ASE
      Setting Up Statistics Collection
        About Statistics
        SAP ASE Data Collections
        Key Performance Indicators for SAP ASE
      Creating an Alert
        SAP ASE Alerts
        Alert Types, Severities, and States for SAP ASE
        Alert-Triggered Scripts
        Alert-Triggered Script Examples
        Substitution Parameters for Scripts
      Setting Display Options for SAP ASE Performance Data
      Optional Configuration Steps
    Manage and Monitor
      Displaying Resource Availability: the Heat Chart
      Graphing Performance Counters: the Statistics Chart
      Manage SAP Control Center
        Administration Console
          Browsing and Managing Resources
          Searching and Filtering Resources
          Searching for Objects in SAP ASE
            Manage Message Rows for Search Requests
          Configuring Retrieval Thresholds for the Administration Console
        Job Scheduling
          Executing and Stopping a Data Collection Job
          Deleting a Data Collection Job
          Resuming and Suspending a Data Collection Job
          Adding a New Schedule to a Job
          Viewing or Deleting a Schedule
          Modifying the Data Collection Interval for a Job
          Resuming and Suspending the Scheduler
          Viewing the Job Execution History
        Alerts
          SAP ASE Alerts
          Alert Types, Severities, and States for SAP ASE
          Creating an SAP ASE Alert
          Displaying SAP ASE Alerts
          Modifying an Alert
          Deleting an Alert
          Alert Subscriptions
            Adding or Modifying an Alert Subscription
            Unsubscribing from an Alert
            Enabling and Disabling Alert Subscription
          Alert Notifications
            Displaying Alert History and Resolutions
            Resolving Alerts
          Alert-Triggered Scripts
            Substitution Parameters for Scripts
            Testing an Alert-Triggered Script
            Alert-Triggered Script Examples
        Resources
          Unregistering a Resource
          Adding a Resource to a Perspective
          Removing a Resource from a Perspective
          Modifying a Resource’s Name and Connection Properties
          Searching for Resources in the Resource Explorer
        Perspectives
          Creating a Perspective
          Removing a Perspective
          Renaming a Perspective
        Views
          Managing a View
          Arranging View Layout in a Perspective
        Instances
          Enabling and Disabling Shared-Disk Mode
          Deploying an Instance from a Shared Disk Installation
          Refreshing or Converting an Instance
          Removing an Instance
          Shared-Disk Mode
          sccinstance Command
        Repository
          Scheduling Backups of the Repository
          Modifying the Backup Schedule
          Forcing an Immediate Backup
          Restoring the Repository from Backups
          Configuring Repository Purging
        Logging
          Viewing the SAP ASE Component Log
          Viewing SAP Control Center Server Logs
          Viewing the SAP Control Center Client Log
          Changing the Logging Level
          Logging or Message Levels
          Changing Logging Configuration
        SAP Control Center Console
          Console Commands
            help Command
            info Command
            shutdown command
            status Command
        Setting SAP ASE Parameters in the Configuration File
          Configuration Parameters for SAP ASE
      Manage and Monitor the SAP ASE Environment
        Managing an SAP ASE server
          Executing SQL Statements
          Registering the Agent for an SAP ASE Server
          Authenticating the Unified Agent
          Authenticating the SCC Agent
          Starting an SAP ASE Server
          Stopping an SAP ASE Server
          Configuring Retrieval Thresholds for the Administration Console
          SAP ASE Error Log
            Viewing the SAP ASE Error Log
            Searching the Error Log for Messages
            Managing Flag Definitions
              Importing Flag Definitions
              Exporting Flag Definitions
          Server Configuration
            Displaying Configuration Values
            Modifying Server Configuration Parameters
            Server Configuration Statistics and Details
            Server Monitor Settings
          Server Properties
          Activating a Role
          Managing Permissions
            Enabling Granular Permissions
          Replacing Compiled Object Definitions
        Displaying the Performance Overview
          Performance Overview Statistics and Details
        Caches
          Monitor Caches
            Monitoring SAP ASE Data Caches
            Modifying Data Cache Sizes
            Adding Data Cache Buffer Pools
            Data Cache Statistics and Details
            Monitoring the SAP ASE Procedure Cache
            Procedure Cache Statistics and Details
            Monitoring the SAP ASE Statement Cache
              Setting the Statement Cache Size
            Statement Cache Statistics and Details
            Monitoring SAP ASE In-memory Storage
          In-memory Storage Statistics and Details
          Manage Caches
            Creating a Cache
            Cache Properties
            Managing Binding Options
            Managing Buffer Pools
            Managing Cache Configurations
            Generating DDL for a Cache
            Deleting a Cache
        Clusters
          Monitor Clusters
            Cluster Instances
              Monitoring Cluster Instances in Cluster Configurations
              Cluster Instances Statistics and Details
            Cluster Interconnect
              Displaying the Cluster Overview
              Cluster Interconnect Statistics and Details
              Monitoring Interprocess Communication in Cluster Configurations
            Workload Management
              Monitoring Workloads in Cluster Configurations
              Workload Management Statistics and Details
          Manage Clusters
            Starting the SCC agent for a Cluster
            Starting the Unified Agent for a Cluster
            Preparing to Create a Cluster
            Creating a Cluster
            Registering a Cluster
            Registering the Agent and Starting a Cluster
            Displaying Cluster Configuration Values
            Starting a Cluster
            Stopping a Cluster
            Dropping a Cluster
            Viewing a Cluster Log
            Cluster Properties
            Manage Logical Clusters
              Adding a Logical Cluster
              Designating a Failover Logical Cluster
              Designating a Failback Logical Cluster
              Logical Cluster States
                Changing the State of a Logical Cluster
              Deleting a Logical Cluster
              Generating a DDL Script for a Logical Cluster
              Logical Cluster Properties
            Manage Cluster Instances
              Displaying Instance Configuration Values
              Starting an Instance
              Adding an Instance to a Cluster
              Stopping an Instance
              Deleting an Instance
              Instance Properties
              Viewing an Instance Log
            Manage Load Profiles
              Adding a Load Profile
              Deleting a Load Profile
              Generating a DDL Script for a Load Profile
              Load Profile Properties
            Manage Routes
              Adding a Route
              Deleting a Route
              Route Properties
            Manage Auxiliary Servers
              Configuring a Backup Server
              Deleting a Backup Server
              Backup Server Properties
              Configuring an XP Server
              Deleting an XP Server
              XP Server Properties
        Databases
          Monitor Databases
            Determining the Backup Status of a Database
            Displaying Resources Used by a Database
            Modifying Database Sizes
            Database Statistics and Details
            Displaying Information About Segments Used by a Database
          Manage Databases
            Creating a User Database
            Creating a Proxy Database
            Creating a Temporary Database
            Creating an Archive Database
            Creating an In-Memory Database
            Creating an In-Memory Temporary Database
            Creating an Encrypted Database
              Encrypting an Existing Database
              Suspending the Encryption Process
              Resuming the Encryption Process
              Decrypting an Encrypted Database
                Suspending the Decryption Process
                Resuming the Decryption Process
            Creating a Temporary Database Group
            Shrinking a Database
            Backing Up (Dumping) a Database
              Viewing Available Dump Configurations
              Creating a Dump Configuration
              Backing Up a Database Using a Dump Configuration
              Dump Configuration Properties
              Deleting a Dump Configuration
              Backing Up a Database or Transaction Log to Multiple Stripes
              Backing Up a Database Incrementally
              Backing Up a Database Incrementally Using a Dump Configuration
              Viewing Dump Records
              Purging Dump Records from Dump History
              Generating Database-Creation SQL for a Target Database
              Generating Database-Creation SQL from a Dump Image
              Backing Up Server Configuration Files
            Scheduling a Database Backup
              Requirements and Permissions for Scheduling Backups
              Creating a Schedule for Backups
              Schedule Properties
              Deleting a Schedule
              Scheduling a Backup Job in the Backup Wizard
              Creating a New Scheduled Backup Job
              Properties of a Scheduled Backup Job
              Manage a Scheduled Backup Job
                Enabling Scheduled Jobs
                Deleting a Backup Job from the Schedule
                Disabling Scheduled Jobs
                Running a Scheduled Job Now
                Rescheduling a Backup Job
                Terminating a Scheduled Job in Progress
              Viewing the Execution History of a Scheduled Backup Job
                Job History Properties
                Viewing the Contents of the Execution History Log
                Deleting the Execution History of a Scheduled Backup Job
              Job Scheduler Administration
              Set Up an Alert for When a Backup Job Fails
            Restoring (Loading) a Database
              Generating a Database Load Sequence
              Generating a Database Load Sequence for a Target Database from Dump History
              Restoring a Database from a Cumulative Dump
              Restoring a Database from a SQL Script
              Restoring a Database from a Point in Time
            Viewing Database Statistics
            Checkpointing Databases
            Checking Database Consistency
            Placing a Database in Quiesce-Hold
            Placing a Database in Quiesce-Release
            Mounting an SAP ASE Database
            Unmounting an SAP ASE Database
            Database Properties
              Changing Database Ownership
              Modifying Database Storage Allocations
              Modifying the Transaction Log Cache and the Log I/O Buffer Size
              Changing Database Options
            Generating DDL for a Database
            Deleting a Database
        Defaults
          Creating a Default
          Defaults Properties
          Replacing a Default Definition
          Deleting a Default
        Devices
          Monitor Devices
            Determining Device I/O Response and I/O per Second
            Modifying Device Sizes
            Device Statistics and Details
          Manage Devices
            Displaying a Device Object
            Creating a Database Device
            Creating an In-Memory Device
            Creating a Dump Device
            Database Device Properties
            In-Memory Device Properties
            Dump Device Properties
            Generating DDL for a Device
            Deleting a Database, In-Memory, or Dump Device
        Engines
          Monitor Engines
            Displaying Engine CPU Utilization
            Engine Statistics and Details
          Manage Engine Groups
            Creating Engine Groups
            Engine Groups Properties
            Deleting an Engine Group
            Generating DDL for an Engine Group
        Execution Classes
          Creating Execution Classes
          Execution Classes Properties
          Modifying Bindings to Execution Classes
        Extended Stored Procedures
          Creating an Extended Stored Procedure
          Replacing an Extended Stored Procedure Definition
          Extended Stored Procedures Properties
          Granting Execute Permission on an Extended Stored Procedure
          Revoking Execute Permission on an Extended Stored Procedure
          Deleting an Extended Stored Procedure
          Generating DDL for an Extended Stored Procedure
        Functions
          Manage Scalar Functions
            Creating a Scalar Function
            Replacing a Scalar User Defined Function Definition
            Scalar Function Properties
            Granting Execute Permission on a Scalar Function
            Revoking Execute Permission on a Scalar Function
            Deleting a Scalar Function
            Generating DDL for a Scalar Function
          Manage SQLJ Functions
            Creating a SQLJ Function
            Replacing a SQLJ Function Definition
            SQLJ Function Properties
            Deleting a SQLJ Function
            Generating DDL for a SQLJ Function
        Networks
          Managing Remote Servers
            Configuring a Server for Remote Procedure Calls
            Adding a Remote Server
            Deleting a Remote Server
            Remote Server Properties
              Testing a Remote Server Connection
              Setting Options for a Remote Server
              Managing Remote Server Login Mappings
              Managing CIS Roles and Logins Mappings
        Precomputed Result Sets
          Configuring SAP ASE to Use Precomputed Result Sets
          Viewing Precomputed Result Sets
          Creating a Precomputed Result Set
          Deleting a Precomputed Result Set
          Altering a Precomputed Result Set
          Refreshing Precomputed Result Sets
          Truncating a Precomputed Result Set
          Granting Permissions on Precomputed Result Sets
          Revoking Permissions on Precomputed Result Sets
          Granting Precomputed Result Set Permissions to a Specific User
          Revoking Precomputed Result Set Permissions from a Specific User
          Displaying Information About Precomputed Result Sets
          Generating DDL for a Precomputed Result Set
        Procedures
          Manage Stored Procedures
            Creating a Stored Procedure
            Replacing a Stored Procedure Definition
            Stored Procedure Properties
            Granting Execute Permission on a Stored Procedure
            Revoking Execute Permission on a Stored Procedure
            Deleting a Stored Procedure
            Generating DDL for a Stored Procedure
          Manage SQLJ Procedures
            Creating a SQLJ Procedure
            Replacing a SQLJ Procedure Definition
            SQLJ Procedure Properties
            Deleting a SQLJ Procedure
            Generating DDL for a SQLJ Procedure
        Processes
          Identifying Resource-Intensive Processes
          Identifying Blocked Processes and Blocking Processes
          Terminating Blocking Processes
          Identifying the Lead Blocker in a Chain
          Displaying the SQL Query Associated with a Process
          Displaying Wait Events for a Process
          Process Statistics and Details
        Replication Agents
          Monitoring RepAgent Threads
          Replication Agent Statistics and Details
        Rules
          Manage Rules
            Creating a Rule
            Replacing a Rule Definition
            Rule Properties
            Deleting a Rule
            Generating DDL for a Rule
        Security
          Manage Encryption Keys
            Modifying and Deleting a System Encryption Password
            Creating a System Encryption Password
            Creating a Master Key
            Master Key Properties
            Modifying, Regenerating, and Deleting a Master Key
            Dual Control and Split Knowledge
            Creating a Column Encryption Key
            Column Encryption Keys Properties
            Creating a Key Copy
            Modifying and Deleting a Column Encryption Key
            Creating a Database Encryption Key
            Database Encryption Keys Properties
            Granting Encryption Permissions to a Role, User, or Group
            Modifying a Database Encryption Key
            Deleting an Encryption Key
            Generate DDL for an Encryption Key
          Manage Login Profiles
            Creating a Login Profile
            Login Profile Properties
            Removing Roles Granted to a Login Profile
            Granting Roles to a Login Profile
            Deleting a Login Profile
            Displaying Logins Assigned to a Login Profile
            Transferring Login Attributes to a Login Profile
          Manage Logins
            Creating a Login
            Login Properties
            Managing Users Mapped to Logins
            Removing Roles from a Login
            Granting Roles to a Login
            Configuring Login Password Properties
            Changing a Login Password
            Displaying Login Account Properties
            Assigning Login Profiles to a Login
            Deleting a Login
          Manage Groups
            Creating a Group
            Adding or Removing Users to or from a Group
            Group Properties
            Setting Command Permissions for a Group
            Granting Object Permissions to a Group
            Revoking Object Permissions from a Group
            Granting Privileges to a Group
            Revoking Privileges from a Group
            Deleting a Group
            Generate DDL for a Group
          Manage Users
            Creating a User
            Transferring Ownership of a Database Object
            Users Properties
            Granting Object Permissions to a User
            Revoking Object Permissions from a User
            Granting Privileges to a User
            Revoking Privileges from a User
            Setting Command Permissions for a User
            Deleting a User
          Manage Roles
            Expiring a Role Password
            Creating a Role
            Restoring System Roles
            Role Properties
            Revoking Object Permission from a Role
            Granting Object Permissions to a Role
            Revoking Privileges from a Role
            Granting Privileges to a Role
            Creating Role Hierarchy
            Managing Mutually Exclusive Roles
            Removing Login Profiles Assigned to a Role
            Assigning Login Profiles to a Role
            Removing Logins Assigned to a Role
            Assigning Logins to a Role
            Setting Command Permissions for a Role
        Segments
          Monitor Segments
            Determining the Space Used by a Table on a Segment
            Extending a Segment in SAP ASE
            Segment Statistics and Details
          Manage Segments
            Displaying Segments
            Creating a Segment
            Segment Properties
            Removing a Threshold from a Segment
            Adding a Threshold to a Segment
            Removing a Database Device from a Segment
            Adding a Database Device to a Segment
            Deleting a Segment
            Generating DDL for a Segment
        Statistics
          Interpreting Statistics
          Updating Statistics on a Table
          Updating Statistics on Specific Columns
          Updating Statistics on an Index
          Updating Statistics for a Data Partition
          Updating Statistics on an Index Partition
          Deleting Statistics from a Table
          Deleting Statistics from a Column
          Deleting Statistics from a Data Partition
        SQL Activity
          Monitoring SQL Queries
          Executing SQL Statements
        Tables
          Creating a User or Proxy Table
          Creating a Column
          Creating an Index
          Restoring Table Data
          Creating a Foreign Key
          Creating a Check Constraint
          Checking Table Consistency
          Binding Defaults and Rules to a Column
          Placing a Table on a Segment
          Setting the Table Locking Scheme
          Creating a Unique Constraint or Primary Key
          Manage Table Compression
            Identifying Table Compression Candidates
            Initiating a Compression Estimate
            Applying Compression Settings
          Manage Index Compression
            Setting Index Compression on an Index
            Setting Index Compression on a Local Index Partition
            Setting Index Compression on a Table
          Manage Triggers
            Creating a Trigger
            Trigger Properties
            Replacing a Trigger Definition
          Incrementally Transferring Data
            Enabling Incremental Transfer
            Incrementally Transferring Data In
            Incrementally Transferring Data Out
          Bulk Copying Data
            Bulk Copying Data Into or Out of Tables
          Setting Table or Column Permissions
            Granting Table Permissions
            Revoking Table Permissions
            Granting Column Permissions
            Revoking Column Permissions
          Manage Partitions
            Partition Locking
              Enabling Partition Locking
            Enabling Semantic-based Partitioning
            Using a Hash Partition
            Using a Range Partition
            Using a List Partition
            Using a Round-Robin Partition
            Splitting a Partition
            Merging Partitions
            Moving a Partition
            Deleting a Partition
          Reorganize Tables and Table Objects
            Reorganizing Tables at the Database Level
            Reorganizing Tables
            Reorganizing Table Partitions
            Reorganizing Indexes
            Reorganizing Index Partitions
            Status Messages
          Table Properties
          Column Properties
          Index Properties
          Foreign Key Properties
          Check Constraint Properties
          Partition Properties
          Deleting a Table
          Deleting an Index
        Thread Pools
          Monitor Threads
            Identifying the Threads in a Thread Pool
            Thread Statistics and Details
          Manage Thread Pools
            Creating a Thread Pool
            Thread Pool Properties
        Transactions
          Identifying a Transaction’s Process
          Transaction Statistics and Details
        User-Defined Datatypes
          Adding a User-Defined Datatype
          User-Defined Datatypes Properties
          Deleting a User-Defined Datatype
        Views
          Creating a View
          Replacing a View Definition
          View Properties
          Granting Permissions on Views
          Revoking Permissions on Views
          Deleting a View
    Troubleshoot SAP Control Center for SAP ASE
      Data Display Problems
        Cannot Monitor SAP ASE or Display Statistics Chart
        Data on Screens or Charts Is Missing
        Database Objects Are Not Updated
        Error: No Result Set for this Query
        Error: No Data Was Found For Statistic
        Error: Unable to Format the Date String
        Properties for Engine Groups Incorrectly Displayed
        Same Name Engine Groups Are Not Selectable
        "Number of Transactions" KPI Is Not Updated
        Cannot Find Error Information For Monitor View
        Display Large Number of Objects in Administration Console
      Data Collection and Alert Problems
        Collection Job for SAP ASE Fails
        Alerts Are Configured But Do Not Fire
        Data Collections Fail to Complete
        Alerts Are Not Generated
      Authentication and Access Problems
        Cannot Log In
        SAP Control Center Fails to Start
        Browser Refresh (F5) Causes Logout
        Invalid Connection Profile
        Cannot Authenticate Server Configured with a Multibyte Character Set
        Features Are Not Enabled Although You Have sa_role
        Resetting the Online Help
      Performance Problems
        SAP ASE is Responding Slowly
        Memory Warnings at Startup
        SCC Out of Memory Errors
        Performance Statistics Do Not Cover Enough Time
      Collect Diagnostic Data
        Preparing to Collect Diagnostic Data
        Collecting Field Diagnostic Data
        Collecting Optimizer Diagnostic Data
        Upload Diagnostic Data
          Uploading Diagnostic Data Via FTP
          Submitting Diagnostic Data via E-mail Message
        Deleting a Diagnostic Data File
    Glossary: SAP Control Center for SAP ASE
  Utility Guide SAP Adaptive Server Enterprise 16.0
    Types of Utilities
      Threaded Versions of Utilities
      Installation or Configuration Utilities
      Utilities for Languages, Character Sets, and Sort Orders
      Utilities to Start Servers
      Database Creation and Manipulation Utilities
      Utilities to Gather Information
      Tuning Utility
      Utility to Manage a Cluster
    Utility Commands Reference
      auditinit
      backupserver
      bcp
        Usage for bcp
          Copying Tables with Indexes or Triggers Using bcp
          Using bcp with Compressed Data
      buildmaster
      certauth
      certpk12
      certreg
      charset
      cobpre
      cpre
      dataserver
        Usage for dataserver
          Dependencies and Conditions of dataserver -b and -w Options
          Potential Issues of Using dataserver -f and -w Options Together
      ddlgen
        Usage for ddlgen
          Hiding Passwords in ddlgen
          ddlgen and Encryption
            ddlgen for Encrypted Columns
            Encrypted Columns and Specifying the -XOD Flag in ddlgen
            ddlgen Support for Key Copies
            EKC Encryption Key Copy Filter and ddlgen
          Create Table DDL
      defncopy
      dscp
      dsedit
      extractjava
      installjava
        Usage for installjava
          Cases When Adding New JARs Causes Exceptions
          Updating JARs and Classes
          Locks
      isql
        Usage for isql
          Interactive isql Commands
          isql Session Commands
          Prompt Labels and Double Wildcards in an isql Session
          Command History in isql
      langinstall
      optdiag
        Usage for optdiag
          Byte Ordering and Binary optdiag Files
          optdiag Input Mode
      preupgrade
        Usage for preupgrade
          The preupgrade -D Parameter
      pwdcrypt
      qptune
      qrmutil
      showserver
      sqldbgr
        Usage for sqldbgr
          Error Messages in sqldbgr
      sqlloc
      sqllocres
      sqlsrvr
        Usage for sqlsrvr
          Starting an SAP ASE Server
          startsrvr Dependencies and Conditions with -b and -w
      sqlupgrade
      sqlupgraderes
      srvbuild
        Usage for srvbuild
          Using LDAP with srvbuild in a 64-bit Environment
      srvbuildres
      startserver
        Usage for startserver
          The Runserver File
      sybatch
      sybcluster
      syconfig
      sybdiag
        Usage for sybdiag
          Viewing sybdiag Output
          Configuration Options for sybdiag
      sybdumptran
        Usage for sybdumptran
      sybmigrate
      sybrestore
      sybtsmpasswd
      updatease
      xpserver
    Using bcp to Transfer Data to and from SAP ASE
      Methods for Moving Data
        Import and Export Data with bcp
      bcp Modes
      bcp Requirements
        bcp Permissions
        Before You Transfer
      Copy Data to Partitions Using bcp
      Improve bcp Performance
        Fast, Fast-logged, and Slow bcp
          Slow bcp
          Fast bcp
          Fast-logged bcp
          Copying Tables with Indexes
            Locking Scheme and Fast bcp
          Space Requirements for Copying
        Summary of Steps for Fast and Fast-logged bcp
        Bulk Copying Data into Partitioned Tables
          Copying Data Randomly Into Partitions
          Monitoring bcp Sessions with dbcc checktable and sp_helpsegment
          Reducing Logging by Increasing Page Allocations
        Using Parallel Bulk Copy to Copy Data into a Specific Partition
          bcp in and Locks
          Parallel Bulk Copy Methods
          Parallel Bulk Copy Syntax
          Using Parallel Bulk Copy on Round-robin Partitioned Tables
          Parallel Bulk Copy and IDENTITY Columns
            Retaining Sort Order
            Specifying the Value of a Table’s IDENTITY Column
      Bulk Copying Encrypted Data
      bcp Options
        Using the Default Formats
          Native Format
          Character Format
        Change Terminators from the Command Line
      Change the Defaults in Interactive bcp
        Respond to bcp Prompts
        File Storage Type
        Prefix Length
        Field length
        Field and Row Terminators
          Choose Terminators
      Format Files
      Examples of Copying Out Data Interactively
      Examples of Copying In Data Interactively
      bcp and Alternate Languages
      Support for Initialization Strings
      bcp and Row-Level Access Rules
      Copy In and Batch Files
        Improve Recoverability
        Batches and Partitioned Tables
      Copy Out and Text and Image Data
      Specify a Network Packet Size
      Copy In and Error Files
      Copy Out and Error Files
      Data Integrity for Defaults, Rules, and Triggers
      How bcp Differs from Other Utilities
    Using dataserver Build Servers
      Building a New Master Device
        Environments When Using dataserver
        Specifying Device and Logical Page Sizes When Building a New SAP ASE Server
        Starting an Existing a SAP ASE Server
        Upgrading to a Server With Larger Page Sizes
        Viewing the Current Server Limits
    Using dscp to View and Edit Server Entries
      Starting dscp
        Working with Server Entries
          Adding and Modifying Server Entries
            Adding a Server Entry
            Modifying or Deleting a Server Entry
          Copy Server Entries
          List and View Contents of Server Entries
          Delete Server Entries
        Exiting dscp
    Using dsedit to View and Edit Server Entries
      Add, View, and Edit Server Entries
      Using dsedit in UNIX
        Starting dsedit in UNIX
        Open an Editing Session in UNIX
        Modify Server Entries in UNIX
          Adding a New Server Entry in UNIX
          Viewing or Modifying a Server Entry in UNIX
          Add or Edit Network Transport Addresses
            TCP/IP Addresses
            SPX/IPX Addresses
        Copying a Server Entry to Another Interfaces File in UNIX
        Copying Server Entries Within the Current Session
        Copying Server Entries Between Sessions
      Using dsedit in Windows
        Starting dsedit in Windows
        Open an Editing Session in Windows
          Opening a Session in Windows
          Opening Additional Sessions in Windows
          Switching Between Sessions in Windows
        Modify Server Entries in Windows
          Adding a Server Entry
          Modifying a Server Attribute
          Renaming a Server Entry
          Deleting a Server Entry
        Copying Server Entries Within the Current Session in Windows
        Copying Server Entries Between Sessions in Windows
      Troubleshooting dsedit
    Using Interactive isql from the Command Line
      Starting isql
      Stopping isql
      Using Transact-SQL in isql
        Formatting isql Output
        Correcting isql Input
        set Options that Affect Output
      Changing the Command Terminator
      Performance Statistics Interaction with Command Terminator Values
      Input and Output Files
        UNIX command line redirection
    Using Interactive SQL in Graphics Mode
      Starting Interactive SQL
      The Main Interactive SQL Window
        Plan Dialog Tab
      The Interactive SQL Toolbar
      Open Multiple Windows
      Keyboard Shortcuts
      Display Data Using Interactive SQL
      Edit Table Values in Interactive SQL
        Copying Rows from the Interactive SQL Result Set
        Editing Rows from the Interactive SQL Result Set
        Inserting Rows into the Database from the Interactive SQL Result Set
        Deleting Rows from the Database Using Interactive SQL
      SQL Statements in Interactive SQL
        Canceling an Interactive SQL Command
        Combining Multiple Statements
        Looking Up Tables, Columns, and Procedures
        Recall Commands
        Logging Commands
      Configure Interactive SQL
        General Dialog Box
        Result Dialog Box
        Import/Export Dialog Box
        Messages Dialog Tab
        Editor Dialog Box
        Query Editor Dialog Box
      Processing Command Files
        Saving SQL Statements to a File
        Executing Command Files
        Saving, Loading, and Running Command Files
      The SQL Escape Syntax in Interactive SQL
      Interactive SQL Commands
    Interactive sybcluster Commands Reference
      Commands Active Before Connecting to a Cluster
      Commands Active After Connecting to a Cluster
      add backupserver
      add instance
      connect
      create backupserver
      create cluster
      create xpserver
      deploy plugin
      diagnose cluster
      diagnose instance
      disconnect
      drop backupserver
      drop cluster
      drop instance
      drop xpserver
      exit
      help
      localize
      quit
      set backupserver
      set cluster
      set instance
      set xpserver port
      show agents
      show backupserver config
      show cluster
      show instance
      show membership mode
      show session
      show xpserver
      shutdown cluster
      shutdown instance
      start cluster
      start instance
      upgrade server
      use
    Using sybmigrate to Migrate Data
      What sybmigrate Does
      What sybmigrate Does Not Do
      Before You Begin
        Permissions
          Changing Target Login Accounts
        Platforms
        Environment Settings
        Migrating Proxy Tables
      Migration process
        Overview of the Migration Process
        Pre-migration Considerations
        Configuration and Tuning for Higher Performance
          Configuration Considerations for SAP ASE
        Possible Errors to Avoid
        Auto-select Dependent Objects for Migration
        Migrating an Archive Database
          Upgrading an SAP ASE Server with an Archive Database
          Downgrading an SAP ASE Server with an Archive Database
        GUI Mode
          Setting Up Source Databases for Migration
          Begin the Migration
          Validating the Migration
          Migration and Validation Progress
        Resource File Mode
      Using sybmigrate with Encrypted Columns
      Post-migration Activities
      Migrate Databases in the Replication Server Domain
        Preparing for Migration
        Postmigration Procedures
          Restoring Primary Databases
          Restoring the RSSD
          Amending System Tables When the Logical Page Size Changes
          Restoring Replicate Databases
          Logs
        Migrating Databases That Support Wide Data
      Limitations
        Stopping High Availability
        Other Limitations
      Troubleshooting and Error Messages
    Using sybrestore to Restore Databases
      Before You Begin
      sybrestore Checks
        Compatibility Geometry Check
      sybrestore Syntax
      Restoring a Database in Noninteractive Mode
      Restoring a Database in Interactive Mode
        Interactive Menu Options
        Logging sybrestore Output
        Providing a Mapping Directory
        Restoring a Database to a Point In Time
          Example of Restoring a Database to a Point In Time
        Restoring User and System Databases
        Master Database Restore
          Prerequisites for Restoring a Master Database
          Configuration and Resource Files
            Creating or Editing the Restore Utility Configuration File
            Creating or Editing Resource Files
            Resource File Examples
          Restoring a Master Database
  Transact-SQL Users Guide 16.0
    SQL Building Blocks
      Tables, Columns, and Rows
      Queries, Data Modification, and Commands
      Relational Operations
      Compiled Objects
        Save or Restore Source Text
        Verify and Encrypt Source Text
        Replacing Object Definitions
      Compliance to ANSI Standards
        Federal Information Processing Standards (FIPS) Flagger
        Chained Transactions and Isolation Levels
        Identifier Compliance to ANSI Standards
        SQL Standard-Style Comments
        Right Truncation of Character Strings
        Permissions Required for update and delete Statements
        Arithmetic Errors
        Synonymous Keywords
        Treatment of Nulls
      Data and Language Characters
        Naming Convention Identifiers
          Multibyte Character Sets
          Delimited Identifiers
          Uniqueness and Qualification Conventions
          Remote Servers
      Expressions in SAP ASE
        Arithmetic Operators
        Bitwise Operators
        The String Concatenation Operator
        The Comparison Operators
        Nonstandard Operators
        Character Expression Comparisons
        Empty Strings
        Quotation Marks
        Relational and Logical Expressions
      Transact-SQL Extensions
        compute Clause
        Control-of-Flow Language
        Stored Procedures
        Extended Stored Procedures
        Triggers
        Defaults and Rules
        Error Handling and set Options
        Additional SAP ASE Extensions to SQL
      SAP ASE Login Accounts
      isql Utility
        Default Databases
        Network-Based Security Services with isql
      Displaying SQL Text
    Databases and Tables
      Databases
      Create a User Database
        The on Clause
        The log on Clause
        for load Option
      Choose a Database
      Permissions Within Databases
      Initialize Databases Asynchronously
        Determine If There is Space to be Initialized
        Restrictions for Initializing Databases Asynchronously
      Drop Databases
      Change the Database Size
      Enforce Data Integrity in Databases
      quiesce database Command
      Tables
      Designing and Creating a Table
        Table Names
        Create the User-Defined Datatypes
        Choose Columns That Accept Null Values
        Sample Table Design Sketch
          Define the Sample Table
      Create Tables in Different Databases
      Create New Tables from Query Results: select into
        Check for Errors
      Temporary Tables Usage
        Unique Temporary Table Names
        Manipulate Temporary Tables in Stored Procedures
        General Rules for Temporary Tables
      Deferred Table Creation
        Deferred Table Creation at the Database Level
        Create Deferred Tables
        Explicitly Materialize Deferred Tables
        Identify Deferred Tables
        Roll Back for Deferred Tables
        Command Behavior in Deferred Tables
      IDENTITY Columns Usage
        Create IDENTITY Columns with User-Defined Datatypes
        Reference IDENTITY Columns
        Refer to IDENTITY Columns with syb_identity
        Automatically Create ā€œhiddenā€ IDENTITY Columns
        Using select into with IDENTITY Columns
          Select an IDENTITY Column into a New Table
          Select the IDENTITY Column More Than Once
          Add a New IDENTITY Column with select into
          Define a Column for Which the Value Must Be Computed
          IDENTITY Columns Selected into Tables with Unions or Joins
      Allow Null Values in a Column
        Constraints and Rules Used with Null Values
        Defaults and Null Values
        Nulls Require Variable-Length Datatypes
        text, unitext, and image Columns
      Alter Existing Tables
        Objects Using select * Do Not List Changes to Table
        Use alter table on Remote Tables
        Add Columns
          Add Columns Appends Column IDs
          Add NOT NULL Columns
          Add Constraints
        Drop Columns
          Drop Columns Renumbers the Column ID
          Drop Columns Without Performing a Data Copy
            Restrictions for no datacopy Parameter
          Drop Constraints
        Modify Columns
          Convert Datatypes
          Modifying Tables and Using Bulk Copy
          Decreased Column Length May Truncate Data
          Modify datetime Columns
          Modify the NULL Default Value of a Column
          Check Columns That Have Precision or Scale
          Modify text, unitext, and image Columns
        Add IDENTITY Columns
        Drop IDENTITY Columns
        Modify IDENTITY Columns
        Data Copying
          Change exp_row_size
        Modifying Locking Schemes and Table Schema
        Add, Drop, or Modify Columns with User-Defined Datatypes
        Errors and Warnings from alter table
          Errors and Warnings Generated by alter table modify
          Scripts Generated by if exists()...alter table
        Rename Tables and Other Objects
          Rename Dependent Objects
      Drop Tables
      Manage Identity Gaps in Tables
        Parameters for Controlling Identity Gaps
        Comparison of identity burning set factor and identity_gap
        Set the Table-Specific Identity Gap
        Change the Table-Specific Identity Gap
        Display Table-Specific Identity Gap Information
        Gaps from Other Causes
        IDENTITY Column Maximum Value
      Define Integrity Constraints for Tables
        Table and Column Level Constraints
        Create Error Messages for Constraints
        Check Constraints
        Default Column Values
        unique and primary key Constraints
        Referential Integrity Constraints
          Table and Column Level Referential Integrity Constraints
          Using Create Schema for Cross-Referencing Constraints
          General Rules for Creating Referential Integrity Constraints
          Designing Applications That Use Referential Integrity
      Computed Columns
        Computed Columns Usage
          Computed Columns Example
        Indexes on Computed Columns
        Deterministic Property
          Effects of Deterministic Property on Computed Columns
          Effects of Deterministic Property on Materialized Computed Columns
          Effects of Deterministic Property on Virtual Computed Columns
          Effects of Deterministic Property on Function-Based Indexes
          Examples of Nondeterministic Computed Columns
      Retrieve Information About Databases and Tables
        Help on Databases
        Help on Database Objects
          sp_help Usage on Database Objects
          Use sp_helpconstraint to Find Table Constraint Information
          Determining Much Space a Table Uses
          List Tables, Columns, and Datatypes
          Find an Object Name and ID
    SQL-Derived Tables
      SQL-Derived Tables and Optimization
      SQL-Derived Table Syntax
        Derived Column Lists
        Correlated SQL-Derived Tables Are Not Supported
      SQL-Derived Tables Usage
        Nesting
        Subqueries Using SQL-Derived Tables
        Unions in Derived-Table Expressions
        Unions in Subqueries
        Rename Columns with SQL-Derived Tables
        Constant Expressions
        Aggregate Functions
        Joins with SQL-Derived Tables
        Create a Table From a SQL-Derived Table
        Views with SQL-Derived Tables
        Correlated Attributes
    Partition Tables and Indexes
      Partitioning Types
        Range Partitioning
        Hash Partitioning
        List Partitioning
        Round-Robin Partitioning
      Partition Pruning
      Composite Partitioning Keys
      Indexes and Partitions
        Global Indexes
        Local Indexes
        Guarantee a Unique Index
      Create and Manage Partitions
        Partitioning Tasks
        Create a Range-Partitioned Table
          Restrictions on Partition Keys and Bound Values for Range-Partitioned Tables
        Create a Hash-Partitioned Table
        Create a List-Partitioned Table
        Create a Round-Robin–Partitioned Table
        Create Partitioned Indexes
        Create a Partitioned Table From an Existing Table
      Change Data Partitions
        Split, Merge, and Move Partitions
          Partition Schemes Available for Splitting or Merging
          Split Partitions
          Merge Partitions
          Move Partitions
          Effect of Split or Merged Partitions on Indexes
        Add Partitions to a Partitioned Table
        Change the Partitioning Type or Key
        Unpartition Round-Robin–Partitioned Tables
        partition Parameter Usage
        Change Partition-Key Columns
      Configure Partitions
      update, delete, and insert in Partitioned Tables
      Update Values in Partition-Key Columns
      Display Information About Partitions
        Function Usage
      Truncate a Partition
      Using Partitions to Load Table Data
      Update Partition Statistics
      Improved Concurrency for Partition-Level Online Operations
        Partition-Level Online Operation Syntax
        Concurrency with Partition-Level Online Operations
        Partition-Level Online Operations with Global Index
    Virtually Hashed Tables
      Structure of a Virtually Hashed Table
      Create a Virtually Hashed Table
      Limitations for Virtually Hashed Tables
      Commands that Support Virtually Hashed Tables
      Query Processor Support
      Monitor Counter Support
      System Procedure Support
    Create Indexes on Tables
      Guidelines for Using Indexes
      Methods of Creating Indexes
      Create Indexes
        Issue create index in Parallel
          Configuring enhanced parallel create index
          Enhanced Parallel create index Usage
          View Parallel create index Commands with showplan
        Function-Based Indexes
        Create Indexes Without Blocking Access to Data
        Unique Indexes
        IDENTITY Columns in Nonunique Indexes
        Ascending and Descending Index-Column Values
        Using fillfactor, max_rows_per_page, and reservepagegap
      Indexes on Computed Columns
      Clustered or Nonclustered Index Usage
        Create Clustered Indexes on Segments
      Index Options
        ignore_dup_key Option
        ignore_dup_row and allow_dup_row
        sorted_data Option
        on segment_name Option
      Drop Indexes
      Identifying the Indexes on a Table
      Update Statistics for Indexes
    Datatypes
      System-Supplied Datatypes
        Exact Numeric Types: Integers
        Exact Numeric Types: Decimal Numbers
        Approximate Numeric Datatypes
        Money Datatypes
        Date and Time Datatypes
        Character Datatypes
          unichar Datatype
            Relational Expressions
            Join Operators
            Union Operators
            Clauses and Modifiers
          text Datatype
          unitext Datatype
        Binary Datatypes
          image Datatype
        bit Datatype
        timestamp Datatype
        sysname and longsysname Datatype
      LOB Locators in Transact-SQL Statements
        Implicitly Create a Locator
        Explicitly Create a Locator
        Convert the Locator Value to the LOB Value
        Locator Scope
      Convert Between Datatypes
      Mixed-Mode Arithmetic and Datatype Hierarchy
        Working with money Datatypes
        Determine Precision and Scale
      User-Defined Datatypes
        Length, Precision, and Scale
        Null Type
        Associate Rules and Defaults with User-Defined Datatypes
        Create User-Defined Datatype with IDENTITY Property
        Create IDENTITY Columns from User-Defined Datatypes
        Drop a User-Defined Datatype
      Datatype Entry Rules
        char, nchar, unichar, univarchar, varchar, nvarchar, unitext, and text
        Date and Time
          Enter Times
          Enter Dates
            Date Formats
          Search Dates and Times
        binary, varbinary, and image
        money and smallmoney
        float, real, and double precision
        decimal and numeric
        Integer Types and Their Unsigned Counterparts
        timestamp
      Get Information About Datatypes
    Queries: Selecting Data from a Table
      select Syntax
        Check for Identifiers in a select Statement
      Choose Columns Using the select Clause
        Choose all Columns Using select *
        Choose Specific Columns
        Rearrange the Column Order
        Rename Columns in Query Results
        Expressions
          Quoted Strings in Column Headings
          Character Strings in Query Results
          Computed Values in the select List
          Arithmetic Operator Precedence
        Select Text, Unitext, and Image Values
          readtext Usage
        select List Summary
      select for update
        Use select for update in Cursors and DML
        Concurrency Issues
      Eliminate Duplicate Query Results with Distinct
      Specify Tables with the from Clause
      Select Rows Using the where Clause
        Comparison Operators in where Clauses
        Ranges (between and not between)
        Lists (in and not in)
        Matching Character Strings: like
          not like Usage
          Different Results Using not like and ^
          Use Wildcard Characters as Literal Characters
          Interaction of Wildcard Characters and Square Brackets
          Use Trailing Blanks and %
          Use Wildcard Characters in Columns
        ā€œUnknownā€ Values: NULL
          SQL Standard for NULL Concatenation
          Test a Column for Null Values
          Difference Between False and Unknown
          Substitute a Value for NULLs
          Expressions that Evaluate to NULL
          Concatenate Strings and NULL
          System-Generated NULLs
        Connect Conditions with Logical Operators
          Logical Operator Precedence
      Multiple select Items in a Nested exists Query
      Use a Column Alias in Nested select Statements
    Subqueries: Queries Within Other Queries
      Subquery Restrictions
      Qualify Column Names
      Subqueries with Correlation Names
      Multiple Levels of Nesting
      Using an Asterisk in Nested select Statements
        Use Table-Name Qualifiers
        Use Nested Queries with group by
        Usage and Examples of Asterisks in select Statements
      Subqueries in update, delete, and insert Statements
      Subqueries in Conditional Statements
      Subqueries Instead of Expressions
      Types of Subqueries
        Expression Subqueries
          Use Scalar Aggregate Functions to Guarantee a Single Value
          Use group by and having in Expression Subqueries
          Use distinct with Expression Subqueries
        Quantified Predicate Subqueries
          Subqueries with any and all
            > all Means Greater Than All Values
            = all Means Equal to Every Value
            > any Means Greater Than at Least One Value
            = any Means Equal to Some Value
        Subqueries Used with in
        Subqueries Used with not in
        Subqueries Using not in with NULL
        Subqueries Used with exists
        Subqueries Used with not exists
        Find Intersection and Difference with exists
        Subqueries Using SQL Derived Tables
      Correlated Subqueries
        Correlated Subqueries with Correlation Names
        Correlated Subqueries with Comparison Operators
        Correlated Subqueries in a having Clause
    Aggregates, Grouping, and Sorting
      Aggregate Functions and Datatypes
      count versus count (*)
      Aggregate Functions with distinct
      Null Values and the Aggregate Functions
      Using Statistical Aggregates
      Organize Query Results into Groups: the group by Clause
        group by and SQL Standards
        Nest Groups with group by
        Reference Other Columns in Queries Using group by
        Expressions and group by
        group by in Nested Aggregates
        Null Values and group by
        where Clause and group by
        group by and all
        Aggregates Without group by
      Select Groups of Data: the having Clause
        Interactions between having, group by, and where Clauses
        having Without group by
      Sort Query Results: the order by Clause
        order by and group by
        order by and group by Used with select distinct
      Summarize Groups of Data: the compute Clause
        Row Aggregates and compute
          Rules for compute Clauses
        Specify More Than One Column After compute
        Use More Than One compute Clause
        Apply an Aggregate to More Than One Column
        Use Different Aggregates in the Aame compute Clause
        Generate Totals: compute Without by
      Combine Queries: the union Operator
        Guidelines for union Queries
    Joins: Retrieve Data from Several Tables
      Join Syntax
      Joins and the Relational Model
      How Joins are Structured
        The from Clause
        The where Clause
          Join Operators
          Datatypes in Join Columns
          Joins and Text and Image Columns
      How Joins are Processed
      Equijoins and Natural Joins
      Joins with Additional Conditions
      Joins Not Based on Equality
      Self-Joins and Correlation Names
      The Not-Equal Join
        Not-Equal Joins and Subqueries
      Join More Than Two Tables
      Star Joins
      Outer Joins
        Inner and Outer Tables
        Outer Join Restrictions
        Views Used with Outer Joins
        ANSI Inner and Outer Joins
          Correlation Name and Column Referencing Rules for ANSI Joins
          ANSI Inner Joins
            The Join Table of an Inner Join
            The on Clause of an ANSI Inner Join
        ANSI outer joins
          Placement of the Predicate in the on or where Clause
          Nested ANSI Outer Joins
        Transact-SQL Outer Joins
          Outer Joins and Aggregate Extended Columns
      Relocated Joins
        Configuring Relocated Joins
      How Null Values Affect Joins
      Determine Which Table Columns to Join
    Managing Data
      Referential Integrity
      Transactions
      Sample Databases
      Add New Data
        Add New Rows with Values
        Insert Data into Specific Columns
          Restrict Column Data: Rules
          The NULL Character String
          Insert NULLs into Columns That Do Not Allow Them
          Add Rows Without Values in All Columns
          Change a Column’s Value to NULL
          SAP ASE-generated values for IDENTITY columns
          Explicitly Insert Data into an IDENTITY Column
          Retrieve IDENTITY Column Values with @@identity
          Reserve a Block of IDENTITY Column Values
          Maximum Value of the IDENTITY Column
            Modify the Maximum Value of the IDENTITY Column
            Creating a New Table with a Larger Precision
            Renumbering the Table IDENTITY Columns with bcp
        Add New Rows with select
          Use Computed Columns
          Insert Data into Some Columns
          Insert Data from the Same Table
      Create Nonmaterialized, Non-Null Columns
        Add Nonmaterialized Columns
        Tables That Already Have Nonmaterialized Columns
        Nonmaterialized Column Storage
        Alter Nonmaterialized Columns
        Limitations for Nonmaterialized Columns
      Change Existing Data
        Use the set Clause with Update
          Assign Variables in the set Clause
        Use the where Clause with update
        Use the from Clause with update
        Perform updates with joins
        Update IDENTITY Columns
      Change text, unitext, and image data
      Truncate Trailing Zeros
      Transfer Data Incrementally
        Mark Tables for Incremental Transfer
        Transfer Tables from a Destination File
        Convert SAP ASE Datatypes to SAP IQ
        Store Transfer Information
        Exceptions and Errors
        Sample Incremental Transfer
          Replacing Data with New Rows
      Delete Data
        Use the from Clause with delete
        Delete from IDENTITY Columns
      Delete All Rows from a Table
        truncate table Syntax
    Views: Limit Access to Data
      Advantages of Views
      Security
      Logical Data Independence
      Create Views
        create view Syntax
        select Statement Usage with create view
          View Definition with Projection
          View Definition with a Computed Column
          View Definition with an Aggregate or Built-In Function
          View Definition with a Join
          Views Used with Outer Joins
          Views Derived From Other Views
          Distinct Views
          Views That Include IDENTITY Columns
        Validate a View’s Selection Criteria
          Views Derived from Other Views
      Retrieve Data Through Views
        View Resolution
        Redefine Views
        Rename Views
        Alter or Drop Underlying Objects
      Modify Data Through Views
        Restrictions on Updating Views
      Drop Views
      Use Views as Security Mechanisms
      Get Information About Views
    Defining Defaults and Rules for Data
      Create Defaults
        Bind Defaults
        Unbind Defaults
        How Defaults Affect NULL Values
      Drop Defaults
      Create Rules
        Bind Rules
          Rules Bound to Columns
          Rules Bound to User-Defined Datatypes
          Precedence of Rules
        Rules and NULL Values
        Unbind Rules
      Drop Rules
      Retrieve Information About Defaults and Rules
      Share Inline Defaults
        Create an Inline Shared Default
        Unbind a Shared Inline Default
        Limitations for Shared Inline Defaults
    Precomputed Result Sets
      Benefits of Precomputed Result Sets
      Configuring SAP ASE for Precomputed Result Sets
      Creating Precomputed Result Sets
      Identifying Precomputed Result Sets
      Refreshing Precomputed Result Sets
      Altering Precomputed Result Sets
      Dropping or Truncating Precomputed Result Sets
      Configuring Staleness
      Querying Precomputed Result Sets
      Rewriting Queries
      Replicating Precomputed Result Sets
      Restrictions for Precomputed Result Sets
    Batches and Control-of-Flow Language
      Rules Associated with Batches
        Examples of Using Batches
        Batches Submitted as Files
      Control-of-Flow Language Usage
        if...else
        case Expression
          case Expression for Alternative Representation
          case and Division by Zero
          rand Functions in case Expressions
          case Expression Results
          case Expressions and set ansinull
          case Expression Requires at Least one Non-Null Result
          Determining the Result Set
          case and Value Comparisons
          coalesce
          nullif
        begin...end
        while and break...continue
        declare and Local Variables
        goto
        return
        print
        raiserror
        Create Messages for print and raiserror
        waitfor
        Comments
          Slash-Asterisk Style Comments
          Double-Hyphen Style Comments
      Local Variables
        Local Variables and select Statements
        Local Variables and update Statements
        Local Variables and Subqueries
        Local Variables and while Loops and if…else Blocks
        Variables and Null Values
      Global Variables
        Transactions and Global Variables
          Check for Errors with @@error
          Check IDENTITY Values with @@identity
          Check the Transaction Nesting Level with @@trancount
          Check the Transaction State with @@transtate
          Check the Nesting Level with @@nestlevel
          Check the Status From the Last Fetch
    Transact-SQL Functions
      Built-In Functions
        System Functions
        String Functions
          Concatenating Expressions
            Concatenation Operators and LOB Locators
          Nest String Functions
          Limits on String Functions
        Text and Image Functions
          readtext on unitext Columns Usage
        Aggregate Functions
          Aggregate Functions Used with the group by Clause
          Aggregate Functions and Null Values
          Vector and Scalar Aggregates
          Aggregate Functions as Row Aggregates
        Statistical Aggregate Functions
          Formulas for Computing Standard Deviations
        Mathematical Functions
        Date Functions
        Datatype Conversion Functions
          convert Function Usage for Explicit Conversions
          Datatype Conversion Guidelines and Constraints
            Convert Character Data to a Noncharacter Type
            Convert from One Character Type to Another
            Convert Numbers to a Character Type
            Convert to or from unitext
            Rounding During Conversion To and From Money Types
            Convert Date and Time Information
            Convert Between Numeric Types
            Convert Between Binary and Integer Types
            Convert Between Binary and Numeric or Decimal Types
            Convert Image Columns to Binary Types
            Convert Other Types to bit
            Convert Hexadecimal Data
            Convert bigtime and bigdatetime Data
            Convert NULL Value
          Change the Date Format
          Conversion Error Handling
        Security Functions
        XML Functions
      User-Created Functions
    Stored Procedures
      Examples
      Permissions
      Performance
      Create and Execute Stored Procedures
        Deferred Name Resolution Usage
        Parameters
        Default Parameters
          Default Parameters Usage
          NULL as the Default Parameter
          Wildcard Characters in the Default Parameter
        Using Multiple Parameters
        LOB Datatypes in Stored Procedures
        Procedure Groups
        with recompile in create procedure
        with recompile in execute
        Nesting Procedures
        Temporary Tables in Stored Procedures
        Set Options in Stored Procedures
          Query Optimization Settings
          Maximum Number of Arguments
          Maximum Size for Expressions, Variables, and Arguments
        Execution of Stored Procedures
          Execute Procedures After a Time Delay
          Execute Procedures Remotely
          Execute a Procedure with execute as owner or execute as caller
            Example with execute as Omitted
            Example of Procedure with execute as
      Deferred Compilation in Stored Procedures
      Information Returned From Stored Procedures
        Return Status
          Reserved Return Status Values
          User-Generated Return Values
        Check Roles in Procedures
        Return Parameters
          Pass Values in Parameters
          The Output Keyword
      Restrictions Associated with Stored Procedures
        Qualify Names Inside Procedures
      Rename Stored Procedures
        Rename Objects Referenced by Procedures
      Stored Procedures as Security Mechanisms
      Dropping Stored Procedures
      System Procedures
        Execute System Procedures
        Permissions on System Procedures
        Types of System Procedures
        Other SAP ASE-Supplied Stored Procedures
      Get Information About Stored Procedures
        Get a Report with sp_help
        View the Source Text of a Procedure with sp_helptext
        Identify Dependent Objects with sp_depends
          Use sp_depends with deferred_name_resolution
        Identify Permissions with sp_helprotect
    Extended Stored Procedures Usage
      XP Server
        CIS RPC Mechanism
        sybesp_dll_version
      Dynamic Link Library Support
      Open Server API
      ESPs and Permissions
      ESPs and Performance
      Create Functions for ESPs
        Files for ESP Development
        Open Server Data Structures
        Open Server Return Codes
        Outline of a Simple ESP Function
        ESP Function Example
        Building the DLL
      Registering ESPs
        create procedure Usage
        sp_addextendedproc Usage
      Remove ESPs
        Renaming ESPs
      Execute ESPs
      System ESPs
      Get Information About ESPs
      ESP Exceptions and Messages
    Cursors: Accessing Data
      Types of Cursors
      Cursor Scope
      Cursor Scans and the Cursor Result Set
      Make Cursors Updatable
        Determine Which Columns Can Be Updated
      How SAP ASE Processes Cursors
      Monitor Cursor Statements
      declare cursor
        cursor_scrollability
        Cursor Sensitivity
        read_only Option
      Open Cursors
      Fetch Data Rows Using Cursors
        fetch Syntax
        into Clause Usage
        Check Cursor Status
        Get Multiple Rows With Each Fetch
        Check the Number of Rows Fetched
      Update and Delete Rows Using Cursors
        Update Cursor Result Set Rows
        Delete Cursor Result Set Rows
      Close and Deallocate Cursors
      Cursor Examples
      Cursors in Stored Procedures
      Cursors and Locking
        Cursor-Locking Options
      Transaction Support for Updatable Cursors
      Get Information About Cursors
      Browse Mode Versus Cursors
    Triggers: Enforce Referential Integrity
      Use Triggers Versus Integrity Constraints
      Create Triggers
        create trigger Syntax
      Use Triggers to Maintain Referential Integrity
        Test Data Modifications Against the Trigger Test Tables
        Insert Trigger Example
        Delete Trigger Examples
        Update Trigger Examples
      Multirow Considerations
        Insert Trigger Example Using Multiple Rows
        Delete Trigger Example Using Multiple Rows
        Update Trigger Example Using Multiple Rows
        Conditional Insert Trigger Example Using Multiple Rows
      Roll Back Triggers
      Global Login Triggers
      Nesting Triggers
        Trigger Self-Recursion
      Rules Associated with Triggers
        Triggers and Permissions
        Trigger Restrictions
        Implicit and Explicit Null Values
        Triggers and Performance
        set Commands in Triggers
        Renaming and triggers
      Disable Triggers
      Drop Triggers
      Multiple Triggers
        Changing the Order of When a Trigger Is Fired
        Order of Triggers in Merge Statements
        Transactional Behavior with Multiple Triggers
        Disabling and Reenabling Triggers
      Get Information About Triggers
        sp_help
        sp_helptext
        sp_depends
      instead of Triggers
        Inserted and Deleted Logical Tables
        Triggers and Transactions
        Nesting
        Recursion
        instead of insert Triggers
        instead of update Trigger
        instead of delete Trigger
        Searched and Positioned update and delete
        Get Information About instead of Triggers
    In-Row Off-Row LOB
      In-Row LOB Columns Compression
      Migrate Off-Row LOB Data to In-Row Storage
        In-Row LOB Columns and Bulk Copy
        Methods for Migrating Existing Data
          Set Up the mymsgs Example Table
          Migrate Using Update Statement
          Use reorg rebuild
          Migrate Using alter table with Data Copy
        Guidelines for Selecting the In-Row LOB Length
        Identifying In-Row LOB Length Selection
      Downgrading Tables Containing In-Row LOB Columns
    Transactions: Maintain Data Consistency and Recovery
      Transactions and Consistency
      Transactions and Recovery
      Transaction Usage
        Allow Data Definition Commands in Transactions
        System Procedures That Are Not Allowed in Transactions
        Begin and Commit Transactions
        Roll Back and Save Transactions
        Transaction States
        Nested Transactions
        Example of a Transaction
      Transaction Mode and Isolation Level
        Choose a Transaction Mode
          Transaction Modes and Nested Transactions
          Find the Status of the Current Transaction Mode
        Choose an Isolation Level
          Default Isolation Levels for SAP ASE and ANSI SQL
          Dirty Reads
          Repeatable Reads
          Find the Status of the Current Isolation Level
          Change the Isolation Level for a Query
          Isolation Level Precedences
          Cursors and Isolation Levels
          Stored Procedures and Isolation Levels
          Triggers and Isolation Levels
        Compliance with SQL Standards
        Use the Lock Table Command to Improve Performance
      Transactions in Stored Procedures and Triggers
        Errors and Transaction Rollbacks
        Transaction Modes and Stored Procedures
          Run System Procedures in Chained Mode
          Set Transaction Modes for Stored Procedures
      Use Cursors in Transactions
      Issues to Consider When Using Transactions
      Backup and Recovery of Transactions
    Locking Commands and Options
      wait/nowait Option of the Lock Table Command
      Session-Level Lock-Wait Limit
      Server-Wide Lock-Wait Limit
      Information on the Number of Lock-Wait Timeouts
      Readpast Locking for Queue Processing
        Incompatible Locks During readpast Queries
        Allpages-Locked Tables and readpast Queries
        Effects of Isolation Levels Select Queries with readpast
        Data Modification Commands with readpast and Isolation Levels
        text, unitext, and image columns and readpast
    The pubs2 Database
      Tables in the pubs2 Database
        publishers Table
        authors Table
        titles Table
        titleauthor Table
        salesdetail Table
        sales Table
        stores Table
        roysched Table
        discounts Table
        blurbs Table
        au_pix Table
      Diagram of the pubs2 Database
    The pubs3 Database
      Tables in the pubs3 Database
        publishers Table
        authors Table
        titles Table
        titleauthor Table
        salesdetail Table
        sales Table
        stores Table
        store_employees Table
        roysched Table
        discounts Table
        blurbs Table
      Diagram of the pubs3 Database
  System Administration Guide 16.0: Volume 1
    Overview of System Administration
      Roles Required for System Administration Tasks
        Database Owner
        Database Object Owner
      Performing System Administration Tasks
      System Tables
        Querying the System Tables
        Keys in System Tables
        Updating System Tables
      System Procedures
        Using System Procedures
        System Procedure Tables
        Creating Stored Procedures
      System Extended Stored Procedures
        Creating System ESPs
      Logging Error Messages
      Connecting to SAP ASE
        The interfaces File
        Directory Services
        LDAP as a Directory Service
          Multiple Directory Services
          LDAP Directory Services Versus the SAP Interfaces File
            LDAP Performance
      Security Features Available in SAP ASE
    System and Optional Databases
      Overview of System Databases
      The master Database
        Controlling Object Creation in the master Database
        Backing Up Master and Keeping Copies of System Tables
      model Database
      sybsystemprocs Database
      tempdb database
        Creating Temporary Tables
      sybsecurity Database
      sybsystemdb Database
      sybmgmtdb Database
      pubs2 and pubs3 Sample Databases
        Maintaining the Sample Databases
        pubs2 Image Data
      dbccdb Database
      sybdiag Database
      Determining the Version of the Installation Scripts
    System Administration for Beginners
      Logical Page Sizes
      Using ā€œTestā€ Servers
        Planning Resources
        Achieving Performance Goals
      Considerations When Installing SAP Products
      Allocating Physical Resources
        Dedicated Versus Shared Servers
        Decision-Support and OLTP Applications
        Advance Resource Planning
        Operating System Configuration
      Backup and Recovery
        Keep Up-To-Date Backups of the master Database
          Keep Offline Copies of System Tables
        Automating Backup Procedures
        Verify Data Consistency Before Backing Up a Database
        Monitor the Log Size
      Ongoing Maintenance and Troubleshooting
        Starting and Stopping SAP ASE
        Viewing and Pruning the Error Log
      Keeping Records
        Contact Information
        Configuration Information
        Maintenance Schedules
        System Information
        Disaster Recovery Plan
      Additional Resources
    Managing and Monitoring SAP ASE
      SAP Control Center for SAP ASE
      Configuration History Tracking
        Configuring SAP ASE to Track Configuration Changes
        Changes Captured
        Querying ch_events
    Setting Configuration Parameters
      Modifying Configuration Parameters
      Required Roles for Modifying Configuration Parameters
      Unit Specification Using sp_configure
      Global Versus Session Settings
      Getting Help Information on Configuration Parameters
      Using sp_configure
        sp_configure Syntax Elements
        Issue sp_configure with the Configuration File
          Configuration File Naming Recommendations
          Read or Write the Configuration File with sp_configure
          Edit the Configuration File
            Permissions for Configuration Files
            Backing Up Configuration Files
            Verify the Name of the Configuration File Currently in Use
          Start SAP ASE Using a Configuration File
            Configuration File Errors
        The Parameter Hierarchy
        User-Defined Subsets of the Parameter Hierarchy: Display Levels
          The Effect of the Display Level on sp_configure Output
        Performance Tuning with sp_configure and sp_sysmon
        Using Configuration Parameters in a Clustered Environment
      sp_configure Output
      sysconfigures and syscurconfigs Tables
        Example syscurconfigs and sysconfigures Query
      Named Cache Configuration Parameter Group
      Dump Configuration Parameter Group
      Configuration Parameters
        Alphabetical Listing of Configuration Parameters
          abstract plan cache
          abstract plan dump
          abstract plan load
          abstract plan replace
          abstract plan sharing
          additional network memory
          aggresive task stealing
          allocate max shared memory
          allow backward scans
          allow nested triggers
          allow procedure grouping
          allow remote access
          allow resource limits
          allow sendmsg
          allow sql server async i/o
          allow updates to system tables
          average cap size
          audit queue size
          auditing
          automatic cluster takeover
          builtin date strings
          caps per ccb
          capture compression statistics
          capture missing statistics
          check password for digit
          CIPC large message pool size
          CIPC regular message pool size
          cis bulk insert array size
          cis bulk insert batch size
          cis connect timeout
          cis cursor rows
          cis idle connection timeout
          cis packet size
          cis rpc handling
          cluster heartbeat interval
          cluster heartbeat retries
          cluster redundancy level
          cluster vote timeout
          column default cache size
          compression info pool size
          compression memory size
          configuration file
          cost of a logical io
          cost of a physical io
          cost of a cpu unit
          cpu accounting flush interval
          cpu grace time
          current audit table
          deadlock checking period
          deadlock pipe active
          deadlock pipe max messages
          deadlock retries
          default character set id
          default database size
          default exp_row_size percent
          default fill factor percent
          default language id
          default network packet size
            Requesting a Larger Packet Size at Login
          default sortorder id
          default unicode sortorder
          default XML sortorder
          deferred name resolution
          disable character set conversions
          disable disk mirroring
          disable jsagent core dump
          disable varbinary truncation
          disk i/o structures
          DMA object pool size
          dtm detach timeout period
          dtm lock timeout period
          dump history filename
          dump on conditions
          dynamic allocation on demand
          dynamic SQL plan pinning
          early row send increment
          enable async database init
          enable backupserver HA
          enable cis
          enable compression
          enable concurrent dump tran
          enable console logging
          enable DTM
          enforce dump configuration
          enable dump history
          enable encrypted columns
          enable enterprise java beans
          enable file access
          enable full-text search
          enable functionality group
          enable inline default sharing
          enable HA
          enable housekeeper GC
          enable hp posix async i/o
          enable HugePages
          enable i/o fencing
          enable ISM
          enable java
          enable job scheduler
          enable js restart logging
          enable large chunk elc
          enable large pool for load
          enable ldap user auth
          enable literal autoparam
          engine local cache percent
          enable logins during recovery
          enable merge join
          enable metrics capture
          enable monitoring
          enable pam user auth
          enable pci
          enable permissive unicode
          enable plan sharing
          enable predicated privileges
          enable query tuning mem limit
          enable query tuning time limit
          enable rapidlog
          enable real time messaging
          enable rep agent threads
          enable row level access control
          enable semantic partitioning
          enable sort-merge join and JTC
          enable sql debugger
          enable ssl
          enable stmt cache monitoring
          enable surrogate processing
          enable unicode conversion
          enable unicode normalization
          enable utility lvl 0 scan wait
          enable webservices
          enable xact coordination
          enable xml
          engine memory log size
          errorlog pipe active
          errorlog pipe max messages
          esp execution priority
          esp execution stacksize
          esp unload dll
          event buffers per engine
          event log computer name (Windows only)
          event logging
          executable codesize + overhead
          extended cache size
          FIPS login password encryption
          global async prefetch limit
          global cache partition number
          heap memory per user
          histogram tuning factor
          housekeeper free write percent
          i/o accounting flush interval
          i/o batch size
          i/o polling process count
          identity burning set factor
          identity grab size
          identity reservation size
          idle migration timeout
          job scheduler interval
          job scheduler tasks
          js heartbeat interval
          js job output width
          kernel mode
          kernel resource memory
          large allocation auto tune
          license information
          lock address spinlock ratio
          lock hashtable size
          lock scheme
          lock shared memory
          lock spinlock ratio
          lock table spinlock ratio
          lock timeout pipe active
          lock timeout pipe max messages
          lock wait period
          log audit logon failure
          log audit logon success
          max async i/os per engine
            On the Linux Platform
          max async i/os per server
          max buffers per lava operator
            Differences Between number of sort buffers and max data buffers per lava sort
          max cis remote connections
          max concurrently recovered db
          max js restart attempts
          max memory
            If SAP ASE Cannot Start
          max native threads per engine
          max nesting level
          max network packet size
            Choosing Packet Sizes
          max network peek depth
          max number network listeners
          max online engines
          max online Q engines
          max parallel degree
          max pci slots
          max query parallel degree
          max repartition degree
          max resource granularity
          max scan parallel degree
          max SQL text monitored
          max transfer history
          max utility parallel degree
          maximum dump conditions
          maximum failed logins
          maximum job output
          memory alignment boundary
          memory dump compression level
          memory per worker process
          messaging memory
          metrics elap max
          metrics exec max
          metrics lio max
          metrics pio max
          min pages for parallel scan
          minimum password length
          mnc_full_index_filter
          msg confidentiality reqd
          msg integrity reqd
          net password encryption reqd
          network polling mode
            In-Line Network Polling
          number of alarms
          number of aux scan descriptors
            Monitoring and Estimating Scan Descriptor Usage
          number of backup connections
          number of ccbs
          number of checkpoint tasks
          number of devices
            Setting the number of devices on UNIX
          number of disk tasks
          number of dtx participants
            Optimizing the Number of DTX Participants for Your System
          number of dump threads
          number of early send rows
          number of engines at startup
          number of histogram steps
          number of index trips
          number of java sockets
          number of large i/o buffers
          number of locks
          number of mailboxes
          number of messages
          number of network tasks
          number of oam trips
          number of open databases
            Optimizing the number of open databases
          number of open indexes
            Optimizing number of open indexes
          number of open objects
            Optimizing number of open objects
          number of open partitions
          number of pre-allocated extents
            Using a Value of 32 for the number of pre-allocated extents
          number of Q engines at startup
          number of remote connections
          number of remote logins
          number of remote sites
          number of sort buffers
          number of user connections
          number of worker processes
          o/s file descriptors
          object lockwait timing
          open index hash spinlock ratio
          open index spinlock ratio
          open object spinlock ratio
          optimization goal
          optimize temp table resolution
          optimization timeout limit
          optimizer level
          page lock promotion HWM
          page lock promotion LWM
          page lock promotion PCT
          page utilization percent
          partition groups
          partition spinlock ratio
          pci memory size
          per object statistics active
          percent database for history
          percent database for output
          percent history free
          percent output free
          performance monitoring option
          permission cache entries
          plan text pipe active
          plan text pipe max messages
          print deadlock information
          print recovery information
          procedure cache size
          procedure deferred compilation
          process wait events
          prod-consumer overlap factor
          quorum heartbeat interval
          quorum heartbeat retries
          quoted identifier enhancements
          rapidlog buffer size
          rapidlog max files
          read committed with lock
          recovery interval in minutes
          recovery prefetch size
          remote server pre-read packets
          restricted decrypt permission
          row lock promotion HWM
          row lock promotion LWM
          row lock promotion PCT
          rtm thread idle wait period
          runnable process search count
            runnable process search count versus idle timeout
          sampling percent
          secure default login
          select for update
          select on syscomments.text
          send doneinproc tokens
          session migration timeout
          session tempdb log cache size
          shared memory starting address
          size of auto identity column
          size of global fixed heap
          size of process object heap
          size of shared class heap
          size of unilib cache
          solaris async i/o mode
          sproc optimize timeout limit
          SQL batch capture
          SQL Perfmon Integration
          sql server clock tick length
          sql text pipe active
          sql text pipe max messages
          stack guard size
          stack size
          start mail session
          start xp server during boot
          startup delay
          statement cache size
          statement pipe active
          statement pipe max messages
          statement statistics active
          streamlined dynamic SQL
          strict dtm enforcement
          suppress js max task message
          suspend audit when device full
          syb_sendmsg port number
          sysstatistics flush interval
          systemwide password expiration
          tape retention in days
          tcp no delay
          text prefetch size
          threshold event max messages
          threshold event monitoring
          time slice
          total data cache size
          total logical memory
          total physical memory
          transfer utility memory size
          txn to pss ratio
            Optimizing the txn to pss ratio for your system
          unified login required
          update statistics hashing
          upgrade version
          use security services
          user log cache queue size
          user log cache size
          user log cache spinlock ratio
            utility statistics hashing
          wait event timing
          wait on uncommitted insert
          workload manager cache size
          xact coordination interval
          xp_cmdshell context
    Disk Resource Issues
      Device Allocation and Object Placement
      Commands for Managing Disk Resources
      Considerations in Storage Management Decisions
        Recovery
        Performance
      Status and Defaults at Installation
      System Tables That Manage Storage
        The sysdevices Table
        The sysusages Table
        The syssegments Table
        The sysindexes Table
        The syspartitions Table
    Managing Remote Servers
      Adding Remote Logins
        Map Users’ Server IDs
        Map Remote Logins to Particular Local Names
        Map All Remote Logins to One Local Name
        Keeping Remote Login Names for Local Servers
        Example of Remote User Login Mapping
      Password Checking for Remote Users
        Effects of Using the Untrusted Mode
      Getting Information About Remote Logins
      Configuration Parameters for Remote Logins
    Initializing Database Devices
      Using the disk init command
      Getting Information about Devices
      Dropping devices
      Designating Default Devices
        Choosing Default and Nondefault Devices
      Increasing the Size of Devices with disk resize
        Insufficient Disk Space
    Setting Database Options
      Database Option Descriptions
      Viewing the Options on a Database
      Displaying Currently Set Switches with sysoptions
    Configuring Character Sets, Sort Orders, and Languages
      Advantages of Internationalized Systems
        A Sample Internationalized System
        Elements of an Internationalized System
      Selecting the Character Set for Your Server
        Unicode
          Configuration Parameters
          Functions
          Using unichar Columns
          Using unitext
          Open Client Interoperability
          Java Interoperability
        Selecting the Server Default Character Set
      Selecting the Sort Order
        Different Types of Sort Orders
        Selecting the Default Sort Order
          Chinese Pinyin Sort Order
          Selecting Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
          Selecting the Default Unicode Sort Order
      Select a Language for System Messages
      A Spanish-Version Server
      A US-based company in Japan
      A Japan-Based Company with Multinational Clients
      Changing the character set, sort order, or message language
        Changing the default character set
        Changing the sort order with a resources file
        Change the Default Sort Order
        Reconfiguring the Character Set, Sort Order, or Message Language
        Example: Converting a Unicode Database to UTF-8
          Migrating Selected Columns to unichar
          Migrating to or from unitext
        Before Changing the Character Set or Sort Order
        Set the User’s Default Language
        Manage Suspect Partitions
      Installing Date Strings for Unsupported Languages
        Server Versus Client Date Interpretation
      Internationalization and localization files
        Character sets directory structure
        Types of localization files
        Software Messages Directory Structure
        Global variables for Languages and Character Sets
    Configuring Client/Server Character Set Conversions
      Supported Character Set Conversions
        Conversion for Native Character Sets
        Conversion in a Unicode System
        SAP ASE Direct Conversions
        Unicode Conversions
          Allowing Unicode noncharacters
      Choosing a Conversion Type
      Enabling and Disabling Character Set Conversion
        Characters That Cannot Be Converted
      Error handling in character set conversion
      Conversions and Changes to Data Lengths
      Specify the Character Set for Utility Programs
        Display and file character set command line options
    Diagnosing System Problems
      How SAP ASE Uses Error Messages
        Error Log Format
        Error Messages and Message Numbers
        Variables in Error Message Text
      SAP ASE error logging
        Severity Levels
        Severity Levels 10 – 18
          Level 10: Status Information
          Level 11: Specified Database Object Not Found
          Level 12: Wrong Datatype Encountered
          Level 13: User Transaction Syntax Error
          Level 14: Insufficient Permission to Execute Command
          Level 15: Syntax Error in SQL Statement
          Level 16: Miscellaneous User Error
          Level 17: Insufficient Resources
          Level 18: Nonfatal Internal Error Detected
        Severity Levels 19 – 26
          Level 19: SAP ASE Fatal Error in Resource
          Level 20: SAP ASE Fatal Error in Current Process
          Level 21: SAP ASE Fatal Error in Database Processes
          Level 22: SAP ASE Fatal Error: Table Integrity Suspect
          Level 23: Fatal Error: Database Integrity Suspect
          Level 24: Hardware Error or System Table Corruption
          Level 25: SAP ASE Internal Error
          Level 26: Rule Error
      Backup Server Error Logging
      Killing Processes
        Using kill with statusonly
        Using sp_lock to Examine Blocking Processes
      Using Shared Memory Dumps
        Configuring Shared Memory Dump Conditions
        System-Wide Default Settings
      Housekeeper functionality
        Housekeeper wash
        Housekeeper chores
        Housekeeper Garbage Collection
          Configure SAP ASE Priority Level
        Configuring enable housekeeper GC
          Using The reorg Command
      Shutting Down Servers
        Shutting Down SAP ASE
        Shutting down a Backup Server
          Using nowait on a Backup Server
      Learning about known problems
  System Administration Guide 16.0: Volume 2
    Limiting Access to Server Resources
      Resource Limits
      Plan Resource Limits
      Enable Resource Limits
      Define Time Ranges
        Determe the Time Ranges You Need
        Modifying a Named Time Range
        Dropping a Named Time Range
        When Do Time Range Changes Take Effect?
      Identify Users and Limits
        Identifying Heavy-Usage Users
        Identifying Heavy-Usage Applications
        Choosing a Limit Type
        Determining Time of Enforcement
        Determining the Scope of Resource Limits
      Understanding Limit Types
        Limiting I/O Cost
          Identify I/O Costs
          Calculate the I/O Cost of a Cursor
          Scope of the io_cost Limit Type
        Limiting Elapsed Time
          Scope of the elapsed_time Limit Type
        Limiting the Size of the Result Set
          Scope of the row_count Limit Type
        Setting Limits for tempdb Space Usage
        Limiting Idle Time
      Creating a Resource Limit
        Resource Limit Examples
      Getting Information on Existing Limits
      Modifying Resource Limits
      Dropping Resource Limits
      Resource Limit Precedence
    Mirroring Database Devices
      Determining Which Devices to Mirror
        Mirroring Using Minimal Physical Disk Space
        Mirroring for Nonstop Recovery
      Conditions That Do Not Disable Mirroring
      Disk Mirroring Commands
        Initializing Mirrors
        Unmirroring a Device
          Effects on System Tables
        Restarting Mirrors
        waitfor mirrorexit
        Mirroring the Master Device
        Getting Information About Devices and Mirrors
      Disk Mirroring Tutorial
      Disk Resizing and Mirroring
    Configuring Memory
      How SAP ASE Allocates Memory
        Disk Space Allocation
        How SAP ASE Allocates Buffer Pools
        Heap Memory
          Calculating Heap Memory
      Memory Management in SAP ASE
      Determining the Amount of Memory SAP ASE Needs
        Determine the SAP ASE Memory Configuration
        If You Are Upgrading
      Determining the Amount of Memory SAP ASE Can Use
      Configuration Parameters That Affect Memory Allocation
      Dynamically Allocating Memory
        If SAP ASE Cannot Start
        Dynamically Decreasing Memory Configuration Parameters
      Configuring Thread Pools
        Determining the Total Number of Threads
        Tuning the syb_blocking_pool
      System Procedures for Configuring Memory
        Viewing the Configuration Parameters for Memory
          Memory Available for Dynamic Growth
        Using sp_helpconfig
        Using sp_monitorconfig
      Configuration Parameters That Control SAP ASE Memory
        SAP ASE Executable Code Size
        Data and Procedure Caches
          Determining the Procedure Cache Size
          Determining the Default Data Cache Size
          Monitoring Cache Space
          Modify the ELC Size
        Kernel Resource Memory
        User Connections
        Open Databases, Open Indexes, and Open Objects
        Number of Locks
        Database Devices and Disk I/O Structures
      Parameters That Use Memory
        Parallel Processing
        Remote Servers
        Referential Integrity
        Parameters That Affect Memory
      The Statement Cache
        Setting the Statement Cache
          Performing Ad Hoc Query Processing
            Statement Matching Criteria
            Caching Conditions
            Statement Cache Sizing
          Monitoring the Statement Cache
          Aggregating Metrics from Syntactically Similar Queries
          Purging the Statement Cache
          Printing Statement Summaries
          Displaying the SQL Plan for Cached Statements
    Configuring Data Caches
      The SAP ASE Data Cache
      Cache Configuration Commands and System Procedures
      Viewing Information About Data Caches
      Configuring Data Caches
        Creating a New Cache
          Insufficient Space for New Cache
        Adding Memory to an Existing Named Cache
        Decreasing the Size of a Cache
        Deleting a Cache
        Explicitly Configuring the Default Cache
        Changing the Cache Type
        Improving the Recovery Log Scan During load database and load tran
      Configuring a Cache Replacement Policy
      Dividing a Data Cache into Memory Pools
        Matching Log I/O Size for Log Caches
      Binding Objects to Caches
      Getting Information About Cache Bindings
        Checking Cache Overhead
        Effects of Overhead on Total Cache Space
      Dropping Cache Bindings
      Changing the Wash Area for a Memory Pool
        When the Wash Area Is Too Small
        When the Wash Area is Too Large
        Setting the Housekeeper to Avoid Washes for Cache
      Changing the Asynchronous Prefetch Limit for a Pool
      Changing the Size of Memory Pools
        Moving Space from the Memory Pool
        Moving Space from Other Memory Pools
      Adding Cache Partitions to Reduce Spinlock
      Dropping a Memory Pool
        When Pools Cannot Be Dropped Due to Page Use
      Cache Binding Effects on Memory and Query Plans
      Configuring Data Caches Using the Configuration File
        Cache and Pool Entries in the Configuration File
        Cache Configuration Guidelines
          Configuration File Errors
    Managing Multiprocessor Servers
      SAP ASE Kernels
      Target Architecture
      Kernel Modes
        Switching Kernel Modes
      Tasks
        Using Threads to Run Tasks
      Configuring an SMP Environment
        Thread Pools
          Dynamic Thread Assignment
        Managing Engines
          Configuring Engines in Process Mode
          Configuring Engines in Threaded Mode
          Choosing the Right Number of Engines
        Starting and Stopping Engines
          Monitoring Engine Status
          Starting and Stopping Engines with sp_engine
            Relationship Between Network Connections and Engines
            Logical Process Management and dbcc engine(offline)
        Managing User Connections
        Configuration Parameters That Affect SMP Systems
          Configuring Spinlock Ratio Parameters
            Round-Robin Assignment
            Sequential Assignment
    Creating and Managing User Databases
      Permissions for Managing User Databases
      Using the create database Command
      Assigning Space and Devices to Databases
        Default Database Size and Devices
        Estimating the Required Space
      Placing a Transaction Log on a Separate Device
        Estimating the Transaction Log Size
        Default Log Size and Device
        Moving the Transaction Log to Another Device
      Shrinking Log Space
        Using dump and load database When Shrinking Log Space
          Shrinking a Log Before a dump and load database
        Using dump and load transaction When Shrinking Log Space
          Shrinking Log Space
      Calculating the Transaction Log Growth Rate
      Database Recovery with the for load Parameter
      Using the with override Option with create database
      Changing Database Ownership
      Altering Databases
        Using alter database
      Using the drop database Command
      System Tables That Manage Space Allocation
        The sysusages Table
          The segmap Column
        The lstart, size, and vstart Columns
      SAP ASE Support for Replication by Column Value
      Getting Information about Database Storage
        Using sp_helpdb to Find Database Device Names and Options
        Checking the Amount of Space Used
          Checking Space Used in a Database
          Checking Summary Information for a Table
          Checking Information for a Table and Its Indexes
        Querying System Table for Space Usage Information
    Database Mount and Unmount
      Manifest File
      Operations That Copy and Move Databases
      Performance Considerations
      Device Verification
      Mounting and Unmounting Databases
        Unmounting a Database
        Mounting a Database
        Moving Databases from One SAP ASE to Another
        System Restrictions
        quiesce database Extension
    Distributed Transaction Management
      Configuration Considerations
        Behavior for Transaction Manager-Coordinated Transactions
        Enhanced Transaction Manager for SAP ASE Versions 15.0.3 or Later
        RPC and CIS Transactions
        SYB2PC Transactions
      Enabling DTM Features
        Configuring Transaction Resources
          Calculating the Number of Required Transaction Descriptors
          Setting the Number of Transaction Descriptors
      Using SAP ASE Coordination Services
        Overview of Transaction Coordination Services
          Hierarchical Transaction Coordination
          X/Open XA-Compliant Behavior in DTP Environments
        Requirements and Behavior
        Ensuring Sufficient Resources for Updates
          number of dtx participants Parameter
          Optimizing the number of dtx participants
        Using Transaction Coordination Services on Remote Servers
          Set the strict dtm enforcement Parameter
        Monitoring Coordinated Transactions and Participants
      DTM Administration and Troubleshooting
        Transactions and Threads of Control
          Lock Manager Support for Detached Transactions
        Getting Information About Distributed Transactions
          Transaction Identification in systransactions
            Transaction Keys
          Viewing active transactions with sp_transactions
            Identify Local, Remote, and External Transactions
            Identify the Transaction Coordinator
            View the Transaction Thread of Control
            Understanding Transaction State Information
            Limiting sp_transactions Output to Specific States
            Transaction Failover Information
          Determining the Commit Node and gtrid with sp_transactions
            Commit and Parent Nodes
            Global Transaction ID
        Executing External Transactions
        Crash Recovery Procedures for Distributed Transactions
          Transactions Coordinated with MSDTC During Crash Recovery
          Transactions Coordinated by SAP ASE or X/Open XA During Crash Recovery
          Transactions Coordinated with SYB2PC During Crash Recovery
        Heuristically Completing Transactions
          Completing Prepared Transactions
            Maintaining a Transaction's Commit Status
            Manually Clearing the Commit Status
          Completing Transactions That Are Not Prepared
          Determining the Commit Status for SAP ASE Transactions
        Troubleshooting for Transactions Coordinated by External Transaction Managers
          SAP ASE Implicit Rollback in External Transactions
    Support for OData
      OData Server Architecture
      OData Server Limitations
        Unsupported OData Protocol Features
      Security Considerations for OData Server
      Configuring OData Server
      Setting Up an HTTP Server for OData
      Create an OData Producer Service Model
      OData Server Sample Files
      Starting and Stopping OData Server
    Creating and Using Segments
      System-Defined Segments
      Segment Usage in SAP ASE
        Controlling Space Usage
        Use Segments to Allocate Database Objects
          Separating Tables, Indexes, and Logs
          Splitting Tables
        Moving a Table to Another Device
      Creating Segments
      Changing the Scope of Segments
        Extending the Scope of Segments
          Automatically Extending the Scope of a Segment
        Reducing the Scope of a Segment
      Assigning Database Objects to Segments
        Creating New Objects on Segments
        Placing Existing Objects on Segments
        Placing Text Pages on a Separate Device
        Creating Clustered Indexes on Segments
      Dropping Segments
      Getting Information About Segments
        sp_helpsegment
        sp_helpdb
        sp_help and sp_helpindex
      Segments and System Tables
      A Segment Tutorial
    Using the reorg Command
      reorg Command and Its Parameters
        Running reorg rebuild Concurrently
        Using the optdiag Utility to Assess the Need for a reorg
      Moving Forwarded Rows to Home Pages
        Use reorg compact to Remove Row Forwarding
      Reclaiming Unused Space from Deletions and Updates
        Reclaming Space Without the reorg Command
      Reclaiming Unused Space and Undoing Row Forwarding
      Rebuilding a Table
        Prerequisites for Running reorg rebuild
          Changing Space Management Settings Before Using reorg rebuild
      Using the reorg rebuild Command on Indexes
        Rebuilding Indexes with reorg rebuild index_name partition_name
        Space Requirements for Rebuilding an Index
        Status Messages
      resume and time Options for Reorganizing Large Tables
      Incremental Reorganization
        Checking the Reorganization Status
        Clearing reorg defrag Information from sysattributes
        Logging Behavior
    Checking Database Consistency
      Page and Object Allocation
        Understanding the Object Allocation Map (OAM)
        Understanding Page Linkage
      dbcc Checks
        dbcc Command Output
      Checking Database and Table Consistency
        dbcc checkstorage
          Understanding the dbcc checkstorage Operation
          Performance and Scalability
        dbcc checktable
        dbcc checkindex
        dbcc checkdb
      Checking Page Allocation
        dbcc checkalloc
        dbcc indexalloc
        dbcc tablealloc
        dbcc textalloc
      Correcting Allocation Errors Using the fix | nofix Options
      Generate Reports with dbcc tablealloc and dbcc indexalloc
      Checking Consistency of System Tables
      Strategies for Using Consistency Checking Commands
        Using Large I/O and Asynchronous Prefetch
        Scheduling Database Maintenance at Your Site
          Database Use
          Backup Schedule
          Size of Tables and Importance of Data
        Errors Generated by Database Consistency Problems
        Reporting on Aborted checkstorage and checkverify Operations
          Aborting with Error 100032
        Comparison of Soft and Hard Faults
          Soft Faults
          Hard Faults
      Verifying Faults with dbcc checkverify
        Scheduling dbcc checkverify
        Executing dbcc checkverify
      Preparing to Use dbcc checkstorage
        Planning Resources
          Planning Workspace Size
            Number of Concurrent Workspaces
            Automatic Workspace Expansion
        Configuring Worker Processes
        Setting a Named Cache for dbcc
        Configuring an 8-page I/O Buffer Pool
        Disk Space for dbccdb
        Segments for Workspaces
        Creating the dbccdb Database
      Updating the dbcc_config Table
        Viewing the Current Configuration Values
        Default Configuration Values
        Deleting Configuration Values
      dbccdb Maintenance Tasks
        Reevaluating and Updating the dbccdb Configuration
        Cleaning Up dbccdb
        Performing Consistency Checks on dbccdb
      Generating Reports from dbccdb
        Reporting a Summary of dbcc checkstorage Operations
      Upgrading Compiled Objects with dbcc upgrade_object
        Finding Compiled Object Errors Before Production
          Reserved Word Errors
          Missing, Truncated, or Corrupted Source Text
          Temporary Table References
          Resolving select * Potential Problem Areas
        Using Database Dumps in Upgrades
          Upgrading Compiled Objects in Database Dumps
    Developing a Backup and Recovery Plan
      Tracking Database Changes
        Getting Information About the Transaction Log
        Determining When Log Records Are Committed
          Changes to Logging Behavior
          Risks of Using delayed_commit
          Enabling set delayed_commit
        Designating Responsibility for Backups
      Checkpoints: Synchronizing a Database and Its Log
        Setting the Recovery Interval
        Automatic Checkpoint Procedure
        Truncating the Log After Automatic Checkpoints
        Free Checkpoints
        Manually Requesting a Checkpoint
      Automatic Recovery After a System Failure or Shutdown
      Fast Recovery
        SAP ASE Start-up Sequence
        Bringing Engines Back Online
        Parallel Recovery
        Database Recovery
        Specifying the Recovery Order
          Changing or Deleting the Recovery Position of a Database
          Listing the User-Assigned Recovery Order of Databases
        Parallel Checkpoints
        Recovery State
        Tuning for Fast Recovery
      The sybdumptran Utility
      Fault Isolation During Recovery
        Persistence of Offline Pages
        Configuring Recovery Fault Isolation
          Isolating Suspect Pages
          Raising the Number of Suspect Pages Allowed
        Getting Information About Offline Databases and Pages
        Bringing Offline Pages Online
        Index-Level Fault Isolation for Data-Only-Locked Tables
        Side Effects of Offline Pages
        Recovery Strategies Using Recovery Fault Isolation
          Reload Strategy
          Repair Strategy
        Assessing the Extent of Corruption
      Using the dump and load Commands
        dump database: Making Routine Database Dumps
        dump transaction: Making Routine Transaction Log Dumps
        dump tran with no_truncate: Copying the Log After Device Failure
        load database: Restoring the Entire Database
        load transaction: Applying Changes to the Database
        online database: Making the Database Available to Users
        Dumping and Loading Databases Across Platforms
          Dumping a Database
          Loading a Database
        Restrictions for Dumping and Loading Databases and Transactions
        Improving Recovery Prefetch
        Performance Notes
        Moving a Database to Another SAP ASE
        Upgrading a User Database
        Using the Special Load Options to Identify Dump Files
        Restoring a Database from Backups
      Suspending and Resuming Updates to Databases
        Guidelines for using quiesce database
        Maintaining Server Roles in a Primary and Secondary Relationship
        Starting the Secondary Server with the -q Option
        ā€œin quiesceā€ Database Log Record Value Updated
        Updating the Dump Sequence Number
        Backing up Primary Devices with quiesce database
          Recovery of Databases for Warm Standby Method
        Making Archived Copies During the Quiescent State
      The mount and unmount Commands
      Using Backup Server for Backup and Recovery
        Requirements for Communicating with Backup Server
        Mounting a New Volume
        Starting and Stopping Backup Server
        Configuring Your Server for Remote Access
        Choosing Backup Media
          Protecting Backup Tapes from Being Overwritten
          Dumping to Files or Disks
      Creating Logical Device Names for Local Dump Devices
        Adding a Backup Device
      Scheduling backups of user databases
        Other Times to Back Up a Database
      Scheduling Backups of master
        Dump the master Database After Each Change
        Save Scripts and System Tables
        Truncate the master Database Transaction Log
        Avoid Volume Changes and Recovery
      Scheduling Backups of the model Database
        Truncate the model Database’s Transaction Log
      Schedule Backups of the sybsystemprocs Database
      Configuring SAP ASE for Simultaneous Loads
      Gather Backup Statistics
    Backing Up and Restoring User Databases
      Specifying the Database and Dump Device
        Rules for Specifying Database Names
        Rules for Specifying Dump Devices
        Tape Device Determination by Backup Server
          Tape Device Configuration File
      Compressing a Dump
        Backup Server Dump Files and Compressed Dumps
        Loading Compressed Dumps
        Cyclic Redundancy Checks for dump database
      Dump History File
      Backups for the Dump Configuration Files
      Performing Cumulative Dumps
        Dump and Load Sequences
        Partially Logged Operations and Cumulative Dumps
        Restrictions
      Specifying a Remote Backup Server
      Remote Dump Host Control
      Specifying Tape Density, Block Size, and Capacity
        Overriding the Default Density
        Overriding the Default Block Size
          Specifying a Larger Block Size Value
        Specifying Tape Capacity for Dump Commands
        Nonrewinding Tape Functionality for Backup Server
          Tape Operations
          Dump Version Compatibility
      Apply Source Database Attributes to the Target Database
      Generate SQL for a Different Target Database
      Specifying the Volume Name
        Loading from a Multifile Volume
      Identifying a Dump
      Improving Dump or Load Performance
        Compatibility with Prior Versions
        Reducing load database Time
        Concurrent dump database and dump transaction Commands
          Configure SAP ASE to Run Concurrent Dumps
        Labels Stored in Integer Format
        Configure Local and Remote Backup Servers
          Setting Shared Memory Usage
          Configuring Shared Memory Dumps
          Setting the Maximum Number of Stripes
          Setting the Maximum Number of Network Connections
          Setting the Maximum Number of Service Threads
      Automatic Physical Database Rearrangement on Load
      Specify Additional Dump Devices with the stripe on Clause
        Dumps to, and Loads from, Multiple Devices
        Using Fewer Devices to Load Than to Dump
        Specifying the Characteristics of Individual Devices
      Tape Handling Options
        Prevent Dump Files from Being Overwritten
        Reinitializing a Volume Before a Dump
      Dumping and Loading Databases with Password Protection
      Overriding the Default Message Destination
      Bringing Databases Online with standby_access
      Getting Information About Dump Files
        Requesting Dump Header Information
        Determining the Database, Device, File Name, and Date
      Copying the Log After a Device Failure
      Responding to Volume Change Requests
        Volume Change Prompts for Dumps
        Volume Change Prompts for Loads
      Recovering a Database: Step-By-Step Instructions
        Getting a Current Dump of the Transaction Log
        Examining the Space Usage
        Dropping the Databases
        Re-creating the Databases
        Loading the Database
        Loading the Transaction Logs
          Loading a Transaction Log to a Point in Time
        Bringing the Databases Online
          Replicated Databases
      Loading Database Dumps from Older Versions
        Upgrading a Dump to the Current Version of SAP ASE
        The Database Offline Status Bit
        Version Identifiers and Automatic Upgrade
      Cache Bindings and Loading Databases
        Databases and Cache Bindings
        Database Objects and Cache Bindings
          Checking on Cache Bindings
      Cross-Database Constraints and Loading Databases
    Restoring the System Databases
      Recovering the master Database
        Recovery Procedure
        Finding Copies of System Tables
        Building a New Master Device
          Replacing the Master Device
          Rebuilding the Configuration Area
        Starting SAP ASE in Master-Recover Mode
        Re-creating Device Allocations for master
        Checking Your Backup Server sysservers Information
        Verifying That Your Backup Server Is Running
        Loading a Backup of master
        Updating the number of devices Configuration Parameter
        Restarting SAP ASE in Master-Recover Mode
        Checking System Tables to Verify Current Backup of master
        Restarting SAP ASE
        Restoring Server User IDs
        Restoring the model Database
        Checking SAP ASE
        Backing Up master
      Recovering the model Database
      Recovering the sybsystemprocs Database
        Restoring sybsystemprocs with installmaster
        Restoring sybsystemprocs with load database
      Reducing the Size of tempdb
        Reset tempdb to Default Size
      Restoring System Tables with disk reinit and disk refit
        Restoring sysdevices with disk reinit
        Restoring sysusages and sysdatabase with disk refit
    Archive Database Access
      Components of an Archive Database
        The Database Dump
        The Modified Pages Section
        The sysaltusages Table and the Scratch Database
      Working With an Archive Database
        DDLGen Support for Archive Database Access
      Configuring an Archive Database
        Sizing the Modified Pages Section
        Increasing the Amount of Space Allocated to the Modified Pages Section
        Materializing an Archive Database
          Using load database with norecovery
          Using Logical Devices with an Archive Database
          load database Limitations with an Archive Database
        Bringing an Archive Database Online
        Loading a Transaction Log into an Archive Database
        Dropping an Archive Database
      SQL Commands for Archive Databases
      dbcc Commands for Archive Databases
      Issuing a Typical Archive Database Command Sequence
      Compressed Dumps for an Archive Database
        Creating a Compression Memory Pool
      Upgrading and Downgrading an SAP ASE with Archive Databases
        Limitations for Downgrading an SAP ASE with an Archive Database
      Compatibility Issues for a Compressed Dump
      Archive Database Limitations
    Shrinking Databases
      Shrinking a Database
      How SAP ASE Shrinks the Database
      Shrink Operations on Databases That Contain Text or Image Data
        Shrink Database Backlink Performance Improvements
      Restarting Partially Completed Shrink Operations
      Moving Data Before Shrinking the Database
        Restrictions for Moving the Transaction Log
        Locks Held During Data Movement
      Determine the Status of a Shrink Operation
      Upgrading or Downgrading Shrunken Databases
      Restrictions
    Expanding Databases Automatically
      Layouts for Disks, Devices, Databases, and Segments
      Threshold Action Procedures
      Installing Automatic Database Expansion Procedures
      Running sp_dbextend
        Validating Current Thresholds
      Configuring a Database for Automatic Expansion
      Restrictions and Limitations
    Managing Free Space with Thresholds
      Monitoring Free Space with the Last-Chance Threshold
        Controlling How Often sp_thresholdaction Executes
      Rollback Records and the Last-Chance Threshold
        Calculating the Space for Rollback Records
          Using lct_admin to Determine the Free Log Space
        Determining the Current Space for Rollback Records
        Effect of Rollback Records on the Last-Chance Threshold
        User-Defined Thresholds
      Last-Chance Threshold and User Log Caches for Shared Log and Data Segments
        Using lct_admin abort to Abort Suspended Transactions
      Add Space to the Master Database’s Transaction Log
      Automatically Aborting or Suspending Processes
        Using abort tran on log full to Abort Transactions
      Waking Suspended Processes
      Adding, Changing, and Deleting Thresholds
        Displaying Information About Existing Thresholds
        Thresholds and System Tables
        Creating Free-Space Thresholds
        Changing or Specifying a New Free-Space Threshold
        Dropping a Threshold
      Creating a Free-Space Threshold for the Log Segment
        Usage Scenario: Testing and Adjusting the New Threshold
      Creating Additional Thresholds on Data and Log Segments
        Determining Threshold Placement
      Creating Threshold Procedures
        Parameters for Threshold Procedures
        Generating Error Log Messages
        sp_thresholdaction Procedures that Include a dump transaction
        A Simple Threshold Procedure
        A More Complex Procedure
        Placement for Threshold Procedures
      Disabling Free-Space Accounting for Data Segments
    Transaction Log Space Management
      Transaction Log Space
      Automating Transaction Log Management
        Rescue Scenario Use Case
        Monitoring Use Case
        Monitoring and Control Use Case
      Analyzing and Managing Transaction Log Space
        Viewing the Span of a Transaction
        Viewing the Oldest Active Transactions
      Truncating a Log that Is Not on A Separate Segment
      Truncating the Log in Early Development Environments
      Truncating a Log that Has No Free Space
        Dangers of Using with truncate_only and with no_log
        Provide Sufficient Log Space
          Querying the syslogshold Table
  Migration Technology Guide 15.5
    About this book
    Migration Strategy
      Preupgrade considerations
        Understanding optimization goals
          Optimization criteria
        Resource recommendations for Adaptive Server 15.0
        Incorporating statistics in Adaptive Server 15.0
        Recommended testing before upgrade
      Migrating to Adaptive Server 15.0 features
        Upgrading, and using new features immediately
        Upgrading, and using new features later
        Upgrading, but not using new features
      Troubleshooting
        Query processing tips
        Information to capture before contacting Technical Support
          701 errors
          Performance problems with a limited number of queries
          System-wide performance issues
          Uploading diagnostics to Technical Support
    QPTune
      Setting up your system
      Using QPTune to fix missing statistics
        Starting QPTune to fix missing statistics
        Collecting statistics
        Fixing statistics
        Using undo_fix_stats
      Using QPTune to tune queries or applications
        Starting QPTune to tune queries or applications
          Simple start
          Custom start
        Collecting metrics
        Comparing metrics
        Applying the best results
      Configuration file
      Examples
      Upgrade issues
      Localization
      QPTune GUI
        Environment and system requirements
        Starting the QPTune GUI
        Fixing missing statistics
        Tuning Task
      QPTune reference information
    Running the Query Processor in Compatibility Mode
      Enabling compatibility mode
      Feature support in compatibility mode
      Additional trace flag for diagnostics
      New stored procedure sp_compatmode
      Changes to @@qpmode global variable
      Diagnostic tool
  Performance and Tuning Series: Basics 16.0
  Performance and Tuning Series: Improving Performance with Statistical Analysis 16.0
  Performance and Tuning Series: Locking and Concurrency Control 16.0
  Performance and Tuning Series: Monitoring Adaptive Server with sp_sysmon 16.0
  Performance and Tuning Series: Monitoring Tables 16.0
  Performance and Tuning Series: Physical Database Tuning 16.0
  Performance and Tuning Series: Query Processing and Abstract Plans 16.0
  Glossary 16.0
  Quick Reference Guide 15.7
    Quick Reference Guide
      Datatypes
      Standards and compliance
      Datatypes and encrypted columns
      Adaptive Server global variables
      Reserved words
        Transact-SQL reserved words
        ANSI SQL reserved words
        Potential ANSI SQL reserved words
      Functions
        XML functions
      Commands
      Interactive dbsql commands
      System procedures
      Catalog stored procedures
      Extended stored procedures
      dbcc stored procedures
      System tables
      DBCC tables
      Monitoring tables
      sybpcidb tables
      Utilities
  System Tables Diagram 16.0
  Monitoring Tables Diagram 16.0
  Troubleshooting: Error Messages Advanced Resolutions 15.0
    About this book
    Introduction
      Understanding error message severity levels
        Notifying the System Administrator
      Variables in error message text
      Finding object names in error message text
      Finding the Adaptive Server version
        Understanding the field order in the version string
      Creating error messages
      Reporting errors
        Sybase Technical Support checklist
        Sending error log fragments
        Reproducing problems
    Parser Errors (100s, 7380)
      Error 102
      Error 107
      Error 195
      Error 7380
    Sequencer Errors (200s, 7783, 7788, 11000s, 14200)
      Error 207
      Error 208
      Error 213
      Error 216
      Error 225
      Error 226
      Error 229
      Error 232
      Error 233
      Error 241
      Error 247
      Error 257
      Error 259
      Error 265
      Error 266
      Error 268
      Error 277
      Error 7783
      Error 7788
      Error 11018
      Error 11068
      Error 11072
      Error 14200
    Query Processor Errors (300s, 400s, 500s)
      Error 311
      Error 313
      Error 314
      Error 403
      Error 414
      Error 428
      Error 511
      Error 512
      Error 515
      Error 530
      Error 539
      Error 540
      Error 546
      Error 547
      Error 551
      Error 584
    Access Method Errors (600s)
      Error 601
      Error 603
      Error 605
      Error 611
      Error 614
      Error 622
      Error 623
      Error 624
      Error 625
      Error 629
      Error 631
      Error 644
      Error 678
      Error 691
      Error 692
      Error 693
      Error 694
      Error 695
      Error 696
      Error 697
    Memory Manager Errors (700s)
      Error 701
      Error 702
      Error 703
      Error 706
      Error 707
      Error 709
      Error 714
      Error 715
      Error 717
      Error 718
      Error 719
      Error 720
      Error 721
    Buffer Manager Errors (800s)
      Error 803
      Error 804
      Error 806
      Error 813
      Error 820
      Error 821
      Error 822
      Error 823
      Error 832
      Error 834
      Error 835
      Error 840
      Error 842
      Error 847
      Error 849
      Error 852
      Error 855
      Error 861
      Error 863
      Error 881
      Error 890
    Open Database Manager Errors (900s)
      Error 903
      Error 905
      Error 906
      Error 908
      Error 911
      Error 913
      Error 916
      Error 921
      Error 924
      Error 925
      Error 926
      Error 930
      Error 935
      Error 940
      Error 941
      Error 945
      Error 950
      Error 965
    Abstract Plan Manager Errors (1000s)
      Error 1024
    Page Manager Errors (1100s)
      Error 1105
      Error 1108
      Error 1120
      Error 1124
      Error 1127
      Error 1129
      Error 1131
      Error 1133
      Error 1141
      Error 1142
      Error 1143
      Error 1159
      Error 1161
    Lock Manager Errors (1200s)
      Error 1203
      Error 1204
      Error 1205
      Error 1243
      Error 1244
      Error 1249
      Error 1251
      Error 1265
      Error 1279
    Sort Manager Errors (1500s)
      Error 1501
      Error 1505
      Error 1506
      Error 1508
      Error 1509
      Error 1510
      Error 1514
      Error 1530
      Error 1531
    Initialization Errors (1600s)
      Error 1601
      Error 1602
      Error 1603
      Error 1605
      Error 1608
      Error 1613
      Error 1621
      Error 1622
      Error 1623
    Create Utilities Errors (1700 - 1900s, 2100s, 2700s, 12800s)
      Error 1702
      Error 1708
      Error 1732
      Error 1803
      Error 1808
      Error 1809
      Error 1810
      Error 1813
      Error 1820
      Error 1902
      Error 1903
      Error 1916
      Error 1928
      Error 2110
      Error 2714
      Error 2729
      Error 2753
      Error 2762
      Error 12818
      Error 12842
      Error 12881
    High Availability Errors (2200s)
      Error 2243
    Character Set Conversion Errors (2400s)
      Error 2401
      Error 2402
      Error 2409
    dbcc Errors (2500s, 7900s, 12000s, 15000s)
      Error 2501
      Error 2502
      Error 2503
      Error 2507
      Error 2509
      Error 2510
      Error 2511
      Error 2513
      Error 2514
      Error 2517
      Error 2520
      Error 2521
      Error 2524
      Error 2525
      Error 2529
      Error 2540
      Error 2546
      Error 2547
      Error 2550
      Error 2558
      Error 2559
      Error 2572
      Error 2573
      Error 2574
      Error 2575
      Error 2578
      Error 2582
      Error 2583
      Error 2591
      Error 2596
      Error 7901
      Error 7902
      Error 7928
      Error 7930
      Error 7939
      Error 7940
      Error 7949
      Error 7989
      Error 9961
      Error 12964
      Error 15056
      Error 15080
      Error 15082
      Error 15084
    insert Errors (2600s)
      Error 2601
      Error 2610
      Error 2615
      Error 2619
      Error 2620
      Error 2626
      Error 2628
      Error 2630
      Error 2631
    Procedure Manager Errors (2800s)
      Error 2805
      Error 2806
      Error 2811
      Error 2812
      Error 2824
      Error 2835
      Error 2844
    dump and load Errors (3000s - 3200s, 4200s - 4300s)
      Error 3019
      Error 3020
      Error 3021
      Error 3105
      Error 3120
      Error 3143
      Error 3144
      Error 3161
      Error 3162
      Error 3201
      Error 3203
      Error 3211
      Error 3212
      Error 3216
      Error 3225
      Error 3230
      Error 3233
      Error 3240
      Error 4204
      Error 4205
      Error 4207
      Error 4216
      Error 4221
      Error 4222
      Error 4305
      Error 4322
    commit and abort Errors (3300s)
      Error 3301
      Error 3307
      Error 3321
      Error 3322
    Recovery Errors (3400s, 12500s)
      Error 3401
      Error 3403
      Error 3404
      Error 3414
      Error 3429
      Error 3434
      Error 3445
      Error 3446
      Error 3447
      Error 3452
      Error 3454
      Error 3462
      Error 3470
      Error 12546
      Error 12547
      Error 12551
      Error 12583
      Error 12587
    Exception Handling Errors (3600s)
      Error 3604
      Error 3621
      Error 3624
      Error 3626
      Error 3641
      Error 3642
      Error 3643
      Error 3644
      Error 3646
      Error 3648
    drop Errors (3700s)
      Error 3701
      Error 3702
      Error 3703
    Transaction Errors (3900s)
      Error 3904
      Error 3905
      Error 3906
      Error 3908
      Error 3917
      Error 3949
    dataserver Errors (4000s)
      Error 4001
      Error 4002
      Error 4020
    View Resolution Manager Errors (4400s)
      Error 4430
    truncate table Errors (4700s)
      Error 4716
    Bulk Copy Utility Errors (4800s)
      Error 4801
      Error 4806
    alter table Errors (4900s)
      Error 4951
      Error 4953
      Error 4954
      Error 4956
      Error 4964
    alter database Errors (5000s)
      Error 5006
      Error 5013
      Error 5018
      Error 5034
    Disk Errors (5100s)
      Error 5115
      Error 5123
      Error 5142
    Transaction Coordinator Errors (5600s)
      Error 5602
    Open Client Errors (5700s)
      Error 5701
      Error 5704
    Configuration Errors (5800s, 10800s)
      Error 5806
      Error 5808
      Error 5824
      Error 5846
      Error 5847
      Error 5848
      Error 5849
      Error 5850
      Error 5851
      Error 5852
      Error 5853
      Error 5854
      Error 5857
      Error 5859
      Error 5861
      Error 5863
      Error 5865
      Error 5866
      Error 5867
      Error 5868
      Error 5893
      Error 10841
      Error 10865
    Process Kill Errors (6100s)
      Error 6103
      Error 6107
    Timestamp Errors (6900s)
      Error 6901
      Error 6902
    Distributed Database Network Errors (7200s)
      Error 7201
      Error 7205
      Error 7207
      Error 7211
      Error 7212
      Error 7214
      Error 7215
      Error 7218
      Error 7220
      Error 7221
      Error 7223
      Error 7227
      Error 7234
      Error 7235
    Text Manager Errors (7100s)
      Error 7101
      Error 7105
      Error 7114
      Error 7130
      Error 7134
    Threshold Manager Errors (7400s)
      Error 7401
      Error 7402
      Error 7403
      Error 7404
      Error 7406
      Error 7407
      Error 7408
      Error 7409
      Error 7410
      Error 7411
      Error 7412
      Error 7413
      Error 7414
      Error 7415
      Error 7417
      Error 7418
      Error 7438
    Auditing Errors (7600s)
      Error 7618
    Remote Procedure Call Errors (8000s)
      Error 8006
      Error 8009
    Descriptor Manager Errors (8200s)
      Error 8201
      Error 8203
      Error 8204
      Error 8207
      Error 8210
      Error 8211
      Error 8219
      Error 8239
      Error 8241
    sysindexes Manager Errors (8400s)
      Error 8402
      Error 8419
    Process Status Structure Errors (8600s)
      Error 8601
    Site Buffer Manager Errors (8700s)
      Error 8704
    Disk Manager Errors (9000s)
      Error 9004
    Replication Agent Manager Errors (9100s - 9200s)
      Error 9122
      Error 9287
      Error 9289
      Error 9290
    Component Integration Services Errors (11200s)
      Error 11201
      Error 11202
      Error 11203
    Configurable Shared Memory Dump Manager (12000s, 12300s)
      Error 12036
      Error 12326
      Error 12328
      Error 12329
      Error 12330
      Error 12333
      Error 12334
      Error 12335
    Fault Isolation Utility Errors (12700s)
      Error 12716
      Error 12717
    Partition (14100s) and Partition Key Manager (14300s) Errors
      Error 14100
      Error 14108
      Error 14120
      Error 14124
      Error 14126
      Error 14313
    mount database Errors (14500s)
      Error 14503
      Error 14504
      Error 14511
      Error 14513
      Error 14560
      Error 14561
    Anchor Manager Errors (14600s)
      Error 14605
      Error 14618
      Error 14619
      Error 14620
      Error 14621
      Error 14622
      Error 14623
    XML Utility Manager Errors (14900s)
      Error 14901
    Message Service Errors (15100s)
      Error 15101
      Error 15105
    Web Services Errors (15200s)
      Error 15219
    Encryption Errors (15400s)
      Error 15402
      Error 15403
      Error 15412
      Error 15413
      Error 15417
    Statistics Errors (15600s)
      Error 15600
      Error 15601
    System Procedure Errors (17000s, 18000s)
      Error 17461
      Error 17715
      Error 17716
      Error 17737
      Error 17870
      Error 17871
      Error 17872
      Error 17873
      Error 17874
      Error 17875
      Error 17903
      Error 17904
      Error 17905
      Error 17906
      Error 17910
      Error 18031
      Error 18032
      Error 18033
      Error 18123
      Error 18750
    Kernel Errors
      Asynchronous I/O not available
      Buffer mismatch
      Could not create shared memory
      Current process infected
      dopen error
      dstart I/O request repeatedly delayed
      Failed to open device
      Feature is not licensed
      File already in use
      Memory too fragmented
      Memory usage in procedure headers
      Network information message
      No more alarms available
      Open objects parameter may be too low
      os_attach_region errors
      os_create_region errors
      Read/write errors
      Server is unnamed
      Stack guardword corrupted
      time slice error
      t_rcvconnect error
      udunmirror errors
      No more engines can be offlined
  Reference Manual: Building Blocks 16.0
    About These Topics
    System and User-Defined Datatypes
      Datatype Categories
        Exact Numeric Datatypes
          Integer Types
          Decimal Datatypes
        Approximate Numeric Datatypes
          Understanding Approximate Numeric Datatypes
          Range, Precision, and Storage Size
          Entering Approximate Numeric Data
          NaN and Inf Values
        Money Datatypes
          Accuracy
          Range and Storage Size
          Entering Monetary Values
        timestamp Datatype
          Creating a timestamp Column
        Date and Time Datatypes
          Range and Storage Requirements
          Entering Date and Time Data
            Entering the Date
            Entering the Time
            Displaying Formats for datetime, smalldatetime, and date Values
            Display Formats for bigdatetime and bigtime
            Displaying Formats for time Value
            Finding Values That Match a Pattern
            Manipulating Dates
          Standards and Compliance
        Character Datatypes
          unichar and univarchar
          Length and Storage Size
            Determining Column Length with System Functions
          Entering Character Data
            Entering Unicode Characters
          Example of Treatment of Blanks
          Manipulating Character Data
          Standards and Compliance for Character Datatypes
        Binary Datatypes
          Valid binary and varbinary Entries
          Entries of More than the Maximum Column Size
          Treatment of Trailing Zeros
          Platform Dependence
        bit Datatype
        sysname and longsysname Datatypes
        text, image, and unitext Datatypes
          Data Structures Used for Storing text, unitext, and image Data
          Initialize text, unitext, and image Columns
            Define unitext Columns
          Save Space by Allowing NULL
          Obtain Information from sysindexes
          Using readtext and writetext
          Determine How Much Space a Column Uses
          Restrictions on text, image, and unitext Columns
          Selecting text, unitext, and image Data
          Converting text and image Datatypes
          Converting to or from Unitext
          Pattern Matching in text Data
          Duplicate Rows
          Using Large Object text, unitext, and image Datatypes in Stored Procedures
            Declaring a LOB Datatype
            Creating a LOB Parameter
            Examples for Using LOB Datatypes
          Standards and Compliance
      Range and Storage Size
      Datatypes of Columns, Variables, or Parameters
        Declaring Datatypes for a Column in a Table
        Declaring Datatypes for Local Variable in a Batch or Procedure
        Declaring Datatypes for a Parameter in a Stored Procedure
        Determine the Datatype of Numeric Literals
        Determine the Datatype of Character Literals
      Datatypes of Mixed-Mode Expressions
        Determine the Datatype Hierarchy
        Determine Precision and Scale
      Datatype Conversions
        Automatic Conversion of Fixed-Length NULL Columns
        Handling Overflow and Truncation Errors
      Datatypes and Encrypted Columns
      User-Defined Datatypes
      Standards and Compliance
    Transact-SQL Functions
      abs
      acos
      allocinfo
      ascii
      asehostname
      asin
      atan
      atn2
      avg
      audit_event_name
      authmech
      biginttohex
      bintostr
      cache_usage
      case
      cast
        Usage for cast
          Conversions Involving Java Classes
          Implicit Conversion
          Explicit Conversion
      ceiling
      char
        Usage for char
          Reformatting Output With char
      char_length
      charindex
      coalesce
      col_length
      col_name
      compare
        Usage for compare
          Maximum Row and Column Length for APL and DOL
      convert
        Usage for convert
          Conversions Involving Java classes
          Implicit Conversion
          Explicit Conversion
      cos
      cot
      count
      count_big
      create_locator
      current_bigdatetime
      current_bigtime
      current_date
      current_time
      curunreservedpgs
      data_pages
      datachange
        Usage for datachange
          Restrictions for datachange
      datalength
      dateadd
      datediff
      datename
      datepart
      day
      db_attr
      db_id
      db_instanceid
      db_name
      db_recovery_status
      dbencryption_status
      defrag_status
      degrees
      derived_stat
      difference
      dol_downgrade_check
      exp
      floor
      get_appcontext
      get_internal_date
      getdate
      getutcdate
      has_role
      hash
      hashbytes
      hextobigint
      hextoint
      host_id
      host_name
      instance_id
      identity_burn_max
      index_col
      index_colorder
      index_name
      inttohex
      isdate
      is_quiesced
      is_sec_service_on
      is_singleusermode
      isnull
      isnumeric
      instance_name
      lc_id
      lc_name
      lct_admin
      left
      len
      license_enabled
      list_appcontext
      locator_literal
      locator_valid
      lockscheme
      log
      log10
      loginfo
      lower
      lprofile_id
      lprofile_name
      ltrim
      max
      migrate_instance_id
      min
      month
      mut_excl_roles
      newid
      next_identity
      nullif
      object_attr
      object_id
      object_name
      object_owner_id
      pagesize
      partition_id
      partition_name
      partition_object_id
      password_random
      patindex
      pi
      power
      proc_role
      pssinfo
      radians
      rand
      rand2
      replicate
      reserve_identity
      reserved_pages
      return_lob
      reverse
      right
      rm_appcontext
      role_contain
      role_id
      role_name
      round
      row_count
      rtrim
      sdc_intempdbconfig
      set_appcontext
      setdata
      shrinkdb_status
      show_cached_plan_in_xml
      show_cached_text
      show_cached_text_long
      show_condensed_text
      show_dynamic_params_in_xml
      show_plan
      show_role
      show_sec_services
      sign
      sin
      sortkey
        Usage for sortkey
          Collation Tables
          Collation Names and IDs
      soundex
      space
      spaceusage
      spid_instance_id
      square
      sqrt
      stddev
      stdev
      stdevp
      stddev_pop
      stddev_samp
      str
      str_replace
      strtobin
      stuff
      substring
      sum
      suser_id
      suser_name
      syb_quit
      syb_sendmsg
      sys_tempdbid
      tan
      tempdb_id
      textptr
      textvalid
      to_unichar
      tran_dumpable_status
      tsequal
        Usage for tsequal
          Adding a Timestamp to a New Table for Browsing
      uhighsurr
      ulowsurr
      upper
      uscalar
      used_pages
      user
      user_id
      user_name
      valid_name
      valid_user
      var
      var_pop
      var_samp
      variance
      varp
      workload_metric
      xa_bqual
      xa_gtrid
      xact_connmigrate_check
      xact_owner_instance
      xmlextract
      xmlparse
      xmlrepresentation
      xmltable
      xmltest
      xmlvalidate
      year
    Global Variables
      Using Global Variables in a Clustered Environment
    Expressions, Identifiers, and Wildcard Characters
      Expressions
        Size of Expressions
        Arithmetic and Character Expressions
        Relational and Logical Expressions
        Operator Precedence
        Arithmetic Operators
        Bitwise Operators
        String Concatenation Operator
        Comparison Operators
        Nonstandard Operators
        Using any, all, and in
        Negating and Testing
        Ranges
        Using Nulls in Expressions
          Comparisons That Return TRUE
          Difference Between FALSE and UNKNOWN
          Using ā€œNULLā€ as a Character String
          NULL Compared to the Empty String
        Connecting Expressions
        Using Parentheses in Expressions
        Comparing Character Expressions
        Using the Empty String
        Including Quotation Marks in Character Expressions
        Using the Continuation Character
      Identifiers
        Short Identifiers
        Tables Beginning With # (Temporary Tables)
        Case Sensitivity and Identifiers
        Uniqueness of Object Names
        Using Delimited Identifiers
          Enabling Quoted Identifiers
        Identifying Tables or Columns by Their Qualified Object Name
          Using Delimited Identifiers Within an Object Name
          Omitting the Owner Name
          Referencing Your Own Objects in the Current Database
          Referencing Objects Owned by the Database Owner
          Using Qualified Identifiers Consistently
        Determining Whether an Identifier is Valid
        Renaming Database Objects
        Using Multibyte Character Sets
      like Pattern Matching
        Using not like
      Pattern Matching with Wildcard Characters
        Case and Accent Insensitivity
        Using Wildcard Characters
          The Percent Sign (%) Wildcard Character
          The Underscore (_) Wildcard Character
          Bracketed ([ ]) Characters
          The Caret (^) Wildcard Character
        Using Multibyte Wildcard Characters
        Using Wildcard Characters as Literal Characters
          Using Square Brackets ( [ ] ) as Escape Characters
          Using the escape Clause
        Using Wildcard Characters With datetime Data
    Reserved Words
      Transact-SQL Reserved Words
      ANSI SQL Reserved Words
      Potential ANSI SQL Reserved Words
    SQLSTATE Codes and Messages
      SQLSTATE Warnings
      Exceptions
        Cardinality Violations
        Data Exceptions
        Integrity Constraint Violations
        Invalid Cursor States
        Syntax Errors and Access Rule Violations
        Transaction Rollbacks
        with check option Violation
  Reference Manual: Commands 16.0
    Commands
      alter database
        alter database Restrictions
        Using alter database for Archive Databases
        Altering In-Memory and Relaxed Durability Databases
        Backing Up master After Allocating More Space
        Placing the Log on a Separate Device
        Altering Databases for Compression
        In-row LOB Columns
        Shrinking Log Space
        Getting Help on Space Usage
        The system and default Segments
        Using alter database to Awaken Sleeping Processes
        Using the alter database for proxy_update Parameter
        Fully Encrypting Databases
      alter encryption key
      alter login
      alter index
      alter login profile
      alter precomputed result set
      alter...modify owner
      alter role
        Changing Passwords for Roles
        Mutually Exclusive Roles
      alter table
        Restrictions for alter table
        alter table and Encrypted Columns
        Altering a Table’s Compression
        Interactions Between Compression and Other alter table Parameters
        Altering the Compression Level for a Table Using Large Objects
        Getting Information About Tables
        Specifying Ascending or Descending Ordering in Indexes
        Using Cross-Database Referential Integrity Constraints
        Changing Defaults
        Setting Space Management Properties for Indexes
        Conversion of max_rows_per_page to exp_row_size
        Using reservepagegap
        Partitioning Tables for Improved Performance
        Using Computed Columns
        Adding IDENTITY Columns
        Altering Table Schema
        Restrictions for Modifying a Table Schema
        Restrictions for Modifying text and image Columns
        Modifying Tables With Unitext Columns
        Changing Locking Schemes
        Adding Java-SQL Columns
        Restrictions for Shared-Disk Clusters
      alter thread pool
      begin...end
      begin transaction
      break
      checkpoint
      close
      commit
      compute Clause
        compute Clause Restrictions
        compute Results Appear as a New Row or Rows
        Case-Sensitivity
      connect to...disconnect
      continue
      create archive database
      create database
        Restrictions for create database
        Temporary Databases
        Creating Compressed Databases
        Creating Databases With In-Row LOBs
        Creating In-Memory and Relaxed Durability Databases
        New Databases Created from model
        Ensuring Database Recoverability
        Using the for load Option
        Getting Information About Databases
        Using with default_location and for proxy_update
      create default
        create default Restrictions
        Datatype Compatibility
        Getting Information about Defaults
        Defaults and Rules
        Defaults and Nulls
        Specifying a Default Value in create table
        Objects Dependent on Replaced Defaults
      create encryption key
      create existing table
        Datatype Conversions
        Changes by Server Class
        Remote Procedures
        Encrypted Columns
      create function
        Objects Dependent on Replaced Functions
      create function (SQLJ)
      create index
        Creating Indexes Efficiently
        Creating Clustered Indexes
        Creating Indexes on Compressed Table
        Creating Indexes on Encrypted Columns
        Specifying Ascending or Descending Ordering in Indexes
        Space Requirements for Indexes
        Duplicate Rows
        Using Unique Constraints in Place of Indexes
        Using the sorted_data Option to Speed Sorts
        Specifying the Number of Histogram Steps
        Space Management Properties
        Index Options and Locking Modes
        Using the sorted_data Option on Data-Only-Locked Tables
        Getting Information About Tables and Indexes
        Creating Indexes on Computed Columns
        Creating Partitioned Indexes
        Creating Function-Based Indexes
        create index and Stored Procedures
      create login
      create login profile
      create plan
      create precomputed result set
      create procedure
        create procedure Restrictions
        execute as Stored Procedure
        System Procedures
        Nested Procedures
        Procedure Return Status
        Object Identifiers
        Temporary Tables and Procedures
        Setting Options in Procedures
        Extended Stored Procedures
        Objects Dependent on Replaced Procedures
        Getting Information About Procedures
      create procedure (SQLJ)
      create proxy_table
      create role
      create rule
        create rule Restrictions
        Binding Rules
      create schema
      create service
      create table
        Restrictions for create table
        Creating Compressed Tables
        Restrictions for Compression
        Using Indexes
        Renaming a Table or Its Columns
        Restrictions on Compressing Tables That Use Large Object (LOB) Data
        Column Definitions
        Temporary Tables
        Defining Integrity Constraints
        Unique and Primary-Key Constraints
        Referential Integrity Constraints
        Using Cross-Database Referential Integrity Constraints
        check Constraints
        IDENTITY Columns
        Specifying a Locking Scheme
        Getting Information About Tables
        Creating Tables with Partitions
        Creating Tables With Computed Columns
        Creating Tables with Encrypted Columns
        Limitations When Creating Virtually Hashed Tables
        Creating Tables for In-Memory and Relaxed Durability Databases
        Restrictions for Shared-Disk Clusters
        Space Management Properties
        Using reservepagegap
        Java-SQL Columns
        Determining Values for hash_factor
      create thread pool
      create trigger
        Triggers and Referential Integrity
        The deleted and inserted Logical Tables
        Trigger Restrictions
        Triggers and Performance
        Setting Options Within Triggers
        Dropping a Trigger
        Actions That Do Not Cause Triggers to Fire
        Nesting Triggers and Trigger Recursion
        Restrictions for instead of
        Getting Information About Triggers
        Triggers and Transactions
        Inserting and Updating Triggers
        instead of and for Triggers
      create view
        Restrictions on Views
        View Resolution
        Modifying Data Through Views
        IDENTITY Columns and Views
        group by Clauses and Views
        distinct Clauses and Views
        Creating Views from SQL-Derived Tables
        Objects Dependent on Replaced Views
      dbcc
        Using dbcc quorum (clusters only)
        Restrictions on dbcc checkstorage for Shared-Disk Clusters
        Using dbcc complete_xact
        Checking Performed by dbcc checkcatalog
        Using dbcc checktable
      deallocate cursor
      deallocate locator
      declare
      declare cursor
        Using Scrollable Cursors
        Cursor select Statements
        Cursor Scope
        Result Set
        Updatable Cursors
        Releasing Locks at Cursor Close
      delete
        delete Restrictions
        Deleting All Rows from a Table
        delete and Transactions
        Using the where current of Parameter
        Using readpast
      delete statistics
      disk init
        Using dsync with disk init
        Creating Devices for In-Memory and Relaxed Durability Databases
      disk mirror
      disk refit
      disk reinit
        Using dsync with Disk Reinit
      disk remirror
      disk resize
      disk unmirror
      drop database
      drop default
      drop encryption key
      drop function
      drop function (SQLJ)
      drop index
      drop login
      drop login profile
      drop precomputed result set
      drop procedure
      drop role
      drop rule
      drop service
      drop table
        Restrictions for drop table
        Dropping Tables with Cross-Database Referential Integrity Constraints
      drop thread pool
      drop trigger
      drop view
      dump configuration
      dump database
        Commands and System Procedures Used to Back Up Databases
        Scheduling Dumps
        Specifying Dump Devices
        Restrictions for dump database
        Dumping Databases with Devices That Are Mirrored
        Dumping the System Databases
        Dump Files
        Volume Names
        Changing Dump Volumes
        Appending to or Overwriting a Volume
        File Names and Archive Names
        dump database Performance
        Compressed Dumps for an Archive Database
        Compatibility Issues for a Compressed Dump
        Encrypted Columns and dump database
      dump transaction
        dump transaction Restrictions
        Copying the Log After Device Failure
        Dumping Databases Without Separate Log Segments
        Dumping Only Complete Transactions
        Dumping Without the Log
        Scheduling Dumps
        Using Thresholds to Automate dump transaction
        Specifying Dump Devices
        Determining Tape Device Characteristics
        Backup Servers
        Dump Files
        Volume Names
        Changing Dump Volumes
        Appending To or Overwriting a Volume
        Dumping Logs Stored on Mirrored Devices
        Fully Recoverable DDL and dump transaction
      execute
      fetch
        Status Information
        fetch Restrictions
        Using Scrollable Cursors with fetch_direction
        Multiple Rows per Fetch
        Rules for Positioning the Scrollable Cursor
      goto label
      grant
        grant all Object Creation Privileges
        Using the with grant option Parameter
        Users and User Groups
        Using the grant Command's granted by Option
        Privileges for grant
        Grant Access to Roles
        Granting Default Permissions on System Tables
        Granting Permissions for update statistics, delete statistics, and truncate table
        Granting Proxies and Session Authorizations
        Granting a Privilege to a Role
      grant role
      group by and having Clauses
        How group by and having Queries with Aggregates Work
        Standard group by and having Queries
        Transact-SQL Extensions to group by and having
        group by and having Clauses and Sort Orders
        How group by Works With the Optimizer
      if...else
      insert
        The Column List
        Validating Column Values
        Treatment of Blanks
        Inserting Rows Selected from Another Table
        Inserting Rows in Bulk
        Transactions and insert
        Inserting Values into IDENTITY Columns
        Inserting Data Through Views
        Partitoning Tables for Improved Insert Performance
      kill
      load database
        Commands and System Procedures to Restore Databases
        Restrictions for load database
        Locking Out Users During Loads
        Upgrading Database and Transaction Log Dumps
        Specifying Dump Devices
        Backup Servers
        Volume Names
        Changing Dump Volumes
        Restoring the System Databases
        Disk Mirroring
        Materializing an Archive Database
        Using load database with norecovery
        Using Logical Devices with an Archive Database
        load database Limitations with an Archive Database
        load database and Encrypted Columns
        Loading Compressed Data
      load transaction
        load transaction Restrictions
        Restoring a Database
        Recovering a Database to a Specified Time
        Locking Users Out During Loads
        Upgrading Database and Transaction Log Dumps
        Specifying Dump Devices
        Backup Servers
        Volume Names
        Changing Dump Volumes
        Disk Mirroring
        Loading a Transaction Log into an Archive Database
      lock table
      merge
      mount
      online database
      open
      order by clause
        order by Clause Restrictions
        Behavior of order by When Identical Table Column Name and Column Alias Name Exist
        Collating Sequences
        Sort Rules
        Descending Scans
      prepare transaction
      print
      quiesce database
        Encrypted Columns and quiesce database
        quiesce database in a Clustered Environment
      raiserror
      readtext
        Using the readpast Option
        Using readtext with unitext Columns
      reconfigure
      refresh precomputed result set
      remove java
      reorg
      return
      revoke
        Using the revoke Command's granted by Option
        Revoking set proxy and set session authorization
        Revoking Default Permissions on System Tables
        Revoking Permissions for update statistics, delete statistics, and truncate table
        Using the cascade Option
      revoke role
      rollback
      rollback trigger
      save transaction
      select
        Using select into
        Converting the NULL Properties of a Target Column with select...into
        Specifying a Compression Level
        Parameter Interactions with Data Compression
        Using select for update
        Specifying in-row LOB Columns
        Specifying a Lock Scheme Using select...into
        Specifying a Partition Strategy Using select...into
        Using index, prefetch, and lru | mru
        Using Encrypted Columns
        Using parallel
        Using readpast
        Expanded select * Syntax
        Using select with Variables, Global Variables, and Constants
      set
        set Options That Can Be Grouped Together
        Compile-Time Changes for Some set Parameters
        Aggregate Behavior
        Comparison Behavior
        Roles and set Options
        In-Memory and Relaxed-Durability Databases
        Setting Compression for a Session
        Using Predicated Privileges
        Distributed Transactions, CIS, and set Options
        Using Proxies
        Using lock wait
        Repeatable-Reads Transaction Isolation Level
        Using Simulated Statistics
        Global Variables Affected by set Options
        Using fipsflagger with Java in the Database
        Restrictions for set tracefile
        set Options That Save Diagnostic Information to a Trace File
        Restrictions for show_sqltext
        Exporting set Options from a Login Trigger
        Delimited Identifiers
          Bracketed Identifiers
      setuser
      shutdown
        Specifying a Wait Time
      transfer table
      truncate lob
      truncate precomputed result set
      truncate table
      union operator
      unmount
      update
        Using update with Transactions
        Using Joins in Updates
        Using update with Character Data
        Using update with Cursors
        Updating IDENTITY Columns
        Updating Data Through Views
        Using index, prefetch, or lru | mru
        Using readpast
        Using Variables in update Statements
      update all statistics
      update index statistics
      update statistics
        Types of Scans Performed During update statistics
        update statistics and Sampling
        create index and Stored Procedures
        Using Hash-Based Statistics
      update table statistics
      use
      waitfor
      where clause
      while
      writetext
    Interactive SQL Commands
      clear
      configure
      connect
      disconnect
      exit
      input
      output
      parameters
      read
      set connection
      start logging
      stop logging
      system
  Reference Manual: Procedures 16.0
    System Procedures
      Permissions on System Procedures
      Auditing System Procedures
      Executing System Procedures
      Entering Parameter Values
      Messages
      System Procedure Tables
      sp_activeroles
      sp_add_qpgroup
      sp_add_resource_limit
      sp_add_time_range
      sp_addalias
      sp_addauditrecord
      sp_addaudittable
      sp_addengine
      sp_addexeclass
      sp_addextendedproc
      sp_addexternlogin
      sp_addgroup
      sp_addlanguage
        System Table Changes
        Dates for Languages Added with sp_addlanguage
      sp_addlogin
      sp_addmessage
      sp_addobjectdef
      sp_addremotelogin
      sp_addsegment
      sp_addserver
      sp_addthreshold
        Creating Additional Thresholds
        Executing Threshold Procedures
        Changing or Deleting Thresholds
        Disabling Free-Space Accounting
        The Last-Chance Threshold
        Creating Threshold Procedures
      sp_addtype
      sp_addumpdevice
      sp_adduser
      sp_altermessage
      sp_audit
        sp_audit and Security
      sp_autoconnect
      sp_autoformat
      sp_bindcache
      sp_bindefault
      sp_bindexeclass
      sp_bindmsg
      sp_bindrule
      sp_cacheconfig
        Data Cache Memory
        Creating Cache for In-Memory or Relaxed Durability Databases
        Changing Existing Caches
        Using Cache Partitions
        Dropping Caches
      sp_cachestrategy
        Overrides
      sp_changedbowner
      sp_changegroup
      sp_checknames
      sp_checkreswords
        Handling Reported Instances of Reserved Words
        Changing Identifiers
        Using sp_rename to Change Identifiers
        Changing Other Identifiers
        Using Delimited Identifiers
      sp_checksource
      sp_chgattribute
      sp_cleanpwdchecks
      sp_clearpsexe
      sp_clearstats
      sp_client_addr
      sp_cluster
      sp_clusterlockusage
      sp_cmp_all_qplans
      sp_cmp_qplans
      sp_commonkey
      sp_companion
      sp_compatmode
      sp_config_dump
      sp_confighistory
      sp_configure
        The sp_configure number of checkpoint tasks Parameter
        The sp_configure max concurrently recovered db Parameter
        Setting Configuration Parameters for Clusters Using sp_configure
      sp_copy_all_qplans
      sp_copy_qplan
      sp_countmetadata
      sp_cursorinfo
      sp_dbextend
      sp_dboption
        Full Logging and sp_dboption
        Shrinking the Log
        Allowing Wide Rows Using sp_dboption
        Asynchronous Log Service (ALS) Options
        Considerations for Using enforce dump tran sequence
        Database Options and sp_dboption
      sp_dbrecovery_order
      sp_dbremap
      sp_defaultloc
      sp_deletesmobj
      sp_depends
        Java Methods
      sp_deviceattr
      sp_diskdefault
      sp_displayaudit
      sp_displaylevel
      sp_displaylogin
      sp_displayroles
      sp_downgrade
      sp_dropalias
      sp_drop_all_qplans
      sp_drop_qpgroup
      sp_drop_qplan
      sp_drop_resource_limit
      sp_drop_time_range
      sp_dropdevice
      sp_dropengine
      sp_dropexeclass
      sp_dropextendedproc
      sp_dropexternlogin
      sp_dropglockpromote
      sp_ dropglockpromote_ptn
      sp_dropgroup
      sp_dropkey
      sp_droplanguage
      sp_droplogin
      sp_dropmessage
      sp_dropobjectdef
      sp_dropremotelogin
      sp_droprowlockpromote
      sp_droprowlockpromote_ptn
      sp_dropsegment
      sp_dropserver
      sp_dropthreshold
      sp_droptype
      sp_dropuser
      sp_dump_history
      sp_dump_info
      sp_dumpoptimize
        Thresholds and sp_dumpoptimize
      sp_encryption
      sp_engine
        Using sp_engine ā€œofflineā€ Versus sp_engine ā€œshutdownā€
      sp_errorlog
      sp_estspace
        Estimating the Extra Space Required by a Column
      sp_export_qpgroup
      sp_extendsegment
      sp_extengine
      sp_extrapwdchecks
      sp_familylock
      sp_find_qplan
      sp_fixindex
      sp_flushstats
      sp_forceonline_db
      sp_forceonline_object
      sp_forceonline_page
      sp_foreignkey
      sp_freedll
      sp_getmessage
      sp_grantlogin
      sp_ha_admin
      sp_help
        Rules for Finding Objects
        Precomputed Result Sets and sp_help
      sp_help_resource_limit
      sp_help_qpgroup
      sp_help_qplan
      sp_helpapptrace
      sp_helpartition
        Accuracy of Results and sp_helpartition
      sp_helpcache
      sp_helpcomputedcolumn
      sp_helpconfig
        Planning Metadata Cache Configuration with sp_helpconfig
        Estimate Memory Requirements for compression info pool size
        Using sp_helpconfig with sybdiagdb (SAP Product Support Only)
      sp_helpconstraint
      sp_helpdb
      sp_helpdefrag
      sp_helpdevice
      sp_helpextendedproc
      sp_helpexternlogin
      sp_helpgroup
      sp_helpindex
      sp_helpjava
      sp_helpjoins
      sp_helpkey
      sp_helplanguage
      sp_helplog
      sp_helpmaplogin
      sp_helpobjectdef
      sp_helpremotelogin
      sp_helprotect
      sp_helpsegment
      sp_helpserver
      sp_helpsort
      sp_helptext
      sp_helpthread
      sp_helpthreshold
      sp_helptrigger
      sp_helpuser
      sp_hidetext
      sp_import_qpgroup
      sp_indsuspect
      sp_jreconfig
      sp_ldapadmin
      sp_listener
      sp_listsuspect_db
      sp_listsuspect_object
      sp_listsuspect_page
      sp_lmconfig
      sp_lock
      sp_locklogin
      sp_logdevice
      sp_logging_rate
      sp_loginconfig
      sp_logininfo
      sp_logiosize
      sp_logintrigger
      sp_maplogin
      sp_merge_dup_inline_default
      sp_metrics
      sp_modify_resource_limit
      sp_modify_time_range
      sp_modifylogin
      sp_modifystats
      sp_modifythreshold
        Crossing a Threshold
        The Last-Chance Threshold
        Create Threshold Procedures with sp_modifythreshold
        Execute Threshold Procedures with sp_modifythreshold
        Disable Free-Space Accounting
      sp_monitor
      sp_monitorconfig
      sp_monitor_server
      sp_object_stats
      sp_objectsegment
      sp_opt_querystats
      sp_optgoal
      sp_options
      sp_passthru
        Return Parameters and sp_passthru
      sp_password
      sp_passwordpolicy
        Login Password Complexity Checks and sp_passwordpolicy
        High-Availability and Password Policy Options
      sp_pciconfig
      sp_placeobject
      sp_plan_dbccdb
      sp_poolconfig
        Wash Percentage and sp_poolconfig
        Local Asynchronous Prefetch Percentage and sp_poolconfig
      sp_post_xpload
        Handling Suspect Partitions in Cross-Platform Dump and Load Operations
      sp_primarykey
      sp_processmail
      sp_procxmode
      sp_querysmobj
      sp_recompile
      sp_refit_admin
      sp_remoteoption
      sp_remotesql
      sp_rename
      sp_rename_qpgroup
      sp_renamedb
      sp_reportstats
      sp_restore_system_role
      sp_revokelogin
      sp_role
      sp_securityprofile
      sp_sendmsg
      sp_serveroption
      sp_set_qplan
      sp_setlangalias
      sp_setpglockpromote
      sp_setpglockpromote_ptn
      sp_setpsexe
      sp_setrowlockpromote
      sp_setrowlockpromote_ptn
      sp_setsuspect_granularity
      sp_setsuspect_threshold
      sp_setup_table_transfer
      sp_shmdumpconfig
      sp_show_options
      sp_showcontrolinfo
      sp_showexeclass
      sp_showoptstats
      sp_showplan
      sp_showpsexe
      sp_spaceusage
        Interpreting PctBloatUsedPages and PctBloatReservedPages Values
        Output Columns from sp_spaceusage
      sp_spaceused
      sp_ssladmin
        Using lsciphers and setciphers to Set Cipher Suites
      sp_syntax
      sp_sysmon
      sp_tab_suspectptn
      sp_tempdb
      sp_tempdb_markdrop
      sp_thresholdaction
      sp_tran_dumpable_status
      sp_transactions
      sp_unbindcache
      sp_unbindcache_all
      sp_unbindefault
      sp_unbindexeclass
      sp_unbindmsg
      sp_unbindrule
      sp_version
      sp_volchanged
        When Backup Server Detects a Problem
        Changing Tape Volumes on UNIX
      sp_webservices
      sp_who
      sp_xact_loginfo
      sp_xmlschema
    Catalog Stored Procedures
      Specifying Optional Parameters
      Pattern Matching
      System Procedure Tables
      ODBC Datatypes
      sp_column_privileges
      sp_columns
      sp_databases
      sp_datatype_info
      sp_fkeys
      sp_pkeys
      sp_server_info
      sp_special_columns
      sp_sproc_columns
      sp_statistics
      sp_stored_procedures
      sp_table_privileges
      sp_tables
    System Extended Stored Procedures
      xp_cmdshell
      xp_deletemail
      xp_enumgroups
      xp_findnextmsg
      xp_logevent
      xp_readmail
      xp_sendmail
      xp_startmail
      xp_stopmail
    dbcc Stored Procedures
      Specifying the Object Name and Date
        Specifying the Object Name
        Specifying the Date
      sp_dbcc_alterws
      sp_dbcc_configreport
      sp_dbcc_createws
      sp_dbcc_deletedb
      sp_dbcc_deletehistory
      sp_dbcc_differentialreport
      sp_dbcc_evaluatedb
      sp_dbcc_exclusions
      sp_dbcc_faultreport
      sp_dbcc_fullreport
      sp_dbcc_help_fault
      sp_dbcc_patch_finishtime
      sp_dbcc_recommendations
      sp_dbcc_runcheck
      sp_dbcc_statisticsreport
      sp_dbcc_summaryreport
      sp_dbcc_updateconfig
  Reference Manual: Tables 16.0
    System Tables
      Locations of System Tables
        System Tables in master
        System Tables in sybsecurity
        System Table in sybsystemdb
        System Tables in All Databases
        The sybdiagdb Database
        The syblicenseslog Table
      Using System Tables in the Cluster Edition
        timestamp Columns
        Changed Identity Values
        Controlling Fake-Table Materialization
      Rules for Using System Tables
        Permissions on System Tables
        Locking Schemes Used for System Tables
        Reserved Columns
        Updating System Tables
        Triggers on System Tables
      ch_events
      sysdams
      syblicenseslog
      sysalternates
      sysaltusages
      sysattributes
      sysauditoptions
      sysaudits_01 – sysaudits_08
      syscacheinfo
      syscachepoolinfo
      syscharsets
      syscolumns
      syscomments
      sysconfigures
      sysconstraints
      syscoordinations
      syscurconfigs
      sysdatabases
      sysdepends
      sysdevices
      sysencryptkeys
      sysengines
      sysgams
      sysindexes
      sysinstances
      sysjars
      syskeys
      syslanguages
      syslisteners
      syslocks
      sysloginroles
      syslogins
      syslogs
      syslogshold
      sysmessages
      sysmonitors
      sysobjects
      sysoptions
      syspartitionkeys
      syspartitions
      syspoolinfo
      sysprocedures
      sysprocesses
      sysprotects
      sysquerymetrics
      sysqueryplans
      sysreferences
      sysremotelogins
      sysresourcelimits
      sysroles
      syssecmechs
      syssegments
      sysservers
      syssessions
      sysslices
      syssrvroles
      sysstatistics
      systabstats
      systhresholds
      systimeranges
      systransactions
      systypes
      sysusages
      sysusermessages
      sysusers
      sysxtypes
    dbccdb Tables
      dbccdb Workspaces
      dbccdb Log
      dbcc_config
      dbcc_counters
      dbcc_exclusions
      dbcc_fault_params
      dbcc_faults
      dbcc_operation_log
      dbcc_operation_results
      dbcc_types
    Monitoring Tables
      monCachedObject
      monCachePool
      monCachedProcedures
      monCachedStatement
      monCIPC
      monCIPCEndpoints
      monCIPCLinks
      monCIPCMesh
      monCLMObjectActivity
      monClusterCacheManager
      monCMSFailover
      monDataCache
      monDBRecovery
      monDBRecoveryLRTypes
      monDeadLock
      monDeviceIO
      monDeviceSpaceUsage
      monEngine
      monErrorLog
      monFailoverRecovery
      monInmemoryStorage
      monIOController
      monIOQueue
      monLicense
      monLocks
      monLockTimeout
      monLogicalCluster
      monLogicalClusterAction
      monLogicalClusterInstance
      monLogicalClusterRoute
      monMemoryUsage
      monNetworkIO
      monOpenDatabases
      monOpenObjectActivity
      monOpenPartitionActivity
      monPCIBridge
      monPCIEngine
      monPCISlots
      monPCM
      monProcedureCache
      monProcedureCacheMemoryUsage
      monProcedureCacheModuleUsage
      monProcess
      monProcessActivity
      monProcessLookup
      monProcessMigration
      monProcessNetIO
      monProcessObject
      monProcessProcedures
      monProcessSQLText
      monProcessStatement
      monProcessWaits
      monProcessWorkerThread
      monRepCoordinator
      monRepLogActivity
      monRepScanners
      monRepScannersTotalTime
      monRepSchemaCache
      monRepSenders
      monSpinlockActivity
      monSQLRepActivity
      monSQLRepMisses
      monState
      monStatementCache
      monSysExecutionTime
      monSysLoad
      monSysPlanText
      monSysSQLText
      monSysStatement
      monSysWaits
      monSysWorkerThread
      monTableColumns
      monTableCompression
      monTableParameters
      monTables
      monTableTransfer
      monTask
      monTempdbActivity
      monThread
      monThreadPool
      monThresholdEvent
      monWaitClassInfo
      monWaitEventInfo
      monWorkload
      monWorkloadPreview
      monWorkloadProfile
      monWorkloadRaw
      monWorkQueue
    sybpcidb Tables
      pca_jre_arguments
      pca_jre_directives
      pci_arguments
      pci_directives
      pci_slotinfo
      pci_slot_syscalls
  Active Messaging Users Guide 15.7
    Introduction
      Active Messaging concepts
      Automatic decisions in real time
      Messaging models
        JMS
        WebSphere MQ messaging models
      Message format
        JMS message properties
        MQ message topics
      Message selectors
    Understanding Active Messaging
      Sending and receiving messages from a queue
      Publishing and consuming messages from a JMS topic
      Working with message properties
      Previewing the messaging interface
      MQ overview
      Securing channels with SSL
      MQ publish/subscribe
        Syntax for topics
        Publisher and subscriber identities
        MQ publish/subscribe examples
      Working with MQ cluster queue objects
      Working with remote queue objectsļæ½
      Working with text messaging
        Text messages and JMS
        Text messages and MQ
      Adaptive Server Cluster Edition support
        Login redirection
        Extended high availability
      Active Messaging support for the threaded kernel
      Internationalization support
      Transactional message behavior
        Transactional messaging set option
      MQ security
        Connecting to the MQ queue manager
      Installing MQ client on Adaptive Server host machines
      MQ authorizations
      Querying MQ information
    SQL Reference
      Message-related global variables
      <msgheader> and <msgproperties> documents
      Adaptive Server-specific message properties
      Keywords
      Stored procedures
      Built-in functions
      Syntax segments
      sp_configure 'enable real time messaging'
      sp_engine
      sp_msgadmin
      msgconsume
      msgpropcount
      msgproplist
      msgpropname
      msgproptype
      msgpropvalue
      msgpublish
      msgrecv
      msgsend
      msgsubscribe
      msgunsubscribe
      endpoint
      option_string
      sizespec
      timespec
    Samples
      Sybase directories
      Using code samples with SQL
      Using code samples with Java/JDBC
    Glossary
  Component Integration Services Users Guide 16.0
    Introduction to Component Integration Services
    Component Integration Services Concepts
      Proxy Tables
        Using the create table Command
        Using the create existing table Command
          Datatype Conversions
        Using the create proxy_table Command
        Remote Procedures as Proxy Tables
        Server Limits
        Cascading Proxy Tables
      Proxy Databases
        User Proxy Databases
          User Proxy Database Schema Synchronization
        System Proxy Databases
          System Proxy Database Creation
          Schema Synchronization When Current Database Has a System Proxy Database
          Stored Procedure Execution Within a System Proxy Database
      File System Access
        Directory Access
        Recursion Through Subordinate Directories
        File Access
      Remote Servers
        Connection Management
        Connecting to Remote Servers Without the Interfaces File
        LDAP Directory Services
        Secure Communication with SSL
          Using Trusted Roots Files
        Secure Communication Using Kerberos
          Configuring Kerberos security services
          Configuring the Remote SAP ASE Kerberos Principal Name
          Configuring Component Integration Services Remote Procedure Calls
        Security Issues
          Using Encrypted Columns in CIS
        Remote Server Logins
          Connecting to Backup Server and XP Server
        Mapping External Logins
        Configuring Failover for Remote Server Connections
        Remote Server Capabilities
      Query Processing
      RPC handling and Component Integration Services
        Site Handler and Outbound RPCs
        Configuring Component Integration Services for Outbound RPCs
        Text Parameters for RPCs
        Text Parameter Support for XJS/390
      Distributed Transaction Management
        DTM-Enabled Servers
        Pre-DTM servers
        strict DTM enforcement
        Enable Component Integration Services
        Transactional RPCs
        Restrictions on Transaction Management
      SAP ASE to SAP ASE update statistics
      Updating Statistics on Non-SAP ASE Backends
      Java in the Database
        Constraints on Java Class Columns
        Java Abstract Datatypes (ADTs)
          Java Class Definitions
      Datatypes
        Unicode support
        Datatype Conversions
        text and image Datatypes
          Limits of @@textsize
          Odd Bytes Padded
          Converting text and image Datatypes
          Pattern Matching with text and unitext Data
          Entering text and image Values
          readtext using bytes
          Restriction for text, image, and unitext with bulk copy
          Considerations for Using text, unitext, and image data with Server Classes
      Configuration and Tuning
        Using sp_configure
          sysconfigures Table
          Changing the Configuration Parameters
        Using Global Variables to Determine Status
    CIS Support for HANA Server
      Configuring CIS for HANA
        Creating SAP HANA as an ODBC Data Source on Windows
        Adding SAP HANA to the SAP ASE Interfaces File
        Configuring the PCI Bridge and PCA/ODBC
      Adding Server Class HANAODBC
      Datatype Mapping Between SAP ASE and HANA
      Restrictions
    SQL Reference
      dbcc Commands
        dbcc Options
        Trace Flags
      Functions
        Aggregate Functions
        Datatype Conversion Functions
        Date Functions
        Mathematical Functions
        Security Functions
        String Functions
        System Functions
        Text and Image Functions
      Transact-SQLCommands
        alter table
        case
        connect to...disconnect
        create existing table
        create index
        create table
        delete
        drop index
        fetch
        insert
        readtext
        select
        truncate table
        update
        update statistics
        writetext
      Passthrough Mode
        The connect to Command
        The sp_autoconnect System Procedure
        The sp_passthru System Procedure
        The sp_remotesql System Procedure
      Quoted Identifier Support
      Delimited Identifier Support
      auto identity Option
      Triggers
    Tutorial
      Adding a Remote Server
        Creating Server Entries in System Tables
        Adding an Alternate Login and Password
        Verifying Connectivity
      Performing a Join Between Two Remote Tables
    Troubleshooting
      Problems Accessing Component Integration Services
      Problems Using Component Integration Services
        Unable to Access Remote Server
        Unable to Access Remote Objects
        Problem Retrieving Data from Remote Objects
      If You Need Help
  Compression Users Guide 16.0
    Data Compression Overview
      Enabling Data Compression
      Selecting Data into Compressed Tables
      Administering Compressed Databases
        Session-Level Data Compression
        Copy, Dump, and Load Compressed Data
      Limits for Database Compression
    Levels of Data Compression
      Row-Level Compression
      Page-Level Compression
    Creating Databases for Data Compression
      Altering the Compression Level of a Database
    Creating a Compressed Table
      Disabling Compression
      Altering the Compression Level of a Table or Partition
    Index Compression
      Enabling Index Compression
      Creating an Index Compressed Table
      Creating a Compressed Index
      Changing the Index Compression State
    Datatypes Available for Compression
    Compressed Data Storage Strategies
    Compressed Columns with Large Objects
      Creating a Compressed Database with LOB Datatypes
      Creating Compressed Tables with LOB Datatypes
      Altering Tables with Compressed LOB Datatypes
    Administering Compressed Databases
      Session-Level Data Compression
      Copy, Dump, and Load Compressed Data
    Limits for Database Compression
  Database Encryption 16.0
    Overview of Encryption
      Full Database Encryption
      Column Encryption
    Protect Data with Encryption Keys
      Creating the Database Encryption Key
        Dropping a Database Encryption Key
        Changing a Database Encryption Key
      Creating Column Encryption Keys
        Dropping Column Encryption Keys
        Changing the Column Encryption Key
      Key Protection
        Grant Access to Keys
        Separate Keys from Data
    Key Encryption
      Protect Encryption Keys with the Master Key
      Protect Encryption Keys with the System-Encryption Password
      Protect Keys with User-Specified Passwords
      Protect Encryption Keys with Dual Control
    Database-Level Master and Dual Master Keys
      Creating the Master and Dual Master Keys
        Creating Master Key Copies
      Setting Passwords for the Master and Dual Master Keys
      Altering Passwords and Key Encryption Keys for Master Key Copies
      Regenerate Master Keys
      Dropping Master Keys and Key Copies
      Recovering the Master Key and Dual Master Key
      Starting SAP ASE in Unattended Start-Up mode
        Configure Unattended Start-Up Mode
        Create the Master Key Start-Up File
        How SAP ASE Uses the Master Key Start-Up File
    Secure External Passwords and Hidden Text
      Service Keys
        Creating Service Keys
        Dropping Service Keys
        Modify Service Keys
          Changing the syb_extpasswdkey
          Changing the syb_syscommkey
        Service Keys with External Passwords
          SSL Passwords
          LDAP Passwords
          Replication Agent Passwords
      Service Keys Encrypted with the Master Key
    Database Encryption
      Create an Encrypted Database
      Encrypt an Existing Database
      Encryption Status and Progress
      Performance Considerations
      Suspend the Encryption Process
        The quiesce database Command and Fully Encrypted Databases
      Resume the Encryption Process
      Decrypt an Encrypted Database
      Recover Fully Encrypted Databases
      Back Up (Dump) a Fully Encrypted Database
      Back Up the Database Encryption Key
      Restore (Load) Backups of Fully Encrypted Databases
      Loading Behavior of Encrypted Databases
      Dropping a Database That is Being Encrypted
      Mounting and Unmounting a Fully Encrypted Database
      Archive Databases and Full Encryption
    Column Encryption
      Encrypting Columns on New Tables
        Specifying Encryption on select into
      Encrypting Columns in Existing Tables
      Index Creation and Constraints on Encrypted Columns
      Domain Creation and Access Rules on Encrypted Columns
      Decrypt Permission
        Revoking Decryption Permission
      Restrict Decrypt Permission
      Default Values Returned Instead of Decrypted Data
        Defining Decrypt Defaults
        Permissions and Decrypt Default
        Columns with Decrypt Default Values
        Decrypt Default Columns and Query Qualifications
        decrypt default and Implicit Grants
        decrypt default and insert, update, and delete Statements
        Removing Decrypt Defaults
      Length of Encrypted Columns
      Encrypted Columns Audits
        Event Names and Numbers
        Passwords Masked in Command Text Auditing
        Auditing Actions of the Key Custodian
      Performance Considerations
        Indexes on Encrypted Columns
        Sort Orders and Encrypted Columns
        Joins on Encrypted Columns
        Search Arguments and Encrypted Columns
        Movement of Encrypted Data as Cipher Text
      Access Encrypted Data
        Encrypted Columns Process
        Permissions for Decryption
        Drop Encryption
    Role of the Key Custodian
      Users, Roles, and Data Access
    Key Protection Using User-Specified Passwords
      Change a Key’s Protection Method
      Create Key Copies
      Change Passwords on Key Copies
      Access Encrypted Data with a User Password
      Application Transparency Using Login Passwords on Key Copies
      Login Password Change and Key Copies
      Dropping a Key Copy
    Key Recovery from Lost Passwords
      Loss of Password on Key Copy
      Loss of Login Password
      Loss of Password on Base Key
      Key Recovery Commands
      Ownership Change of Encryption Keys
  In-Memory Database Users Guide 15.7
    In-Memory Databases
      Cache and buffer support
      Durability levels
        Temporary databases and in-memory temporary databases
        Multidatabase transactions and database types
      Template databases
        Altering the database to use a new template
      Minimally logged commands
      Limits for in-memory and relaxed-durability databases
        Changed system procedures
    Managing In-Memory and Relaxed-Durability Databases
      Specifying named caches for in-memory databases
      Verifying changes to the configuration file
        Changing static configuration parameters for in-memory databases
      Creating in-memory devices
      Creating in-memory databases
      Creating disk-resident databases with relaxed durability
      Administering in-memory databases
        Resizing in-memory storage caches
        Deleting in-memory storage caches
        Increasing the size of in-memory databases
        Dumping and loading in-memory databases
          Configuring number of backup connections
        Dropping in-memory databases
        Dropping in-memory devices
    Minimally Logged DML
      Types of DML logging settings
        Database-level logging
        Table-level logging
        Session-level logging
        Additional minimal logging rules
      Transactional semantics
      Logging concurrent transactions
      Minimal logging with ddl in tran set to true
      Effect of referential integrity constraints
      Multistatement transactions in minimally logged mode
      Stored procedures and minimally logged DML
      Including set dml_logging in a trigger
      Using deferred updates
      Obtaining diagnostic information
    Performance and Tuning for In-Memory Databases
      Configuring in-memory storage cache
        Cache layout
      sp_sysmon output for in-memory databases
      Monitoring the default data cache performance
      Organizing physical data for in-memory devices
      Performance optimization for low-durability databases
        Tuning checkpoint intervals
      Minimally logged DML
      Dumping and loading in-memory databases
      Tuning for spinlock contention and network connections
        Improving contention for lock manager hashtable spinlock ratios
        Determining the number of network connections
  Java in Adaptive Server Enterprise 15.7
    An Introduction to Java in the Database
      Advantages of Java in the database
      Capabilities of Java in the database
        Invoking Java methods in the database
        Storing Java classes as datatypes
        Storing and querying XML in the database
      Java components
      Functional changes in Adaptive Server 15.0.3 and later
        Changes in class distribution
        The PCA/JVM runs in headless mode
        Changes in memory management
        Changes in ClassLoader behavior
      Standards
      Java in the database: questions and answers
        What are the key features?
        How are Java instructions stored in the database?
        How is Java executed in the database?
        Which Java Virtual Machines (JVMs) are supported?
        What is headless mode?
        What about JDBC?
        How can Java and SQL be used together?
        What is the Java API?
        Which Java classes are supported in the Java API?
        Can user-defined classes be installed in the database?
        Can data be accessed using Java?
        Can the same classes be used on the client and the server?
        How to use Java classes in SQL
        Where can information about Java in the database be found?
        What you cannot do with Java in the database
    Managing the Java Environment
      Components of the Java environment
        The JVM pluggable component
        Pluggable component adapter JVM (PCA/JVM)
        Pluggable component interface (PCI) and the PCI Bridge
        The PCI memory pool
        The sybpcidb database
        How configuration values are organized in sybpcidb
      When to change configuration values
        Server-level options
        Configuration options for the PCI Bridge
        Configuration options for the PCA/JVM
      Changing configuration values in a running server
        Changing configuration values by restarting Adaptive Server
        Changing configuration values before the JVM is initialized
        Changing configuration values after the JVM is initialized
      Restoring default configuration values to sybpcidb
      Using monitor tables to display information about the PCI Bridge
    Preparing for and Maintaining Java in the Database
      The Java runtime environment
        Java classes in the database
          Sybase runtime Java classes
          User-defined Java classes
        JDBC drivers
        The JVM
      Enabling Java
      Installing Java classes in the database
        Using installjava
          Installing uncompressed JARs
          Retaining the JAR file
          Updating installed classes
        Referencing other Java-SQL classes
      Viewing information about installed classes and JARs
      Downloading installed classes and JARs
      Removing classes and JARs
        Retaining classes
    Using Java Classes in SQL
      General concepts
        Java considerations
        Java-SQL names
      Using Java classes as datatypes
        Creating and altering tables with Java-SQL columns
          Altering partitioned tables
        Selecting, inserting, updating, and deleting Java objects
      Invoking Java methods in SQL
        Sample methods
        Exceptions in Java-SQL methods
      Representing Java instances
      Assignment properties of Java-SQL data items
      Datatype mapping between Java and SQL fields
      Character sets for data and identifiers
      Subtypes in Java-SQL data
        Widening conversions
        Narrowing conversions
        Runtime versus compile-time datatypes
      Treatment of nulls in Java-SQL data
        References to fields and methods of null instances
        Null values as arguments to Java-SQL methods
        Null values when using the SQL convert function
      Java-SQL string data
        Zero-length strings
      Type and void methods
        Java void instance methods
        Java void static methods
      Equality and ordering operations
      Evaluation order and Java method calls
        Columns
        Variables and parameters
        Deterministic Java functions in expressions
      Static variables in Java-SQL classes
        Changes for static variables for Adaptive Server 15.0.3 and later
        Changes for static variables for the Cluster Edition
      Java classes in multiple databases
        Scope
        Cross-database references
        Inter-class transfers
        Passing inter-class arguments
        Temporary and work databases
      Java classes
    Data Access Using JDBC
      Overview
      JDBC concepts and terminology
      Differences between client- and server-side JDBC
      Permissions
      Using JDBC to access data
        Overview of the JDBCExamples class
        The main( ) and serverMain( ) methods
          Using main( )
          Using serverMain( )
        Obtaining a JDBC connection: the Connecter( ) method
        Routing the action to other methods: the doAction( ) method
        Executing imperative SQL operations: the doSQL( ) method
        Executing an update statement: the updater( ) method
        Executing a select statement: the selecter( ) method
        Calling a SQL stored procedure: the caller( ) method
      Error handling in the native JDBC driver
      The JDBCExamples class
        The main( ) method
        The serverMain( ) method
        The connecter( ) method
        The doAction( ) method
        The doSQL( ) method
        The updater( ) method
        The selecter( ) method
        The caller( ) method
    SQLJ Functions and Stored Procedures
      Overview
        Compliance with SQLJ Part 1 specifications
        General issues
        Security and permissions
        SQLJ Examples
      Invoking Java methods in Adaptive Server
      Using Sybase Central to manage SQLJ functions and procedures
      SQLJ user-defined functions
        Handling null argument values
          Handling nulls when creating the function
          Handling nulls in the function call
        Deleting a SQLJ function name
      SQLJ stored procedures
        Modifying SQL data
        Using input and output parameters
        Returning result sets
          Deleting a SQLJ stored procedure name
      Viewing information about SQLJ functions and procedures
      Advanced topics
        Mapping Java and SQL datatypes
        Using the command main method
      SQLJ and Sybase implementation: a comparison
      SQLJExamples class
    Debugging Java in the Database
      Supported Java debuggers
      Setting up Java debugging
        Configuring the server to support debugging
        Attaching the remote debugger to the JVM debug agent
    File and Network Access Using Java
      File access using java.io
        User identity and permissions
        Specifying directories for file I/O: UNIX platforms
          Mask syntax
          Examples
        Specifying directories for file I/O: Windows platforms
          Mask syntax
          Examples
        File I/O changes
        Rules for opening existing files
          UNIX platforms
          Windows platforms
        Rules for creating files with a file open operation
        Final file check
      File access using java.net
        Examples
          Using socket classes
          Using the URL classes
    Additional Topics
      JDK requirement for Java classes in the server
      Assignments
        Assignment rules at compile-time
        Assignment rules at runtime
      Allowed conversions
      Transferring Java-SQL objects to clients
      Suggestions for improving performance
        Minimize the number of calls from SQL to the JVM
        Use the java.lang.Thread class with care
        Determine if you are running within the PCA/JVM
        Avoid SQL loops in a multi-engine environment
      Controlling access to native methods in the PCA/JVM
      Unsupported Java API packages, classes, and methods
        Restricted Java packages, classes, and methods
        Unsupported java.sql methods and interfaces
      Invoking SQL from Java
        Special considerations
      Transact-SQL commands from Java methods
      Datatype mapping between Java and SQL
      Java-SQL identifiers
      Java-SQL class and package names
      Java-SQL column declarations
      Java-SQL variable declarations
      Java-SQL column references
      Java-SQL member references
      Java-SQL method calls
    Glossary
  Job Scheduler Users Guide 16.0
  Unified Agent and Agent Management Console Users Guide 2.0.2
    About this book
    Overview
      What is Unified Agent?
      Services provided
      Agent Management Console
    Installing and Configuring Unified Agent and Agent Management Console
      Pre-installation tasks
      Installing Unified Agent
        Starting the JINI server
        Starting and stopping Unified Agent
        Starting Unified Agent as a service on UNIX platforms
        Starting Unified Agent as a service on Windows platforms
        Installing the Agent Management Console
      Configuring Unified Agent
        Post-configuration tasks
    Security
      Unified Agent security
        Encryption
        Authentication
          Login modules
          Security module control flags
        Authorization
        Role mappings
        Permissions
    Agent Management Console Features and Functionality
      Managing look-up services
        Creating a network lookup profile
        Discovering Unified Agents
        Deleting a network look-up profile
        Changing a network look-up profile
        Specifying a network plug-in name filter
      Managing Unified Agents
        Manually adding an agent
        Connecting to an agent
        Adding credentials
        Disconnecting from an agent
        Restarting an agent
        Retrieving the agent log
        Viewing and changing agent properties
      Managing discovery adaptors
        Creating a discovery adaptor
        Deleting a discovery adaptor
        Viewing and changing discovery adaptor properties
        Setting discovery adaptor password
      Managing security modules
        Creating a security module
        Deleting a security module
        Ordering the security module authentication
        Viewing and changing security module properties
        Setting a security module password
      Managing role mappings
        Creating a role mapping
      Managing agent services
        Starting an agent service
        Restarting an agent service
        Stopping an agent service
        Viewing agent service properties
      Managing agent plug-ins
        Loading an agent plug-in
        Unloading an agent plug-in
        Reloading an agent plug-in
        Viewing agent plug-in properties
        Server-based plug-ins
          Pinging the server
          Starting the server
          Restarting the server
          Stopping the server
          Retrieving the server log
      Managing attributes
        Viewing attributes
        Updating attribute values
        Viewing properties and changing permissions
      Managing operations
        Viewing operations
    Password Encryption and Security Configuration
      Password encryption utility
      Enabling Rivest-Shamir-Adleman (RSA) encryption
      Adaptive Server agent plug-in server password encryption
      Pluggable Authentication Module (PAM) configuration
    SNMP Agent Plug-in
      Overview
      Terminology
      Sybase Adaptive Server MIB
      Unified Agent SNMP services and plug-ins
        UAF SNMP Service
        UAF SNMP Service MIBs
      Adaptive Server-to-SNMP client architecture
      Security
        Security for connections from Adaptive Server
        Security for connections from SNMP
      Configuring Adaptive Server for the SNMP Agent Plug-in
      TDS services
      UAF SNMP Agent Service
      Adaptive Server runtime
      Using the Adaptive Server SNMP Agent Plug-in
        Viewing the SNMP information from NET-SNMP
      Sybase MIB
    Tabular Data Stream (TDS) Service
      What is TDS?
      Using the TDS service
      UAF services
        uaf_list_service_operations
        uaf_list_services
        uaf_list_service_operation_arguments
        uaf_invoke_service_operation
        uaf_list_service_attributes
        uaf_get_service_attribute
        uaf_set_service_attribute
      UAF plug-ins
        uaf_list_plugins
        uaf_list_plugin_operations
        uaf_list_plugin_operation_arguments
        uaf_invoke_plugin_operation
        uaf_list_plugin_attributes
        uaf_get_plugin_attribute
        uaf_set_plugin_attribute
      TDS listener client examples
        Setting up examples for the Adaptive Server client
        Examples for configuring the Adaptive Server client
        Examples for using the Adaptive Server client
        Examples for configuring the Adaptive Server client
      Reporting functionality and error recovery
  Using Backup Server with IBM Tivoli Storage Manager 16.0
  Using SAP Failover in a High Availability System 16.0
  Web Services Users Guide 15.7 ESD #2
    Understanding Adaptive Server Enterprise Web Services
      Overview
      Adaptive Server Enterprise Web Services
      Advantages of ASE Web Services
        Stored procedures and functions
        SQL
        Security
        LDAP
        User-defined Web services
      Web services standards
        XML
          Example
          XML document structure
        WSDL
        SOAP
          SOAP message structure
    Understanding the ASE Web Services Engine
      Producer of Web services
        Producer components
        Producer Web methods
        User-defined Web services
      Consumer of Web services
        Consumer components
          SDS server
          SOAP stack
        Proxy tables
      Web Services engine as a consumer versus producer
    Installing and Configuring ASE Web Services
      Installing Web Services
      Configuring Web Services
        Configuring during installation
        Configuring after installation
      Licensing
      Configuration files
      Security
        Configuring SSL
        Installing a certificate for Microsoft .NET
    Using ASE Web Services
      Using the ASE Web Services Engine
        Starting and stopping the ASE Web Services Engine
          Conditions
          Verification
        ASE Web Services methods
          execute
          login
          logout
        Using sp_webservices
          add
          help
          list
          modify
          remove
        Invoking a Web service
      Using user-defined Web services
        Commands for user-defined Web services
          create service
          drop service
        Using sp_webservices with user-defined Web services
          addalias
          deploy
          dropalias
          listudws
          listalias
          undeploy
        Security for user-defined Web services
        Auditing for user-defined Web services
          Auditing sp_webservices ā€˜deploy’
          Auditing sp_webservices ā€˜undeploy’
      ASE Web Services logging
        Rolling over log files
      Using Sybase Central
    Sample Applications
      Apache sample client
        Creating the sample client
        Using runexecute
      Microsoft .NET sample client
        Creating the sample client
        Using Execute.exe
    Troubleshooting
      Troubleshooting issues
        Remote server class definition setting
        Unmapped RPC/encoded Web method
        Truncated document/literal results
        Starting ASE Web Services Engine
        Locating WSDL
        Specifying entries in ws.properties
        Windows NT command-line arguments
        Run or stop scripts fail
        Null passwords
        Specifying SOAP endpoints with SSL
        Abnormal termination of sp_webservices ā€˜add’
        Web Services proxy table restrictions
        sysattributes table entry
      Diagnostic tools
        Detailed logging
        Enabling JDBC-level tracing
      Messages
    Installation Contents
      ASE Web Services directory tree
    Configuration Properties
      ws.properties
      myres.properties
      Specifying properties file entries
    SOAP and Adaptive Server Enterprise Datatype Mapping
      Datatype mapping
        SOAP-to-ASE datatype mappings
        ASE-to-SOAP datatype mappings for the create service command
    Glossary
  XA Interface Integration Guide for CICS, Encina, and TUXEDO 15.7
    The Sybase XA Environment
      Definitions
      Overview of the X/Open DTP model
        Components of the model
        How the components communicate
        How the components interact
        Recovery
      The Sybase XA environment
        Components of the Sybase XA environment
      Connections in the Sybase XA environment
        Identifying connections via LRMs
          Where is the connection information stored?
        Establishing connections
        Distributing work across LRMs
    Configuring the XA Environment
      Configuring Adaptive Server
      Open string parameters for the DTM XA Interface
        Open string parameters
        dtm_tm_role required for username
        Log file and trace flag parameters
          Labels for logfile entries
        xa_open() function behavior
      XA configuration file for DTM XA Interface
        Environment variable for specifying the configuration file
        [all] section for defining common LRM parameters
          Parameter definitions for [all] section
        Editing the XA configuration file
        Additional capabilities, properties, and options
      Using the DTM XA Interface with CICS
        Building the switch-load file
          Compiling the switch-load file on IBM RISC System/6000 AIX
          Compiling the switch-load file on HP9000 Series 800 HP-UX
          Compiling the switch-load file on Sun Solaris 2.x (SPARC)
        Adding a Sybase stanza to the CICS region XAD definition
      Using the DTM XA Interface with Encina
        Assigning an open string with monadmin create rm
        Initializing LRMs with mon_RegisterRmi
        Linking applications with DTM XA Interface libraries
        Establishing connections
      Using the DTM XA Interface with TUXEDO
        Linking
        Setting up the UBBCONFIG file
        Creating the TUXEDO configuration file
        Building the TMS
      Building the COBOL runtime environment
    Application Programming Guidelines
      X/Open DTP versus traditional Sybase transaction processing
      Managing transactions and connections
        Managing transactions
        Managing connections
        The current connection
        Nontransactional connections
      Deallocating cursor function with Client-Library
      Dynamic SQL
      Obtaining a Client-Library connection handle
      Multiple-thread environment issues
        Caveats of thread use
        Embedded SQL thread-safe code
        Tightly coupled transactions
      Linking with CT Library
      Sample embedded SQL COBOL fragment
      Sample embedded SQL C fragment
  XML Services 15.7
    Introduction to XML Services
      XML capabilities
      Overview
        XML in the database
        A sample XML document
          HTML display of Order data
        XML document types
    XML Query Functions
      XML query functions
        Example sections
      xmlextract
      xmltest
      xmlparse
      xmlrepresentation
      xmlvalidate
      option_strings: general format
        Option values for query functions.
    XML Language and XML Query Language
      Character set support
      URI support
      Namespace support
      XML schema support
      Predefined entities in XML documents
      Predefined entities in XPath queries
      White space
      Empty elements
      XML Query Language
        XPath-supported syntax and tokens
        XPath operators
          XPath basic operators
          XPath set operators
          XPath comparison operators
        XPath functions
          General guidelines and examples
          Functions
      Parenthesized expressions
        Parentheses and subscripts
        Parentheses and unions
    for xml Mapping Function
      for xml clause
        for xml subqueries
        for xml schema and for xml all
    XML Mappings
      SQLX options
        SQLX option definitions
      SQLX data mapping
        Mapping duplicate column names and unnamed columns
        Mapping SQL names to XML names
        Mapping SQL values to XML values
          Numeric values
          Character values
          Binary values
    XML Support for I18N
      Overview
        Unicode datatypes
        Surrogate pairs
        Numeric character representation
        Client-server conversions
        Character sets and XML data
      I18N in for xml
        Option strings
        Numeric Character Representation in for xml
        header option
        Exceptions
        Examples
          Example 1
          Example 2
          Example 3
          Example 4
          Example 5
          Example 6
          Example 7
      I18N in xmlparse
        Options
          Sort ordering in xmlparse
      I18N in xmlextract
        NCR option
        Sort ordering in xmlextract
        Sort ordering in XML Services
      I18n in xmlvalidate
        NCR option
    xmltable()
      Introduction
      xmltable and derived table syntax
      xmltable
    The sample_docs Example Table
      sample_docs table columns and rows
        Sample_docs table columns
        sample_docs table rows
      sample_docs tables
        Table script (for publishers table)
      Publishers table representation
      Titles table representation
    XML Services and External File System Access
      Getting Started
        Enabling XML services and External File System Access
        Character set conversions with external file systems
        Examples
        Setting up your XML documents and creating the proxy table
        Example: extracting the book title from the XML documents
        Example: importing XML documents or XML query results to an Adaptive Server table
        Example: storing parsed XML documents in the file system
        Example: 'xmlerror' option capabilities with External File Access
        Example: specifying the 'xmlerror=message’ option in xmlextract
        Example: parsing XML and non-XML documents with the 'xmlerror=message' option
        Example: using the option 'xmlerror=null' for non-XML documents
    Migrating Between the Java-based XQL Processor and the Native XML Processor
      Introduction
      Migrating documents and queries
        Migrating documents between the Java-based XQL processor and the native XML processor
        Migrating text documents between the Java-based XQL processor and the native XML processor
        Migrating documents from regenerated copies
        Regenerating text documents from the Java-based XQL processor
        Regenerating text documents from the native XML processor
        Migrating queries between the native XML processor and the Java-based XQL processor
    Sample Application for xmltable()
      Sample table
      Using the depts document
        The depts document structure
        Creating SQL tables from the depts document
          Normalizing the data from the depts document
          Generating tables using select
SAP Adaptive Server Enterprise 16.0 (Japanese)
  New Features Summary SAP Adaptive Server Enterprise 16.0 (Japanese)
  New Features Guide SAP Adaptive Server Enterprise 16.0 (Japanese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX (Japanese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX (Japanese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux (Japanese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Solaris (Japanese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows (Japanese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX (Japanese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX (Japanese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux (Japanese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris (Japanese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows (Japanese)
  Security Administration Guide SAP Adaptive Server Enterprise 16.0 (Japanese)
  Utility Guide SAP Adaptive Server Enterprise 16.0 (Japanese)
  New Features Bulletin Open Server 15.7 and SDK 15.7 for Windows, Linux, and UNIX (Japanese)
  Users Guide Adaptive Server Enterprise ADO.NET Data Provider (Japanese)
  Users Guide Adaptive Server Enterprise ODBC Driver by Sybase for Microsoft Windows and UNIX (Japanese)
  Programmers Guide Adaptive Server Enterprise Extension Module for Python (Japanese)
  Programmers Guide Adaptive Server Enterprise Database Driver for Perl (Japanese)
  Programmers Guide Adaptive Server Enterprise Database Driver for PHP (Japanese)
  Programmers Reference jConnect for JDBC 7.07 SP100 (Japanese)
  SAP Control Center Release Bulletin (Japanese)
  SAP Control Center for Adaptive Server Enterprise (Japanese)
  New Features Summary SAP Adaptive Server Enterprise 16.0 (Japanese)
  New Features Guide SAP Adaptive Server Enterprise 16.0 (Japanese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX (Japanese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX (Japanese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux (Japanese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Solaris (Japanese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows (Japanese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX (Japanese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX (Japanese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux (Japanese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris (Japanese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows (Japanese)
  Security Administration Guide SAP Adaptive Server Enterprise 16.0 (Japanese)
  Utility Guide SAP Adaptive Server Enterprise 16.0 (Japanese)
  New Features Bulletin Open Server 15.7 and SDK 15.7 for Windows, Linux, and UNIX (Japanese)
  Users Guide Adaptive Server Enterprise ADO.NET Data Provider (Japanese)
  Users Guide Adaptive Server Enterprise ODBC Driver by Sybase for Microsoft Windows and UNIX (Japanese)
  Programmers Guide Adaptive Server Enterprise Extension Module for Python (Japanese)
  Programmers Guide Adaptive Server Enterprise Database Driver for Perl (Japanese)
  Programmers Guide Adaptive Server Enterprise Database Driver for PHP (Japanese)
  Programmers Reference jConnect for JDBC 7.07 SP100 (Japanese)
  SAP Control Center Release Bulletin (Japanese)
  SAP Control Center for Adaptive Server Enterprise (Japanese)
SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
  New Features Summary SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
  New Features Guide SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX (Simplified Chinese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX (Simplified Chinese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux (Simplified Chinese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Solaris (Simplified Chinese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows (Simplified Chinese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX (Simplified Chinese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX (Simplified Chinese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux (Simplified Chinese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris (Simplified Chinese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows (Simplified Chinese)
  Security Administration Guide SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
  Utility Guide SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
  New Features Bulletin Open Server 15.7 and SDK 15.7 for Windows, Linux, and UNIX (Simplified Chinese)
  Programmers Guide Adaptive Server Enterprise Extension Module for Python (Simplified Chinese)
  Programmers Guide Adaptive Server Enterprise Database Driver for Perl (Simplified Chinese)
  Programmers Guide Adaptive Server Enterprise Database Driver for PHP (Simplified Chinese)
  Programmers Reference jConnect for JDBC 7.07 SP100 (Simplified Chinese)
  SAP Control Center Release Bulletin (Simpiified Chinese)
  SAP Control Center for Adaptive Server Enterprise (Simplified Chinese)
  New Features Summary SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
  New Features Guide SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX (Simplified Chinese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX (Simplified Chinese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux (Simplified Chinese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Solaris (Simplified Chinese)
  Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows (Simplified Chinese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX (Simplified Chinese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX (Simplified Chinese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux (Simplified Chinese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris (Simplified Chinese)
  Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows (Simplified Chinese)
  Security Administration Guide SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
  Utility Guide SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
  New Features Bulletin Open Server 15.7 and SDK 15.7 for Windows, Linux, and UNIX (Simplified Chinese)
  Programmers Guide Adaptive Server Enterprise Extension Module for Python (Simplified Chinese)
  Programmers Guide Adaptive Server Enterprise Database Driver for Perl (Simplified Chinese)
  Programmers Guide Adaptive Server Enterprise Database Driver for PHP (Simplified Chinese)
  Programmers Reference jConnect for JDBC 7.07 SP100 (Simplified Chinese)
  SAP Control Center Release Bulletin (Simpiified Chinese)
  SAP Control Center for Adaptive Server Enterprise (Simplified Chinese)
Adaptive Server Enterprise 15.7 SP121
  New Features Guide
    Certicom Replacement
    Reducing load database Time
    Cyclic Redundancy Checks for dump database
    SAP JVM Support
    Shrink Database Backlink Behavior Change
    Enhanced Checking Functionality for Shrinking Databases
    sp_monitorconfig Permission Changes
    Changes for alter table add | drop partition
    Option to Control Wait Behavior for Uncommitted Inserts
    Support for Remote Dump Host Control
    Support for Parallel Index Creation on Partitioned Table with Empty Partitions
    Dump Commands Support for Mirrored Devices
    Extended Maximum Variable Length of a Datatype
    Diagnostic Enhancements for 'Proc Cache Header' Memory Pool
      Configuration Parameters for Diagnostic Tool
    Changes to System Tables
    Known Issues
    Documentation Updates
  New Features Guide
    Certicom Replacement
    Reducing load database Time
    Cyclic Redundancy Checks for dump database
    SAP JVM Support
    Shrink Database Backlink Behavior Change
    Enhanced Checking Functionality for Shrinking Databases
    sp_monitorconfig Permission Changes
    Changes for alter table add | drop partition
    Option to Control Wait Behavior for Uncommitted Inserts
    Support for Remote Dump Host Control
    Support for Parallel Index Creation on Partitioned Table with Empty Partitions
    Dump Commands Support for Mirrored Devices
    Extended Maximum Variable Length of a Datatype
    Diagnostic Enhancements for 'Proc Cache Header' Memory Pool
      Configuration Parameters for Diagnostic Tool
    Changes to System Tables
    Known Issues
    Documentation Updates
Adaptive Server Enterprise 15.7 SP110
  New Features Guide
    Improved Data-Load Performance
      Data-Load Optimization on Tables with Multiple Indexes
        Viewing Parallel Update Index Queries in showplan
        Viewing Queries with UpdateIndex
      Restrictions
      Downgrade Considerations
      Troubleshoot
    Remote Dump Host Control
    Transaction Log Space Management
      Transaction Log Space
      loginfo
      sp_xact_loginfo
        Automating Transaction Log Management
          Rescue Scenario Use Case
          Monitoring Use Case
          Monitoring and Control Use Case
      Analyzing and Managing Transaction Log Space
        Viewing the Span of a Transaction
        Viewing the Oldest Active Transactions
    Parallel create index with Hash-Based Statistics for High Domains
    EMC PowerPath Device Fencing
    SQL Standard for NULL Concatenation
    Function Nesting in Expressions Increased to 32
    System Changes
      Commands
      System Procedures
      Functions
  New Features Guide
    Improved Data-Load Performance
      Data-Load Optimization on Tables with Multiple Indexes
        Viewing Parallel Update Index Queries in showplan
        Viewing Queries with UpdateIndex
      Restrictions
      Downgrade Considerations
      Troubleshoot
    Remote Dump Host Control
    Transaction Log Space Management
      Transaction Log Space
      loginfo
      sp_xact_loginfo
        Automating Transaction Log Management
          Rescue Scenario Use Case
          Monitoring Use Case
          Monitoring and Control Use Case
      Analyzing and Managing Transaction Log Space
        Viewing the Span of a Transaction
        Viewing the Oldest Active Transactions
    Parallel create index with Hash-Based Statistics for High Domains
    EMC PowerPath Device Fencing
    SQL Standard for NULL Concatenation
    Function Nesting in Expressions Increased to 32
    System Changes
      Commands
      System Procedures
      Functions
Adaptive Server Enterprise 15.7 SP100
  New Features Summary Adaptive Server Enterprise 15.7 SP100
    Version 15.7 SP100
      Adaptive Server 15.7 SP100 Feature and Platform Matrix
      Shrinking Databases
      Enhancements to Backup and Restore
      Aggregating Metrics from Syntactically Similar Queries
      Updates to Precomputed Result Sets
      Improved Data Load Performance
      Incremental Reorganization
      Creating Indexes Without Blocking Access to Data
      Query Plan and Execution Statistics in HTML
      Gathering Hash-Based Statistics with create index
      Query Plan Optimization with Bloom Filters
      Support for Replication by Column Value
      Support for Multiple Scanner Threads
      Sybase Central Adaptive Server Plug-in
      Running Adaptive Server on VMware vSphere
      Support for OData
      Support for NTLM and MIT Kerberos on Windows 64-bit
      Properties Added to Responses File
      Automatic Physical Database Rearrangement
      System Changes for Adaptive Server Version 15.7 SP100
        Commands
        Functions
        System Stored Procedures
        Configuration Parameters
        System Tables
        Utilities
        Monitoring Table Changes
        Permission Changes for Commands and Functions
    Version 15.7 ESD #4
      15.7 ESD #4.2
        Improved Rollback Reporting
      15.7 ESD #4
        Remote Backup Server Maximum Name Length
        Support for Query Plan Pinning
        AF_UNIX Support
        Changes to sp_addthreshold and Roles
        System Changes for Adaptive Server Version 15.7 ESD #4
          Utilities
          Configuration Parameters
    Version 15.7 ESD #3
      sybrestore Utility
      System Changes for Adaptive Server Version 15.7 ESD #3
        Commands
        Functions
        System Stored Procedures
        Monitoring Table Changes
    Version 15.7 ESD #2
      Granular Permissions
      Predicated Privileges
      Deferred Table Creation
      Online Utilities
      Merging and Splitting Partitions
      Maximum Size of Query in the Statement Cache
      Enhancements to show_cached_plan_in_xml
      Fast-Logged Bulk Copy
      Precomputed Result Sets
      Concurrent dump database and dump transaction Commands
      Hash-Based Update Statistics
      Enhancements to dump and load
      alter table drop column without datacopy
      Expanded Maximum Database Size
      User-Defined Optimization Goal
      Shared Query Plans
      Initializing Databases Asynchronously
      In-Row Large Object Compression
      Configuring Shared Memory Dumps
      System Changes for Adaptive Server Version 15.7 ESD #2
        Commands
        Functions
        System Stored Procedures
        Configuration Parameters
        System Tables
        Utilities
        Monitoring Table Changes
    Version 15.7 ESD #1
      Proxy Table Support for In-row LOB Columns
      Support for System Procedures in Replicated Master Database
      Increased Number of Parameters
      Multiple Listeners on Windows
      Windows Supports Adaptive Server High Availability
      New and Changed Configuration Parameters
    Version 15.7
      Application Functionality Configuration Group
      New Adaptive Server Kernel
      Compressing Data in Adaptive Server
      New Security Features
        End-to-End CIS Kerberos Authentication
        Dual Control of Encryption Keys and Unattended Startup
        Securing Logins, Roles, and Password Management Extensions
        Login Profiles
        Employee Lifecycle Management
        External Passwords and Hidden Text
      Abstract Plans in Cached Statements
      Shrink Log Space
      Displaying Currently Set Switches with sysoptions
      Changes for Large Objects
        In-Row Off-Row LOB
        Using Large Object text, unitext, and image Datatypes in Stored Procedures
        Using LOB Locators in Transact-SQL Statements
        Extension to where Clause for Large Objects
      Showing Cached Plans in XML
      Padding a Character Field Using str
      Changes to select for update
      Creating Nonmaterialized, Non-null Columns
      Sharing Inline Defaults
      Retain Monitoring Data
      Analyze Dynamic Parameters
      Monitor Lock Timeouts
      Truncate Trailing Zeros
      Fully Recoverable DDL
      Transfer Rows from Source to Target Table Using merge
      View Statistics and Histograms with sp_showoptstats
      Changes to Cursors
        Release Cursor Locks at Cursor Close
        Enhanced Transaction Support for Cursors
        Monitor Cursor Statements
      Nested select Statement Enhancements
      Changes to Commands and System Procedures in Chained Transaction
      Expanded Variable-Length Rows
      Changes to like Pattern Matching
      Changes to Quoted Identifiers
      Allowing Unicode Noncharacters
      Reduce Query Processing Latency
      The sybdiag Utility
      The Optimizer Diagnostic Utility
      System Changes for Adaptive Server Version 15.7
        Commands
        Functions
        System Stored Procedures
        Configuration Parameters
        System Tables
        Utilities
        Monitoring Table Changes
          New Monitoring Tables
          Changes to Monitoring Tables
        Global Variables
    Version 15.5 Cluster Edition
      Adaptive Server 15.5 Cluster Edition Feature and Platform Matrix
      Multiple simultaneous failover
      Adding space to an archive database
      Distributed transaction management in the shared-disk cluster
      System Changes for Adaptive Server Version 15.5 Cluster Edition
        Changed commands
        Monitoring Tables
        Configuration Parameters
        Functions
    Version 15.5
      Adaptive Server 15.5 Feature and Platform Matrix
      In-Memory and Relaxed-Durability Databases
      Faster Compression for Backups
      Backup Server Support for the IBMĀ® TivoliĀ® Storage Manager
      Deferred Name Resolution for User-Defined Stored Procedures
      FIPS 140-2 Login Password Encryption
      Incremental Data Transfer
      bigdatetime and bigtime Datatypes
      Creating and Managing tempdb Groups
      System Changes for Adaptive Server Version 15.5
        Datatypes
        Functions
        System Stored Procedures
        Commands
        Configuration Parameters
        Monitoring Tables
        System Tables
        Utilities
        Auditing
    Version 15.0.3
      SQL Statement Replication
      Security Enhancements
        LDAPS User Authentication Enhancement
        Automatic LDAP User Authentication and Failback
        Login Mapping of External Authentication
        Using SSL to Specify a Common Name
        Concurrent Kerberos Authentication
      Virtually Hashed Tables
      Huge Pages
      Upgrading During a High Availability Configuration
        Reinstalling System Stored Procedures
      Distributed Transaction Management (DTM)
      Adaptive Server Plug-in Updates
      The Java Interface
      System Changes for Adaptive Server Version 15.0.3
        Functions
        System Stored Procedures
        Commands
        Configuration Parameters
        Monitoring Tables
        System Tables
    Version 15.0.2
      Encrypted Columns
      Archive Database Access
      Finding Slow-Running Queries
      Deferred Compilation
      Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
      Statistical Aggregate Functions
        Standard Deviation and Variance
      Eager and Lazy Aggregation
        Vector and Scalar Aggregation
      Improved Performance for Data Insertion
        Using Asynchronous Writes During a Page Split
        Improving Throughput of tempdb Transactions
        Post-commit Optimization
      Changes to the Query Processor
        Deferred Compilation
        Non-binary Character Set Histogram Interpolation
        Expression Histogramming Selectivity Estimates
      Viewing Current Optimizer Settings
      New Security Features
        PAM Support in 64-bit Adaptive Server on AIX
        Global Login Triggers Set Automatically
        SSL Support
        Improved Password Security
        Auditing Enhancements
          Hiding System Stored Procedure and Command Password Parameters
          Monitoring Failed Login Attempts
        High Availability Considerations
      Installing and Editing Monitoring Tables
      Monitoring Tables for the Statement Cache
      Row-Level Locking for System Tables
      The xmltable() Function
      Relocated Joins
      User-Defined SQL Functions
      instead of Triggers
      System Changes for Adaptive Server Version 15.0.2
        Trace Flags
        Commands
        Changes to the set Command
        Utilities
        System Stored Procedures
        System Tables
        Configuration Parameters
        Functions
        Global Variables
    Version 15.0.1
      Changes to Abstract Plans
        New Query-Level Settings
        Operator Name Alignment for the Abstract Plan and the Optimizer Criteria
        Extending the Optimizer Criteria Set Syntax
      Literal Parameterization
      System Changes for Adaptive Server Version 15.0.1
        Functions
        Configuration Parameters
        Commands
        Monitoring Tables
    Version 15.0
      Partition Support
      Row-Locked System Catalogs
      Query Processor
      Large Identifiers
      Computed Columns
        Differences Between Computed Columns and Function-Based Indexes
        Differences Between Materialized and Not Materialized Computed Columns
      Scrollable Cursors
      unitext Datatype Support
      big int Datatype Support
      Unsigned Integer Datatype Support
      Integer Identity
      Enhancements to XML Services
      Adaptive Server Plug-in Enhancements
      Interactive SQL
      User-Defined Web Services
      Very Large Storage Support
      Automatic Running of update statistics
      SySAM License Management
      Query Processing Metrics (qp Metrics)
      Updates to Abstract Plans
      showplan Changes
      Secure Socket Layer Uses FIPS 140-2
      System Changes for Adaptive Server Version 15.0
        Utilities
        Reserved Words
        Global Variables
        Configuration Parameters
        Functions
        Commands
        System Stored Procedures
        System Tables
        Monitoring Tables
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  New Features Guide Adaptive Server Enterprise 15.7 SP100
    Change in Release Version Number
    Shrinking Databases
      Shrinking a Database
      How Adaptive Server Shrinks the Database
      Shrink Operations on Databases That Contain Text or Image Data
      Restarting Partially Completed Shrink Operations
      Moving Data Before Shrinking the Database
        Restrictions for Moving the Transaction Log
        Locks Held During Data Movement
      Determine the Status of a Shrink Operation
      Upgrading or Downgrading Shrunken Databases
      Restrictions
    Enhancements to Backup and Restore
      Cumulative Dump
        Dump and Load Sequences
        Partially Logged Operations and Cumulative Dumps
        Restrictions
        System Changes Supporting Cumulative Dumps
      Changes to load database
        Apply Source Database Attributes to the Target Database
        Generate SQL for a Different Target Database
        Restore Databases in Tivoli Storage Manager to Different Target Databases
      The sybdumptran Utility
    Aggregating Metrics from Syntactically Similar Queries
    Updates to Precomputed Result Sets
    Improved Data Load Performance
      Enable Data Load Optimization
      Tables with Indexes
      Viewing Queries with bulkInsertRowCount
      Batch Insert Optimization
      Restrictions
    Incremental Reorganization
      Running reorg defrag
      Checking the Reorganization Status
      Clearing reorg defrag Information from sysattributes
      Logging Behavior
      Restrictions
    Creating Indexes Without Blocking Access to Data
    Query Plan and Execution Statistics in HTML
      set statistics Command Options
      Query Plan Tree Structure
      Query Timings
        Thread Usage
        CPU Usage
        Wait Distribution
      Query Text
      Query Detail
      Parallel Query Plan Fragments
      Writing HTML to an External File
    Gathering Hash-Based Statistics with create index
    Query Plan Optimization with Bloom Filters
      Example of showplan Output for Bloom Filters
      Example of Lava Operator Tree for Bloom Filters
      Disabling Bloom Filters
    Adaptive Server Support for Multiple Scanner Threads
    Adaptive Server Support for Replication by Column Value
    Sybase Central Adaptive Server Plug-in
    Running Adaptive Server on VMware vSphere 5.0
      Configure the BIOS Settings
      Configure the Guest Operating System
      CPU Considerations
        Recommendations for Virtual CPUs
        CPU Scheduling
      Memory Considerations
      Resource Management
      Hardware-Assisted Memory Virtualization
      Linux Huge Pages
      Networking
      Storage
    Automatic Physical Database Rearrangement on Load
    Support for OData
      OData Server Architecture
      OData Server Limitations
        Unsupported OData Protocol Features
      Security Considerations for OData Server
      Configuring OData Server
      Setting Up an HTTP Server for OData
      Create an OData Producer Service Model
      OData Server Sample Files
      Starting and Stopping OData Server
    MIT Kerberos and NTLM Security Services
      Using NT Lan Manager Security Services on Windows 64-bit
      Using MIT Kerberos Security Services on Windows 64-bit
    Solaris Asynchronous I/O Performance
    Properties Added to Responses File
    System Changes
      New Functions
        defrag_status
        loginfo
        show_condensed_text
        shrinkdb_status
      Changed Commands
        alter database
        create index
        create materialized view
        create precomputed result set
        dbcc
        dump database
        load database
        reorg
        select
        set
        update statistics
      Procedures
        New System Procedures
          sp_helpdefrag
          sp_dump_info
        Changed System Procedures
          sp_configure
          sp_config_rep_agent
          sp_dboption
          sp_depends
          sp_dump_history
          sp_extrapwdchecks
          sp_helpdb
          sp_helprotect
          sp_listener
          sp_optgoal
          sp_replication_path
          sp_showoptstats
          sp_sjobcreate and sp_sjobmodify
      Tables
        New System Tables
          sysdams
        Changed System Tables
        New Monitoring Tables
          monSysExecutionTime
          monRepCoordinator
          monRepSchemaCache
        Changed Monitoring Tables
      Utilities
        New Utilities
          sybdumptran
            Options for load transaction
        Changed Utilities
      Configuration Parameters
        Changed Configuration Parameters
        New Configuration Parameters
      Permission Changes for Commands and Functions
  Release Bulletin Adaptive Server Enterprise 15.7 SP100 for HP-UX
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
        In-Row LOB Column Replication
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Compressed LOB Column Replication
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server
    Known Issues for Adaptive Server
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise 15.7 SP100 for IBM AIX
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
        In-Row LOB Column Replication
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Compressed LOB Column Replication
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server
    Known Issues for Adaptive Server
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise 15.7 SP100 for Linux
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
        In-Row LOB Column Replication
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Compressed LOB Column Replication
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server
    Known Issues for Adaptive Server
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise 15.7 SP100 for Sun Solaris
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
        In-Row LOB Column Replication
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Compressed LOB Column Replication
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server
    Known Issues for Adaptive Server
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise 15.7 SP100 for Windows
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
        In-Row LOB Column Replication
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Compressed LOB Column Replication
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server
    Known Issues for Adaptive Server
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise 15.7 SP100 for HP-UX
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Memory Requirements
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Minimally Configuring Adaptive Server
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading to Adaptive Server
        Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Downgrading an Adaptive Server That Uses Encryption
      Downgrade Considerations for Adaptive Server with Replicated Databases
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise 15.7 SP100 for IBM AIX
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Making Input/Output Completion Port API Available for Adaptive Server
      Memory Requirements
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Minimally Configuring Adaptive Server
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading to Adaptive Server
        Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Downgrading an Adaptive Server That Uses Encryption
      Downgrade Considerations for Adaptive Server with Replicated Databases
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise 15.7 SP100 for Linux
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Memory Requirements
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Minimally Configuring Adaptive Server
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
      Raw Partitions on Linux
        Choosing a Raw Partition
        Examples for Creating Raw Partitions
        Red Hat Raw Device Administration
        SuSE Raw Device Administration
        Accessing Raw Devices from the Server
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading to Adaptive Server
        Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Downgrading an Adaptive Server That Uses Encryption
      Downgrade Considerations for Adaptive Server with Replicated Databases
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise 15.7 SP100 for Sun Solaris
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Memory Requirements
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Minimally Configuring Adaptive Server
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading to Adaptive Server
        Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Downgrading an Adaptive Server That Uses Encryption
      Downgrade Considerations for Adaptive Server with Replicated Databases
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise 15.7 SP100 for Windows
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Preparing to Install Adaptive Server
        Managing Java in the Database During Installations and Upgrades
    Installing Adaptive Server
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Minimally Configuring Adaptive Server
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Postinstallation Tasks
      Stopping and Starting Services
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
        Adding a Server to the Interfaces File
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading Adaptive Server on Windows
        Testing the Adaptive Server Upgrade
        Manually Upgrading to Adaptive Server
        Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Downgrading an Adaptive Server That Uses Encryption
      Downgrade Considerations for Adaptive Server with Replicated Databases
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Configuration Guide for UNIX 15.7 ESD #2
    About Adaptive Server
      System-Specific Issues
      System User Roles
      Environment Variables
    Adaptive Server Devices and System Databases
      The master Device
      The sybsystemdb Device
      The sysprocsdev Device
      Optional Devices and Databases
        Pluggable Component Interface (PCI) Database
        Sample Databases
        sybsecurity Device and Database
        dbccdb Database
        sybmgmtdb Database
      Using Operating System Files as Database Devices
        The directio Parameter
        The dsync Parameter
      Determine the Size of a Database Device
        Support for Raw Partitions or Files
        Preparation of a Raw Partition Device
          Choosing a Raw Partition
    Client/Server Communication
    About Changing Adaptive Server Configuration
    Languages Other Than US English
    Adaptive Server Specifications
      Database Specifications
      Table Specifications
      Procedure Specifications
      Query Specifications
      Maximum Column Sizes
      Database Requirements for Varying Page Sizes
      Data Limits for Tables According to Page Size
    Start and Stop Servers
      Start Servers
        Server Start-up Parameters
        RUN_server_name File
        Using the startserver Command
      Start Servers When the Operating System Restarts
        Creating a System Restart Script for HP-UX
        Creating a System Restart Script for IBM RS/6000
        Creating a System Restart Script for Sun Solaris and Linux
      Starting XP Server After Initial Installation
      Stop Servers
        Stopping Adaptive Server
        Stopping Backup Server
        Using the kill Command
        Shutdown and Shared Memory Files
    Huge Pages on Linux
    Configure the Operating System
      Verifying Environment Variables
      Using the stty Setting
      Restore Correct Permissions
      File Descriptors and User Connections
        File Descriptors and User Connections for HP-UX
        File Descriptors and User Connections for AIX
        File Descriptors and User Connections for Linux
        File Descriptors and User Connections for Sun Solaris
        Displaying Current Soft and Hard Limits
        Increasing the Soft Limit
        Increasing the Hard Limit
      Enable Asynchronous Disk I/O
        Enabling Asynchronous Disk I/O on Linux
        Enabling Asynchronous Disk I/O on IBM AIX
        Enabling Asynchronous Disk I/O HP-UX
        Enabling Asynchronous I/O for File System Devices
        Enabling Asynchronous I/O for File Systems
      Adjust the Client Connection Timeout Period
        Adjusting the Client Connection Timeout for HP-UX
        Adjusting the Client Connection Timeout for IBM RS/6000
        Adjusting the Client Connection Timeout for Linux
      Check for Hardware Errors
      Monitor the Use of Operating System Resources
        Monitor Operating System Resources for HP-UX
        Monitor Operating System Resources for IBM RS/6000
        Monitor Operating System Resources for Sun Solaris and Linux
      Check Database Integrity
    Configuring New Servers with srvbuild
    Adaptive Server Default Configuration
      Default Settings
    Set Up Communications Across the Network
      How Adaptive Server Determines Which Directory Service Entry to Use
      How a Client Uses Directory Services
      Create a Directory Services Entry
      Supported Directory Drivers
      Contents of the interfaces File
      interfaces File Format
        Components of an interfaces File Entry
      Create a Master interfaces File
        Using dsedit or dscp to Create a Master interfaces File
        Using a Text Editor to Create a Master interfaces File
      Configure the interfaces File for Multiple Networks
        Configuring the Server for Multiple Network Handlers
        Configure Client Connections
          Manage One Network-Independent DSQUERY Name
          Using Different DSQUERY Names
        Configuring for Query Port Backup
      IPv6 Support
        IPv6 Infrastructure
    Troubleshoot
      Troubleshooting when the Server Fails to Start
      Troubleshooting an Error when Executing an ESP
    Use the Lightweight Directory Access Protocol as a Directory Service
      LDAP Directory Services Versus the Sybase Interfaces File
      The libtcl*.cfg File
      Enabling LDAP Directory Services
      Keywords for the LDAP URL Variables
      Adding a Server to the Directory Services
      Multiple Directory Services
      Encrypting the Password
      Performance
      Migrating from the interfaces File to LDAP
    Localization Support
      Language Modules
      Default Character Sets
      Supported Character Sets
        Arabic Character Sets
        Baltic Character Set
        Simplified Chinese Character Sets
        Traditional Chinese Character Set
        Cyrillic Character Sets
        Eastern European Character Sets
        Greek Character Sets
        Hebrew Character Sets
        Japanese Character Sets
        Korean Character Set
        Thai Character Sets
        Turkish Character Sets
        Unicode Character Set
        Vietnamese Character Set
        Western European Character Sets
      Character Set Names
      Load Character Sets
      Language Definition Files Sort Order
      Character Set Conversion
        Conversions Between Server and Client
      Sort Orders
        Available Sort Orders for Character Sets
      Language Modules
        Installing a New Language Module
        Message Languages
      Localization Directories
        About the locales Directory
        About the charsets Directory
        Format of locales.dat File Entries
        How Client Applications Use locales.dat
      Changing Adaptive Server Localization Configuration
        Configuring Adaptive Server for Other Character Sets
        Editing the locales.dat File
        Changing Backup Server Localization Configuration
    Adaptive Server Error Logging
      Set Error Log Paths
        Set the Adaptive Server Error Log Path
      Manage Messages
        Log User-Defined Messages
        Log Auditing Events
    Manage Database Devices
      Device Requirements
      Create Files for Database Devices
    Database Management System Auditing
      Audit System Devices and Databases
      Install Auditing
        Preinstallation Recommendations for Auditing Devices
        Configuring Adaptive Server for Auditing
        Creating a Device for the Audit Database Transaction Log
        Enabling Auditing
        Deleting a Device Entry
        Changing a Device Entry
    Install Online Help for Transact-SQL Syntax
      Default Device for the sybsyntax Database
      Installing sybsyntax
  Configuration Guide for Windows 15.7 ESD #2
    About Adaptive Server
      System-Specific Issues
      User Roles
      Environment Variables
    Adaptive Server Devices and System Databases
      The master Device
      The sybsystemdb Device
      The sysprocsdev Device
      Optional Devices and Databases
        Pluggable Component Interface (PCI) Database
        Sample Databases
        sybsecurity Device and Database
        dbccdb Database
      Using Operating System Files as Database Devices
        The dsync Parameter
        The directio Parameter
    Client/Server Communication
    About Changing Adaptive Server Configurations
    Languages Other Than US English
    Adaptive Server Specifications
      Database Specifications
      Table Specifications
      Query Specifications
      Procedure Specifications
      Extended-Limit Capabilities
    Start and Stop Servers
      Server Start-up Parameters
        Specifying Additional Start-up Parameters
      Starting and Stopping Servers Using Unified Agent
      Start and Stop Servers Using the Control Panel
        Starting Servers as an Automatic Service
          Setting Up Adaptive Server as an Automatic Service
        Starting, Stopping, and Pausing Servers Manually
      Stopping Backup Server
      Stopping Adaptive Server
    Monitor Servers
      Monitoring Servers with the Control Panel
    Adaptive Server Configurations
      Default Adaptive Server Configuration
        Default Adaptive Server Parameter Settings
        Default Backup and XP Server Settings
      Change Adaptive Server Configurations
        Starting Server Config
        Configuring Adaptive Server
          Setting Adaptive Server Parameters
          Changing the Default Backup Server
          Changing the Default XP Server
        Configuring Backup Server
        Configuring Job Scheduler and Self Management
    Network Communications Using sql.ini
      Client Connections to Adaptive Server
      Determine the Address to Listen for Client Connections
      Client Access to Adaptive Server
        Enabling Client Access to a Server
        Changing the Server Entries in sql.ini
      Components in the sql.ini File
        Server Name
        Network Driver
        Service Type
        Server Address
          Address Format
          IP Address
          Named Pipes Format
          Windows Sockets Format
            Increasing Windows Sockets Connections
              Modifying an Existing TcpNumConnections Value
              Adding a TcpNumConnections Value
            Using Multiple TCP/IP Network Interface Cards
            Controlling the Connection Timeout
              Increasing the TcpKeepTries Value
          NWLink IPX/SPX Format
            Available NWLink IPX/SPX Connection Formats
            Selecting Valid Connection Formats
      Share Network Configuration Information
        Creating a Master sql.ini File
        Windows Registry as a Directory Service
          Using Windows Registry as a Directory Service
      Verify Server Connections
      Configure ODBC Connections
        Configuring the ODBC Driver
      IPv6 Support
        IPv6 Infrastructure
    Lightweight Directory Access Protocol in Adaptive Server
      LDAP Directory Services versus the Sybase Interfaces File
      The libtcl.cfg File
      Enabling LDAP Directory Services
      Adding a Server to the Directory Services
        Adding a Server Entry to the Directory Service Using dsedit
      Multiple Directory Services
      Encrypting the Password
      Performance with LDAP
      Migrating from the sql.ini File to LDAP
    Localization Support
      Language Modules
      Default Character Sets for Servers
        Changing the Default Character Set for Servers
      Supported Character Sets
        Arabic Character Sets
        Baltic Character Set
        Simplified Chinese Character Sets
        Traditional Chinese Character Set
        Cyrillic Character Sets
        Eastern European Character Sets
        Greek Character Sets
        Hebrew Character Sets
        Japanese Character Sets
        Korean Character Set
        Thai Character Sets
        Turkish Character Sets
        Unicode Character Set
        Vietnamese Character Set
        Western European Character Sets
      Character Set Conversion
        Conversions Between Server and Client
      Sort Orders
        Available Sort Orders
      Language Modules
        Installing a New Language Module
        Message Languages
      Localization
        Localization Directories
        charsets and locales Directories
          Format of locales.dat File Entries
          Client Application Use of locales.dat
          Editing the locales.dat File
      Changing Adaptive Server and Backup Server Localization Configuration
        Completing Adaptive Server Localization Changes
        Completing Backup Server Localization Changes
        Configuring Adaptive Server for Other Character Sets
      Language-Specific Sort Orders
      Sybase Character Set Names
      charset Utility
    Log Error Messages and Events
      Adaptive Server Error Logging
      Windows Event Logging
        Setting Up Windows Event Logging
        Enable and Disable Windows Event Logging
          Enabling or Disabling Event Logging Using Server Config Utility
          Enabling or Disabling Event Logging Using sp_configure
        Windows Event Log Information
      Manage Logs
      Set Error Log Paths
        Setting the Adaptive Server Error Log Path
        Setting the Backup Server Error Log Path
      Manage Messages
        Log User-Defined Messages
          New Messages
          Existing Messages
        Log Auditing Events
        Log User-Defined Events
      Using a Remote Log
      Central Logging Site
        Log Messages from Multiple Adaptive Servers
        Set Up a Local Central Logging Site
          Creating a Registry key
          Defining a Registry Key
      View Messages
        Viewing Messages in the Windows Event Log
        Viewing Messages in the Adaptive Server Error Log
    Security Services with Windows LAN Manager
      How Login Authentication Works
      Administering Security Services Using LAN Manager
      Modify Configuration Files Required for a Unified Login
        Set Up Drivers for Network-Based Security
          Entries for Network Drivers
          Entries for Directory Services
          Entries for Security Drivers
            Editing the libtcl.cfg File
        Checking the LAN Manager's Local Name
        Specifying Security Information for Adaptive Server
      Identify Users and Servers to LAN Manager
      Configure Adaptive Server for LAN Manager Security
        Enabling and Disabling External Security Services
        Manage Unified Login
          Requiring Unified Login
          Establishing a Secure Default Login
          Map LAN Manager Login Names to Server Names
        Data Integrity Check
        Ensure Adequate Memory for Security Services
      Add Logins to Support Unified Login
        Adding Logins
      Define the Connection to a Server for Security Services
        Specifying the Principal Name
        Specifying Network-Based User Authentication
        Specifying the Name Assigned to LAN Manager
      Determining the Status of Security Services
      Configuration Parameters Used in Security Services
        Data Integrity Check
        Message Sequence Check
        Detect Interception or Replay
        Specify a Login
        Control User Authentication
      Manage Login Security on an Windows Computer
        Adaptive Server Security
        Combined Adaptive Server and Windows Login Security
          Trusted Connections and Combined Login Security
        Login Security Modes
          Standard Mode
          Integrated Mode
          Mixed Mode
        Manage the Login Security Features
          Permit Trusted Connections
          Windows Registry Parameters
            Default Login
            Default Domain
            SetHostName
            Character Mappings
            Modify the Parameter Values
        Administer Login Security Using System Procedures
          Assigning Trusted Connection Permissions
          Display the Current Registry Values
          Display Permissions and User Names
          Revoke Permissions Granted with sp_grantlogin
        Configuring Login Security
          Creating Windows Users and Groups
          Configuring Mapping and Default Domain Values
          Setting Login Security Mode
          Adding Network Login Names to syslogins
          Assigning Roles
        Change Login Security Options
          Enabling Standard Login Security Mode
          Enabling Integrated or Mixed Login Security Mode
    E-mail Messages and Adaptive Server
      Sybmail Messages
        Send Messages
        Receive Messages
      Preparing Windows Mail for Sybmail
        Connecting to a Post Office
        Creating a Mailbox for Adaptive Server
        Creating a Mail Profile for Adaptive Server
      Create an Adaptive Server Login for Sybmail
      Configuring Sybmail and Extended Stored Procedures
      Manage a Mail Session
        Start a Mail Session
          Start Sybmail Without Parameters
        Stop a Mail Session
        Stored and Extended Procedures for Handling Messages
      Outgoing Messages
      Incoming Messages
        Find the Next Message
        Read a Specific Message
        Delete a Message
        Processing Incoming Mail
      Sybmail Security
        Set Execution Privileges
        Set the Execution Context
          Name Both the User and the Database
          Name the User But Not the Database
          Name the Database But Not the User
          Name Neither the User Nor the Database
    Manage Adaptive Server Databases
      Manage Database Devices
        Device Requirements
        Creating .dat Files for Database Devices
      Back Up and Restore Data
        Backing Up Data with a Tape Drive
          Windows Tape Drive Names
          Set the Maximum Capacity for a Tape Drive
        Backing Up Data Using a Hard Disk
        Dumping Across a Network
        Examples of Backing Up and Restoring User Databases
          Back Up and Restore to a Database and Device
          Back Up and Restore on a Remote Backup Server
          Backup File Names
          Additional Dump Devices
          Tape Handling Options
          Get Information About Files
        Backing Up and Restoring System Databases
      Optimize Adaptive Server Performance and Tuning
        Using Dedicated Adaptive Server Operation
        Disk Drives and Adaptive Server Performance
          Monitor Disk Usage
      Monitoring Adaptive Server Statistics
    Database Management System Auditing
      Audit System Devices and Databases
      Preinstallation for Auditing Devices
      Installing Auditing
    Install Online Help for Transact-SQL Syntax
      Default Device for the sybsyntax Database
      Installing sybsyntax
    Troubleshoot Network Connections
      Running Server Ping
      Troubleshoot Connection Failures
        Using Returned Messages to Diagnose a Failure
          Troubleshooting a Connection Failure to Adaptive Server
          Failure to Load Net-Library DLLs
        Troubleshooting Failure of Other Applications
          Before Calling Sybase Technical Support
    Adaptive Server Registry Keys
      \SOFTWARE\SYBASE\Server\server_name
      \SOFTWARE\SYBASE\SQLServer\server_name\parameter
      \SOFTWARE\SYBASE\SQLServer
      \SYSTEM\CurrentControlSet\Services\SYBSQL_server_name
  Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for HP-UX
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
      Unsupported Features and Utilities
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server Cluster Edition
    Known Plug-In Issues for Adaptive Server Cluster Edition
    Known Issues for Adaptive Server Cluster Edition
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for IBM AIX
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
      Unsupported Features and Utilities
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server Cluster Edition
    Known Plug-In Issues for Adaptive Server Cluster Edition
    Known Issues for Adaptive Server Cluster Edition
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Linux
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
      Unsupported Features and Utilities
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server Cluster Edition
    Known Plug-In Issues for Adaptive Server Cluster Edition
    Known Issues for Adaptive Server Cluster Edition
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Sun Solaris
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
      Unsupported Features and Utilities
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server Cluster Edition
    Known Plug-In Issues for Adaptive Server Cluster Edition
    Known Issues for Adaptive Server Cluster Edition
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for HP-UX
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Cluster Edition System Requirements for Using Private Interconnect Technology
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Creating and Starting the Cluster
      Differences Between Private and Shared Installations
      Cluster Edition Preinstallation Checklist
        Creating a Simulated Cluster on a Single Node
      Before Creating a Cluster
        Creating a Cluster with Storage Foundation for Sybase Cluster Edition
        Worksheet for Creating a Cluster
        Create a Cluster Using sybcluster
          Configuring the Cluster Using sybcluster
          Starting and Stopping a Cluster Using sybcluster
          Verifying the Cluster Configuration
      Starting the Cluster When the Operating System Starts
      Cleaning Up After a Failed Cluster Installation
      Auxiliary Servers
        Configuring Backup Server Using sybcluster
        Installing Job Scheduler
        Configuring XP Server Using sybcluster
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Creating a Test Environment
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
      I/O Fencing
        Preparing to Set Up I/O Fencing
        Enabling I/O Fencing
      Manual Cluster Setup and Management
        Setting the Environment
        Raw Devices
        The Cluster Input File
        Manually Configuring the Cluster
          Configuring the Interfaces File
          Building the Master and Quorum Devices
          System Stored Procedures
            Initializing and Creating sybsystemprocs
          Creating Runserver Files
          Setting Up Local System and Temporary Databases
        Automatic Takeover of a Cluster
        Starting the Cluster
          Starting the Cluster After a System Failure
        Postconfiguration Tasks
        Shutting Down the Cluster or the Instance
          Shutting Down an Instance
        Reconfiguring the Cluster
        Enabling sybcluster and Sybase Control Center After a Manual Configuration
          A sybcluster Sample Session Configuration Values
          Sample sybcluster Session
          Configuring the Cluster Using an Input File
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Checking System and Upgrade Requirements
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        The runserver File Location
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Upgrading to a Private Installation
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading from One Version of Adaptive Server Cluster Edition to Another
        Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
          Verifying the Cluster Edition Server for Upgrade
          Upgrading the Cluster Edition Server Using an Input File
          Upgrading the Cluster Edition Server Interactively
          Responding to upgrade server Prompts
        Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Updating JAR and XML Files
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Migrating a Server Configured for High Availability
        Using bcp to Migrate Data
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      If the Cluster Edition Configuration Fails
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Re-running the Cluster Edition Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
        If Lack of Space Prevents an Upgrade
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for IBM AIX
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Making Input/Output Completion Port API Available for Adaptive Server
      Cluster Edition System Requirements for Using Private Interconnect Technology
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Creating and Starting the Cluster
      Differences Between Private and Shared Installations
      Cluster Edition Preinstallation Checklist
        Creating a Simulated Cluster on a Single Node
      Before Creating a Cluster
        Creating a Cluster with Storage Foundation for Sybase Cluster Edition
        Worksheet for Creating a Cluster
        Create a Cluster Using sybcluster
          Configuring the Cluster Using sybcluster
          Starting and Stopping a Cluster Using sybcluster
          Verifying the Cluster Configuration
      Starting the Cluster When the Operating System Starts
      Cleaning Up After a Failed Cluster Installation
      Auxiliary Servers
        Configuring Backup Server Using sybcluster
        Installing Job Scheduler
        Configuring XP Server Using sybcluster
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Creating a Test Environment
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
      I/O Fencing
        Preparing to Set Up I/O Fencing
          Setting Up Raw Disks For Multi-Node Access and I/O Fencing
          I/O Fencing via SCSI-3 PGR
        Enabling I/O Fencing
      Creating Logical Volumes
      Manual Cluster Setup and Management
        Setting the Environment
        Raw Devices
        The Cluster Input File
        Manually Configuring the Cluster
          Configuring the Interfaces File
          Building the Master and Quorum Devices
          System Stored Procedures
            Initializing and Creating sybsystemprocs
          Creating Runserver Files
          Setting Up Local System and Temporary Databases
        Automatic Takeover of a Cluster
        Starting the Cluster
          Starting the Cluster After a System Failure
        Postconfiguration Tasks
        Shutting Down the Cluster or the Instance
          Shutting Down an Instance
        Reconfiguring the Cluster
        Enabling sybcluster and Sybase Control Center After a Manual Configuration
          A sybcluster Sample Session Configuration Values
          Sample sybcluster Session
          Configuring the Cluster Using an Input File
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Checking System and Upgrade Requirements
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        The runserver File Location
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Upgrading to a Private Installation
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading from One Version of Adaptive Server Cluster Edition to Another
        Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
          Verifying the Cluster Edition Server for Upgrade
          Upgrading the Cluster Edition Server Using an Input File
          Upgrading the Cluster Edition Server Interactively
          Responding to upgrade server Prompts
        Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Updating JAR and XML Files
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Migrating a Server Configured for High Availability
        Using bcp to Migrate Data
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      If the Cluster Edition Configuration Fails
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Re-running the Cluster Edition Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
        If Lack of Space Prevents an Upgrade
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Linux
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Cluster Edition System Requirements for Using Private Interconnect Technology
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Installing Adaptive Server as a Shared Versus Private Installation
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Creating and Starting the Cluster
      Differences Between Private and Shared Installations
      Cluster Edition Preinstallation Checklist
        Creating a Simulated Cluster on a Single Node
      Before Creating a Cluster
        Creating a Cluster with Storage Foundation for Sybase Cluster Edition
        Worksheet for Creating a Cluster
        Create a Cluster Using sybcluster
          Configuring the Cluster Using sybcluster
          Starting and Stopping a Cluster Using sybcluster
          Verifying the Cluster Configuration
      Starting the Cluster When the Operating System Starts
      Cleaning Up After a Failed Cluster Installation
      Auxiliary Servers
        Configuring Backup Server Using sybcluster
        Installing Job Scheduler
        Configuring XP Server Using sybcluster
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Creating a Test Environment
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
      I/O Fencing
        Preparing to Set Up I/O Fencing
        Enabling I/O Fencing
      Raw Partitions on Linux
        Choosing a Raw Partition
        Examples for Creating Raw Partitions
        Red Hat Raw Device Administration
        SuSE Raw Device Administration
        Accessing Raw Devices from the Server
      Manual Cluster Setup and Management
        Setting the Environment
        Raw Devices
        The Cluster Input File
        Manually Configuring the Cluster
          Configuring the Interfaces File
          Building the Master and Quorum Devices
          System Stored Procedures
            Initializing and Creating sybsystemprocs
          Creating Runserver Files
          Setting Up Local System and Temporary Databases
        Automatic Takeover of a Cluster
        Starting the Cluster
          Starting the Cluster After a System Failure
        Postconfiguration Tasks
        Shutting Down the Cluster or the Instance
          Shutting Down an Instance
        Reconfiguring the Cluster
        Enabling sybcluster and Sybase Control Center After a Manual Configuration
          A sybcluster Sample Session Configuration Values
          Sample sybcluster Session
          Configuring the Cluster Using an Input File
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Checking System and Upgrade Requirements
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        The runserver File Location
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Upgrading to a Private Installation
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading from One Version of Adaptive Server Cluster Edition to Another
        Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
          Verifying the Cluster Edition Server for Upgrade
          Upgrading the Cluster Edition Server Using an Input File
          Upgrading the Cluster Edition Server Interactively
          Responding to upgrade server Prompts
        Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Updating JAR and XML Files
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Migrating a Server Configured for High Availability
        Using bcp to Migrate Data
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      If the Cluster Edition Configuration Fails
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Re-running the Cluster Edition Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
        If Lack of Space Prevents an Upgrade
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Sun Solaris
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Cluster Edition System Requirements for Using Private Interconnect Technology
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Creating and Starting the Cluster
      Differences Between Private and Shared Installations
      Cluster Edition Preinstallation Checklist
        Creating a Simulated Cluster on a Single Node
      Before Creating a Cluster
        Creating a Cluster with Storage Foundation for Sybase Cluster Edition
        Worksheet for Creating a Cluster
        Create a Cluster Using sybcluster
          Configuring the Cluster Using sybcluster
          Starting and Stopping a Cluster Using sybcluster
          Verifying the Cluster Configuration
      Starting the Cluster When the Operating System Starts
      Cleaning Up After a Failed Cluster Installation
      Auxiliary Servers
        Configuring Backup Server Using sybcluster
        Installing Job Scheduler
        Configuring XP Server Using sybcluster
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Creating a Test Environment
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
      I/O Fencing
        Preparing to Set Up I/O Fencing
        Enabling I/O Fencing
      Manual Cluster Setup and Management
        Setting the Environment
        Raw Devices
        The Cluster Input File
        Manually Configuring the Cluster
          Configuring the Interfaces File
          Building the Master and Quorum Devices
          System Stored Procedures
            Initializing and Creating sybsystemprocs
          Creating Runserver Files
          Setting Up Local System and Temporary Databases
        Automatic Takeover of a Cluster
        Starting the Cluster
          Starting the Cluster After a System Failure
        Postconfiguration Tasks
        Shutting Down the Cluster or the Instance
          Shutting Down an Instance
        Reconfiguring the Cluster
        Enabling sybcluster and Sybase Control Center After a Manual Configuration
          A sybcluster Sample Session Configuration Values
          Sample sybcluster Session
          Configuring the Cluster Using an Input File
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Checking System and Upgrade Requirements
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        The runserver File Location
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Upgrading to a Private Installation
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading from One Version of Adaptive Server Cluster Edition to Another
        Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
          Verifying the Cluster Edition Server for Upgrade
          Upgrading the Cluster Edition Server Using an Input File
          Upgrading the Cluster Edition Server Interactively
          Responding to upgrade server Prompts
        Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Updating JAR and XML Files
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Migrating a Server Configured for High Availability
        Using bcp to Migrate Data
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      If the Cluster Edition Configuration Fails
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Re-running the Cluster Edition Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
        If Lack of Space Prevents an Upgrade
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Utility Guide 15.7 SP100
    Utility Commands Reference
      Threaded Versions of Utilities
      Installation or Configuration Utilities
      Utilities for Languages, Character Sets, and Sort Orders
      Utilities to Start Servers
      Database Creation and Manipulation Utilities
      Utilities to Gather Information
      Tuning Utility
      Utility to Manage a Cluster
      backupserver
      bcp
        Usage for bcp
          Copying Tables with Indexes or Triggers Using bcp
          Using bcp with Compressed Data
      buildmaster
      certauth
        Usage for certauth
          Accomplish Certificate Management Tasks Using Open Source Utility
          Creating a Server Certificate File that Adaptive Server Understands
      certpk12
      certreq
      charset
      cobpre
      cpre
      dataserver
        Usage for dataserver
          Dependencies and Conditions of -b and -w Options
          Potential Issues of Using -f and -w Options Together
      ddlgen
        Usage for ddlgen
          Hiding Passwords in ddlgen
          ddlgen for Encrypted Columns
          Encrypted Columns and Specifying the -XOD Flag in ddlgen
          ddlgen Support for Key Copies
          EKC Encryption Key Copy Filter and ddlgen
          Create Table DDL
      defncopy
      dscp
      dsedit
      extractjava
      installjava
        Usage for installjava
          Cases When Adding New JARs Causes Exceptions
          Updating JARs and Classes
          Locks
      isql
        Usage for isql
          Interactive isql Commands
          isql Session Commands
          Prompt Labels and Double Wildcards in an isql Session
          Command History in isql
      langinstall
      optdiag
        Usage for optdiag
          Byte Ordering and Binary optdiag Files
          optdiag Input Mode
      preupgrade
        Usage for preupgrade
          The preupgrade -D Parameter
      pwdcrypt
      qrmutil
      qptune
      showserver
      sqldbgr
        Usage for sqldbgr
          Error Messages in sqldbgr
      sqlloc
      sqllocres
      sqlsrvr
        Usage for sqlsrvr
          Starting Adaptive Server
          startsrvr Dependencies and Conditions with -b and -w
      sqlupgrade
      sqlupgraderes
      srvbuild
        Usage for srvbuild
          Using LDAP with srvbuild in a 64-bit Environment
      srvbuildres
      startserver
        Usage for startserver
          The runserver File
      sybcluster
      sybdiag
        Usage for sybdiag
          Configuration Options for sybdiag
      sybmigrate
      sybrestore
      sybtsmpasswd
      updatease
      xpserver
    Transferring Data to and from Adaptive Server with bcp
      Methods for Moving Data
        Import and Export Data with bcp
      bcp Modes
      bcp Requirements
        bcp Permissions
        Before You Transfer
      Copy Data to Partitions Using bcp
      Improve bcp Performance
        Fast, Fast-logged, and Slow bcp
          Slow bcp
          Fast bcp
          Fast-logged bcp
          Copying Tables with Indexes
            Locking Scheme and Fast bcp
          Space Requirements for Copying
        Summary of Steps for Fast and Fast-logged bcp
        Bulk Copying Data into Partitioned Tables
          Copying Data Randomly into Partitions
          Monitoring bcp Sessions with dbcc checktable and sp_helpsegment
          Reducing Logging by Increasing Page Allocations
        Using Parallel Bulk Copy to Copy Data into a Specific Partition
          bcp in and Locks
          Parallel Bulk Copy Methods
          Parallel Bulk Copy Syntax
          Using Parallel Bulk Copy on Round-robin Partitioned Tables
          Parallel Bulk Copy and IDENTITY Columns
            Retaining Sort Order
            Specifying the Value of a Table’s IDENTITY Column
      Bulk Copying Encrypted Data
      bcp Options
        Using the Default Formats
          Native Format
          Character Format
        Change Terminators from the Command Line
      Change the Defaults in Interactive bcp
        Respond to bcp Prompts
        File Storage Type
        Prefix Length
        Field length
        Field and Row Terminators
          Choose Terminators
      Format Files
      Examples of Copying Out Data Interactively
      Examples of Copying In Data Interactively
      bcp and Alternate Languages
      Support for Initialization Strings
      bcp and Row-Level Access Rules
      Copy In and Batch Files
        Improve Recoverability
        Batches and Partitioned Tables
      Copy Out and Text and Image Data
      Specify a Network Packet Size
      Copy In and Error Files
      Copy Out and Error Files
      Data Integrity for Defaults, Rules, and Triggers
      How bcp Differs from Other Utilities
    Building Servers Using dataserver
      Building a New Master Device
        Environments When Using dataserver
        Specifying Device and Logical Page Sizes When Building a New Adaptive Server
        Starting an Existing Adaptive Server
        Upgrading to a Server With Larger Page Sizes
        Viewing the Current Server Limits
    Viewing and Editing Server Entries Using dscp
      Starting dscp
        Working with Server Entries
          Adding and Modifying Server Entries
            Adding a Server Entry
            Modifying or Deleting a Server Entry
          Copy Server Entries
          List and View Contents of Server Entries
          Delete Server Entries
        Exiting dscp
    Viewing and Editing Server Entries Using dsedit
      Add, View, and Edit Server Entries
      Using dsedit in UNIX
        Starting dsedit in UNIX
        Open an Editing Session in UNIX
        Modify Server Entries in UNIX
          Adding a New Server Entry in UNIX
          Viewing or Modifying a Server Entry in UNIX
          Add or Edit Network Transport Addresses
            TCP/IP Addresses
            SPX/IPX Addresses
        Copying a Server Entry to Another Interfaces File in UNIX
        Copying Server Entries Within the Current Session
        Copying Server Entries Between Sessions
      Using dsedit in Windows
        Starting dsedit in Windows
        Open an Editing Session in Windows
          Opening a Session in Windows
          Opening Additional Sessions in Windows
          Switching Between Sessions in Windows
        Modify Server Entries in Windows
          Adding a Server Entry
          Modifying a Server Attribute
          Renaming a Server Entry
          Deleting a Server Entry
        Copying server entries within the current session in Windows
        Copying server entries between sessions in Windows
      Troubleshooting dsedit
    Using Interactive isql from the Command Line
      Starting isql
      Stopping isql
      Using Transact-SQL in isql
        Formatting isql Output
        Correcting isql Input
        set Options that Affect Output
      Changing the Command Terminator
      Performance Statistics Interaction with Command Terminator Values
      Input and Output Files
        UNIX command line redirection
    Using Interactive SQL in Graphics Mode
      Starting Interactive SQL
      The Main Interactive SQL Window
        Plan Dialog Tab
      The Interactive SQL Toolbar
      Open Multiple Windows
      Keyboard Shortcuts
      Display Data Using Interactive SQL
      Edit Table Values in Interactive SQL
        Copying Rows from the Interactive SQL Result Set
        Editing Rows from the Interactive SQL Result Set
        Inserting Rows into the Database from the Interactive SQL Result Set
        Deleting Rows from the Database Using Interactive SQL
      SQL Statements in Interactive SQL
        Canceling an Interactive SQL Command
        Combining Multiple Statements
        Looking Up Tables, Columns, and Procedures
        Recall Commands
        Logging Commands
      Configure Interactive SQL
        General Dialog Box
        Result Dialog Box
        Import/Export Dialog Box
        Messages Dialog Tab
        Editor Dialog Box
        Query Editor Dialog Box
      Processing Command Files
        Saving SQL Statements to a File
        Executing Command Files
        Saving, Loading, and Running Command Files
      The SQL Escape Syntax in Interactive SQL
      Interactive SQL Commands
    Interactive sybcluster Commands Reference
      Commands Active Before Connecting to a Cluster
      Commands Active After Connecting to a Cluster
      add backupserver
      add instance
      connect
      create backupserver
      create cluster
      create xpserver
      deploy plugin
      diagnose cluster
      diagnose instance
      disconnect
      drop backupserver
      drop cluster
      drop instance
      drop xpserver
      exit
      help
      localize
      quit
      set backupserver
      set cluster
      set instance
      set xpserver port
      show agents
      show backupserver config
      show cluster
      show instance
      show membership mode
      show session
      show xpserver
      shutdown cluster
      shutdown instance
      start cluster
      start instance
      upgrade server
      use
    Migrating Data Using sybmigrate
      What sybmigrate Does
      What sybmigrate Does Not Do
      Before You Begin
        Permissions
          Changing Target Login Accounts
        Platforms
        Environment Settings
        Migrating Proxy Tables
      Migration process
        Overview of the Migration Process
        Pre-migration Considerations
        Configuration and Tuning for Higher Performance
          Configuration Considerations for Adaptive Server
        Possible Errors to Avoid
        Auto-select Dependent Objects for Migration
        Migrating an Archive Database
          Upgrading an Adaptive Server with an Archive Database
          Downgrading an Adaptive Server with an Archive Database
        GUI mode
          Setting up source databases for migration
          Begin the migration
          Validating the migration
          Migration and Validation Progress
        Resource File Mode
      Using sybmigrate with Encrypted Columns
      Post-migration Activities
      Migrate Databases in the Replication Server Domain
        Preparing for migration
        Postmigration Procedures
          Restoring primary databases
          Restoring the RSSD
          Amending system tables when the logical page size changes
          Restoring Replicate Databases
          Logs
        Migrating Databases That Support Wide Data
      Limitations
        Stopping High Availability
        Other Limitations
      Troubleshooting and Error Messages
    Restoring a Database Using sybrestore
      Noninteractive Mode
      Interactive Mode
      Before You Begin
      Using sybrestore
        Compatibility Geometry Check
        sybrestore Syntax
          Interactive Mode Syntax
          Noninteractive Mode Syntax
      Restoring a Database in Noninteractive Mode
      Restoring a Database in Interactive Mode
        Providing a Mapping Directory
        Restoring a Database Using the Interactive Command Line
          Restoring a database
          Restoring a database to a point in time
        Example of Restore to a Point-in-time
  Transact-SQL Users Guide 15.7
    SQL Building Blocks
      SQL in Adaptive Server
        Queries, data modification, and commands
        Tables, columns, and rows
        Relational operations
        Compiled objects
          Saving or restoring source text
          Verifying and encrypting source text
      Compliance to ANSI standards
        Federal Information Processing Standards (FIPS) flagger
        Chained transactions and isolation levels
        Identifiers
        SQL standard-style comments
        Right truncation of character strings
        Permissions required for update and delete statements
        Arithmetic errors
        Synonymous keywords
        Treatment of nulls
      Naming conventions
        SQL data characters
        SQL language characters
        Identifiers
          Multibyte character sets
          Delimited identifiers
          Uniqueness and qualification conventions
          Remote servers
      Expressions in Adaptive Server
        Arithmetic and character expressions
          Operator precedence
          Arithmetic operators
          Bitwise operators
          The string concatenation operator
          The comparison operators
          Nonstandard operators
          Character expression comparisons
          Empty strings
          Quotation marks
        Relational and logical expressions
          any, all, and in
          and and or
      Transact-SQL extensions
        compute clause
        Control-of-flow language
        Stored procedures
        Extended stored procedures
        Triggers
        Defaults and rules
        Error handling and set options
        Additional Adaptive Server extensions to SQL
      Adaptive Server login accounts
      isql utility
        Default databases
        Network-based security services with isql
      Displaying SQL text
    Queries: Selecting Data from a Table
      Queries
        select syntax
          Checking for identifiers in a select statement
      Choosing columns using the select clause
        Choosing all columns using select *
        Choosing specific columns
        Rearranging the column order
        Renaming columns in query results
        Using expressions
          Quoted strings in column headings
          Character strings in query results
          Computed values in the select list
          Arithmetic operator precedence
        Selecting text, unitext, and image values
          Using readtext
        Select list summary
      Using select for update
        Using select for update in cursors and DML
        Concurrency issues
      Eliminating duplicate query results with distinct
      Specifying tables with the from clause
      Selecting rows using the where clause
        Comparison operators in where clauses
        Ranges (between and not between)
        Lists (in and not in)
      Matching patterns
        Matching character strings: like
          Using not like
          Getting different results using not like and ^
          Using wildcard characters as literal characters
          Interaction of wildcard characters and square brackets
          Using trailing blanks and %
          Using wildcard characters in columns
        ā€œUnknownā€ values: NULL
          Testing a column for null values
          Difference between false and unknown
          Substituting a value for NULLs
          Expressions that evaluate to NULL
          Concatenating strings and NULL
          System-generated NULLs
        Connecting conditions with logical operators
          Logical operator precedence
      Using multiple select items in a nested exists query
      Using a column alias in nested select statements
    Using Aggregates, Grouping, and Sorting
      Using aggregate functions
        Aggregate functions and datatypes
        count vs. count (*)
        Aggregate functions with distinct
        Null values and the aggregate functions
        Using statistical aggregates
          Standard deviation and variance
      Organizing query results into groups: the group by clause
        group by and SQL standards
        Nesting groups with group by
        Referencing other columns in queries using group by
        Expressions and group by
        Using group by in nested aggregates
        Null values and group by
        where clause and group by
        group by and all
        Aggregates without group by
      Selecting groups of data: the having clause
        How the having, group by, and where clauses interact
        Using having without group by
      Sorting query results: the order by clause
        order by and group by
        order by and group by used with select distinct
      Summarizing groups of data: the compute clause
        Row aggregates and compute
          Rules for compute clauses
        Specifying more than one column after compute
        Using more than one compute clause
        Applying an aggregate to more than one column
        Using different aggregates in the same compute clause
        Generating totals: compute without by
      Combining queries: the union operator
        Guidelines for union queries
        Using union with other Transact-SQL commands
    Joins: Retrieving Data from Several Tables
      How joins work
        Join syntax
        Joins and the relational model
      How joins are structured
        The from clause
        The where clause
          Join operators
          Datatypes in join columns
          Joins and text and image columns
      How joins are processed
      Equijoins and natural joins
      Joins with additional conditions
      Joins not based on equality
      Self-joins and correlation names
      The not-equal join
        Not-equal joins and subqueries
      Joining more than two tables
      Outer joins
        Inner and outer tables
        Outer join restrictions
        Views used with outer joins
        ANSI inner and outer joins
          Correlation name and column referencing rules for ANSI joins
          ANSI inner joins
        ANSI outer joins
          Should the predicate be in the on or where clause?
          Nested ANSI outer joins
          Converting outer joins with join-order-dependency
        Transact-SQL outer joins
          Using outer joins and aggregate extended columns
      Relocated joins
        Using relocated joins
        Configuring relocated joins
      How null values affect joins
      Determining which table columns to join
    Subqueries: Using Queries Within Other Queries
      How subqueries work
        Subquery restrictions
        Example of using a subquery
        Qualifying column names
        Subqueries with correlation names
        Multiple levels of nesting
        Using an asterisk in nested select statements
          Using table-name qualifiers
          Using nested queries with group by
          Examples
          Usage
        Subqueries in update, delete, and insert statements
        Subqueries in conditional statements
        Subqueries instead of expressions
      Types of subqueries
        Expression subqueries
          Using scalar aggregate functions to guarantee a single value
          Using group by and having in expression subqueries
          Using distinct with expression subqueries
        Quantified predicate subqueries
          Subqueries with any and all
        Subqueries used with in
        Subqueries used with not in
        Subqueries using not in with NULL
        Subqueries used with exists
        Subqueries used with not exists
        Finding intersection and difference with exists
        Subqueries using SQL derived tables
      Using correlated subqueries
        Correlated subqueries with correlation names
        Correlated subqueries with comparison operators
        Correlated subqueries in a having clause
    Using and Creating Datatypes
      How Transact-SQL datatypes work
      Using system-supplied datatypes
        Exact numeric types: integers
        Exact numeric types: decimal numbers
        Approximate numeric datatypes
        Money datatypes
        Date and time datatypes
        Character datatypes
          unichar datatype
          text datatype
          unitext datatype
        Binary datatypes
          image datatype
        The bit datatype
        The timestamp datatype
        The sysname and longsysname datatype
      Using LOB Locators in Transact-SQL Statements
        Creating a LOB locator
          Explicitly creating a locator
          Implicitly creating a locator
        Converting the locator value to the LOB value
        Locator scope
      Converting between datatypes
      Mixed-mode arithmetic and datatype hierarchy
        Working with money datatypes
        Determining precision and scale
      Creating user-defined datatypes
        Specifying length, precision, and scale
        Specifying null type
        Associating rules and defaults with user-defined datatypes
        Creating user-defined datatype with IDENTITY property
        Creating IDENTITY columns from user-defined datatypes
        Dropping a user-defined datatype
      Getting information about datatypes
    Adding, Changing, Transferring, and Deleting Data
      Referential integrity
      Transactions
      Using the sample databases
      Datatype entry rules
        char, nchar, unichar, univarchar, varchar, nvarchar, unitext, and text
        date and time
          Entering times
          Entering dates
          Searching for dates and times
        binary, varbinary, and image
        money and smallmoney
        float, real, and double precision
        decimal and numeric
        Integer types and their unsigned counterparts
        timestamp
      Adding new data
        Adding new rows with values
        Inserting data into specific columns
          Restricting column data: rules
          Using the NULL character string
          Inserting NULLs into columns that do not allow them
          Adding rows without values in all columns
          Changing a column’s value to NULL
          Adaptive-Server-generated values for IDENTITY columns
          Explicitly inserting data into an IDENTITY column
          Retrieving IDENTITY column values with @@identity
          Reserving a block of IDENTITY column values
          Reaching the IDENTITY column’s maximum value
        Adding new rows with select
          Using computed columns
          Inserting data into some columns
          Inserting data from the same table
      Creating nonmaterialized, non-null columns
        Adding nonmaterialized columns
        Tables that already have nonmaterialized columns
        Nonmaterialized column storage
        Altering nonmaterialized columns
        Limitations
      Changing existing data
        Using the set clause with update
          Assigning variables in the set clause
        Using the where clause with update
        Using the from clause with update
        Performing updates with joins
        Updating IDENTITY columns
      Changing text, unitext, and image data
      Trucating trailing zeros
      Transferring data incrementally
        Marking tables for incremental transfer
        Transferring tables from a destination file
        Converting Adaptive Server datatypes to IQ
        Storing transfer information
        Exceptions and errors
        Sample session for incremental data transfer
          Replacing data with new rows
      Deleting data
        Using the from clause with delete
        Deleting from IDENTITY columns
      Deleting all rows from a table
        truncate table syntax
    Creating Databases and Tables
      Databases and tables
        Enforcing data integrity in databases
        Permissions within databases
      Using and creating databases
        Choosing a database: use
        Creating a user database with create database
          The on clause
          The log on clause
          for load option
        quiesce database command
      Altering the sizes of databases
      Dropping databases
      Creating tables
        Maximum number of columns per table
        Example
        Choosing table names
        Creating tables in different databases
        create table syntax
        Using IDENTITY columns
          Creating IDENTITY columns with user-defined datatypes
          Referencing IDENTITY columns
          Referring to IDENTITY columns with syb_identity
          Automatically creating ā€œhiddenā€ IDENTITY columns
        Allowing null values in a column
          Constraints and rules used with null values
          Defaults and null values
          Nulls require variable-length datatypes
          text, unitext, and image columns
        Using temporary tables
          Ensuring that the temporary table name is unique
          Manipulating temporary tables in stored procedures
          General rules for temporary tables
      Managing identity gaps in tables
        Parameters for controlling identity gaps
        Comparison of identity burning set factor and identity_gap
          Reducing the identity number gap
        Setting the table-specific identity gap
        Changing the table-specific identity gap
        Displaying table-specific identity gap information
        Gaps from other causes
        When table inserts reach IDENTITY column maximum value
      Defining integrity constraints for tables
        Specifying table-level or column-level constraints
        Creating error messages for constraints
        After creating a check constraint
        Specifying default column values
        Specifying unique and primary key constraints
        Specifying referential integrity constraints
          Table-level or column-level referential integrity constraints
          Maximum number of references allowed for a table
          Using create schema for cross-referencing constraints
          General rules for creating referential integrity constraints
        Specifying check constraints
        Designing applications that use referential integrity
      Designing and creating a table
        Making a design sketch
        Creating the user-defined datatypes
        Choosing the columns that accept null values
        Defining the table
      Creating new tables from query results: select into
        Checking for errors
        Using select into with IDENTITY columns
          Selecting an IDENTITY column into a new table
          Selecting the IDENTITY column more than once
          Adding a new IDENTITY column with select into
          Defining a column for which the value must be computed
          IDENTITY columns selected into tables with unions or joins
      Altering existing tables
        Objects using select * do not list changes to table
        Using alter table on remote tables
        Adding columns
          Adding columns appends column IDs
          Adding NOT NULL columns
          Adding constraints
        Dropping columns
          Dropping columns renumbers the column ID
          Dropping constraints
        Modifying columns
          Converting datatypes
          Modifying tables may prevent successful bulk copy of previous dump
          Decreasing column length may truncate data
          Modifying datetime columns
          Modifying the NULL default value of a column
          Modifying columns that have precision or scale
          Modifying text, unitext, and image columns
        Adding, dropping, and modifying IDENTITY columns
          Adding IDENTITY columns
          Dropping IDENTITY columns
          Modifying IDENTITY columns
        Data copying
          Changing exp_row_size
        Modifying locking schemes and table schema
        Altering columns with user-defined datatypes
          Adding a column with user-defined datatypes
          Dropping a column with user-defined datatypes
          Modifying a column with user-defined datatypes
        Errors and warnings from alter table
          Errors and warnings generated by alter table modify
          Scripts generated by if exists()...alter table
        Renaming tables and other objects
          Renaming dependent objects
      Dropping tables
      Computed columns
        Using computed columns
          Computed columns example
        Indexes on computed columns
        Deterministic property
          How does the deterministic property affect computed columns?
          Examples
          How does the deterministic property affect function-based indexes?
      Assigning permissions to users
      Getting information about databases and tables
        Getting help on databases
        Getting help on database objects
          Using sp_help on database objects
          Using sp_helpconstraint to find a table’s constraint information
          Finding out how much space a table uses
          Listing tables, columns, and datatypes
          Finding an object name and ID
    SQL-Derived Tables
      Advantages of SQL-derived tables
        SQL-derived tables and optimization
      SQL-derived table syntax
        Derived column lists
        Correlated SQL-derived tables
      Using SQL-derived tables
        Nesting
        Subqueries using SQL-derived tables
        Unions
        Unions in subqueries
        Renaming columns with SQL-derived tables
        Constant expressions
        Aggregate functions
        Joins with SQL-derived tables
        Creating a table from a SQL-derived table
          Using views with SQL-derived tables
        Correlated attributes
    Partitioning Tables and Indexes
      Upgrading from Adaptive Server 12.5.x and earlier
      Data partitions
      Index partitions
      Partition IDs
      Locks and partitions
      Partitioning types
        Range partitioning
        Hash partitioning
        List partitioning
        Round-robin partitioning
        Composite partitioning keys
        Partition pruning
      Indexes and partitions
        Global indexes
          Global nonclustered index on unpartitioned table
          Global clustered index on unpartitioned table
          Global clustered index on round-robin partitioned table
          Global nonclustered index on partitioned table
        Local indexes
          Local clustered indexes
          Local nonclustered indexes
        Guaranteeing a unique index
      Creating and managing partitions
        Partitioning tasks
        Creating data partitions
          Creating a range-partitioned table
          Creating a hash-partitioned table
          Creating a list-partitioned table
          Creating a round-robin–partitioned table
        Creating partitioned indexes
          Creating global indexes
          Creating local indexes
          Creating clustered indexes on partitioned tables
        Creating a partitioned table from an existing table
      Altering data partitions
        Changing an unpartitioned table to a partitioned table
        Adding partitions to a partitioned table
        Changing the partitioning type
        Changing the partitioning key
        Unpartitioning round-robin–partitioned tables
        Using the partition parameter
        Altering partition-key columns
      Configuring partitions
      Updating, deleting, and inserting in partitioned tables
      Updating values in partition-key columns
      Displaying information about partitions
        Using functions
      Truncating a partition
      Using partitions to load table data
      Updating partition statistics
    Virtually hashed tables
      Structure of a virtually hashed table
      Creating a virtually hashed table
      Limitations for virtually hashed tables
      Commands that support virtually hashed tables
      Query processor support
      Monitor counter support
      System procedure support
    Views: Limiting Access to Data
      How views work
        Advantages of views
          Security
          Logical data independence
        Examples
      Creating views
        create view syntax
        Using the select statement with create view
          View definition with projection
          View definition with a computed column
          View definition with an aggregate or built-in function
          View definition with a join
          Views used with outer joins
          Views derived from other views
          distinct views
          Views that include IDENTITY columns
        Validating a view’s selection criteria
          Views derived from other views
      Retrieving data through views
        View resolution
        Redefining views
        Renaming views
        Altering or dropping underlying objects
      Modifying data through views
        Restrictions on updating views
          Computed columns in a view definition
          group by or compute in a view definition
          NULL values in underlying objects
          Views created using with check option
          Multitable views
          Views with IDENTITY columns
      Dropping views
      Using views as security mechanisms
      Getting information about views
        Using sp_help and sp_helptext to display view information
        Using sp_depends to list dependent objects
        Listing all views in a database
        Finding an object name and ID
    Creating Indexes on Tables
      How indexes work
        Comparing the two ways to create indexes
        Guidelines for using indexes
      Creating indexes
        create index syntax
        Indexing more than one column: composite indexes
        Indexing with function-based indexes
        Using the unique option
        Including IDENTITY columns in nonunique indexes
        Ascending and descending index-column values
        Using fillfactor, max_rows_per_page, and reservepagegap
      Indexes on computed columns
      Function-based indexes
      Using clustered or nonclustered indexes
        Creating clustered indexes on segments
      Specifying index options
        Using the ignore_dup_key option
        Using the ignore_dup_row and allow_dup_row options
        Using the sorted_data option
        Using the on segment_name option
      Dropping indexes
      Determining what indexes exist on a table
      Updating statistics about indexes
    Defining Defaults and Rules for Data
      How defaults and rules work
      Creating defaults
        create default syntax
        Binding defaults
        Unbinding defaults
        How defaults affect NULL values
      Dropping defaults
      Creating rules
        create rule syntax
        Binding rules
          Rules bound to columns
          Rules bound to user-defined datatypes
          Precedence of rules
        Rules and NULL values
        Unbinding rules
      Dropping rules
      Getting information about defaults and rules
      Sharing inline defaults
        Creating an inline shared default
        Unbinding a shared inline default
        Limitations
    Using Batches and Control-of-Flow Language
      Introduction
      Rules associated with batches
        Examples of using batches
        Batches submitted as files
      Using control-of-flow language
        if...else
        case expression
          Using case expression for alternative representation
          case and division by zero
          Using rand functions in case expressions
          case expression results
          case expressions and set ansinull
          case expression requires at least one non-null result
          Determining the result set
          case and value comparisons
          coalesce
          nullif
        begin...end
        while and break...continue
        declare and local variables
        goto
        return
        print
        raiserror
        Creating messages for print and raiserror
        waitfor
        Comments
          Slash-asterisk style comments
          Double-hyphen style comments
      Local variables
        Declaring local variables
        Local variables and select statements
        Local variables and update statements
        Local variables and subqueries
        Local variables and while loops and if…else blocks
        Variables and null values
      Global variables
        Transactions and global variables
          Checking for errors with @@error
          Checking IDENTITY values with @@identity
          Checking the transaction nesting level with @@trancount
          Checking the transaction state with @@transtate
          Checking the nesting level with @@nestlevel
          Checking the status from the last fetch
    Using Transact-SQL Functions in Queries
      Setting up a query
      Built-in functions
        System functions
        String functions
          Concatenating expressions
          Nesting string functions
          Limits on string functions
        Text and image functions
          Using readtext on unitext columns
        Aggregate functions
          Limitations
          Aggregate functions used with the group by clause
          Aggregate functions and null values
          Vector and scalar aggregates
          Aggregate functions as row aggregates
        Statistical aggregate functions
          Formulas for computing standard deviations
        Mathematical functions
        Date functions
        Datatype conversion functions
          Using the convert function for explicit conversions
          Datatype conversion guidelines and constraints
          Changing the date format
          Conversion error handling
        Security functions
        XML functions
      User-created functions
    Using Stored Procedures
      How stored procedures work
        Examples
        Permissions
        Performance
      Creating and executing stored procedures
        Using deferred name resolution
        Parameters
        Default parameters
          Using default parameters in stored procedures
          NULL as the default parameter
          Wildcard characters in the default parameter
        Using more than one parameter
        Using large object text, unitext, and image datatypes in stored procedures
        Procedure groups
        Using with recompile in create procedure
          Using with recompile
        Using with recompile in execute
        Nesting procedures within procedures
        Using temporary tables in stored procedures
        Setting options in stored procedures
          Query optimization settings
          Arguments for stored procedures
          Length of expressions, variables, and arguments
        Executing stored procedures
          Executing procedures after a time delay
          Executing procedures remotely
      Deferred compilation in stored procedures
      Returning information from stored procedures
        Return status
          Reserved return status values
          User-generated return values
        Checking roles in procedures
        Return parameters
          Passing values in parameters
          The output keyword
      Restrictions associated with stored procedures
        Qualifying names inside procedures
      Renaming stored procedures
        Renaming objects referenced by procedures
      Using stored procedures as security mechanisms
      Dropping stored procedures
      System procedures
        Executing system procedures
        Permissions on system procedures
        Types of system procedures
        Other Sybase-supplied procedures
          Catalog stored procedures
          System extended stored procedures
          dbcc procedures
      Getting information about stored procedures
        Getting a report with sp_help
        Viewing the source text of a procedure with sp_helptext
        Identifying dependent objects with sp_depends
          Using sp_depends with deferred_name_resolution
        Identifying permissions with sp_helprotect
    Using Extended Stored Procedures
      Overview
        XP Server
        Dynamic link library support
        Open Server API
        ESPs and permissions
        ESPs and performance
      Creating functions for ESPs
        Files for ESP development
        Open Server data structures
        Open Server return codes
        Outline of a simple ESP function
        ESP function example
        Building the DLL
          Search order for DLLs
          Sample makefile (UNIX)
          Sample definitions file
      Registering ESPs
        Using create procedure
        Using sp_addextendedproc
      Removing ESPs
        Renaming ESPs
      Executing ESPs
      System ESPs
      Getting information about ESPs
      ESP exceptions and messages
    Cursors: Accessing Data
      Selecting rows with cursors
      Sensitivity and scrollability
      Types of cursors
      Cursor scope
      Cursor scans and the cursor result set
      Making cursors updatable
        Determining which columns can be updated
      How processes cursors
      Monitoring cursor statements
      Using declare cursor
        declare cursor examples
      Opening cursors
      Fetching data rows using cursors
        fetch syntax
        Checking cursor status
        Getting multiple rows with each fetch
        Checking the number of rows fetched
      Updating and deleting rows using cursors
        Updating cursor result set rows
        Deleting cursor result set rows
      Closing and deallocating cursors
      Scrollable and forward-only cursor examples
        Forward-only (default) cursors
        Example table for scrollable cursors
        Insensitive scrollable cursors
        Semisensitive scrollable cursors
      Using cursors in stored procedures
      Cursors and locking
        Cursor-locking options
      Enhanced transaction support for updatable cursors
      Getting information about cursors
      Using browse mode instead of cursors
        Browsing a table
        Browse-mode restrictions
        Timestamping a new table for browsing
        Timestamping an existing table
        Comparing timestamp values
    Triggers: Enforcing Referential Integrity
      How triggers work
        Using triggers versus integrity constraints
      Creating triggers
        create trigger syntax
          SQL statements that are not allowed in triggers
      Using triggers to maintain referential integrity
        Testing data modifications against the trigger test tables
        Insert trigger example
        Delete trigger examples
          Cascading delete example
          Restricted delete examples
        Update trigger examples
          Restricted update triggers
          Updating a foreign key
      Multirow considerations
        Insert trigger example using multiple rows
        Delete trigger example using multiple rows
        Update trigger example using multiple rows
        Conditional insert trigger example using multiple rows
      Rolling back triggers
      Global login triggers
      Nesting triggers
        Trigger self-recursion
      Rules associated with triggers
        Triggers and permissions
        Trigger restrictions
        Implicit and explicit null values
        Triggers and performance
        set commands in triggers
        Renaming and triggers
        Trigger tips
      Disabling triggers
      Dropping triggers
      Getting information about triggers
        sp_help
        sp_helptext
        sp_depends
    In-Row Off-Row LOB
      Overview
      Compressing in-row LOB columns
      Migrating off-row LOB data to use in-row storage
        In-row LOB columns and bulk copy
        Examples of methods for migrating existing data
        Guidelines for selecting the in-row LOB length
      Downgrading with tables containing in-row LOB columns
    Using instead of Triggers
      Inserted and deleted logical tables
      Triggers and transactions
      Nesting and recursion
      instead of insert triggers
        Example
      instead of update trigger
      instead of delete trigger
      searched and positioned update and delete
      Getting information about triggers
    Transactions: Maintaining Data Consistency and Recovery
      How transactions work
        Transactions and consistency
        Transactions and recovery
      Using transactions
        Allowing data definition commands in transactions
        System procedures that are not allowed in transactions
        Beginning and committing transactions
        Rolling back and saving transactions
        Checking the state of transactions
        Nested transactions
        Example of a transaction
      Selecting the transaction mode and isolation level
        Choosing a transaction mode
          Transaction modes and nested transactions
          Finding the status of the current transaction mode
        Choosing an isolation level
          Default isolation levels for Adaptive Server and ANSI SQL
          Dirty reads
          Repeatable reads
          Finding the status of the current isolation level
          Changing the isolation level for a query
          Isolation level precedences
          Cursors and isolation levels
          Stored procedures and isolation levels
          Triggers and isolation levels
        Compliance with SQL standards
        Using the lock table command to improve performance
      Using transactions in stored procedures and triggers
        Errors and transaction rollbacks
        Transaction modes and stored procedures
          Running system procedures in chained mode
          Setting transaction modes for stored procedures
      Using cursors in transactions
      Issues to consider when using transactions
      Backup and recovery of transactions
    Locking Commands and Options
      Setting a time limit on waiting for locks
        wait/nowait option of the lock table command
        Setting a session-level lock-wait limit
        Setting a server-wide lock-wait limit
        Information on the number of lock-wait timeouts
      Readpast locking for queue processing
        Incompatible locks during readpast queries
        Allpages-locked tables and readpast queries
        Effects of isolation levels select queries with readpast
          Session-level transaction isolation levels and readpast
          Query-level isolation levels and readpast
        Data modification commands with readpast and isolation levels
        text, unitext, and image columns and readpast
        Readpast-locking examples
    The pubs2 Database
      Tables in the pubs2 database
        publishers table
        authors table
        titles table
        titleauthor table
        salesdetail table
        sales table
        stores table
        roysched table
        discounts table
        blurbs table
        au_pix table
      Diagram of the pubs2 database
    The pubs3 Database
      Tables in the pubs3 database
        publishers table
        authors table
        titles table
        titleauthor table
        salesdetail table
        sales table
        stores table
        store_employees table
        roysched table
        discounts table
        blurbs table
      Diagram of the pubs3 database
  Security Administration Guide 15.7 ESD #2
    Introduction to Security
      Introduction to security
      What is ā€œinformation security?ā€
      Information security standards
        Common Criteria configuration evaluation
        FIPS 140-2 validated cryptographic module
    Getting Started with Security Administration in Adaptive Server
      General process of security administration
      Recommendations for setting up security
      An example of setting up security
      Security features in Adaptive Server
        Identification and authentication
          External authentication
          Managing remote servers
        Discretionary access control
          Row-level access control
          Predicated Privileges
        Division of roles
          Role hierarchy
          Restrictions on role activation
          Mutual exclusivity
        Auditing for accountability
        Confidentiality of data
    Managing Adaptive Server Logins and Database Users
      Introduction to logins and login profiles
      Managing login accounts
        Creating login accounts
        Last login and managing inactive accounts
          Defining a stale period
          Tracking the last login
          Preventing inactive accounts from being locked
        Authentication mechanisms for login
      Changing login accounts
      Dropping login accounts
      Choosing and creating a password
        Setting and changing the maximum login attempts
        Logging in after losing a password
        Displaying password information
        Checking passwords for at least one digit
        Setting and changing minimum password length
        Password complexity checks
          Disallowing simple passwords
          Custom password-complexity checks
          Specifying characters in a password
          Password complexity option cross-checks
          Setting password complexity checks
        Enabling custom password checks
        Setting the login and role expiration interval for a password
          Password expiration turned off for pre-12.x passwords
          Circumventing password protection
          Creating a password expiration interval for a new login
          Creating a password expiration interval for a new role
          Creation date added for passwords
          Changing or removing password expiration interval for login or role
          Securing login passwords on the network
        Securing login passwords stored on disk and in memory
        Character set considerations for passwords
        Upgrade and downgrade behavior
          Login password downgrade
          Behavior changes on upgraded master database
          Behavior changes in a new master database
          Retaining password encryption after upgrading then downgrading
          Expiring passwords when allow password downgrade is set to 0
        Using passwords in a high-availability environment
          High-availability configuration
          Passwords updated after upgrade
      Establishing a password and login policy
      Login failure
      Locking Adaptive Server login accounts and roles
        Locking and unlocking logins
        Locking and unlocking login accounts
        Using syslogins to track if an account is locked
        Locking and unlocking roles
        Locking logins that own thresholds
      Managing login profiles
        Login profile attributes
        Applying login profile and password policy attributes
        Creating a login profile
        Creating a default login profile
        Associating a login profile with a login account
        Ignoring a login profile
        Transfer existing login account values to a new login profile
        Manual replication of login profiles
        Granting roles to login profiles
        Invoking a login script
        Displaying login profile information
          Displaying the login profile name
          Displaying the login profile ID
          Displaying login profile binding information
        Modifying login profiles
          Adding or dropping auto-activated roles
          Changing a login profile to be the default login profile
        Dropping a login profile
      Adding users to databases
        Adding a ā€œguestā€ user to a database
          ā€œguestā€ user permissions
          ā€œguestā€ user in user databases
          ā€œguestā€ user in installed system databases
          ā€œguestā€ user in pubs2 and pubs3
        Adding a guest user to the server
        Adding remote users
      Creating groups
        Changing a user’s group membership
        Setting up groups and adding users
      Using aliases in databases
        Adding aliases
        Dropping aliases
        Getting information about aliases
      Getting information about users
        Reporting on users and processes
        Getting information about login accounts
        Getting information about database users
        Finding user names and IDs
      Changing user information
        Changing passwords
          Requiring new passwords
          Null passwords
          Logging in after lost password
        Changing user session information
      Dropping users and groups
        Dropping users
        Dropping groups
      Monitoring license use
        How licenses are counted
        Configuring the License Use Monitor
        Monitoring license use with the housekeeper task
        Logging the number of user licenses
      Number of user and login IDs
        Limits and ranges of ID numbers
        Login connection limitations
      Getting information about usage: chargeback accounting
        Reporting current usage statistics
          Displaying current accounting totals
          Initiating a new accounting interval
        Specifying the interval for adding accounting statistics
    Managing Roles
      Creating and assigning roles to users
        System-defined roles
        System administrator privileges
        System security officer privileges
        Operator privileges
        Sybase Technical Support
        Replication role
        Distributed Transaction Manager role
        High availability role
        Monitoring and diagnosis
        Job Scheduler roles
        Real-time messaging role
        Web Services role
        Key custodian role
        Planning user-defined roles
        Creating a user-defined role
        Adding and removing passwords from a role
        Role hierarchies and mutual exclusivity
          Defining and changing mutual exclusivity of roles
          Defining and changing a role hierarchy
        Setting up default activation at login
        Setting conditions for role activation
        Dropping user-defined roles
        Activating and deactivating roles
        Displaying information about roles
          Finding role IDs and names
          Viewing active system roles
          Displaying a role hierarchy
          Viewing user roles in a hierarchy
          Determining mutual exclusivity
          Determining role activation
          Checking for roles in stored procedures
      Granting and revoking roles
        Granting roles
        Understanding grant and roles
        Revoking roles
        Roles granted to login profiles
      Securing role passwords
        Character set considerations
        Locked roles and syssrvroles
        Login password policy checks to role passwords
          High-availability support for password policy options
        Setting up Adaptive Server for roles
          Installing
          Upgrading Adaptive Server
          Downgrading Adaptive Server
    External Authentication
      Configuring Adaptive Server for network-based security
        Security services and Adaptive Server
        Administering network-based security
        Setting up configuration files for security
          Specifying security information for the server
          Preparing libtcl.cfg to use network-based security
          The objectid.dat file
        Identifying users and servers to the security mechanism
        Configuring Adaptive Server for security
          Enabling network-based security
          Requiring unified login
          Establishing a secure default login
          Mapping security mechanism login names to server names
          Requiring message confidentiality with encryption
          Requiring data integrity
          Memory requirements for network-based security
        Adding logins to support unified login
          General procedure for adding logins
        Establishing Kerberos security for remote connections
          Unified login and the remote server logins
          Getting information about remote servers
        Connecting to the server and using the security services
          Using security mechanisms for the client
        Getting information about available security services
          Determining supported security services and mechanisms
          Determining active security services
          Determining whether a security service Is enabled
        Using Kerberos
          Kerberos compatibility
          Starting Adaptive Server under Kerberos
          Configuring Kerberos
        Using principal names
          Specifying the Adaptive Server principal name
          Using sybmapname to handle user principal names
      Concurrent Kerberos authentication
      Configuring Adaptive Server for LDAP user authentication
        Composed DN algorithm
        Searched DN algorithm
        Configuring LDAP
        LDAP user authentication administration
          LDAP user authentication password information changes
          Failover support
        Adaptive Server logins and LDAP user accounts
        Secondary lookup server support
        LDAP server state transitions
        LDAP user authentication tuning
        Adding tighter controls on login mapping
          Login mapping of external authentication
        Troubleshooting LDAP user authentication errors
        Configuring an LDAP server
      LDAPS user authentication enhancements
      Automatic LDAP user authentication and failback
        Setting the LDAP failback time interval
          Examples
      Configuring Adaptive Server for authentication using PAM
        Enabling PAM in Adaptive Server
          Configuring operating systems
          Running a 32- and 64-bit server on the same machine
          Configuring Adaptive Server for PAM user authentication
          Adaptive Server logins and PAM user accounts
      Enhanced login controls
        Forcing authentication
        Mapping logins using sp_maplogin
          Displaying mapping information
          Determining the authentication mechanism
    Managing User Permissions
      Overview
      Permissions for creating databases
        Changing database ownership
      Database owner privileges
      Database object owner privileges
      Other database user privileges
      Permissions on system procedures
      Granting and revoking permissions
        Object access permissions
          Concrete identification
          Special requirements for SQL92 standard compliance
          Examples of granting object access permissions
          Examples of revoking object access permissions
        Granting permissions on dbcc commands
          Server-wide and database-specific dbcc commands
          dbcc grantees and users in databases
        Permissions on system tables
          Granting default permissions to system tables and stored procedures
        Combining grant and revoke statements
        Understanding permission order and hierarchy
        Grant dbcc and set proxy issue warning for fipsflagger
      Acquiring the permissions of another user
        Using setuser
        Using proxy authorization
          Using set proxy to restrict roles
          Executing proxy authorization
          Proxy authorization for applications
      Changing database object ownership
        Supported object types
        Authorization
        Transferring ownership
          Transferring ownership of objects in the system database
          Transferring ownership of database owner objects
          Using preserve permissions
          Security issues
          Transferring ownership of encryption keys
      Reporting on permissions
        Querying the sysprotects table for proxy authorization
        Displaying information about users and processes
        Reporting permissions on database objects or users
        Reporting permissions on specific tables
      Using views and stored procedures as security mechanisms
        Using views as security mechanisms
        Using stored procedures as security mechanisms
          Roles and stored procedures
        Understanding ownership chains
          Example of views and ownership chains
          Example of procedures and ownership chains
        Permissions on triggers
      Executing a procedure with execute as owner or execute as caller
        Creating a procedure with references to an object with an unqualified name
        Procedures that invoke a nested procedure in another database with a fully qualified name
      Using row-level access control
        Access rules
          Syntax for access rules
          Using access and extended access rules
          Access rule examples
          Access rules and alter table command
          Access rules and bcp
          Access rules as user-defined Java functions
        Using the Application Context Facility
          Setting permissions for using application context functions
        Creating and using application contexts
          set_appcontext
          get_appcontext
          list_appcontext
          rm_appcontext
        SYS_SESSION system application context
        Solving a problem using an access rule and ACF
        Using login triggers
          Creating login triggers
          Configuring login triggers
          Executing a login trigger
          Understanding login trigger output
          Using login triggers for other applications
          Login trigger restrictions
          Issues and information
          Disabling execute privilege on login triggers
        Exporting set options from a login trigger
        Setting global login triggers
    Granting Predicated Privileges
      Introduction to predicated privileges
      Commands used for predicated privileges
      Configuring Adaptive Server to use predicated privileges
        enable predicated privileges
      Granting predicated privileges
        Granting access to select data
        Granting access to update data
        Granting access to delete data
        Using predicated privileges to enforce a data privacy policy
      Revoking predicated privileges
      How Adaptive Server saves predicated privileges in sysprotects
      Predicated role activation
      Combining predicates to enforce row-level privileges
      Understanding SQL behavior with predicated privileges
      Chain-of-ownership effect on predicated privileges
      ansi_permissions and predicated privileges
      Permissions on accesses made by predicates
      Using triggers with predicated privileges
      Recompiling predicated privileges
      Disallowing recursive predicate processing
      Information leakage through predicates
    Using Granular Permissions
      Introduction to granular permissions
      Configuring Adaptive Server to use granular permissions
      System privileges
      Effect of privileges as part of system-defined roles
      Permission management
        manage security permissions privilege
        manage server permissions privilege
        manage database permissions privilege
        manage any object permission privileges
      Privileges granted to system-defined roles
      Privileges assigned to the database owner
      Roles added with granular permissions
        sa_serverprivs_role
      Default roles granted to the system administrator
      Limiting the power of the system administrator and database owner
      Enable granular permissions and sybsecurity
      Logging in to a locked-out Adaptive Server
      General use scenarios
        Scenario 1: Permissions for an application server user
        Scenario 2: Permissions for a database access manager
        Scenario 3: Permissions for a database backup manager
        Scenario 4: Permissions for a help desk operator
        Scenario 5: Permissions for a security auditor
      System table master.dbo.sysprotects
      Database user usedb_user
      Grantable system privileges
    Confidentiality of Data
      Secure Sockets Layer (SSL) in Adaptive Server
        Internet communications overview
          Public-key cryptography
          SSL overview
        SSL in Adaptive Server
          SSL filter
          Authentication via the certificate
          Connection types
        Enabling SSL
          Obtaining a certificate
          Creating server directory entries
          Administering certificates
        Performance
        Cipher Suites
          @@ssl_ciphersuite
        Setting SSL cipher suite preferences
          Examples sp_ssladmin
          Other considerations
      Using SSL to specify a common name
        Specifying a common name with sp_listener
        Stored procedure sp_addserver changed
      Kerberos confidentiality
      Dumping and loading databases with password protection
        Passwords and earlier versions of Adaptive Server
        Passwords and character sets
    Auditing
      Introduction to auditing in Adaptive Server
        Correlating Adaptive Server and operating system audit records
        The audit system
          The sybsecurity database
          The audit queue
          Auditing configuration parameters
          Auditing grant and revoke commands
          Auditing DML statements
          Auditing login and login profile commands
          Auditing stored procedures
          System procedures for auditing
          Managing deployed source in source code control systems
      Installing and setting up auditing
        Installing the audit system
          Tables and devices for the audit trail
          Device for the syslogs transaction log table
          Preinstallation tasks for auditing devices
        Installing auditing with auditinit
        Installing auditing with installsecurity
        Moving the auditing database to multiple devices
          Moving sybsecurity without saving global audit settings
          Moving sybsecurity and saving global audit settings
        Setting up audit trail management
          Setting up threshold procedures
          Setting auditing configuration parameters
        Setting up transaction log management
          Truncating the transaction log
          Managing the transaction log with no truncation
        Enabling and disabling auditing
        Single-table auditing
          Establishing and managing single-table auditing
          Threshold procedure for single-table auditing
          What happens when the current audit table is full?
          Recovering when the current audit table is full
        Restarting auditing
      Setting global auditing options
        Auditing options: types and requirements
          Examples of setting auditing options
        Hiding system stored procedure and command password parameters
        Determining current auditing settings
        Adding user-specified records to the audit trail
          Examples of adding user-defined audit records
      Querying the audit trail
      Understanding the audit tables
        Reading the extrainfo column
        Monitoring failed login attempts
        Auditing login failures
  Sybase Control Center for Adaptive Server Enterprise 3.2.8
    About Sybase Control Center for Adaptive Server
      New Features in Sybase Control Center for Adaptive Server Enterprise
      User Interface Overview
      Toolbar Icons
      Status Icons
      Display and Copy Options in Adaptive Server monitors
      Common Display Options
      Keyboard Shortcuts
      Displaying the Versions of SCC Components
      Style and Syntax Conventions
      Accessibility Features
      Sybase Control Center Accessibility Information
    Get Started
      Quick Start for an Evaluation
      Get Started in a Production Environment
      Deploying an Instance from a Shared Disk Installation
        Enabling and Disabling Shared-Disk Mode
        Shared-Disk Mode
        sccinstance Command
      Launching Sybase Control Center
        Registering the ODBC Driver in Windows
        Starting and Stopping Sybase Control Center in Windows
        Starting and Stopping Sybase Control Center in UNIX
        Configuring Memory Usage
          Changing a Memory Option on the Command Line
          Changing a Memory Option for a Sybase Control Center Windows Service
          Changing a Memory Option for an SCC UNIX Service
        scc Command
      Logging in to Sybase Control Center
      Logging out of Sybase Control Center
      Setting Up Security
        Security
        Configuring Authentication for Windows
        Configuring a Pluggable Authentication Module (PAM) for UNIX
        Configuring an LDAP Authentication Module
          LDAP Configuration Properties
        Mapping Sybase Control Center Roles to LDAP or OS Groups
        Encrypting a Password
        Configuring Ports
      Configuring the E-mail Server
      Configuring the Automatic Logout Timer
      Configuring Retrieval Thresholds for the Administration Console
      User Authorization
        Assigning a Role to a Login or a Group
        Removing a Role from a Login or a Group
        Adding a Group
        Removing a Group
        Adding a Login Account to a Group
        Removing a Login Account from a Group
        Adding a Login Account to the System
        Removing a Login Account from the System
        Modifying a User Profile
        Logins, Roles, and Groups
    Configure
      Configuring Adaptive Server for Monitoring
      Registering an Adaptive Server
      Importing Resources for Batch Registration
      Registering the Agent for an Adaptive Server
      Authenticating a Login Account for a Managed Resource
        Role Assignment in Sybase Control Center for Adaptive Server
        Encrypted Authentication for Adaptive Server
      Setting Up Statistics Collection
        About Statistics
        Adaptive Server Data Collections
        Key Performance Indicators for Adaptive Server
      Creating an Alert
        Adaptive Server Alerts
        Alert Types, Severities, and States for Adaptive Server
        Alert-Triggered Scripts
        Alert-Triggered Script Examples
        Substitution Parameters for Scripts
      Setting Display Options for Adaptive Server Performance Data
      Optional Configuration Steps
    Manage and Monitor
      Displaying Resource Availability: the Heat Chart
      Graphing Performance Counters: the Statistics Chart
      Manage Sybase Control Center
        Administration Console
          Browsing and Managing Resources
          Searching and Filtering Resources
          Searching for Objects in Adaptive Server
            Handling Message Rows for Search Requests
          Configuring Retrieval Thresholds for the Administration Console
        Job Scheduling
          Executing and Stopping a Data Collection Job
          Deleting a Data Collection Job
          Resuming and Suspending a Data Collection Job
          Adding a New Schedule to a Job
          Viewing or Deleting a Schedule
          Modifying the Data Collection Interval for a Job
          Resuming and Suspending the Scheduler
          Viewing the Job Execution History
        Alerts
          Adaptive Server Alerts
          Alert Types, Severities, and States for Adaptive Server
          Creating an Adaptive Server Alert
          Displaying Adaptive Server Alerts
          Modifying an Alert
          Deleting an Alert
          Alert Subscriptions
            Adding or Modifying an Alert Subscription
            Unsubscribing from an Alert
            Enabling and Disabling Alert Subscription
          Alert Notifications
            Displaying Alert History and Resolutions
            Resolving Alerts
          Alert-Triggered Scripts
            Substitution Parameters for Scripts
            Testing an Alert-Triggered Script
            Alert-Triggered Script Examples
        Resources
          Unregistering a Resource
          Adding a Resource to a Perspective
          Removing a Resource from a Perspective
          Modifying a Resource’s Name and Connection Properties
          Searching for Resources in the Resource Explorer
        Perspectives
          Creating a Perspective
          Removing a Perspective
          Renaming a Perspective
        Views
          Managing a View
          Arranging View Layout in a Perspective
        Instances
          Enabling and Disabling Shared-Disk Mode
          Deploying an Instance from a Shared Disk Installation
          Refreshing or Converting an Instance
          Removing an Instance
          Shared-Disk Mode
          sccinstance Command
        Repository
          Scheduling Backups of the Repository
          Modifying the Backup Schedule
          Forcing an Immediate Backup
          Restoring the Repository from Backups
          Configuring Repository Purging
        Logging
          Viewing the Adaptive Server Component Log
          Viewing Sybase Control Center Server Logs
          Viewing the Sybase Control Center Client Log
          Changing the Logging Level
          Logging or Message Levels
          Changing Logging Configuration
        Sybase Control Center Console
          Console Commands
            help Command
            info Command
            shutdown command
            status Command
        Setting Adaptive Server Parameters in the Configuration File
          Configuration Parameters for Adaptive Server
      Manage and Monitor the Adaptive Server Environment
        Managing an Adaptive Server
          Executing SQL Statements
          Registering the Agent for an Adaptive Server
          Authenticating the Unified Agent
          Authenticating the SCC Agent
          Starting an Adaptive Server
          Stopping an Adaptive Server
          Configuring Retrieval Thresholds for the Administration Console
          Browsing and Managing Resources
          Searching for Objects in Adaptive Server
            Handling Message Rows for Search Requests
          Adaptive Server Error Log
            Viewing the Adaptive Server Error Log
            Searching the Error Log for Messages
            Managing Flag Definitions
          Server Properties
          Enabling Granular Permissions
          Activating a Role
        Displaying the Performance Overview
          Performance Overview Statistics and Details
        Caches
          Monitor Caches
            Monitoring Adaptive Server Data Caches
            Modifying Data Cache Sizes
            Adding Data Cache Buffer Pools
            Data Cache Statistics and Details
            Monitoring the Adaptive Server Procedure Cache
            Procedure Cache Statistics and Details
            Monitoring the Adaptive Server Statement Cache
              Setting the Statement Cache Size
            Statement Cache Statistics and Details
            Monitoring Adaptive Server In-memory Storage
            In-memory Storage Statistics and Details
          Manage Caches
            Creating a Cache
            Cache Properties
              Managing Cache Configurations
              Managing Buffer Pools
              Managing Binding Options
            Generating DDL for Caches
            Deleting a Cache
        Clusters
          Monitor Clusters
            Cluster Instances
              Monitoring Cluster Instances in Adaptive Server Cluster Configurations
              Cluster Instances Statistics and Details
            Cluster Interconnect
              Displaying the Cluster Overview
              Cluster Interconnect Statistics and Details
              Monitoring Interprocess Communication in Adaptive Server Cluster Configurations
            Workload Management
              Monitoring Workloads in Adaptive Server Cluster Configurations
              Workload Management Statistics and Details
          Manage Clusters
            Starting the SCC agent for a Cluster
            Starting the Unified Agent for a Cluster
            Preparing to Create a Cluster
            Creating a Cluster
            Registering a Cluster
            Registering the Agent and Starting a Cluster
            Displaying Cluster Configuration Values
            Starting a Cluster
            Stopping a Cluster
            Dropping a Cluster
            Viewing a Cluster Log
            Cluster Properties
            Manage Logical Clusters
              Adding a Logical Cluster
              Designating a Failover Logical Cluster
              Designating a Failback Logical Cluster
              Logical Cluster States
                Changing the State of a Logical Cluster
              Deleting a Logical Cluster
              Generating a DDL Script for a Logical Cluster
              Logical Cluster Properties
            Manage Cluster Instances
              Displaying Instance Configuration Values
              Starting an Instance
              Adding an Instance to a Cluster
              Stopping an Instance
              Deleting an Instance
              Instance Properties
              Viewing an Instance Log
            Manage Load Profiles
              Adding a Load Profile
              Deleting a Load Profile
              Generating a DDL Script for a Load Profile
              Load Profile Properties
            Manage Routes
              Adding a Route
              Deleting a Route
              Route Properties
            Manage Auxiliary Servers
              Configuring a Backup Server
              Deleting a Backup Server
              Backup Server Properties
              Configuring an XP Server
              Deleting an XP Server
              XP Server Properties
        Compiled Objects
          Granting Permissions on Compiled Objects
          Revoking Permissions on Compiled Objects
        Databases
          Monitor Databases
            Determining the Backup Status of a Database
            Displaying Resources Used by a Database
            Modifying Database Sizes
            Database Statistics and Details
            Displaying Information About Segments Used by a Database
          Manage Databases
            Creating a User Database
            Creating a Proxy Database
              Creating a Temporary Database
            Creating an Archive Database
            Creating an In-Memory Database
            Creating an In-Memory Temporary Database
            Creating a Temporary Database Group
            Backing Up (Dumping) a Database
              Viewing Available Dump Configurations
              Creating a Dump Configuration
              Backing Up a Database Using a Dump Configuration
              Dump Configuration Properties
              Deleting a Dump Configuration
              Backing Up a Database or Transaction Log to Multiple Stripes
              Backing Up a Database Incrementally
              Backing Up a Database Incrementally Using a Dump Configuration
              Viewing Dump Records
              Purging Dump Records from Dump History
              Generating Database-Creation SQL for a Target Database
              Generating Database-Creation SQL from a Dump Image
              Backing Up Server Configuration Files
            Restoring (Loading) a Database
              Generating a Database Load Sequence
              Generating a Database Load Sequence for a Target Database from Dump History
              Restoring a Database from a Cumulative Dump
              Restoring a Database from a SQL Script
              Restoring a Database from a Point in Time
            Viewing Database Statistics
            Checkpointing Databases
            Checking Database Consistency
            Placing a Database in Quiesce-Hold
            Placing a Database in Quiesce-Release
            Mounting an Adaptive Server Database
            Unmounting an Adaptive Server Database
            Database Properties
              Changing Database Ownership
              Modifying Database Storage Allocations
              Modifying the Transaction Log Cache and the Log I/O Buffer Size
              Changing Database Options
            Generating a DDL Script
            Deleting a Database
            Shrinking a Database
        Defaults
          Manage Defaults
            Creating a Default
            Defaults Properties
            Deleting a Default
        Devices
          Monitor Devices
            Determining Device I/O Response and I/O per Second
            Modifying Device Sizes
            Device Statistics and Details
          Manage Devices
            Displaying a Device Object
            Creating a Database Device
            Creating an In-Memory Device
            Creating a Dump Device
            Database Device Properties
            In-Memory Device Properties
            Dump Device Properties
            Generating a DDL Script
            Deleting a Database, In-Memory, or Dump Device
        Engines
          Monitor Engines
            Displaying Engine CPU Utilization
            Engine Statistics and Details
          Manage Engine Groups
            Creating Engine Groups
            Engine Groups Properties
            Deleting an Engine Group
            Generating a DDL Script
        Execution Classes
          Manage Execution Classes
            Creating Execution Classes
            Execution Classes Properties
              Modifying Bindings to Execution Classes
        Extended Stored Procedures
          Manage Stored Procedures
            Creating an Extended Stored Procedure
            Extended Stored Procedures Properties
            Generating a DDL Script
            Deleting an Extended Stored Procedure
        Functions
          Manage Scalar Functions
            Creating a Scalar Function
            Scalar Function Properties
            Generating a DDL Script
            Deleting a Scalar Function
          Manage SQLJ Functions
            Creating a SQLJ Function
            SQLJ Function Properties
            Generating a DDL Script
            Deleting a SQLJ Function
        Networks
          Managing Remote Servers
            Configuring Adaptive Server for Remote Procedure Calls
            Adding a Remote Server
            Deleting a Remote Server
            Remote Server Properties
              Testing a Remote Server Connection
              Setting Options for a Remote Server
              Managing Remote Server Login Mappings
              Managing CIS Roles and Logins Mappings
        Precomputed Result Sets
          Configuring Adaptive Server to Use Precomputed Result Sets
          Viewing Precomputed Result Sets
          Creating a Precomputed Result Set
          Deleting a Precomputed Result Set
          Altering a Precomputed Result Set
          Refreshing Precomputed Result Sets
          Truncating a Precomputed Result Set
          Granting Permissions
          Revoking Permissions
          Granting Precomputed Result Set Permissions to a Specific User
          Revoking Precomputed Result Set Permissions from a Specific User
          Displaying Information About Precomputed Result Sets
          Generating DDL for a Precomputed Result Set
        Procedures
          Manage Stored Procedures
            Creating a Stored Procedure
            Stored Procedure Properties
            Generating a DDL Script
            Deleting a Procedure
          Manage SQLJ Procedures
            Creating a SQLJ Procedure
            SQLJ Procedure Properties
            Generating a DDL Script
            Deleting a SQLJ Procedure
        Processes
          Monitor Processes
            Identifying Resource-Intensive Processes
            Identifying Blocked Processes and Blocking Processes
            Terminating Blocking Processes
            Identifying the Lead Blocker in a Chain
            Displaying the SQL Query Associated with a Process
            Displaying Wait Events for a Process
            Process Statistics and Details
        Replication Agents
          Monitor Replication Agents
            Monitoring RepAgent Threads
            Setting Replication Parameters
            Replication Agent Statistics and Details
        Rules
          Manage Rules
            Creating a Rule
            Rule Properties
            Generating a DDL Script
            Deleting a Rule
        Security
          Manage Encryption Keys
            Creating a System Encryption Password
            Modifying and Deleting a System Encryption Password
            Creating a Master Key
            Creating a Column Encryption Key
            Modifying and Deleting a Column Encryption Key
            Modifying, Regenerating, and Deleting a Master Key
            Master Key Properties
            Dual Control and Split Knowledge
            Column Encryption Keys Properties
              Creating a Key Copy
              Granting Encryption Permissions to a Role, User, or Group
            Generating a DDL Script
            Deleting an Encryption Key
          Manage Login Profiles
            Creating a Login Profile
            Login Profile Properties
              Granting Roles to a Login Profile
              Removing Roles Granted to a Login Profile
            Deleting a Login Profile
            Displaying Logins Assigned to a Login Profile
            Transferring Login Attributes to a Login Profile
          Manage Logins
            Creating a Login
            Login Properties
              Granting Roles to a Login
              Removing Roles from a Login
              Managing Users Mapped to Logins
            Configuring Login Password Properties
            Changing a Login Password
            Displaying Login Account Properties
            Assigning Login Profiles to a Login
            Deleting a Login
          Manage Groups
            Creating a Group
            Adding or Removing Users to or from a Group
            Group Properties
              Granting or Revoking Command Permissions to or from a Group
              Granting Object Permissions to a Group
              Revoking Object Permissions from a Group
              Granting Privileges to a Group
              Revoking Privileges from a Group
            Generating a DDL Script
            Deleting a Group
          Manage Users
            Creating a User
            Transferring Ownership of a Database Object
            Users Properties
              Granting Object Permissions to a User
              Revoking Object Permissions from a User
              Granting Privileges to a User
              Revoking Privileges from a User
            Generating a DDL Script
            Deleting a User
          Manage Roles
            Expiring a Role Password
            Creating a Role
            Restoring System Roles
            Role Properties
              Assigning Logins to a Role
              Removing Logins Assigned to a Role
              Assigning Login Profiles to a Role
              Removing Login Profiles Assigned to a Role
              Setting Command Permissions for a Role
              Managing Mutually Exclusive Roles
              Creating Role Hierarchy
              Granting Privileges to a Role
              Revoking Privileges from a Role
              Granting Object Permissions to a Role
              Revoking Object Permission from a Role
        Segments
          Monitor Segments
            Determining the Space Used by a Table on a Segment
            Extending a Segment in Adaptive Server
            Segment Statistics and Details
          Manage Segments
            Displaying Segments
            Creating a Segment
            Segment Properties
              Adding a Database Device to a Segment
              Removing a Database Device from a Segment
              Adding a Threshold to a Segment
              Removing a Threshold from a Segment
            Generating a DDL Script
            Deleting a Segment
        Server Configuration
          Monitor Server Configuration
            Displaying Configuration Values
            Modifying Server Configuration Parameters
            Server Configuration Statistics and Details
        Settings
        Statistics
          Managing Statistics
            Running update statistics
            Updating Statistics on Specific Columns
            Updating Statistics on an Index
            Updating Statistics for a Data Partition
            Updating Statistics on an Index Partition
            Deleting Statistics from a Table
            Deleting Statistics from a Column
            Deleting Statistics from a Data Partition
          Interpreting Statistics
        SQL Activity
          Monitoring SQL Queries
          Executing SQL Statements
        Tables
          Manage Tables
            Creating a User Table
            Creating a Proxy Table
            Creating a Column
            Creating an Index
            Creating a Trigger
            Restoring Table Data
            Creating a Foreign Key
            Creating a Check Constraint
            Checking Table Consistency
            Binding Defaults and Rules to a Column
            Placing a Table on a Segment
            Setting the Table Locking Scheme
            Creating a Primary Key
            Creating a Unique Constraint
            Incrementally Transferring Data
              Incrementally Transferring Data In
              Incrementally Transferring Data Out
            Bulk Copying Data
              Bulk Copying Data Into a Table
              Bulk Copying Data Out of a Table
            Setting Table or Column Permissions
              Granting Table Permissions
              Revoking Table Permissions
              Granting Column Permissions
              Revoking Column Permissions
            Manage Partitions
              Using a Hash Partition
              Using a Range Partition
              Using a List Partition
              Using a Round-Robin Partition
              Enabling Semantic-based Partitioning
              Splitting a Partition
              Merging a Partition
              Moving a Partition
            Manage Reorganization
              Reorganizing Tables at the Database Level
              Reorganizing Tables
              Reorganizing Table Partitions
              Reorganizing Indexes
              Reorganizing Index Partitions
              Status Messages
            Managing Table Statistics
              Updating Table Statistics
              Deleting Table Statistics
              Updating Column Statistics
              Deleting Column Statistics
              Updating Index Statistics
              Updating Partition Statistics
              Deleting Partition Statistics
            Table Properties
            Column Properties
            Index Properties
            Trigger Properties
            Foreign Key Properties
            Check Constraint Properties
            Partition Properties
            Deleting a Table
        Thread Pools
          Monitor Threads
            Identifying the Threads in a Thread Pool
            Thread Statistics and Details
          Manage Thread Pools
            Creating a Thread Pool
            Thread Pool Properties
        Transactions
          Monitor Transactions
            Identifying a Transaction’s Process
            Transaction Statistics and Details
        User-Defined Datatypes
          Manage User-Defined Datatypes
            Adding a User-Defined Datatype
            User-Defined Datatypes Properties
            Deleting a User-Defined Datatype
        Views
          Manage Views
            Creating a View
            View Properties
            Bulk Copying Data Out of a Table
            Deleting a View
    Troubleshoot Sybase Control Center for Adaptive Server
      Data Display Problems
        Cannot Monitor Adaptive Server or Display Statistics Chart
        Data on Screens or Charts Is Missing
        Database Objects Are Not Updated
        Error: No Result Set for this Query
        Error: No Data Was Found For Statistic
        Properties for Engine Groups Incorrectly Displayed
        Same Name Engine Groups Are Not Selectable
        Error: Unable to Format the Date String
        "Number of Transactions" KPI Is Not Updated
        Cannot Find Error Information For Monitor View
        Display Large Number of Objects in Administration Console
      Data Collection and Alert Problems
        Collection Job for Adaptive Server Fails
        Alerts Are Configured But Do Not Fire
        Data Collections Fail to Complete
        Alerts Are Not Generated
      Authentication and Access Problems
        Cannot Log In
        Sybase Control Center Fails to Start
        Browser Refresh (F5) Causes Logout
        Invalid Connection Profile
        Cannot Authenticate Server Configured with a Multibyte Character Set
        Features Are Not Enabled Although You Have sa_role
        Resetting the Online Help
      Performance Problems
        Adaptive Server Is Responding Slowly
        Memory Warnings at Startup
        SCC Out of Memory Errors
        Performance Statistics Do Not Cover Enough Time
      Collect Diagnostic Data
        Preparing to Collect Diagnostic Data
        Collecting Field Diagnostic Data
        Collecting Optimizer Diagnostic Data
        Upload Diagnostic Data
          Uploading Diagnostic Data Via FTP
          Submitting Diagnostic Data via E-mail Message
        Deleting a Diagnostic Data File
    Glossary: Sybase Control Center for Adaptive Server
  System Administration Guide: Volume 1 15.7
    Overview of System Administration
      Adaptive Server administration tasks
        Roles required for system administration tasks
          Database owner
          Database object owner
        Using isql to perform system administration tasks
          Starting isql
          Entering statements
          Saving and reusing statements
        Using Sybase Central for system administration tasks
      System tables
        Querying the system tables
        Keys in system tables
        Updating system tables
      System procedures
        Using system procedures
        System procedure tables
        Creating system procedures
      System extended stored procedures
        Creating system ESPs
      Logging error messages
      Connecting to Adaptive Server
        The interfaces file
        Directory services
        LDAP as a directory service
          Multiple directory services
          LDAP directory services versus the Sybase interfaces file
      Security features available in Adaptive Server
    System and Optional Databases
      Overview of system databases
      master database
        Controlling object creation in master
        Backing up master and keeping copies of system tables
      model database
      sybsystemprocs database
      tempdb database
        Creating temporary tables
      sybsecurity database
      sybsystemdb database
      sybmgmtdb database
      pubs2 and pubs3 sample databases
        Maintaining the sample databases
        pubs2 image data
      dbccdb database
      sybdiag database
      Determining the version of the installation scripts
    System Administration for Beginners
      Logical page sizes
      Using ā€œtestā€ servers
        Planning resources
        Achieving performance goals
      Considerations when installing Sybase products
        Check product compatibility
        Install or upgrade Adaptive Server
        Install additional third-party software
        Configure and test client connections
      Allocating physical resources
        Dedicated versus shared servers
        Decision-support and OLTP applications
        Advance resource planning
        Operating system configuration
      Backup and recovery
        Keep up-to-date backups of master
          Keep offline copies of system tables
        Automate backup procedures
        Verify data consistency before backing up a database
        Monitor the log size
      Ongoing maintenance and troubleshooting
        Starting and stopping Adaptive Server
        Viewing and pruning the error log
      Keeping records
        Contact information
        Configuration information
        Maintenance schedules
        System information
        Disaster recovery plan
      Additional resources
    Managing and Monitoring Adaptive Server
      Sybase Control Center for Adaptive Server
      Adaptive Server Sybase Central Plug-in
        Using the Adaptive Server Plug-in
        Starting and stopping Sybase Central
        Registering Adaptive Server Plug-in
        Performing common tasks
        Using Interactive SQL
          Starting Interactive SQL
    Setting Configuration Parameters
      Overview
        The Adaptive Server configuration file
        Modifying configuration parameters
        Required roles for modifying configuration parameters
        Unit specification using sp_configure
        Global versus session settings
        Getting help information on configuration parameters
      Using sp_configure
        Syntax elements
          Parameter parsing
        Using sp_configure with a configuration file
          Naming tips for the configuration file
          Using sp_configure to read or write the configuration file
          Editing the configuration file
          Starting Adaptive Server with a configuration file
        The parameter hierarchy
        User-defined subsets of the parameter hierarchy: display levels
          The effect of the display level on sp_configure output
        Performance tuning with sp_configure and sp_sysmon
        Using configuration parameters in a clustered environment
      sp_configure output
      Named cache configuration parameters
      sysconfigures and syscurconfigs tables
        Querying syscurconfigs and sysconfigures: an example
      Configuration parameters
        Alphabetical listing of configuration parameters
          abstract plan cache
          abstract plan dump
          abstract plan load
          abstract plan replace
          additional network memory
          allocate max shared memory
          allow backward scans
          allow nested triggers
          allow procedure grouping
          allow remote access
          allow resource limits
          allow sendmsg
          allow sql server async i/o
          allow updates to system tables
          average cap size
          audit queue size
          auditing
          automatic cluster takeover
          builtin date strings
          caps per ccb
          capture compression statistics
          check password for digit
          CIPC large message pool size
          CIPC regular message pool size
          cis bulk insert array size
          cis bulk insert batch size
          cis connect timeout
          cis cursor rows
          cis idle connection timeout
          cis packet size
          cis rpc handling
          cluster heartbeat interval
          cluster heartbeat retries
          cluster redundancy level
          cluster vote timeout
          column default cache size
          compression info pool size
          compression memory size
          configuration file
          cost of a logical io
          cost of a physical io
          cost of a cpu unit
          cpu accounting flush interval
          cpu grace time
          current audit table
          deadlock checking period
          deadlock pipe active
          deadlock pipe max messages
          deadlock retries
          default character set id
          default database size
          default exp_row_size percent
          default fill factor percent
          default language id
          default network packet size
          default sortorder id
          default unicode sortorder
          default XML sortorder
          deferred name resolution
          disable character set conversions
          disable disk mirroring
          disable varbinary truncation
          disk i/o structures
          DMA object pool size
          dtm detach timeout period
          dtm lock timeout period
          dump on conditions
          dynamic allocation on demand
          enable backupserver HA
          enable cis
          enable compression
          enable console logging
          enable DTM
          enable encrypted columns
          enable enterprise java beans
          enable file access
          enable full-text search
          enable functionality group
          enable inline default sharing
          enable HA
          enable housekeeper GC
          enable hp posix async i/o
          enable i/o fencing
          enable java
          enable job scheduler
          enable ldap user auth
          enable literal autoparam
          enable logins during recovery
          enable merge join
          enable metrics capture
          enable monitoring
          enable pam user auth
          enable pci
          enable permissive unicode
          enable query tuning mem limit
          enable query tuning time limit
          enable real time messaging
          enable rep agent threads
          enable row level access control
          enable semantic partitioning
          enable sort-merge join and JTC
          enable sql debugger
          enable ssl
          enable stmt cache monitoring
          enable surrogate processing
          enable unicode conversion
          enable unicode normalization
          enable webservices
          enable xact coordination
          enable xml
          engine memory log size
          errorlog pipe active
          errorlog pipe max messages
          esp execution priority
          esp execution stacksize
          esp unload dll
          event buffers per engine
          event log computer name (Windows only)
          event logging (Windows only)
          executable codesize + overhead
          extended cache size
          FIPS login password encryption
          global async prefetch limit
          global cache partition number
          heap memory per user
          histogram tuning factor
          housekeeper free write percent
          i/o accounting flush interval
          i/o batch size
          i/o polling process count
          identity burning set factor
          identity grab size
          identity reservation size
          idle migration timeout
          job scheduler interval
          job scheduler tasks
          js job output width
          kernel mode
          kernel resource memory
          license information
          lock address spinlock ratio
          lock hashtable size
          lock scheme
          lock shared memory
          lock spinlock ratio
          lock table spinlock ratio
          lock timeout pipe active
          lock timeout pipe max messages
          lock wait period
          log audit logon failure
          log audit logon success
          max async i/os per engine
          max async i/os per server
          max cis remote connections
          max concurrently recovered db
          max memory
          max native threads per engine
          max nesting level
          max network packet size
          max number network listeners
          max online engines
          max online Q engines
          max parallel degree
          max pci slots
          max query parallel degree
          max repartition degree
          max resource granularity
          max scan parallel degree
          max SQL text monitored
          max transfer history
          maximum dump conditions
          max buffers per lava operator
          maximum failed logins
          maximum job output
          memory alignment boundary
          memory per worker process
          messaging memory
          metrics elap max
          metrics exec max
          metrics lio max
          metrics pio max
          min pages for parallel scan
          minimum password length
          mnc_full_index_filter
          msg confidentiality reqd
          msg integrity reqd
          net password encryption required
          number of alarms
          number of aux scan descriptors
          number of backup connections
          number of ccbs
          number of checkpoint tasks
          number of devices
          number of disk tasks
          number of dtx participants
          number of dump threads
          number of engines at startup
          number of histogram steps
          number of index trips
          number of java sockets
          number of large i/o buffers
          number of locks
          number of mailboxes
          number of messages
          number of network tasks
          number of oam trips
          number of open databases
          number of open indexes
          number of open objects
          number of open partitions
          number of pre-allocated extents
          number of Q engines at startup
          number of remote connections
          number of remote logins
          number of remote sites
          number of sort buffers
          number of user connections
          number of worker processes
          o/s file descriptors
          object lockwait timing
          open index hash spinlock ratio
          open index spinlock ratio
          open object spinlock ratio
          optimization goal
          optimization timeout limit
          optimizer level
          page lock promotion HWM
          page lock promotion LWM
          page lock promotion PCT
          page utilization percent
          partition groups
          partition spinlock ratio
          pci memory size
          per object statistics active
          percent database for history
          percent database for output
          percent history free
          percent output free
          performance monitoring option
          permission cache entries
          plan text pipe active
          plan text pipe max messages
          print deadlock information
          print recovery information
          procedure cache size
          procedure deferred compilation
          process wait events
          prod-consumer overlap factor
          quorum heartbeat interval
          quorum heartbeat retries
          quoted identifier enhancements
          read committed with lock
          recovery interval in minutes
          remote server pre-read packets
          restricted decrypt permission
          row lock promotion HWM
          row lock promotion LWM
          row lock promotion PCT
          rtm thread idle wait period
          runnable process search count
          sampling percent
          secure default login
          select for update
          select on syscomments.text
          send doneinproc tokens
          session migration timeout
          session tempdb log cache size
          shared memory starting address
          size of auto identity column
          size of global fixed heap
          size of process object heap
          size of shared class heap
          size of unilib cache
          sproc optimize timeout limit
          SQL batch capture
          SQL Perfmon Integration (Windows only)
          sql server clock tick length
          sql text pipe active
          sql text pipe max messages
          stack guard size
          stack size
          start mail session (Windows only)
          start xp server during boot
          startup delay
          statement cache size
          statement pipe active
          statement pipe max messages
          statement statistics active
          streamlined dynamic SQL
          strict dtm enforcement
          suppress js max task message
          suspend audit when device full
          syb_sendmsg port number
          sysstatistics flush interval
          systemwide password expiration
          tape retention in days
          tcp no delay
          text prefetch size
          time slice
          total data cache size
          total logical memory
          total physical memory
          transfer utility memory size
          txn to pss ratio
          unified login required
          upgrade version
          use security services
          user log cache size
          user log cache spinlock ratio
          wait event timing
          workload manager cache size
          xact coordination interval
          xp_cmdshell context
    Overview of Disk Resource Issues
      Device allocation and object placement
      Commands for managing disk resources
      Considerations in storage management decisions
        Recovery
          Keeping logs on a separate device
          Mirroring
        Performance
      Status and defaults at installation time
      System tables that manage storage
        The sysdevices table
        The sysusages table
        The syssegments table
        The sysindexes table
        The syspartitions table
    Managing Remote Servers
      Overview
      Managing remote servers
        Adding a remote server
          Examples of adding remote servers
        Managing remote server names
        Setting server connection options
          Using the timeouts option
          Using the net password encryption option
          Using the security mechanism option
        Getting information about servers
        Dropping remote servers
      Adding remote logins
        Mapping users’ server IDs
        Mapping remote logins to particular local names
        Mapping all remote logins to one local name
        Keeping remote login names for local servers
        Example of remote user login mapping
      Password checking for remote users
        Effects of using the untrusted mode
      Getting information about remote logins
      Configuration parameters for remote logins
    Initializing Database Devices
      Database devices
      Using the disk init command
      disk init syntax
        Specifying a logical device name
        Specifying a physical device name
        Choosing a device number
        Specifying the device size
        Specifying the dsync setting (optional)
          Performance implications of dsync
          Limitations and restrictions of dsync
        Using directio to bypass operating system buffer
        Other optional parameters for disk init
      Getting information about devices
      Dropping devices
      Designating default devices
        Choosing default and nondefault devices
      Increasing the size of devices with disk resize
        Insufficient disk space
    Setting Database Options
      Using the sp_dboption procedure
      Database option descriptions
      Viewing the options on a database
      Displaying currently set switches with sysoptions
    Configuring Character Sets, Sort Orders, and Languages
      Understanding internationalization and localization
      Advantages of internationalized systems
      A sample internationalized system
      Elements of an internationalized system
      Selecting the character set for your server
        Unicode
          Character set installation
          Configuration parameters
          Functions
          Using unichar columns
          Using unitext
          Open Client interoperability
          Java interoperability
          Limitations
        Selecting the server default character set
      Selecting the sort order
        Using sort orders
        Different types of sort orders
        Selecting the default sort order
          Chinese Pinyin sort order
          Selecting case-insensitive sort orders for Chinese and Japanese character sets
          Selecting the default Unicode sort order
      Selecting a language for system messages
      Setting up your server: examples
        A Spanish-version server
        A U.S.-based company in Japan
        A Japan-based company with multinational clients
      Changing the character set, sort order, or message language
        Changing the default character set
        Changing the sort order with a resources file
        Changing the default sort order
        Reconfiguring the character set, sort order, or message language
        Unicode examples
          Schema
          Converting to UTF-8
          Migrating selected columns to unichar
          Migrating to or from unitext
        Preliminary steps
        Setting the user’s default language
        Recovery after reconfiguration
          Using sp_indsuspect to find corrupt indexes
          Rebuilding indexes after changing the sort order
          Upgrading text data after changing character sets
          Retrieving text values after changing character sets
        Handling suspect partitions
          Fixing tables with suspect partitions
          Handling suspect partitions in cross-platform dump and load operations
      Installing date strings for unsupported languages
        Server versus client date interpretation
      Internationalization and localization files
        Types of internationalization files
        Character sets directory structure
        Types of localization files
        Software messages directory structure
        Message languages and global variables
    Configuring Client/Server Character Set Conversions
      Character set conversion
      Supported character set conversions
        Conversion for native character sets
        Conversion in a Unicode system
        Adaptive Server direct conversions
        Unicode conversions
          Allowing Unicode noncharacters
      Choosing a conversion type
        Non-Unicode client/server systems
        Unicode client/server systems
        Configuring the server
      Enabling and disabling character set conversion
        Characters that cannot be converted
      Error handling in character set conversion
      Conversions and changes to data lengths
        Configuring your system and application
      Specifying the character set for utility programs
        Display and file character set command line options
          Setting the display character set
          Setting the file character set
    Diagnosing System Problems
      How Adaptive Server uses error messages
        Error log format
        Error messages and message numbers
        Variables in error message text
      Adaptive Server error logging
        Severity levels
        Severity levels 10 – 18
          Level 10: Status information
          Level 11: Specified database object not found
          Level 12: Wrong datatype encountered
          Level 13: User transaction syntax error
          Level 14: Insufficient permission to execute command
          Level 15: Syntax error in SQL statement
          Level 16: Miscellaneous user error
          Level 17: Insufficient resources
          Level 18: Nonfatal internal error detected
        Severity levels 19 – 26
          Level 19: Adaptive Server fatal error in resource
          Level 20: Adaptive Server fatal error in current process
          Level 21: Adaptive Server fatal error in database processes
          Level 22: Adaptive Server fatal error: Table integrity suspect
          Level 23: Fatal error: Database integrity suspect
          Level 24: Hardware error or system table corruption
          Level 25: Adaptive Server internal error
          Level 26: Rule error
        Reporting errors
      Backup Server error logging
      Killing processes
        Using kill with statusonly
        Using sp_lock to examine blocking processes
      Housekeeper functionality
        Housekeeper wash
        Housekeeper chores
        Housekeeper garbage collection
          Running at user priority
        Configuring enable housekeeper GC
          Using the reorg command
      Shutting down servers
        Shutting down Adaptive Server
        Shutting down a Backup Server
          Checking for active dumps and loads
          Using nowait on a Backup Server
      Learning about known problems
  System Administration Guide: Volume 2 15.7
    Limiting Access to Server Resources
      Resource limits
      Planning resource limits
      Enabling resource limits
      Defining time ranges
        Determining the time ranges you need
        Creating named time ranges
          A time range example
        Modifying a named time range
        Dropping a named time range
        When do time range changes take effect?
      Identifying users and limits
        Identifying heavy-usage users
        Identifying heavy-usage applications
        Choosing a limit type
        Determining time of enforcement
        Determining the scope of resource limits
      Understanding limit types
        Limiting I/O cost
          Identifying I/O costs
          Calculating the I/O cost of a cursor
          The scope of the io_cost limit type
        Limiting elapsed time
          The scope of the elapsed_time limit type
        Limiting the size of the result set
          The scope of the row_count limit type
        Setting limits for tempdb space usage
        Limiting idle time
      Creating a resource limit
        Resource limit examples
          Examples
      Getting information on existing limits
        Listing all existing resource limits
      Modifying resource limits
      Dropping resource limits
      Resource limit precedence
        Time ranges
        Resource limits
    Mirroring Database Devices
      Disk mirroring
      Deciding what to mirror
        Mirroring using minimal physical disk space
        Mirroring for nonstop recovery
      Conditions that do not disable mirroring
      Disk mirroring commands
        Initializing mirrors
        Unmirroring a device
          Effects on system tables
        Restarting mirrors
        waitfor mirrorexit
        Mirroring the master device
        Getting information about devices and mirrors
      Disk mirroring tutorial
      Disk resizing and mirroring
    Configuring Memory
      Determining memory availability for Adaptive Server
      How Adaptive Server allocates memory
        Disk space allocation
        Larger logical page sizes and buffers
        Heap memory
          Calculating heap memory
      How Adaptive Server uses memory
      Determining the amount of memory Adaptive Server needs
        Determining Adaptive Server memory configuration
        If you are upgrading
      Determining the amount of memory Adaptive Server can use
      Configuration parameters that affect memory allocation
      Dynamically allocating memory
        If Adaptive Server cannot start
        Dynamically decreasing memory configuration parameters
      Configuring thread pools
        Determining the total numberof threads
        Tuning the syb_blocking_pool
      System procedures for configuring memory
        Using sp_configure to set configuration parameters
          Memory available for dynamic growth
        Using sp_helpconfig
        Using sp_monitorconfig
      Configuration parameters that control Adaptive Server memory
        Adaptive Server executable code size
        Data and procedure caches
          Determining the procedure cache size
          Determining the default data cache size
          Monitoring cache space
        Kernel resource memory
        User connections
        Open databases, open indexes, and open objects
        Number of locks
        Database devices and disk I/O structures
      Other parameters that use memory
        Parallel processing
          Worker processes
        Remote servers
          Number of remote sites
          Other configuration parameters for RPCs
        Referential integrity
        Other parameters that affect memory
      The statement cache
        Setting the statement cache
          Ad hoc query processing
          Monitoring the statement cache
          Purging the statement cache
          Printing statement summaries
          Displaying the SQL plan for cached statements
    Configuring Data Caches
      The Adaptive Server data cache
      Cache configuration commands and system procedures
      Information on data caches
      Configuring data caches
        Creating a new cache
          Insufficient space for new cache
        Adding memory to an existing named cache
        Decreasing the size of a cache
        Deleting a cache
        Explicitly configuring the default cache
        Changing the cache type
      Configuring cache replacement policy
      Dividing a data cache into memory pools
        Matching log I/O size for log caches
      Binding objects to caches
        Cache binding restrictions
      Getting information about cache bindings
        Checking cache overhead
        How overhead affects total cache space
      Dropping cache bindings
      Changing the wash area for a memory pool
        When the wash area is too small
        When the wash area is too large
        Setting the housekeeper to avoid washes for cache
      Changing the asynchronous prefetch limit for a pool
      Changing the size of memory pools
        Moving space from the memory pool
        Moving space from other memory pools
      Adding cache partitions
        Setting the number of cache partitions
        Setting the number of local cache partitions
        Precedence
      Dropping a memory pool
        When pools cannot be dropped due to page use
      Cache binding effects on memory and query plans
        Flushing pages from cache
        Locking to perform bindings
        Cache binding effects on stored procedures and triggers
      Configuring data caches using the configuration file
        Cache and pool entries in the configuration file
        Cache configuration guidelines
          Configuration file errors
    Managing Multiprocessor Servers
      Adaptive Server kernels
      Target architecture
      Kernel modes
        Switching kernel modes
      Tasks
        Using threads to run tasks
      Configuring an SMP environment
        Thread pools
        Managing engines
          Configuring engines in process mode
          Configuring engines in threaded mode
          Choosing the right number of engines
        Starting and stopping engines
          Monitoring engine status
          Starting and stopping engines with sp_engine
        Managing user connections (process mode only)
        Configuration parameters that affect SMP systems
          Configuring spinlock ratio parameters
    Creating and Managing User Databases
      Commands for creating and managing user databases
      Permissions for managing user databases
      Using the create database command
      Assigning space and devices to databases
        Default database size and devices
        Estimating the required space
      Placing the transaction log on a separate device
        Estimating the transaction log size
        Default log size and device
        Moving the transaction log to another device
      Shrinking log space
        Using dump and load database when shrinking log space
          Example of sequence using dump and load database
        Using dump and load transaction when shrinking log space
          Example of sequence using dump and load transaction
      Using the for load option for database recovery
      Using the with override option with create database
      Changing database ownership
      Altering databases
        alter database syntax
      Using the drop database command
      System tables that manage space allocation
        The sysusages table
          The segmap column
          The lstart, size, and vstart columns
      Getting information about database storage
        Database device names and options
        Checking the amount of space used
          Checking space used in a database
          Checking summary information for a table
          Checking information for a table and its indexes
        Querying system table for space usage information
    Database Mount and Unmount
      Overview
      Manifest file
      Copying and moving databases
      Performance considerations
      Device verification
      Mounting and unmounting databases
        Unmounting a database
        Mounting a database
        Creating a mountable copy of a database
        Moving databases from one Adaptive Server to another
        System restrictions
        quiesce database extension
    Distributed Transaction Management
      Affected transaction types
        Distributed transactions coordinated by external transaction managers
          Behavior for transaction manager-coordinated transactions
          Enhanced transaction manager for Adaptive Server version 15.0.3 or later
        RPC and CIS transactions
          New behavior for RPC and CIS transactions
        SYB2PC transactions
      Enabling DTM features
        Installing a license key
        Enabling DTM features
          enable dtm parameter
          enable xact coordination parameter
        Configuring transaction resources
          Calculating required transaction descriptors
          Setting the number of transaction descriptors
      Using Adaptive Server coordination services
        Overview of transaction coordination services
          Hierarchical transaction coordination
          X/Open XA-compliant behavior in DTP environments
        Requirements and behavior
        Configuring participant server resources
          number of dtx participants parameter
          Optimizing number of dtx participants for your system
        Using transaction coordination services in heterogeneous environments
          strict dtm enforcement parameter
        Monitoring coordinated transactions and participants
      DTM administration and troubleshooting
        Transactions and threads of control
          Implications for system administrators
          Lock manager changes to support detached transactions
        Getting information about distributed transactions
          Transaction identification in systransactions
          Viewing active transactions with sp_transactions
          Determining the commit node and gtrid with sp_transactions
        Steps to execute external transactions
        Crash recovery procedures for distributed transactions
          Transactions coordinated with MSDTC
          Transactions coordinated by Adaptive Server or X/Open XA
          Transactions coordinated with SYB2PC
        Heuristically completing transactions
          Completing prepared transactions
          Completing transactions that are not prepared
          Determining the commit status for Adaptive Server transactions
        Programming versus configuration considerations
          Behavior of DDLs within distributed transactions
          Adaptive Server implicit rollback in external transactions
    Creating and Using Segments
      Adaptive Server segments
        System-defined segments
      How Adaptive Server uses segments
        Controlling space usage
        Improving performance
          Separating tables, indexes, and logs
          Splitting tables
        Moving a table to another device
      Creating segments
      Changing the scope of segments
        Extending the scope of segments
          Automatically extending the scope of a segment
        Reducing the scope of a segment
      Assigning database objects to segments
        Creating new objects on segments
        Placing existing objects on segments
        Placing text pages on a separate device
        Creating clustered indexes on segments
      Dropping segments
      Getting information about segments
        sp_helpsegment
        sp_helpdb
        sp_help and sp_helpindex
      Segments and system tables
      A segment tutorial
    Using the reorg Command
      reorg command and its parameters
        Using the optdiag utility to assess the need for a reorg
      Moving forwarded rows to home pages
        Using reorg compact to remove row forwarding
      Reclaiming unused space from deletions and updates
        Reclaming space without the reorg command
      Reclaiming unused space and undoing row forwarding
      Rebuilding a table
        Prerequisites for running reorg rebuild
          Changing space management settings before using reorg rebuild
      Using the reorg rebuild command on indexes
        Rebuilding indexes with reorg rebuild index_name partition_name
        Space requirements for rebuilding an index
        Status messages
      resume and time options for reorganizing large tables
        Specifying no_of_minutes in the time option
    Checking Database Consistency
      What is the database consistency checker?
      Page and object allocation
        Understanding the object allocation map (OAM)
        Understanding page linkage
      What checks can be performed with dbcc?
        Understanding the output from dbcc commands
      Checking consistency of databases and tables
        dbcc checkstorage
          Advantages of using dbcc checkstorage
          Comparison of dbcc checkstorage and other dbcc commands
          Understanding the dbcc checkstorage operation
          Performance and scalability
        dbcc checktable
        dbcc checkdb
      Checking page allocation
        dbcc checkalloc
        dbcc indexalloc
        dbcc tablealloc
        dbcc textalloc
      Correcting allocation errors using the fix | nofix option
      Generating reports with dbcc tablealloc and dbcc indexalloc
      Checking consistency of system tables
      Strategies for using consistency checking commands
        Using large I/O and asynchronous prefetch
        Scheduling database maintenance at your site
          Database use
          Backup schedule
          Size of tables and importance of data
        Errors generated by database consistency problems
        Reporting on aborted checkstorage and checkverify operations
          Aborting with error 100032
        Comparison of soft and hard faults
          Soft faults
          Hard faults
      Verifying faults with dbcc checkverify
        How dbcc checkverify works
        When to use dbcc checkverify
        How to use dbcc checkverify
      Preparing to use dbcc checkstorage
        Planning resources
          Examples of sp_plan_dbccdb output
          Planning workspace size
        Configuring worker processes
        Setting up a named cache for dbcc
        Configuring an 8-page I/O buffer pool
        Allocating disk space for dbccdb
        Segments for workspaces
        Creating the dbccdb database
      Updating the dbcc_config table
        Adding default configuration values with sp_dbcc_updateconfig
        Deleting configuration values with sp_dbcc_updateconfig
        Viewing the current configuration values
      Maintaining dbccdb
        Reevaluating and updating dbccdb configuration
        Cleaning up dbccdb
        Removing workspaces
        Performing consistency checks on dbccdb
      Generating reports from dbccdb
        Reporting a summary of dbcc checkstorage operations
        Reporting configuration, statistics and fault information
      Upgrading compiled objects with dbcc upgrade_object
        Finding compiled object errors before production
          Reserved word errors
          Missing, truncated, or corrupted source text
          Quoted identifier errors
          Temporary table references
          select * potential problem areas
        Using database dumps in upgrades
          Upgrading using dump and load
          Upgrading compiled objects in database dumps
        Determining whether a compiled object has been upgraded
    Developing a Backup and Recovery Plan
      Keeping track of database changes
        Getting information about the transaction log
        Using delayed_commit to determine when log records are committed
        Designating responsibility for backups
      Synchronizing a database and its log: checkpoints
        Setting the recovery interval
        Automatic checkpoint procedure
          Checkpoint after user database upgrade
        Truncating the log after automatic checkpoints
        Free checkpoints
        Manually requesting a checkpoint
      Automatic recovery after a system failure or shutdown
      Fast recovery
        Adaptive Server start-up sequence
        Bringing engines online early
        Parallel recovery
        Database recovery
        Recovery order
          Changing or deleting the recovery position of a database
          Listing the user-assigned recovery order of databases
        Parallel checkpoints
        Recovery state
        Tuning for fast recovery
          Database layout
          Runtime configuration suggestions
          Setting space accounting
      Fault isolation during recovery
        Persistence of offline pages
        Configuring recovery fault isolation
          Isolating suspect pages
          Raising the number of suspect pages allowed
        Getting information about offline databases and pages
        Bringing offline pages online
        Index-level fault isolation for data-only-locked tables
        Side effects of offline pages
        Recovery strategies using recovery fault isolation
          Reload strategy
          Repair strategy
        Assessing the extent of corruption
      Using the dump and load commands
        Making routine database dumps: dump database
        Making routine transaction log dumps: dump transaction
        Copying the log after device failure: dump tran with no_truncate
        Restoring the entire database: load database
        Applying changes to the database: load transaction
        Making the database available to users: online database
        Dumping and loading databases across platforms
          Dumping a database
          Loading a database
        Restrictions for dumping and loading databases and transactions
        Performance notes
        Moving a database to another Adaptive Server
        Upgrading a user database
        Using the special dump transaction options
        Using the special load options to identify dump files
        Restoring a database from backups
      Suspending and resuming updates to databases
        Guidelines for using quiesce database
        Maintaining server roles in a primary and secondary relationship
        Starting the secondary server with the -q option
        ā€œin quiesceā€ database log record value updated
        Updating the dump sequence number
        Backing up primary devices with quiesce database
          Recovery of databases for warm standby method
        Making archived copies during the quiescent state
      Using mount and unmount commands
      Using Backup Server for backup and recovery
        Communicating with Backup Server
        Mounting a new volume
        Starting and stopping Backup Server
        Configuring your server for remote access
        Choosing backup media
          Protecting backup tapes from being overwritten
          Dumping to files or disks
      Creating logical device names for local dump devices
        Listing the current device names
        Adding a backup device
      Scheduling backups of user databases
        Scheduling routine backups
        Other times to back up a database
          Dumping a user database after upgrading
          Dumping a database after creating an index
          Dumping a database after unlogged operations
          Dumping a database when the log has been truncated
      Scheduling backups of master
        Dumping master after each change
        Saving scripts and system tables
        Truncating the master database transaction log
        Avoiding volume changes and recovery
      Scheduling backups of the model database
        Truncating the model database’s transaction log
      Scheduling backups of the sybsystemprocs database
      Configuring Adaptive Server for simultaneous loads
      Gathering backup statistics
    Backing Up and Restoring User Databases
      Specifying the database and dump device
        Rules for specifying database names
        Rules for specifying dump devices
        Tape device determination by Backup Server
          Tape sevice configuration file
      Compressing a dump
        Backup Server dump files and compressed dumps
        Loading compressed dumps
      Specifying a remote Backup Server
      Specifying tape density, block size, and capacity
        Overriding the default density
        Overriding the default block size
          Specifying a larger block size value
        Specifying tape capacity for dump commands
        Non-rewinding tape functionality for Backup Server
          Tape operations
          Dump version compatibility
      Specifying the volume name
        Loading from a multifile volume
      Identifying a dump
      Improving dump or load performance
        Compatibility with prior versions
        Labels stored in integer format
        Configuring system resources
          Setting shared memory usage
          Setting maximum number of stripes
          Setting the maximum number of network connections
          Setting the maximum number of service threads
      Specifying additional dump devices: the stripe on clause
        Dumping to multiple devices
        Loading from multiple devices
        Using fewer devices to load than to dump
        Specifying the characteristics of individual devices
      Tape handling options
        Specifying whether to dismount the tape
        Rewinding the tape
        Protecting dump files from being overwritten
        Reinitializing a volume before a dump
      Dumping and loading databases with password protection
      Overriding the default message destination
      Bringing databases online with standby_access
        Determining when to use with standby_access
        Bring databases online with standby_access
      Getting information about dump files
        Requesting dump header information
        Determining the database, device, file name, and date
      Copying the log after a device failure
      Truncating the log
        Truncating a log that is not on a separate segment
        Truncating the log in early development environments
        Truncating a log that has no free space
          Dangers of using with truncate_only and with no_log
          Providing enough log space
      Responding to volume change requests
        Volume change prompts for dumps
        Volume change prompts for loads
      Recovering a database: step-by-step instructions
        Getting a current dump of the transaction log
        Examining the space usage
        Dropping the databases
        Re-creating the databases
        Loading the database
        Loading the transaction logs
          Loading a transaction log to a point in time
        Bringing the databases online
          Replicated databases
      Loading database dumps from older versions
        Upgrading a dump to the current version of Adaptive Server
        The database offline status bit
        Version identifiers
      Cache bindings and loading databases
        Databases and cache bindings
        Database objects and cache bindings
          Checking on cache bindings
      Cross-database constraints and loading databases
    Restoring the System Databases
      Recovering a system database
      Recovering the master database
        About the recovery process
        Summary of recovery procedure
        Finding copies of system tables
        Building a new master device
        Starting Adaptive Server in master-recover mode
        Re-creating device allocations for master
        Checking your Backup Server sysservers information
        Verifying that your Backup Server is running
        Loading a backup of master
        Updating the number of devices configuration parameter
        Restarting Adaptive Server in master-recover mode
        Checking system tables to verify current backup of master
        Restarting Adaptive Server
        Restoring server user IDs
        Restoring the model database
        Checking Adaptive Server
        Backing up master
      Recovering the model database
      Recovering the sybsystemprocs database
        Restoring sybsystemprocs with installmaster
        Restoring sybsystemprocs with load database
      How to Reduce the Size of tempdb
        Reset tempdb to default size
      Restoring system tables with disk reinit and disk refit
        Restoring sysdevices with disk reinit
        Restoring sysusages and sysdatabase with disk refit
    Archive Database Access
      Overview
        Components of an archive database
          The database dump
          The modified pages section
          The sysaltusages table and the scratch database
        Working with an archive database
          DDLGen support for archive database access
      Configuring an archive database
        Sizing the modified pages section
        Increasing the amount of space allocated to the modified pages section
        Materializing an archive database
          Using load database with norecovery
          Using logical devices with an archive database
          load database limitations with an archive database
        Bringing an archive database online
        Loading a transaction log into an archive database
        Dropping an archive database
      Using an archive database
        Using SQL commands with an archive database
        Using dbcc commands with an archive database
        Typical archive database command sequence
      Compressed dumps for an archive database
        Creating a compression memory pool
      Upgrading and downgrading an archive database
        Upgrading an Adaptive Server with an archive database
        Downgrading an Adaptive Server with an archive database
        Compatibility issues for a compressed dump
      Archive database limitations
    Expanding Databases Automatically
      Understanding disks, devices, databases, and segments
      Threshold action procedures
      Installing automatic database expansion procedures
      Running sp_dbextend
        Command options in the sp_dbextend interface
        Validating current thresholds
      Setting up a database for automatic expansion
      Restrictions and limitations
    Managing Free Space with Thresholds
      Monitoring free space with the last-chance threshold
        Crossing the threshold
        Controlling how often sp_thresholdaction executes
      Rollback records and the last-chance threshold
        Calculating the space for rollback records
          Using lct_admin to determine the free log space
        Determining the current space for rollback records
        Effect of rollback records on the last-chance threshold
        User-defined thresholds
      Last-chance threshold and user log caches for shared log and data segments
        Using lct_admin abort to abort suspended transactions
      Adding space to the master database’s transaction log
      Automatically aborting or suspending processes
        Using abort tran on log full to abort transactions
      Waking suspended processes
      Adding, changing, and deleting thresholds
        Displaying information about existing thresholds
        Thresholds and system tables
        Adding a free-space threshold
        Changing or specifying a new free-space threshold
        Dropping a threshold
      Creating a free-space threshold for the log segment
        Testing and adjusting the new threshold
      Creating additional thresholds on other segments
        Determining threshold placement
      Creating threshold procedures
        Declaring procedure parameters
        Generating error log messages
        Dumping the transaction log
        A simple threshold procedure
        A more complex procedure
        Deciding where to put a threshold procedure
      Disabling free-space accounting for data segments
  Migration Technology Guide 15.5
    About this book
    Migration Strategy
      Preupgrade considerations
        Understanding optimization goals
          Optimization criteria
        Resource recommendations for Adaptive Server 15.0
        Incorporating statistics in Adaptive Server 15.0
        Recommended testing before upgrade
      Migrating to Adaptive Server 15.0 features
        Upgrading, and using new features immediately
        Upgrading, and using new features later
        Upgrading, but not using new features
      Troubleshooting
        Query processing tips
        Information to capture before contacting Technical Support
          701 errors
          Performance problems with a limited number of queries
          System-wide performance issues
          Uploading diagnostics to Technical Support
    QPTune
      Setting up your system
      Using QPTune to fix missing statistics
        Starting QPTune to fix missing statistics
        Collecting statistics
        Fixing statistics
        Using undo_fix_stats
      Using QPTune to tune queries or applications
        Starting QPTune to tune queries or applications
          Simple start
          Custom start
        Collecting metrics
        Comparing metrics
        Applying the best results
      Configuration file
      Examples
      Upgrade issues
      Localization
      QPTune GUI
        Environment and system requirements
        Starting the QPTune GUI
        Fixing missing statistics
        Tuning Task
      QPTune reference information
    Running the Query Processor in Compatibility Mode
      Enabling compatibility mode
      Feature support in compatibility mode
      Additional trace flag for diagnostics
      New stored procedure sp_compatmode
      Changes to @@qpmode global variable
      Diagnostic tool
  Performance and Tuning Series: Basics 15.7
    Introduction to the Basics
      Good performance
        Response time
        Throughput
        Designing for performance
      Tuning performance
        Tuning levels
          Application layer
          Database layer
          Adaptive Server layer
          Devices layer
          Network layer
          Hardware layer
          Operating system layer
      Identifying system limits
        Threads, thread pools, engines and CPUs
        Varying logical page sizes
        Number of columns and column size
        Maximum length of expressions, variables, and stored procedure arguments
        Number of logins
        Performance implications for limits
      Size of kernel resource memory
      Analyzing performance
        Normal forms
        Locking
        Special considerations
    Networks and Performance
      Potential performance problems
        Basic questions on network performance
        Techniques summary
      Engine and thread affinity
        Network listeners
          Network listeners in process mode
      How Adaptive Server uses the network
      Configuring the I/O controller
        Dynamically reconfiguring I/O tasks
      Changing network packet sizes
      Large versus default packet sizes for user connections
        Number of packets is important
        Adaptive Server evaluation tools
        Other evaluation tools
        Server-based techniques for reducing network traffic
      Impact of other server activities
        Single user versus multiple users
      Improving network performance
        Isolate heavy network users
        Set tcp no delay on TCP networks
        Configure multiple network listeners
    Using Engines and CPUs
      Background concepts
        How Adaptive Server processes client requests
        Client task implementation
      Single-CPU process model
        Scheduling engines to the CPU
        Scheduling tasks to the engine
        Execution task scheduling
          Scheduling client task processing time
          Maintaining CPU availability during idle time
      Adaptive Server SMP process model
        Scheduling engines to CPUs
        Scheduling Adaptive Server tasks to engines
        Multiple network engines
        Task priorities and run queues
        Processing scenario
      Asynchronous log service
        Understanding the user log cache (ULC) architecture
        When to use ALS
        Using the ALS
          ULC flusher
          Log writer
      Housekeeper wash task improves CPU utilization
        Side effects of the housekeeper wash task
        Configuring the housekeeper wash task
          Changing the percentage by which writes can be increased
          Disabling the housekeeper wash task
          Allowing the housekeeper wash task to work continuously
      Measuring CPU usage
        Single-CPU machines
          Using sp_monitor to measure CPU usage
          Using sp_sysmon to measure CPU usage
          Operating system commands and CPU usage
        Determining when to configure additional engines
        Taking engines offline
      Enabling engine-to-CPU affinity
      Multiprocessor application design guidelines
    Distributing Engine Resources
      Successfully distributing resources
        Environment analysis and planning
          Analyzing the environment
          Phase 1 – execution object behavior
          Phase 2 – the entire environment
        Performing benchmark tests
        Setting goals
        Results analysis and tuning
      Managing preferred access to resources
      Types of execution classes
      Execution class attributes
        Base priority
          Setting the task priority
        Task-to-engine affinity
          Engine group affinity when switching modes
      Setting execution class attributes
        Assigning execution classes
        Scheduling service tasks
        Creating user-defined execution class task affinity
        How execution class bindings affect scheduling
          Execution class bindings
          Engine affinity can affect scheduling in process mode
        Setting attributes for a session only
        Getting information about execution classes
      Determining precedence and scope
        Multiple execution objects and ECs
          Precedence rule
          Scope rule
        Resolving a precedence conflict
        Examples: determining precedence
      Example scenario using precedence rules
        Planning
        Configuration
        Execution characteristics
      Considerations for engine resource distribution
        Client applications: OLTP and DSS
          Unintrusive client applications
          I/O-bound client applications
          Critical applications
        Adaptive Server logins: high-priority users
        Stored procedures: ā€œhot spotsā€
    Memory Use and Performance
      How memory affects performance
      How much memory to configure
      Dynamic reconfiguration
        How memory is allocated
        Large allocation in Adaptive Server
      Caches in Adaptive Server
        Cache sizes and buffer pools
      Procedure cache
        Getting information about the procedure cache size
          Monitoring procedure cache performance
        Procedure cache sizing
        Estimating stored procedure size
        Estimating the procedure cache size for a sort
        Estimating the amount of procedure cache used by create index
        Reducing query processing latency
          Reusing dynamic SQL LWPs across multiple connections
      Statement cache
      Data cache
        Page aging in data cache
        Effect of data cache on retrievals
        Effect of data modifications on the cache
        Data cache performance
        Testing data cache performance
          Cache hit ratio for a single query
          Cache hit ratio information from sp_sysmon
      Configuring the data cache to improve performance
        Commands to configure named data caches
        Tuning named caches
        Cache configuration goals
        Gather data, plan, and then implement
        Evaluating cache needs
        Large I/O and performance
          The optimizer and cache choices
          Choosing the right mix of I/O sizes for a cache
        Reducing spinlock contention with cache partitions
        Cache replacement strategies and policies
          Strategies
          Policies
      Named data cache recommendations
        Sizing caches for special objects, tempdb, and transaction logs
          Examining cache needs for tempdb
          Examining cache needs for transaction logs
          Choosing the I/O size for the transaction log
          Configuring for large log I/O size
          Additional tuning tips for log caches
        Basing data pool sizes on query plans and I/O
          Checking I/O size for queries
        Configuring buffer wash size
        Overhead of pool configuration and binding objects
          Pool configuration overhead
          Cache binding overhead
      Maintaining data cache performance for large I/O
        Diagnosing excessive I/O counts
        Using sp_sysmon to check large I/O performance
      Speed of recovery
        Tuning the recovery interval
        Effects of the housekeeper wash task on recovery time
      Auditing and performance
        Sizing the audit queue
        Auditing performance guidelines
      Text and image pages
    Tuning Asynchronous Prefetch
      How asynchronous prefetch improves performance
        Improving query performance by prefetching pages
        Prefetching control mechanisms in a multiuser environment
        Look-ahead set during recovery
          Prefetching log pages
          Prefetching data and index pages
        Look-ahead set during sequential scans
        Look-ahead set during nonclustered index access
        Look-ahead set during dbcc checks
          Allocation checking
          checkdb and checktable
        Look-ahead set minimum and maximum sizes
      When prefetch is automatically disabled
        Flooding pools
        I/O system overloads
        Unnecessary reads
          Page chain fragmentation
      Tuning goals for asynchronous prefetch
        Commands for configuration
      Other Adaptive Server performance features
        Large I/O
          Sizing and limits for the 16K pool
          Limits for the 2K pool
        Fetch-and-discard (MRU) scans
        Parallel scans and large I/Os
          Hash-based table scans
          Partition-based scans
      Special settings for asynchronous prefetch limits
        Setting limits for recovery
        Setting limits for dbcc
      Maintenance activities for high prefetch performance
        Eliminating kinks in heap tables
        Eliminating kinks in clustered index tables
        Eliminating kinks in nonclustered indexes
      Performance monitoring and asynchronous prefetch
  Performance and Tuning Series: Improving Performance with Statistical Analysis 15.7
    Using the set statistics Commands
      set command syntax
      Using simulated statistics
      Checking subquery cache performance
      Checking compile and execute time
        Converting ticks to milliseconds
      Reporting physical and logical I/O statistics
        Total actual I/O cost value
        Statistics for writes
        Statistics for reads
          Sample output with and without an index
        statistics io output for cursors
        Scan count
          Queries reporting a scan count of 1
          Queries reporting a scan count of more than 1
          Queries reporting scan count of 0
        Relationship between physical and logical reads
          Logical reads, physical reads, and 2K I/O
          Physical reads and large I/O
          Reads and writes on worktables
          Effects of caching on reads
        statistics io and merge joins
      Analyzing queries with set statistics plancost
        set statistics plancost example
    Statistics Tables and Displaying Statistics with optdiag
      System tables that store statistics
        systabstats table
        sysstatistics table
      Viewing statistics with the optdiag utility
        optdiag syntax
        optdiag header information
        Table statistics
          Table-level derived statistics
          Data page cluster ratio
          Space utilization
          Large I/O efficiency
        Index statistics
          Index-level derived statistics
          Data page cluster ratio
          Index page cluster ratio
          Data row cluster ratio
          Space utilization for an index
          Large I/O efficiency for an index
        Column statistics
          Sample output for column statistics
          Range cell and total density values
          Range and in-between selectivity values
        Histogram displays
          Sample output for histograms
          Understanding histogram output
          Histograms for columns with highly duplicated values
          Choosing the number of steps for highly duplicated values
        Configuring the histogram tuning factor
          How many histogram steps?
      Changing statistics with optdiag
        Using optdiag binary
          When to use binary
        Updating selectivities with optdiag input mode
        Editing histograms
          Adding frequency count cells to a histogram
          Skipping load-time verification for step numbering
          Rules checked during histogram loading
          Re-creating indexes without losing statistics updates
      Using simulated statistics
        optdiag syntax for simulated statistics
        Simulated statistics output
        Requirements for loading and using simulated statistics
          Using simulated statistics in the original database
          Using simulated statistics in another database
        Dropping simulated statistics
        Running queries with simulated statistics
          showplan messages for simulated statistics
      Character data containing quotation marks
      Effects of SQL commands on statistics
        How query processing affects systabstats
      Viewing statistics and histograms using sp_showoptstats
  Performance and Tuning Series: Locking and Concurrency Control 15.7
    Introduction to Locking
      How locking affects performance
      Locking and data consistency
      Granularity of locks and locking schemes
        Allpages locking
        Datapages locking
        Datarows locking
      Types of locks in Adaptive Server
        Page and row locks
        Table locks
          Commands that take intent locks
        Demand locks
          Demand locking with serial execution
          Demand locking with parallel execution
        Row-locked system tables
        Range locking for serializable reads
        Latches
      Lock compatibility and lock sufficiency
      How isolation levels affect locking
        Isolation level 0, read uncommitted
        Isolation level 1, read committed
        Isolation level 2, repeatable read
        Isolation level 3, serializable reads
        Adaptive Server default isolation level
      Lock types and duration during query processing
        Lock types during create index commands
        Locking for select queries at isolation level 1
        Table scans and isolation levels 2 and 3
          Table scans and table locks at isolation level 3
          Isolation level 2 and allpages-locked tables
        When update locks are not required
        Locking during or processing
          Processing or queries for allpages-locked tables
          Processing or queries for data-only-locked tables
        Skipping uncommitted inserts during selects
          Skipping uncommitted inserts during deletes, updates, and inserts
          Locking during DMLs on tables with referential integrity constraints
        Using alternative predicates to skip nonqualifying rows
      Pseudocolumn-level locking
        Select queries that do not reference the updated column
        Qualifying old and new values for uncommitted updates
      Reducing contention
    Locking Configuration and Tuning
      Locking and performance
        Using sp_sysmon and sp_object_stats
        Reducing lock contention
          Adding indexes to reduce contention
          Keeping transactions short
          Avoiding hot spots
        Additional locking guidelines
      Configuring locks and lock promotion thresholds
        Configuring the Adaptive Server lock limit
          Estimating number of locks for data-only-locked tables
        Setting lock promotion thresholds
          Lock promotion and scan sessions
          Lock promotion high water mark
          Lock promotion low water mark
          Lock promotion percent
          Setting server-wide lock promotion thresholds
          Setting the lock promotion threshold for a table or database
          Precedence of settings
          Dropping database and table settings
          Using sp_sysmon while tuning lock promotion thresholds
      Choosing the locking scheme for a table
        Analyzing existing applications
        Choosing a locking scheme based on contention statistics
        Monitoring and managing tables after conversion
        Applications not likely to benefit from data-only locking
          Tables where clustered index performance must remain high
          Tables with maximum-length rows
      Optimistic index locking
        Using optimistic index locking
        Cautions and issues
    Locking Reports
      Locking tools
        Getting information about blocked processes
        Viewing locks with sp_lock
        Viewing locks with sp_familylock
        Intrafamily blocking during network buffer merges
        Monitoring lock timeouts
      Deadlocks and concurrency
        Server-side versus application-side deadlocks
          Application deadlock example
        Server task deadlocks
        Deadlocks and parallel queries
        Printing deadlock information to the error log
        Avoiding deadlocks
          Acquiring locks on objects in the same order
          Delaying deadlock checking
      Identifying tables where concurrency is a problem
      Lock management reporting
    Using Locking Commands
      Specifying the locking scheme for a table
        Specifying a server-wide locking scheme
        Specifying a locking scheme with create table
        Changing a locking scheme with alter table
        Before and after changing locking schemes
        Expense of switching to or from allpages locking
        Sort performance during alter table
        Specifying a locking scheme with select into
      Controlling isolation levels
        Setting isolation levels for a session
        Syntax for query-level and table-level locking options
        Using holdlock, noholdlock, or shared
        Using the at isolation clause
        Making locks more restrictive
        Making locks less restrictive
      Readpast locking
      Cursors and locking
        Using the shared keyword
      Additional locking commands
        lock table
        Lock timeouts
    Indexes
      Types of indexes
        Index pages
          Root level
          Leaf level
          Intermediate level
        Index size
      Indexes and partitions
        Local indexes on partitioned tables
        Global indexes on partitioned tables
        Local versus global indexes
        Unsupported partition index types
      Clustered indexes on allpages-locked tables
        Clustered indexes and select operations
          Relationship between physical and logical reads
        Clustered indexes and insert operations
        Page splitting on full data pages
          Exceptions to page splitting
        Page splitting on index pages
        Performance impacts of page splitting
        Overflow pages
        Clustered indexes and delete operations
          Deleting the last row on a page
          Index page merges
      Nonclustered indexes
        Leaf pages revisited
        Nonclustered index structure
        Nonclustered indexes and select operations
        Nonclustered index performance
        Nonclustered indexes and insert operations
        Nonclustered indexes and delete operations
        Clustered indexes on data-only-locked tables
      Index covering
        Covering matching index scans
        Covering nonmatching index scans
      Indexes and caching
        Using separate caches for data and index pages
        Index trips through the cache
    Indexing for Concurrency Control
      How indexes affect performance
      Detecting indexing problems
        Symptoms of poor indexing
          Lack of indexes is causing table scans
          Index is not selective enough
          Index does not support range queries
          Too many indexes slow data modification
          Index entries are too large
          Exception for wide data rows and wide index rows
      Fixing corrupted indexes
      Index limits and requirements
      Choosing indexes
        Index keys and logical keys
        Guidelines for clustered indexes
        Choosing clustered indexes
        Candidates for nonclustered indexes
        Choosing function-based indexes
        Index selection
          Examples of using index selection
        Other indexing guidelines
        Choosing nonclustered indexes
          Performance price for data modification
        Choosing composite indexes
        Key order and performance in composite indexes
        Advantages and disadvantages of composite indexes
        Using online reorg rebuild for data-only-locked indexes
      Techniques for choosing indexes
        Choosing an index for a range query
        Adding a point query with different indexing requirements
      Index and statistics maintenance
        Dropping indexes that hurt performance
        Choosing space management properties for indexes
      Additional indexing tips
        Creating artificial columns
        Keeping index entries short and avoiding overhead
        Dropping and rebuilding indexes
        Configuring enough sort buffers
        Creating the clustered index first
        Configure large buffer pools
      Asynchronous log service
        Understanding the user log cache (ULC) architecture
        When to use ALS
        Using ALS
          ULC flusher
          Log writer
          Stored procedure support for ALS
  Performance and Tuning Series: Monitoring Adaptive Server with sp_sysmon 15.7
    Introduction to sp_sysmon
      Using sp_sysmon
        When to run sp_sysmon
      Invoking sp_sysmon
        Fixed-time intervals
        Using begin_sample and end_sample
        Specifying report sections for output
        Specifying the application detail parameter
        Using the noclear option
        Redirecting output to a file
    Monitoring Performance with sp_sysmon
      How to use the reports
        Header information
        Reading output
          Rows
          Columns in output
        Interpreting the data
          Per-second and per-transaction data
          Percent of total and count data
          Per engine data
          Total or summary data
      Cache Wizard
        Cache wizard syntax
        Preparing to run the cache wizard
        Sample output
        Sample output for Cache Wizard
      Kernel utilization
        Kernel Utilization – threaded mode
          Sample output
          Engine Utilization (Tick %)
          Average Runnable Tasks
          CPU Yields by Engine
          Thread Utilization (OS %)
          Page Faults at OS
          Context Switches at OS
          CtlibController, DiskController, and NetController Activity
          Blocking Call Activity
        Kernel Utilization – process mode
          Sample output
          Engine Busy Utilization
          CPU Yields by Engine
          Network Checks
          Disk I/O Checks
          Total Disk I/O Checks
      Worker Process Management
        Sample output
        Worker Process Requests
        Worker Process Usage
        Memory Requests for Worker Processes
        Avg Mem Ever Used By a WP
      Parallel Query Management
        Sample output
        Parallel Query Usage
        Merge Lock Requests
        Sort Buffer Waits
      Task Management
        Sample output
        Connections Opened
        Task Context Switches by Engine
        Task Context Switches Due To
          Voluntary Yields
          Cache Search Misses
          Exceeding I/O Batch Size
          System Disk Writes
          Logical Lock Contention
          Address Lock Contention
          Latch Contention
          Physical, logical, and object Lock Transition
          Log Semaphore Contention
          PLC Lock Contention
          Group Commit Sleeps
          Last Log Page Writes
          Modify Conflicts
          I/O Device Contention
          Network Packet Received
          Network Packet Sent
          Network Services
          Other Causes
      Application Management
        Requesting detailed application information
        Sample output
        Application Statistics Summary (All Applications)
          Priority Changes
          Allotted Slices Exhausted
          Skipped Tasks By Engine
          Engine Scope Changes
        Per Application Or Per Application And Login
          Application Activity
          Application Priority Changes
          Application I/Os Completed
          Resource Limits Violated
      ESP Management
        Sample output
          ESP Requests
          Avg. Time to Execute an ESP
      Housekeeper Task Activity
        Sample output
        Buffer Cache Washes
        Garbage Collections
        Pages Processed in GC
        Statistics Updates
      Monitor Access to Executing SQL
        Sample output
        Waits on Execution Plans
        Number of SQL Text Overflows
        Maximum SQL Text Requested
      Transaction Profile
        Sample output
        Transaction Summary
          How to count multidatabase transactions
        Transaction Detail
        Inserts
          Fully and minimally logged
          Total Rows Inserted
        Updates and update detail sections
          Updates
          Data-Only-Locked Updates
        Deletes
          Fully and minimally logged
          Total Rows Deleted
      Transaction Management
        Sample output
        ULC Flushes to Xact Log
          Any Logging Mode DMLs
          Fully Logged DMLs
          Minimally Logged DMLs
        Total ULC Flushes
        ULC Flushes Skipped
          Fully Logged DMLs
          Minimally Logged DMLs
          Total ULC Flushes Skips
        ULC Log Records
          Fully Logged DMLs
          Minimally Logged DMLs
          Total ULC Log Records
        Max ULC Size During Sample
          Fully Logged DMLs
          Minimally Logged DMLs
        ML-DMLs Sub-Command Scans
          ULC scans
          syslogs Scans
          Total Sub-Command Scans
        ML-DMLs ULC Efficiency
          Discarded Sub-Commands
          Logged Sub-Commands
        Total ML-DML Sub-Commands
        ULC Semaphore Requests
        Log Semaphore Requests
        Transaction Log Writes
        Transaction Log Allocations
        Avg # Writes per Log Page
        Tuning Recommendations for Transaction Management
      Index Management
        Sample output
        Nonclustered Maintenance
          Ins/Upd Requiring Maint
          Deletes Requiring Maintenance
          RID Upd from Clust Split
          Upd/Del DOL Req Maint
        Page Splits
          Reducing page splits for ascending key inserts
          Default data page splitting
          Effects of ascending inserts
          Setting ascending inserts mode for a table
          Retries and Deadlocks
          Add Index Level
        Page Shrinks
        Index Scans
      Metadata Cache Management
        Sample output
        Open Object, Index, Partition, and Database Usage
        Descriptors immediately discarded
        Object Manager Spinlock Contention
        Object and Index Spinlock Contention
        Index Hash Spinlock Contention
          Using sp_monitorconfig to find metadata cache usage statistics
        Partition Spinlock Contention
        Partition Hash Spinlock Contention
      Lock Management
        Sample output
        Lock Summary
        Lock Detail
          Exclusive Address and Shared Address
          Last Page Locks on Heaps
          Table Lock Hashtable
        Deadlocks by Lock Type
        Deadlock Detection
          Deadlock Searches
          Searches Skipped
          Average Deadlocks per Search
        Lock Promotions
        Lock Time-out Information
        Cluster Lock Summary
      Data Cache Management
        Sample output
        Cache Statistics Summary (All Caches)
          Cache Search Summary
          Cache Turnover
          Cache Strategy Summary
          Large I/O Usage
          Large I/O Effectiveness
          Asynchronous Prefetch Activity Report
          Other Asynchronous Prefetch Statistics
          Dirty Read Behavior
        Cache Management by Cache
          Cache Spinlock Contention
          Utilization
          Cache Search, Hit, and Miss Information
          Pool Turnover
          Cluster Cache Behavior
          Buffer Wash Behavior
          Cache Strategy
          Large I/O Usage
          Large I/O Detail
          Dirty Read Behavior
      Procedure Cache Management
        Sample output
        Procedure Requests
        Procedure Reads from Disk
        Procedure Writes to Disk
        Procedure Removals
        Procedure Recompilations
        SQL Statement Cache
          Sample output
      Memory Management
        Sample output
        Pages Allocated
        Pages Released
      Recovery Management
        Sample output
        Checkpoints
          # of Normal Checkpoints
          # of Free Checkpoints
          Total Checkpoints
        Average Time per Normal Checkpoint
        Average Time per Free Checkpoint
        Increasing the Housekeeper Batch Limit
      Disk I/O Management
        Sample output
        Maximum Outstanding I/Os
        I/Os Delayed by
          Disk I/O Structures
          Server Configuration Limit
          Engine Configuration Limit
          Operating System Limit
        Requested and Completed Disk I/Os
          Total Requested Disk I/Os
          Completed Disk I/Os
        Device Activity Detail
          Reads and Writes
          Total I/Os
          Mirror Semaphore Granted and Waited
      Network I/O Management
        Sample output
        Total Network I/Os Requests
        Network I/Os Delayed
        Total TDS Packets Received
        Total Bytes Received
        Average Bytes Received per Packet
        Total TDS Packets Sent
        Total Bytes Sent
        Average Bytes Sent per Packet
      Replication Agent
        Sample output
          Log Scan Summary
          Log Records Scanned
          Log Records Processed
          Number of Log Scans
          Amount of Time for Log Scans
          Longest Time for Log Scan
          Average Time per Log Scan
          Log Scan Activity
          Transaction Activity
          Log Extension Wait
          Schema Cache
          Backward Schema
          Truncation Point Movement
          Connections to Replication Server
          Network Packet Information
          I/O Wait from RS
  Performance and Tuning Series: Monitoring Tables 15.7
    Introduction to Monitoring Tables
      Monitoring tables in Adaptive Server
        Where does the monitoring information come from?
        Using Transact-SQL to monitor performance
      Installing the monitoring tables
        Versions earlier than 15.0.2, except Cluster Edition
          Configuring loopback proxy server for 15.0.1 ESD #2 and earlier
      Remotely accessing and editing monitoring tables
      Configuring the monitoring tables to collect data
        Allocating memory for pipe error messages
        Configuration parameters for the monitoring tables
        Error 12036
      The mon_role and additional access controls
      Wrapping counter datatypes
      Stateful historical monitoring tables
        Transient monitoring data
      Using monitoring tables in a clustered environment
        Configuring the system view
        InstanceID added to monitor instances
      Monitoring tables for the statement cache
        Configuring Adaptive Server to monitor the statement cache
        Deleting statements from the statement cache
        Obtaining the hash key from the SQL text
        Displaying text and parameter information for cached statements
      Examples of querying the monitoring tables
    Wait Events
      Event 19: xact coord: pause during idle loop
        Action
      Event 29: waiting for regular buffer read to complete
        Action
      Event 30: wait to write MASS while MASS is changing
        Action
      Event 31: waiting for buf write to complete before writing
        Action
      Event 32: waiting for an APF buffer read to complete
        Action
      Event 35: waiting for buffer validation to complete
        Action
      Event 36: waiting for MASS to finish writing before changing
        Action
      Event 37: wait for MASS to finish changing before changing
        Action
      Event 41: wait to acquire latch
        Action
      Event 46: wait for buf write to finish getting buf from LRU
        Action
      Event 51: waiting for last i/o on MASS to complete
        Action
      Event 52: waiting for i/o on MASS initiated by another task
        Action
      Event 53: waiting for MASS to finish changing to start i/o
        Action
      Event 54: waiting for write of the last log page to complete
        Action
      Event 55: wait for i/o to finish after writing last log page
        Action
      Event 57: checkpoint process idle loop
        Action
      Event 61: hk: pause for some time
        Action
      Event 70: waiting for device semaphore
        Action
      Event 83: wait for DES state is changing
        Action
      Event 84: wait for checkpoint to complete
        Action
      Event 85: wait for flusher to queue full DFLPIECE
        Action
      Event 91: waiting for disk buffer manager i/o to complete
        Action
      Event 99: wait for data from client
        Action
      Event 104: wait until an engine has been offlined
        Action
      Event 124: wait for mass read to finish when getting page
        Action
      Event 142: wait for logical connection to free up
        Action
      Event 143: pause to synchronise with site manager
        Action
      Event 150: waiting for a lock
        Action
      Event 157: wait for object to be returned to pool
        Action
      Event 169: wait for message
        Action
      Event 171: wait for CTLIB event to complete
        Action
      Event 178: waiting while allocating new client socket
        Action
      Event 179: waiting while no network read or write is required
        Action
      Event 197: waiting for read to complete in parallel dbcc
        Action
      Event 200: waiting for page reads in parallel dbcc
        Action
      Event 201: waiting for disk read in parallel dbcc
        Action
      Event 202: waiting to re-read page in parallel
        Action
      Event 203: waiting on MASS_READING bit in parallel dbcc
        Action
      Event 205: waiting on TPT lock in parallel dbcc
        Action
      Event 207: waiting sending fault msg to parent in PLL dbcc
        Action
      Event 209: waiting for a pipe buffer to read
        Action
      Event 210: waiting for free buffer in pipe manager
        Action
      Event 214: waiting on run queue after yield
        Action
      Event 215: waiting on run queue after sleep
        Action
      Event 222: replication agent sleeping during flush
        Action
      Event 250: waiting for incoming network data
        Action
      Event 251: waiting for network send to complete
        Action
      Event 259: waiting until last chance threshold is cleared
        Action
      Event 260: waiting for date or time in waitfor command
        Action
      Event 266: waiting for message in worker thread mailbox
        Action
      Event 272: waiting for lock on ULC
        Action
      Event 334: waiting for Lava pipe buffer for write
        Action
      Event 374: wait for lock pending/data pending to be cleared
        Action
      Event 375: OCM wait for finishing BAST handling
        Action
      Event 389: OCM wait for pushing data flag to be cleared
      Event 380: lock/data pending to reset when OCM_ERR_DIDNTWAIT
        Action
      Event 483: Waiting for ack of a multicast synchronous message
        Action
  Performance and Tuning Series: Physical Database Tuning 15.7
    Controlling Physical Data Placement
      Improving performance by controling object placement
        Identifying poor object placement
        Using sp_sysmon while changing data placement
      Improving I/O performance
        Spreading data across disks to avoid I/O contention
          Avoiding physical contention in parallel join queries
        Isolating server-wide I/O from database I/O
          tempdb
          sybsecurity
        Keeping transaction logs on a separate disk
        Mirroring a device on a separate disk
          Using serial mode
      Using segments
        Creating objects on segments
        Separating tables and indexes
        Splitting large tables across devices
        Moving text storage to a separate device
      Partitioning tables for performance
        How Adaptive Server distributes partitions on devices
          RAID devices and partitioned tables
      Space planning for partitioned tables
        Read-only tables
        Read-mostly tables
        Tables with random data modification
      Adding disks when devices are full
        Adding disks when devices are full
        Adding disks when devices are nearly full
      Maintenance issues and partitioned tables
        Regular maintenance checks for partitioned tables
    Data Storage
      Query optimization
        Query processing and page reads
      Adaptive Server pages
        Page headers and page sizes
        Data and index pages
        Large object (LOB) pages
        Extents
      Pages that manage space allocation
        Global allocation map pages
        Allocation pages
        Object allocation map pages
        How OAM pages and allocation pages manage object storage
        Page allocation keeps an object’s pages together
        Data access using sysindexes and syspartitions
      Space overheads
        Number of columns and size
          Variable-length columns in APL tables
          Variable-length columns in DOL tables
        Number of rows per data page
        Additional number of object and size restrictions
      Tables without clustered indexes
        Locking schemes
        Select operations on heap tables
          Allpages-locked heap tables
          Data-only locked heap tables
        Inserting data into an allpages-locked heap table
        Inserting data into a data-only-locked heap table
        Deleting data from a heap table
          Deleting from an allpages-locked heap table
          Deleting from a data-only locked heap table
          Deleting the last row on a page
        Updating data on a heap table
          Allpages-locked heap tables
          Data-only-locked heap tables
        How Adaptive Server performs I/O for heap operations
          Sequential prefetch, or large I/O
        Maintaining heap tables
          Using reorg rebuild to reclaim space
          Reclaiming space by creating a clustered index
          Reclaiming space using bcp
        Transaction log: a special heap table
        Asynchronous prefetch and I/O on heap tables
      Caches and object bindings
        Heap tables, I/O, and cache strategies
          LRU replacement strategy
          MRU replacement strategy
        Select operations and caching
        Data modification and caching
          Caching and inserts on heap tables
          Caching, update, and delete operations on heap tables
    Setting Space Management Properties
      Reducing index maintenance
        Advantages of using fillfactor
        Disadvantages of using fillfactor
        Setting fillfactor values
        fillfactor examples
          No stored fillfactor values
          Table-level or clustered index fillfactor value stored
        Using the sorted_data and fillfactor options
      Reducing row forwarding
        Default, minimum, and maximum values for exp_row_size
          Default value
        Specifying an expected row size with create table
        Adding or changing an expected row size
        Setting a default expected row size server-wide
        Displaying the expected row size for a table
        Choosing an expected row size for a table
          Using optdiag to check for forwarded rows
          Querying systabstats for forwarded rows
        Conversion of max_rows_per_page to exp_row_size
        Monitoring and managing tables that use expected row size
      Leaving space for forwarded rows and inserts
        Extent allocation commands and reservepagegap
        Specifying a reserve page gap with create table
        Specifying a reserve page gap with create index
        Changing reservepagegap
        reservepagegap examples
          reservepagegap specified only for the table
          reservepagegap specified for a clustered index
        Choosing a value for reservepagegap
        Monitoring reservepagegap settings
        reservepagegap and sorted_data options
          Matching options and goals
      Using max_rows_per_page on allpages-locked tables
        Reducing lock contention
        Indexes and max_rows_per_page
        select into and max_rows_per_page
        Applying max_rows_per_page to existing data
    Table and Index Size
      Determining the sizes of tables and indexes
      Effects of data modifications on object sizes
      Using optdiag to display object sizes
        Advantages of optdiag
        Disadvantages of optdiag
      Using sp_spaceused to display object size
        Advantages of sp_spaceused
        Disadvantages of sp_spaceused
      Using sp_estspace to estimate object size
        Advantages of sp_estspace
        Disadvantages of sp_estspace
      Using formulas to estimate object size
        Factors that can affect storage size
        Storage sizes for datatypes
        Tables and indexes used in the formulas
        Calculating table and clustered index sizes for allpages-locked tables
          Calculate the data row size
          Compute the number of data pages
          Compute the size of clustered index rows
          Compute the number of clustered index pages
          Compute the total number of index pages
          Calculate allocation overhead and total pages
          Calculate the size of the leaf index row
          Calculate the number of leaf pages in the index
          Calculate the size of the nonleaf rows
          Calculate the number of non-leaf pages
          Calculate the total number of non-leaf index pages
          Calculate allocation overhead and total pages
        Calculating the sizes of data-only-locked tables
          Calculate the data row size
          Compute the number of data pages
          Calculate allocation overhead and total pages
          Calculate the size of the index row
          Calculate the number of leaf pages in the index
          Calculate the number of non-leaf pages in the index
          Calculate the total number of non-leaf index pages
          Calculate allocation overhead and total pages
        Other factors affecting object size
          Effects of space management properties
        Very small rows
        LOB pages
        Advantages of using formulas to estimate object size
        Disadvantages of using formulas to estimate object size
    Database Maintenance
      Running reorg on tables and indexes
      Creating and maintaining indexes
        Configuring Adaptive Server to speed sorting
        Dumping the database after creating an index
        Creating an index on sorted data
        Maintaining index and column statistics
        Rebuilding indexes
      Creating or altering a database
      Backup and recovery
        Local backups
        Remote backups
        Online backups
        Using thresholds to prevent running out of log space
        Minimizing recovery time
        Recovery order
      Bulk-copy
        Parallel bulk-copy
        Batches and bulk-copy
        Slow bulk-copy
        Improving bulk-copy performance
        Replacing the data in a large table
        Adding large amounts of data to a table
        Using partitions and multiple bulk-copy processes
        Impacts on other users
      Database consistency checker
      Using dbcc tune (cleanup)
      Using dbcc tune on spinlocks
      Determining the space available for maintenance activities
        Overview of space requirements
        Checking space usage and space available
          Checking space used for tables and indexes
          Checking space on segments
          Checking space requirements for space management properties
          Space management properties applied to the table
          Space management properties applied to the index
        Estimating the effects of space management properties
        If there is not enough space
    Temporary Databases
      How temporary database management affects performance
      Using temporary tables
        Hashed (#) temporary tables
        Regular user tables
        Worktables
      Temporary databases
      Session-assigned temporary database
      Using multiple temporary databases
        Creating user temporary databases
        Configuring a default tempdb group
        Binding to groups and tempdb
          Binding applications and logins to temporary databases
      Tuning system temporary databases for performance
        Placing system tempdb
          Initial allocation of system tempdb
          Dropping the master device from tempdb segments
        Configuring user-created temporary databases
          Caching user temporary databases
        General guidelines
          Using multiple disks for parallel query performance
          Binding tempdb to its own cache
          Determining the size of temporary databases
          Minimizing logging in temporary databases
          Optimizing temporary tables
      Logging optimizations for temporary databases
        User log cache (ULC)
  Performance and Tuning Series: Query Processing and Abstract Plan 15.7
    Understanding Query Processing
      Query optimizer
        Factors analyzed in optimizing queries
        Transformations for query optimization
          Search arguments converted to equivalent arguments
          Search argument transitive closure applied where applicable
          equi-join predicate transitive closure applied where applicable
          Predicate transformation and factoring to provide additional optimization paths
        Handling search arguments and useful indexes
          Nonequality operators
        Handling joins
          Join density and join histograms
          Expression histogramming selectivity estimates
          Joins with mixed datatypes
          Joins with expressions and or predicates
          join ordering
      Optimization goals
        Limiting the time spent optimizing a query
      Parallelism
      Optimization issues
      Lava query execution engine
        Lava query plans
          Lava operators
          Lava query execution
      How update operations are performed
        Direct updates
          In-place updates
          Cheap direct updates
          Expensive direct updates
        Deferred updates
          When deferred updates are required
        Deferred index inserts
        Restrictions on update modes through joins
          Joins and subqueries in update and delete statements
          Deletes and updates in triggers versus referential integrity
        Optimizing updates
          Designing for direct updates
          Effects of update types and indexes on update modes
        Using sp_sysmon while tuning updates
    Using showplan
      Displaying a query plan
        Query plans in Adaptive Server Enterprise 15.0 and later
          Why do I get different query plans for the same query?
      Using set showplan with noexec
      Statement-level output
      Query plan shape
        Query plan operators
        EMIT operator
        SCAN operator
        FROM cache message
        FROM or LIST
        FROM TABLE
          I/O size messages
          RID scan
          Log Scan
          DELETE, INSERT, and UPDATE operators
          TEXT DELETE operator
          Query plans for referential integrity enforcement
          JOIN operators
          NESTED LOOP JOIN
          MERGE JOIN
          HASH JOIN
          NARY NESTED LOOP JOIN operator
          semijoin
          Distinct operators
          GROUP SORTED Distinct operator
          SORT Distinct operator
          HASH Distinct operator
          Vector aggregation operators
          compute by message
      Union operators
        UNION ALL operator
        MERGE UNION operator
        HASH UNION
        SCALAR AGGREGATE operator
        RESTRICT operator
        SORT operator
        STORE operator
        SEQUENCER operator
        REMOTE SCAN operator
        SCROLL operator
        RID JOIN operator
        SQLFILTER operator
        EXCHANGE operator
      INSTEAD-OF TRIGGER operators
        INSTEAD-OF TRIGGER operator
        CURSOR SCAN operator
        deferred_index and deferred_varcol messages
    Displaying Query Optimization Strategies and Estimates
      set commands for text format messages
      set commands for XML format messages
        Using show_execio_xml to diagnose query plans
        Showing cached plans in XML
      Diagnostic usage scenarios
      Permissions for set commands
      Analyzing dynamic parameters
        Dynamic parameter example analysis
    Finding Slow Running Queries
      Saving diagnostics to a trace file
        Set options that save diagnostic information to a trace file
        Which sessions are being traced?
        Rebinding a trace
      Displaying SQL text
      Retaining session settings
    Parallel Query Processing
      Vertical, horizontal, and pipelined parallelism
      Queries that benefit from parallel processing
      Enabling parallelism
        number of worker processes
        max parallel degree
        max resource granularity
        max repartition degree
        max scan parallel degree
        prod-consumer overlap factor
        min pages for parallel scan
        max query parallel degree
      Controlling parallelism at the session level
        set command examples
      Controlling query parallelism
        Query-level parallel clause examples
      Using parallelism selectively
      Using parallelism with large numbers of partitions
      When parallel query results differ
        Queries that use set rowcount
        Queries that set local variables
      Understanding parallel query plans
      Adaptive Server parallel query execution model
        EXCHANGE operator
          Pipe management
          Worker process model
        Using parallelism in SQL operations
          Parallelism of attribute-insensitive operation
          Scalar aggregation
          union all
          Parallelism of attribute-sensitive operation
          Subqueries
          select into clauses
          insert/delete/update
        Partition elimination
        Partition skew
        Why queries do not run in parallel
        Runtime adjustment
        Recognizing and managing runtime adjustments
          Using set process_limit_action
          Using showplan
          Reducing the likelihood of runtime adjustments
    Eager and Lazy Aggregation
      Overview
        Eager aggregation
      Aggregation and query processing
      Examples
      Using eager aggregation
        Enabling eager aggregation
        Checking for eager aggregation
        Forcing eager aggregation with abstract plans
    Controlling Optimization
      Special optimizing techniques
      Viewing current optimizer settings
        Setting the optimization level
      Optimizer Diagnostic Utility
        Configuring Adaptive Server to run sp_opt_querystats
        Running sp_opt_querystats
      Specifying query processor choices
      Specifying table order in joins
      Specifying the number of tables considered by the query processor
      Specifying query index
      Specifying I/O size in a query
        Index type and large I/O size
        When prefetch specification cannot be followed
        setting prefetch
      Specifying cache strategy
        In select, delete, and update statements
      Controlling large I/O and cache strategies
        Getting information on cache strategies
      Asynchronous log service
        Understanding the user log cache (ULC) architecture
        When to use ALS
        Using the ALS
      Enabling and disabling merge joins
      Enabling and disabling hash joins
      Enabling and disabling join transitive closure
      Controlling literal parameterization
      Suggesting a degree of parallelism for a query
        Query level parallel clause examples
      Optimization goals
        Setting optimization goals
      Optimization criteria
      Limiting optimization time
      Controlling parallel optimization
        number of worker processes
        Specifying the number of worker processes available for parallel processing
        max resource granularity
        max repartition degree
      Concurrency optimization for small tables
        Changing the locking scheme
    Optimization for Cursors
      Definition
        Set-oriented versus row-oriented programming
        Example
      Resources required at each stage
        Memory use and execute cursors
      Cursor modes
      Index use and requirements for cursors
        Allpages-locked tables
        Data-only-locked tables
          Table scans to avoid the Halloween problem
      Comparing performance with and without cursors
        Sample stored procedure without a cursor
        Sample stored procedure with a cursor
        Cursor versus noncursor performance comparison
      Locking with read-only cursors
      Isolation levels and cursors
      Partitioned heap tables and cursors
      Optimizing tips for cursors
        Optimizing for cursor selects using a cursor
        Using union instead of or clauses or in lists
        Declaring the cursor’s intent
        Specifying column names in the for update clause
        Using set cursor rows
        Keeping cursors open across commits and rollbacks
        Opening multiple cursors on a single connection
    Query Processing Metrics
      Overview
      Executing QP metrics
      Accessing metrics
        sysquerymetrics view
      Using metrics
        Examples
          Identifying the most expensive statement
          Identifying the most frequently used statement for tuning
          Identifying possible performance regression
      Clearing metrics
      Restricting query metrics capture
      Understanding the UID in sysquerymetrics
    Using Statistics to Improve Performance
      Statistics maintained in Adaptive Server
      Importance of statistics
        Nonbinary character set histogram interpolation
      Updating statistics
        Adding statistics for unindexed columns
        Limitations for updating statistics on proxy tables and views
        update statistics commands
        Using sampling for update statistics
      Automatically updating statistics
        datachange function
      Configuring automatic update statistics
        Using Job Scheduler to update statistics
        Examples of updating statistics with datachange
      Column statistics and statistics maintenance
      Creating and updating column statistics
        When additional statistics may be useful
        Adding statistics for a column with update statistics
        Adding statistics for minor columns with update index statistics
        Adding statistics for all columns with update all statistics
      Choosing step numbers for histograms
        Choosing a step number
      Scan types, sort requirements, and locking
        Sorts for unindexed or nonleading columns
        Locking, scans, and sorts during update index statistics
        Locking, scans and sorts during update all statistics
        Using the with consumers clause
        Reducing the impact of update statistics on concurrent processes
      Using the delete statistics command
      When row counts may be inaccurate
    Introduction to Abstract Plans
      Overview
      Managing abstract plans
      Relationship between query text and query plans
        Limits of options for influencing query plans
      Full versus partial plans
        Creating a partial plan
      Abstract plan groups
      How abstract plans are associated with queries
        Abstract plans in cached statements
    Creating and Using Abstract Plans
      Using set commands to capture and associate plans
        Enabling plan capture mode with set plan dump
        Associating queries with stored plans
        Using replace mode during plan capture
          When to use replace mode
        Using dump, load, and replace modes simultaneously
          Using dump and load to the same group
          Using dump and load to different groups
        Compile-time changes for some set parameters
      set plan exists check option
      Using other set options with abstract plans
        Using show_abstract_plan to view plans
        Using showplan
        Using noexec
        Using fmtonly
        Using forceplan
      Server-wide abstract plan capture and association modes
      Creating plans using SQL
        Using create plan
        Using the plan clause
    Abstract Query Plan Guide
      Overview
        Abstract plan language
          Queries, access methods, and abstract plans
          Derived tables
        Identifying tables
        Identifying indexes
        Specifying join order
          Shorthand notation for joins
          Join order examples
          Match between execution methods and abstract plans
          Specifying join order for queries using views
        Specifying the join type
        Specifying partial plans and hints
          Grouping multiple hints
          Inconsistent and illegal plans using hints
        Creating abstract plans for subqueries
          Materialized subqueries
          Flattened subqueries
          Example of changing the join order in a flattened subquery
          Nested subqueries
          Subquery identification and attachment
          More subquery examples: reading ordering and attachment
          Modifying subquery nesting
        Abstract plans for materialized processing of views
        Abstract plans for queries containing aggregates
        Abstract plans for queries containing unions
        Using abstract plans when queries need ordering
        Specifying the reformatting strategy
        Specifying the OR strategy
        When the store operator is not specified
        Abstract plans for parallel processing
      Tips on writing abstract plans
      Using abstract plans at the query level
        Operator name alignment for abstract plan and optimizer criteria
        Extending the optimizer criteria set syntax
      Comparing plans before and after
        Effects of enabling server-wide capture mode
        Time and space to copy plans
      Abstract plans for stored procedures
        Procedures and plan ownership
        Procedures with variable execution paths and optimization
      Ad hoc queries and abstract plans
    Managing Abstract Plans with System Procedures
      Managing an abstract plan group
        Creating a group
        Dropping a group
        Getting information about a group
        Renaming a group
      Finding abstract plans
      Managing individual abstract plans
        Viewing a plan
        Copying a plan to another group
        Dropping an individual abstract plan
        Comparing two abstract plans
        Changing an existing plan
      Managing all plans in a group
        Copying all plans in a group
        Comparing all plans in a group
        Dropping all abstract plans in a group
      Importing and exporting groups of plans
        Exporting plans to a user table
        Importing plans from a user table
  Glossary 15.7
    Glossary
  Monitoring Tables Diagram 15.7
  Quick Reference Guide 15.7
    Quick Reference Guide
      Datatypes
      Standards and compliance
      Datatypes and encrypted columns
      Adaptive Server global variables
      Reserved words
        Transact-SQL reserved words
        ANSI SQL reserved words
        Potential ANSI SQL reserved words
      Functions
        XML functions
      Commands
      Interactive dbsql commands
      System procedures
      Catalog stored procedures
      Extended stored procedures
      dbcc stored procedures
      System tables
      DBCC tables
      Monitoring tables
      sybpcidb tables
      Utilities
  System Table Diagram 15.7
  Troubleshooting: Error Messages and Advanced Resolutions 15.0
    About this book
    Introduction
      Understanding error message severity levels
        Notifying the System Administrator
      Variables in error message text
      Finding object names in error message text
      Finding the Adaptive Server version
        Understanding the field order in the version string
      Creating error messages
      Reporting errors
        Sybase Technical Support checklist
        Sending error log fragments
        Reproducing problems
    Parser Errors (100s, 7380)
      Error 102
      Error 107
      Error 195
      Error 7380
    Sequencer Errors (200s, 7783, 7788, 11000s, 14200)
      Error 207
      Error 208
      Error 213
      Error 216
      Error 225
      Error 226
      Error 229
      Error 232
      Error 233
      Error 241
      Error 247
      Error 257
      Error 259
      Error 265
      Error 266
      Error 268
      Error 277
      Error 7783
      Error 7788
      Error 11018
      Error 11068
      Error 11072
      Error 14200
    Query Processor Errors (300s, 400s, 500s)
      Error 311
      Error 313
      Error 314
      Error 403
      Error 414
      Error 428
      Error 511
      Error 512
      Error 515
      Error 530
      Error 539
      Error 540
      Error 546
      Error 547
      Error 551
      Error 584
    Access Method Errors (600s)
      Error 601
      Error 603
      Error 605
      Error 611
      Error 614
      Error 622
      Error 623
      Error 624
      Error 625
      Error 629
      Error 631
      Error 644
      Error 678
      Error 691
      Error 692
      Error 693
      Error 694
      Error 695
      Error 696
      Error 697
    Memory Manager Errors (700s)
      Error 701
      Error 702
      Error 703
      Error 706
      Error 707
      Error 709
      Error 714
      Error 715
      Error 717
      Error 718
      Error 719
      Error 720
      Error 721
    Buffer Manager Errors (800s)
      Error 803
      Error 804
      Error 806
      Error 813
      Error 820
      Error 821
      Error 822
      Error 823
      Error 832
      Error 834
      Error 835
      Error 840
      Error 842
      Error 847
      Error 849
      Error 852
      Error 855
      Error 861
      Error 863
      Error 881
      Error 890
    Open Database Manager Errors (900s)
      Error 903
      Error 905
      Error 906
      Error 908
      Error 911
      Error 913
      Error 916
      Error 921
      Error 924
      Error 925
      Error 926
      Error 930
      Error 935
      Error 940
      Error 941
      Error 945
      Error 950
      Error 965
    Abstract Plan Manager Errors (1000s)
      Error 1024
    Page Manager Errors (1100s)
      Error 1105
      Error 1108
      Error 1120
      Error 1124
      Error 1127
      Error 1129
      Error 1131
      Error 1133
      Error 1141
      Error 1142
      Error 1143
      Error 1159
      Error 1161
    Lock Manager Errors (1200s)
      Error 1203
      Error 1204
      Error 1205
      Error 1243
      Error 1244
      Error 1249
      Error 1251
      Error 1265
      Error 1279
    Sort Manager Errors (1500s)
      Error 1501
      Error 1505
      Error 1506
      Error 1508
      Error 1509
      Error 1510
      Error 1514
      Error 1530
      Error 1531
    Initialization Errors (1600s)
      Error 1601
      Error 1602
      Error 1603
      Error 1605
      Error 1608
      Error 1613
      Error 1621
      Error 1622
      Error 1623
    Create Utilities Errors (1700 - 1900s, 2100s, 2700s, 12800s)
      Error 1702
      Error 1708
      Error 1732
      Error 1803
      Error 1808
      Error 1809
      Error 1810
      Error 1813
      Error 1820
      Error 1902
      Error 1903
      Error 1916
      Error 1928
      Error 2110
      Error 2714
      Error 2729
      Error 2753
      Error 2762
      Error 12818
      Error 12842
      Error 12881
    High Availability Errors (2200s)
      Error 2243
    Character Set Conversion Errors (2400s)
      Error 2401
      Error 2402
      Error 2409
    dbcc Errors (2500s, 7900s, 12000s, 15000s)
      Error 2501
      Error 2502
      Error 2503
      Error 2507
      Error 2509
      Error 2510
      Error 2511
      Error 2513
      Error 2514
      Error 2517
      Error 2520
      Error 2521
      Error 2524
      Error 2525
      Error 2529
      Error 2540
      Error 2546
      Error 2547
      Error 2550
      Error 2558
      Error 2559
      Error 2572
      Error 2573
      Error 2574
      Error 2575
      Error 2578
      Error 2582
      Error 2583
      Error 2591
      Error 2596
      Error 7901
      Error 7902
      Error 7928
      Error 7930
      Error 7939
      Error 7940
      Error 7949
      Error 7989
      Error 9961
      Error 12964
      Error 15056
      Error 15080
      Error 15082
      Error 15084
    insert Errors (2600s)
      Error 2601
      Error 2610
      Error 2615
      Error 2619
      Error 2620
      Error 2626
      Error 2628
      Error 2630
      Error 2631
    Procedure Manager Errors (2800s)
      Error 2805
      Error 2806
      Error 2811
      Error 2812
      Error 2824
      Error 2835
      Error 2844
    dump and load Errors (3000s - 3200s, 4200s - 4300s)
      Error 3019
      Error 3020
      Error 3021
      Error 3105
      Error 3120
      Error 3143
      Error 3144
      Error 3161
      Error 3162
      Error 3201
      Error 3203
      Error 3211
      Error 3212
      Error 3216
      Error 3225
      Error 3230
      Error 3233
      Error 3240
      Error 4204
      Error 4205
      Error 4207
      Error 4216
      Error 4221
      Error 4222
      Error 4305
      Error 4322
    commit and abort Errors (3300s)
      Error 3301
      Error 3307
      Error 3321
      Error 3322
    Recovery Errors (3400s, 12500s)
      Error 3401
      Error 3403
      Error 3404
      Error 3414
      Error 3429
      Error 3434
      Error 3445
      Error 3446
      Error 3447
      Error 3452
      Error 3454
      Error 3462
      Error 3470
      Error 12546
      Error 12547
      Error 12551
      Error 12583
      Error 12587
    Exception Handling Errors (3600s)
      Error 3604
      Error 3621
      Error 3624
      Error 3626
      Error 3641
      Error 3642
      Error 3643
      Error 3644
      Error 3646
      Error 3648
    drop Errors (3700s)
      Error 3701
      Error 3702
      Error 3703
    Transaction Errors (3900s)
      Error 3904
      Error 3905
      Error 3906
      Error 3908
      Error 3917
      Error 3949
    dataserver Errors (4000s)
      Error 4001
      Error 4002
      Error 4020
    View Resolution Manager Errors (4400s)
      Error 4430
    truncate table Errors (4700s)
      Error 4716
    Bulk Copy Utility Errors (4800s)
      Error 4801
      Error 4806
    alter table Errors (4900s)
      Error 4951
      Error 4953
      Error 4954
      Error 4956
      Error 4964
    alter database Errors (5000s)
      Error 5006
      Error 5013
      Error 5018
      Error 5034
    Disk Errors (5100s)
      Error 5115
      Error 5123
      Error 5142
    Transaction Coordinator Errors (5600s)
      Error 5602
    Open Client Errors (5700s)
      Error 5701
      Error 5704
    Configuration Errors (5800s, 10800s)
      Error 5806
      Error 5808
      Error 5824
      Error 5846
      Error 5847
      Error 5848
      Error 5849
      Error 5850
      Error 5851
      Error 5852
      Error 5853
      Error 5854
      Error 5857
      Error 5859
      Error 5861
      Error 5863
      Error 5865
      Error 5866
      Error 5867
      Error 5868
      Error 5893
      Error 10841
      Error 10865
    Process Kill Errors (6100s)
      Error 6103
      Error 6107
    Timestamp Errors (6900s)
      Error 6901
      Error 6902
    Distributed Database Network Errors (7200s)
      Error 7201
      Error 7205
      Error 7207
      Error 7211
      Error 7212
      Error 7214
      Error 7215
      Error 7218
      Error 7220
      Error 7221
      Error 7223
      Error 7227
      Error 7234
      Error 7235
    Text Manager Errors (7100s)
      Error 7101
      Error 7105
      Error 7114
      Error 7130
      Error 7134
    Threshold Manager Errors (7400s)
      Error 7401
      Error 7402
      Error 7403
      Error 7404
      Error 7406
      Error 7407
      Error 7408
      Error 7409
      Error 7410
      Error 7411
      Error 7412
      Error 7413
      Error 7414
      Error 7415
      Error 7417
      Error 7418
      Error 7438
    Auditing Errors (7600s)
      Error 7618
    Remote Procedure Call Errors (8000s)
      Error 8006
      Error 8009
    Descriptor Manager Errors (8200s)
      Error 8201
      Error 8203
      Error 8204
      Error 8207
      Error 8210
      Error 8211
      Error 8219
      Error 8239
      Error 8241
    sysindexes Manager Errors (8400s)
      Error 8402
      Error 8419
    Process Status Structure Errors (8600s)
      Error 8601
    Site Buffer Manager Errors (8700s)
      Error 8704
    Disk Manager Errors (9000s)
      Error 9004
    Replication Agent Manager Errors (9100s - 9200s)
      Error 9122
      Error 9287
      Error 9289
      Error 9290
    Component Integration Services Errors (11200s)
      Error 11201
      Error 11202
      Error 11203
    Configurable Shared Memory Dump Manager (12000s, 12300s)
      Error 12036
      Error 12326
      Error 12328
      Error 12329
      Error 12330
      Error 12333
      Error 12334
      Error 12335
    Fault Isolation Utility Errors (12700s)
      Error 12716
      Error 12717
    Partition (14100s) and Partition Key Manager (14300s) Errors
      Error 14100
      Error 14108
      Error 14120
      Error 14124
      Error 14126
      Error 14313
    mount database Errors (14500s)
      Error 14503
      Error 14504
      Error 14511
      Error 14513
      Error 14560
      Error 14561
    Anchor Manager Errors (14600s)
      Error 14605
      Error 14618
      Error 14619
      Error 14620
      Error 14621
      Error 14622
      Error 14623
    XML Utility Manager Errors (14900s)
      Error 14901
    Message Service Errors (15100s)
      Error 15101
      Error 15105
    Web Services Errors (15200s)
      Error 15219
    Encryption Errors (15400s)
      Error 15402
      Error 15403
      Error 15412
      Error 15413
      Error 15417
    Statistics Errors (15600s)
      Error 15600
      Error 15601
    System Procedure Errors (17000s, 18000s)
      Error 17461
      Error 17715
      Error 17716
      Error 17737
      Error 17870
      Error 17871
      Error 17872
      Error 17873
      Error 17874
      Error 17875
      Error 17903
      Error 17904
      Error 17905
      Error 17906
      Error 17910
      Error 18031
      Error 18032
      Error 18033
      Error 18123
      Error 18750
    Kernel Errors
      Asynchronous I/O not available
      Buffer mismatch
      Could not create shared memory
      Current process infected
      dopen error
      dstart I/O request repeatedly delayed
      Failed to open device
      Feature is not licensed
      File already in use
      Memory too fragmented
      Memory usage in procedure headers
      Network information message
      No more alarms available
      Open objects parameter may be too low
      os_attach_region errors
      os_create_region errors
      Read/write errors
      Server is unnamed
      Stack guardword corrupted
      time slice error
      t_rcvconnect error
      udunmirror errors
      No more engines can be offlined
  Reference Manuals: Building Blocks 15.7 ESD #2
    About this book
    System and User-Defined Datatypes
      Datatype categories
      Range and storage size
      Datatypes of columns, variables, or parameters
      Datatypes of mixed-mode expressions
        Determining the datatype hierarchy
        Determining precision and scale
      Datatype conversions
        Automatic conversion of fixed-length NULL columns
        Handling overflow and truncation errors
      Standards and compliance
      Exact numeric datatypes
        Integer types
        Decimal datatypes
        Standards and compliance
      Approximate numeric datatypes
        Understanding approximate numeric datatypes
        Range, precision, and storage size
        Entering approximate numeric data
        NaN and Inf values
        Standards and compliance
      Money datatypes
        Accuracy
        Range and storage size
        Entering monetary values
        Standards and compliance
      Timestamp datatype
        Creating a timestamp column
      Date and time datatypes
        Range and storage requirements
        Entering date and time data
        Standards and compliance
      Character datatypes
        unichar, univarchar
        Length and storage size
        Entering character data
          Entering Unicode characters
        Treatment of blanks
        Manipulating character data
        Standards and compliance
      Binary datatypes
        Valid binary and varbinary entries
        Entries of more than the maximum column size
        Treatment of trailing zeros
        Platform dependence
        Standards and compliance
      bit datatype
        Standards and compliance
      sysname and longsysname datatypes
        Standards and compliance
      text, image, and unitext datatypes
        Data structures used for storing text, unitext, and image data
        Initializing text, unitext, and image columns
          Defining unitext columns
        Saving space by allowing NULL
        Getting information from sysindexes
        Using readtext and writetext
        Determining how much space a column uses
        Restrictions on text, image, and unitext columns
        Selecting text, unitext, and image data
        Converting text and image datatypes
        Converting to or from unitext
        Pattern matching in text data
        Duplicate rows
        Using large object text, unitext, and image datatypes in stored procedures
          Declaring a LOB datatype
          Creating a LOB parameter
          Using LOB datatypes
        Standards and compliance
      Datatypes and encrypted columns
      User-defined datatypes
        Standards and compliance
    Transact-SQL Functions
      abs
      acos
      ascii
      asehostname
      asin
      atan
      atn2
      avg
      audit_event_name
      authmech
      biginttohex
      bintostr
      cache_usage
      case
      cast
      ceiling
      char
      char_length
      charindex
      coalesce
      col_length
      col_name
      compare
      convert
      cos
      cot
      count
      count_big
      create_locator
      current_bigdatetime
      current_bigtime
      current_date
      current_time
      curunreservedpgs
      data_pages
      datachange
      datalength
      dateadd
      datediff
      datename
      datepart
      day
      db_attr
      db_id
      db_instanceid
      db_name
      db_recovery_status
      degrees
      derived_stat
      difference
      dol_downgrade_check
      exp
      floor
      get_appcontext
      getdate
      get_internal_date
      getutcdate
      has_role
      hash
      hashbytes
      hextobigint
      hextoint
      host_id
      host_name
      instance_id
      identity_burn_max
      index_col
      index_colorder
      index_name
      inttohex
      isdate
      is_quiesced
      is_sec_service_on
      is_singleusermode
      isnull
      isnumeric
      instance_name
      lc_id
      lc_name
      lct_admin
      left
      len
      license_enabled
      list_appcontext
      locator_literal
      locator_valid
      lockscheme
      log
      log10
      lower
      lprofile_id
      lprofile_name
      ltrim
      max
      migrate_instance_id
      min
      month
      mut_excl_roles
      newid
      next_identity
      nullif
      object_attr
      object_id
      object_name
      object_owner_id
      pagesize
      partition_id
      partition_name
      partition_object_id
      password_random
      patindex
      pi
      power
      proc_role
      pssinfo
      radians
      rand
      rand2
      replicate
      reserve_identity
      reserved_pages
      return_lob
      reverse
      right
      rm_appcontext
      role_contain
      role_id
      role_name
      round
      row_count
      rtrim
      sdc_intempdbconfig
      set_appcontext
      setdata
      show_cached_plan_in_xml
      show_cached_text
      show_cached_text_long
      show_dynamic_params_in_xml
      show_plan
      show_role
      show_sec_services
      sign
      sin
      sortkey
      soundex
      space
      spid_instance_id
      square
      sqrt
      stddev
      stdev
      stdevp
      stddev_pop
      stddev_samp
      str
      str_replace
      strtobin
      stuff
      substring
      sum
      suser_id
      suser_name
      syb_quit
      syb_sendmsg
      sys_tempdbid
      tan
      tempdb_id
      textptr
      textvalid
      to_unichar
      tran_dumpable_status
      tsequal
      uhighsurr
      ulowsurr
      upper
      uscalar
      used_pages
      user
      user_id
      user_name
      valid_name
      valid_user
      var
      var_pop
      var_samp
      variance
      varp
      workload_metric
      xa_bqual
      xa_gtrid
      xact_connmigrate_check
      xact_owner_instance
      xmlextract
      xmlparse
      xmlrepresentation
      xmltable
      xmltest
      xmlvalidate
      year
    Global Variables
      Adaptive Server global variables
        Using global variables in a clustered environment
    Expressions, Identifiers, and Wildcard Characters
      Expressions
        Size of expressions
        Arithmetic and character expressions
        Relational and logical expressions
        Operator precedence
        Arithmetic operators
        Bitwise operators
        String concatenation operator
        Comparison operators
        Nonstandard operators
        Using any, all and in
        Negating and testing
        Ranges
        Using nulls in expressions
          Comparisons that return TRUE
          Difference between FALSE and UNKNOWN
          Using ā€œNULLā€ as a character string
          NULL compared to the empty string
        Connecting expressions
        Using parentheses in expressions
        Comparing character expressions
        Using the empty string
        Including quotation marks in character expressions
        Using the continuation character
      Identifiers
        Short identifiers
        Tables beginning with # (temporary tables)
        Case sensitivity and identifiers
        Uniqueness of object names
        Using delimited identifiers
          Enabling quoted identifiers
        Identifying tables or columns by their qualified object name
          Using delimited identifiers within an object name
          Omitting the owner name
          Referencing your own objects in the current database
          Referencing objects owned by the database owner
          Using qualified identifiers consistently
        Determining whether an identifier is valid
        Renaming database objects
        Using multibyte character sets
      like pattern matching
        Using not like
      Pattern matching with wildcard characters
        Case and accent insensitivity
        Using wildcard characters
          The percent sign (%) wildcard character
          The underscore (_) wildcard character
          Bracketed ([ ]) characters
          The caret (^) wildcard character
        Using multibyte wildcard characters
        Using wildcard characters as literal characters
          Using square brackets ( [ ] ) as escape characters
          Using the escape clause
        Using wildcard characters with datetime data
    Reserved Words
      Transact-SQL reserved words
      ANSI SQL reserved words
      Potential ANSI SQL reserved words
    SQLSTATE Codes and Messages
      Warnings
      Exceptions
        Cardinality violations
        Data exceptions
        Integrity constraint violations
        Invalid cursor states
        Syntax errors and access rule violations
        Transaction rollbacks
        with check option violation
  Reference Manuals: Commands 15.7 ESD #2
    Commands
      alter database
      alter encryption key
      alter login
      alter login profile
      alter precomputed result set
      alter...modify owner
      alter role
      alter table
      alter thread pool
      begin...end
      begin transaction
      break
      checkpoint
      close
      commit
      compute clause
      connect to...disconnect
      continue
      create archive database
      create database
      create default
      create encryption key
      create existing table
      create function
      create function (SQLJ)
      create index
      create login
      create login profile
      create plan
      create precomputed result set
      create procedure
      create procedure (SQLJ)
      create proxy_table
      create role
      create rule
      create schema
      create service
      create table
      create thread pool
      create trigger
      create view
      dbcc
      deallocate cursor
      deallocate locator
      declare
      declare cursor
      delete
      delete statistics
      disk init
      disk mirror
      disk refit
      disk reinit
      disk remirror
      disk resize
      disk unmirror
      drop database
      drop default
      drop encryption key
      drop function
      drop function (SQLJ)
      drop index
      drop login
      drop login profile
      drop precomputed result set
      drop procedure
      drop role
      drop rule
      drop service
      drop table
      drop thread pool
      drop trigger
      drop view
      dump configuration
      dump database
      dump transaction
      execute
      fetch
      goto label
      grant
      grant role
      group by and having clauses
      if...else
      insert
      kill
      load database
      load transaction
      lock table
      merge
      mount
      online database
      open
      order by clause
      prepare transaction
      print
      quiesce database
      raiserror
      readtext
      reconfigure
      refresh
      remove java
      reorg
      return
      revoke
      revoke role
      rollback
      rollback trigger
      save transaction
      select
      set
      setuser
      shutdown
      transfer table
      truncate lob
      truncate precomputed result set
      truncate table
      union operator
      unmount
      update
      update all statistics
      update index statistics
      update statistics
      update table statistics
      use
      waitfor
      where clause
      while
      writetext
    Interactive SQL Commands
      clear
      configure
      connect
      disconnect
      exit
      input
      output
      parameters
      read
      set connection
      start logging
      stop logging
      system
  Reference Manuals: Procedures 15.7 ESD #2
    System Procedures
      Introduction to system procedures
        Return values for system procedures
      Permissions on system procedures
      Auditing system procedures
      Executing system procedures
      Entering parameter values
      Messages
      System procedure tables
      sp_activeroles
      sp_add_qpgroup
      sp_add_resource_limit
      sp_add_time_range
      sp_addalias
      sp_addauditrecord
      sp_addaudittable
      sp_addengine
      sp_addexeclass
      sp_addextendedproc
      sp_addexternlogin
      sp_addgroup
      sp_addlanguage
      sp_addlogin
      sp_addmessage
      sp_addobjectdef
      sp_addremotelogin
      sp_addsegment
      sp_addserver
      sp_addthreshold
      sp_addtype
      sp_addumpdevice
      sp_adduser
      sp_altermessage
      sp_audit
      sp_autoconnect
      sp_autoformat
      sp_bindcache
      sp_bindefault
      sp_bindexeclass
      sp_bindmsg
      sp_bindrule
      sp_cacheconfig
      sp_cachestrategy
      sp_changedbowner
      sp_changegroup
      sp_checknames
      sp_checkreswords
      sp_checksource
      sp_chgattribute
      sp_cleanpwdchecks
      sp_clearpsexe
      sp_clearstats
      sp_client_addr
      sp_cluster
      sp_clusterlockusage
      sp_cmp_all_qplans
      sp_cmp_qplans
      sp_commonkey
      sp_companion
      sp_compatmode
      sp_config_dump
      sp_configure
      sp_copy_all_qplans
      sp_copy_qplan
      sp_countmetadata
      sp_cursorinfo
      sp_dbextend
      sp_dboption
      sp_dbrecovery_order
      sp_dbremap
      sp_defaultloc
      sp_deletesmobj
      sp_depends
      sp_deviceattr
      sp_diskdefault
      sp_displayaudit
      sp_displaylevel
      sp_displaylogin
      sp_displayroles
      sp_downgrade
      sp_dropalias
      sp_drop_all_qplans
      sp_drop_qpgroup
      sp_drop_qplan
      sp_drop_resource_limit
      sp_drop_time_range
      sp_dropdevice
      sp_dropengine
      sp_dropexeclass
      sp_dropextendedproc
      sp_dropexternlogin
      sp_dropglockpromote
      sp_dropgroup
      sp_dropkey
      sp_droplanguage
      sp_droplogin
      sp_dropmessage
      sp_dropobjectdef
      sp_dropremotelogin
      sp_droprowlockpromote
      sp_dropsegment
      sp_dropserver
      sp_dropthreshold
      sp_droptype
      sp_dropuser
      sp_dump_history
      sp_dumpoptimize
      sp_encryption
      sp_engine
      sp_errorlog
      sp_estspace
      sp_export_qpgroup
      sp_extendsegment
      sp_extengine
      sp_extrapwdchecks
      sp_familylock
      sp_find_qplan
      sp_fixindex
      sp_flushstats
      sp_forceonline_db
      sp_forceonline_object
      sp_forceonline_page
      sp_foreignkey
      sp_freedll
      sp_getmessage
      sp_grantlogin
      sp_ha_admin
      sp_help
      sp_help_resource_limit
      sp_help_qpgroup
      sp_help_qplan
      sp_helpapptrace
      sp_helpartition
      sp_helpcache
      sp_helpcomputedcolumn
      sp_helpconfig
      sp_helpconstraint
      sp_helpdb
      sp_helpdevice
      sp_helpextendedproc
      sp_helpexternlogin
      sp_helpgroup
      sp_helpindex
      sp_helpjava
      sp_helpjoins
      sp_helpkey
      sp_helplanguage
      sp_helplog
      sp_helpobjectdef
      sp_helpremotelogin
      sp_helprotect
      sp_helpsegment
      sp_helpserver
      sp_helpsort
      sp_helptext
      sp_helpthread
      sp_helpthreshold
      sp_helpuser
      sp_hidetext
      sp_import_qpgroup
      sp_indsuspect
      sp_jreconfig
      sp_ldapadmin
      sp_listener
      sp_listsuspect_db
      sp_listsuspect_object
      sp_listsuspect_page
      sp_lmconfig
      sp_lock
      sp_locklogin
      sp_logdevice
      sp_loginconfig
      sp_logininfo
      sp_logiosize
      sp_logintrigger
      sp_maplogin
      sp_merge_dup_inline_default
      sp_metrics
      sp_modify_resource_limit
      sp_modify_time_range
      sp_modifylogin
      sp_modifystats
      sp_modifythreshold
      sp_monitor
      sp_monitorconfig
      sp_monitor_server
      sp_object_stats
      sp_objectsegment
      sp_opt_querystats
      sp_optgoal
      sp_options
      sp_passthru
      sp_password
      sp_passwordpolicy
      sp_pciconfig
      sp_placeobject
      sp_plan_dbccdb
      sp_poolconfig
      sp_post_xpload
      sp_primarykey
      sp_processmail
      sp_procxmode
      sp_querysmobj
      sp_recompile
      sp_refit_admin
      sp_remap
      sp_remoteoption
      sp_remotesql
      sp_rename
      sp_rename_qpgroup
      sp_renamedb
      sp_reportstats
      sp_restore_system_role
      sp_revokelogin
      sp_role
      sp_securityprofile
      sp_sendmsg
      sp_serveroption
      sp_set_qplan
      sp_setlangalias
      sp_setpglockpromote
      sp_setpsexe
      sp_setrowlockpromote
      sp_setsuspect_granularity
      sp_setsuspect_threshold
      sp_setup_table_transfer
      sp_shmdumpconfig
      sp_show_options
      sp_showcontrolinfo
      sp_showexeclass
      sp_showoptstats
      sp_showplan
      sp_showpsexe
      sp_spaceusage
      sp_spaceused
      sp_ssladmin
      sp_syntax
      sp_sysmon
      sp_tab_suspectptn
      sp_tempdb
      sp_tempdb_markdrop
      sp_thresholdaction
      sp_tran_dumpable_status
      sp_transactions
      sp_unbindcache
      sp_unbindcache_all
      sp_unbindefault
      sp_unbindexeclass
      sp_unbindmsg
      sp_unbindrule
      sp_version
      sp_volchanged
      sp_webservices
      sp_who
      sp_xmlschema
    Catalog Stored Procedures
      Overview
      Specifying optional parameters
      Pattern matching
      System procedure tables
      ODBC datatypes
      sp_column_privileges
      sp_columns
      sp_databases
      sp_datatype_info
      sp_fkeys
      sp_pkeys
      sp_server_info
      sp_special_columns
      sp_sproc_columns
      sp_statistics
      sp_stored_procedures
      sp_table_privileges
      sp_tables
    System Extended Stored Procedures
      Overview
      Permissions on system ESPs
      DLLs associated with system ESPs
      Using system ESPs
      xp_cmdshell
      xp_deletemail
      xp_enumgroups
      xp_findnextmsg
      xp_logevent
      xp_readmail
      xp_sendmail
      xp_startmail
      xp_stopmail
    dbcc Stored Procedures
      Overview
      Specifying the object name and date
        Specifying the object name
        Specifying the date
      sp_dbcc_alterws
      sp_dbcc_configreport
      sp_dbcc_createws
      sp_dbcc_deletedb
      sp_dbcc_deletehistory
      sp_dbcc_differentialreport
      sp_dbcc_evaluatedb
      sp_dbcc_exclusions
      sp_dbcc_faultreport
      sp_dbcc_fullreport
      sp_dbcc_help_fault
      sp_dbcc_patch_finishtime
      sp_dbcc_recommendations
      sp_dbcc_runcheck
      sp_dbcc_statisticsreport
      sp_dbcc_summaryreport
      sp_dbcc_updateconfig
  Reference Manuals: Tables 15.7 ESD #2
    System Tables
      Locations of system tables
        System tables in master
        System tables in sybsecurity
        System table in sybsystemdb
        System tables in all databases
        About the sybdiagdb database
        About the syblicenseslog table
      Using system tables in the Cluster Edition
        timestamp columns
        Changed identity values
        Controlling fake-table materialization
      Rules for using system tables
        Permissions on system tables
        Locking schemes used for system tables
        Reserved columns
        Updating system tables
        Triggers on system tables
      syblicenseslog
      sysalternates
      sysaltusages
      sysattributes
      sysauditoptions
      sysaudits_01 – sysaudits_08
      syscacheinfo
      syscachepoolinfo
      syscharsets
      syscolumns
      syscomments
      sysconfigures
      sysconstraints
      syscoordinations
      syscurconfigs
      sysdatabases
      sysdepends
      sysdevices
      sysencryptkeys
      sysengines
      sysgams
      sysindexes
      sysinstances
      sysjars
      syskeys
      syslanguages
      syslisteners
      syslocks
      sysloginroles
      syslogins
      syslogs
      syslogshold
      sysmessages
      sysmonitors
      sysobjects
      sysoptions
      syspartitionkeys
      syspartitions
      syspoolinfo
      sysprocedures
      sysprocesses
      sysprotects
      sysquerymetrics
      sysqueryplans
      sysreferences
      sysremotelogins
      sysresourcelimits
      sysroles
      syssecmechs
      syssegments
      sysservers
      syssessions
      sysslices
      syssrvroles
      sysstatistics
      systabstats
      systhresholds
      systimeranges
      systransactions
      systypes
      sysusages
      sysusermessages
      sysusers
      sysxtypes
    dbccdb Tables
      dbccdb workspaces
      dbccdb log
      dbcc_config
      dbcc_counters
      dbcc_exclusions
      dbcc_fault_params
      dbcc_faults
      dbcc_operation_log
      dbcc_operation_results
      dbcc_types
    Monitoring Tables
      monCachedObject
      monCachePool
      monCachedProcedures
      monCachedStatement
      monCIPC
      monCIPCEndpoints
      monCIPCLinks
      monCIPCMesh
      monCLMObjectActivity
      monClusterCacheManager
      monCMSFailover
      monDataCache
      monDBRecovery
      monDBRecoveryLRTypes
      monDeadLock
      monDeviceIO
      monDeviceSpaceUsage
      monEngine
      monErrorLog
      monFailoverRecovery
      monInmemoryStorage
      monIOController
      monIOQueue
      monLicense
      monLocks
      monLockTimeout
      monLogicalCluster
      monLogicalClusterAction
      monLogicalClusterInstance
      monLogicalClusterRoute
      monNetworkIO
      monOpenDatabases
      monOpenObjectActivity
      monOpenPartitionActivity
      monPCIBridge
      monPCIEngine
      monPCISlots
      monPCM
      monProcedureCache
      monProcedureCacheMemoryUsage
      monProcedureCacheModuleUsage
      monProcess
      monProcessActivity
      monProcessLookup
      monProcessMigration
      monProcessNetIO
      monProcessObject
      monProcessProcedures
      monProcessSQLText
      monProcessStatement
      monProcessWaits
      monProcessWorkerThread
      monRepLogActivity
      monRepScanners
      monRepScannersTotalTime
      monRepSenders
      monSpinlockActivity
      monSQLRepActivity
      monSQLRepMisses
      monState
      monStatementCache
      monSysLoad
      monSysPlanText
      monSysSQLText
      monSysStatement
      monSysWaits
      monSysWorkerThread
      monTableColumns
      monTableCompression
      monTableParameters
      monTables
      monTableTransfer
      monTask
      monTempdbActivity
      monThread
      monThreadPool
      monWaitClassInfo
      monWaitEventInfo
      monWorkload
      monWorkloadPreview
      monWorkloadProfile
      monWorkloadRaw
      monWorkQueue
    sybpcidb Tables
      pca_jre_arguments
      pca_jre_directives
      pci_arguments
      pci_directives
      pci_slotinfo
      pci_slot_syscalls
  Active Messaging Users Guide 15.7
    Introduction
      Active Messaging concepts
      Automatic decisions in real time
      Messaging models
        JMS
        WebSphere MQ messaging models
      Message format
        JMS message properties
        MQ message topics
      Message selectors
    Understanding Active Messaging
      Sending and receiving messages from a queue
      Publishing and consuming messages from a JMS topic
      Working with message properties
      Previewing the messaging interface
      MQ overview
      Securing channels with SSL
      MQ publish/subscribe
        Syntax for topics
        Publisher and subscriber identities
        MQ publish/subscribe examples
      Working with MQ cluster queue objects
      Working with remote queue objectsļæ½
      Working with text messaging
        Text messages and JMS
        Text messages and MQ
      Adaptive Server Cluster Edition support
        Login redirection
        Extended high availability
      Active Messaging support for the threaded kernel
      Internationalization support
      Transactional message behavior
        Transactional messaging set option
      MQ security
        Connecting to the MQ queue manager
      Installing MQ client on Adaptive Server host machines
      MQ authorizations
      Querying MQ information
    SQL Reference
      Message-related global variables
      <msgheader> and <msgproperties> documents
      Adaptive Server-specific message properties
      Keywords
      Stored procedures
      Built-in functions
      Syntax segments
      sp_configure 'enable real time messaging'
      sp_engine
      sp_msgadmin
      msgconsume
      msgpropcount
      msgproplist
      msgpropname
      msgproptype
      msgpropvalue
      msgpublish
      msgrecv
      msgsend
      msgsubscribe
      msgunsubscribe
      endpoint
      option_string
      sizespec
      timespec
    Samples
      Sybase directories
      Using code samples with SQL
      Using code samples with Java/JDBC
    Glossary
  Cluster Edition Cluster Users Guide 15.7
    An Overview of the Cluster Edition
      What is the Cluster Edition?
        Adaptive Server integrated clusterware
        The cluster coordinator
        The quorum device
        Database devices in the Cluster Edition
        Private installation versus shared installation
        Backup Server in the Cluster Edition
      How the Cluster Edition enhances the nonclustered edition
      Using interconnected networks in the cluster
        Monitoring links between instances
      Suggested deployment scenarios
        HA failover for OLTP applications
        Horizontal scalability for DSS reporting applications
        Horizontal scalability for OLTP applications
      New client technologies in the Cluster Edition
      Support for replication
    Client Applications and Client/ Server Interaction
      Open Client
      Enabling failover in Client-Library applications
      Client/server interaction
        Login redirection
          Connection properties for login redirection
        Connection migration
          Difference between migration and failover
          When can migration occur?
          Migrated contexts
          Criteria for migration
        Context migration
          Configuring a client migration
        Extended high-availability failover
          Differences between HA failover and failover in clusters
      Using isql in a clustered environment
      Using remote procedure calls in a clustered environment
        RPCs where the remote server is a cluster
        RPCs where the local server is a cluster
        RPCs where local and remote servers are instances in the same cluster
        sp_serveroption
      Reconnecting clients when a node loses power
    Using Security with a Clustered Environment
      Using encrypted columns in a clustered environment
      Using SSL in a clustered environment
        Specifying a common name with sp_listener
      Using LDAP as a directory service
        LDAP directory services versus the Sybase interfaces file
        The libtcl*.cfg file
        Enabling LDAP directory services
        Adding a server to the directory services
        Multiple directory services
        Encrypting the password
        Performance
        Migrating from the interfaces file to LDAP
        Using LDAP directory services with the shared-disk cluster
    Using Monitoring Tables in a Clustered Environment
      Monitoring tables for clusters
        Configuring the system view
        Configuring monitoring tables
        Managing the message pipe
        Changes for RPCs
        Monitoring tables specific to the Cluster Edition
        Monitoring tables that return identical information for all instances
        Monitoring tables that return specific instance information
    Using Backup Server in a Clustered Environment
      Nodes joining cluster during a dump
      Multiple Backup Servers
        Configuring Cluster Edition to use multiple Backup Servers
          Using the dedicated method
          Using the round-robin method
        Starting and stopping Backup Servers
        Backing up to media
        Changes to stored procedures
          sp_addserver
          sp_dumpoptimize and sp_helpserver
          sp_volchanged
    Managing the Workload
      Logical cluster resources
      The system logical cluster
      Setting up a logical cluster
        Creating a logical cluster
        Adding instances to a logical cluster
        Adding routes to a logical cluster
        Starting a logical cluster
      Assigning routing rules
        Routing rules
      Configuring logical cluster attributes
        The open logical cluster
        Down-routing mode
        System-view attribute
        Start-up mode
        Failover mode
        Fail_to_any attribute
        Load profile attribute
        Login distribution mode
        Action release
        Gather mode
        Roles
      Configuring failover
        Adding failover resources
      Managing logical clusters
        User tasks and logical clusters
        Managing the workload manager thread
          Setting memory requirements for the workload manager
        Viewing information about a logical cluster
          Querying the monitor tables
          Using sp_cluster logical, "show"
        Creating and dropping a logical cluster
        Adding resources to a logical cluster
        Dropping resources from a logical cluster
        Adding, moving, and dropping routes
        Migrating connections
      Administering failover, failback, and planned downtime
        Cluster and instance states
        How states change
        Asynchronous commands and logical cluster states
        Using action descriptors
        An example: scheduling and rescheduling a failover
        Using failover, failback, online, offline, and deactivate
          failover
          failback
          online
          offline
          deactivate
      Distributing the workload
        Workload metrics
        Creating a user metric
        Weighting the workload metrics
        Load thresholds
        Load profiles
      Using the sample load profiles
      Creating and configuring your own load profile
        Creating the load profile
        Building the load profile
          Specifying weights for load profile metrics
          Specifying load distribution thresholds
        Associating the load profile with a logical cluster
        Changing a load profile
      Troubleshooting
    Cluster Cache Configuration
      Global caches
      Local caches
      Creating and configuring named data caches
        Getting information about named caches
        Creating a new cache
          sp_cacheconfig
      Configuring and using multiple buffer pools
        sp_poolconfig
        Moving memory between buffer pools
        Changing the wash size of a pool
        Changing a pool’s local asynchronous prefetch percentage
          Asynchronous writes during allpages page split
        Dropping a buffer pool
      Binding objects to named caches
        Syntax for binding objects
        Getting information about bound caches
        Dropping cache bindings
      Modifying the configuration file
        Format of a local named cache
        Extra line in local cache entries
        Deleted named cache with global configuration
        Named cache with local configuration
        Deleted entries with valid configuration
        Creating a local configuration in the presence of a global configuration
      Limitations
    Using Temporary Databases
      Types of temporary databases
        Local temporary databases
          Local user temporary databases
          Local system temporary databases
          Global temporary databases
        Summary information
      Creating temporary databases
        Creating local system temporary databases
        Creating local and global user temporary databases
      Binding users and applications to temporary databases
        Creating and managing temporary database groups
        What you can bind
        How the session binding is determined
        Creating and managing bindings
        Displaying group and binding information
        Dropping temporary databases
          Dropping all but the last local system temporary database
          Dropping the last local system temporary database
      Restrictions for temporary databases
      Private device support for local databases
        Using private devices for temporary data
        Creating private devices using disk init
        Reinitializing private devices using disk reinit
        Dropping private devices using sp_dropdevice
        Displaying private device information using sp_helpdevice
        Using create database and alter database with a private device
        Using disk refit
    Running Job Scheduler in a Clustered Environment
      Installing and configuring Job Scheduler
      Running Job Scheduler in a clustered environment
      Shutting down Job Scheduler
      Redirecting scheduled jobs
    Instance Recovery
      Single-instance recovery
        Single transaction log
      Multiple simultaneous failure
        Enabling multiple simultaneous failover
          Performance limitations and the cluster redundancy level
      Recovery algorithm
    Additional Topics
      Locks
        Deadlocks
        Retention locks
        Cluster lock requests and task request status
      Memory
      Thresholds
        dbcc thresholds output
        dbcc dbtable output
        dbcc dbrepair with remap option
        dbcc dbrepair with newthreshold option
      Cluster interprocess communication
      Distributed checkpoints
      Quorum device heartbeat
        Configuring the quorum device heartbeat
      Using InfiniBand
        Setting the buffer space
          Configuring buffer space
        Configuring InfiniBand in a cluster
      Private installation mode
        Maintaining the server configuration files
          Changing configuration options at runtime
          Manually changing the configuration file
          If the version numbers do not match at start-up
          Recommended configurations
      Using Java in a clustered environment
      Adding space to an archive database
      Distributed transactions on a shared-disk cluster
        Using DTM on the shared-disk cluster
        The cluster as the resource manager
        Handling requests on nonowner instances
        Handling instance failures
        Transaction coordination with ASTC
        The impact of connection migration
          Connection migration and performance
          When connections cannot migrate
        Configuration and system issues
      Support for mount and unmount commands
      Using sp_showplan
    Using the Cluster Edition with the Veritas Cluster Server
      Supported platforms, requirements, and limitations
      Installing and configuring the Cluster Edition on VCS
        Installing the Cluster Edition
        Creating a new Adaptive Server cluster for Storage Foundation integration
        Converting an existing cluster to use SF for Sybase CE
          Relocating database storage
          Reconfiguring interconnects
      Managing a cluster under VCS control
        Starting and stopping instances
        Adding and removing instances
        Increasing the number of user connections
        Changing the character set or sort order
      Membership modes
        Determining the membership mode
        Changing membership mode
      Understanding failure scenarios
      VCS troubleshooting
        Cluster Edition fails to start
        Veritas log: ā€œSybase home directory does not existā€
        Instance log: ā€œfailed to bind to socketā€
        Instance log: ā€œMembership service failed to receive initial message from Veritas cluster membership after 301 seconds. Exiting...ā€
        Instance log: ā€œFailed to open quorum device 'device_path'. OS error 13, 'Permission denied'ā€
        Instance log: ā€œbasis_dsizecheck: attempt to open device 'device_path' failed, system error is: Permission deniedā€
        Instance log: ā€œThe configuration area in master device appears to be corrupt.ā€
        Veritas log: ā€œPath not foundā€
        VCS shuts down the instance after it starts and issues resource faults
        VCS cannot shutdown the instance resource
        Resource faults for VCS groups
        VCS fails to start
    Troubleshooting
      Verifying the cluster environment
      Restarting the cluster using a dataserver binary from an earlier version
      Errors accessing disk devices
      Verifying the cluster is down
      Creating cluster using sybcluster fails with error -131
      Cluster creation fails leaving files in $SYBASE directory
      Unified Agent starts but sybcluster connect fails
      Disk devices in use
      Instances fail to join the cluster
      Private interconnect failure
      Client connection failover fails
      Client fails to reconnect to alternate high availability servers
      sybcluster cannot connect if all connections use SSL
      jConnect sample disables HA
      PC-Client installation – java.lang.NoClassDefFound Error
      The cluster entry ā€œnameā€ did not contain any servers
      After password change, sybcluster cannot manage the cluster
      Agent ā€œcannot be foundā€
      Sybase Central cannot register the AMCP plug-in
      UAF plug-in register error
      Data on disk unavailable: problems affecting database creation
      Access permission to devices is denied after enabling I/O fencing
      sybcluster cannot find interfaces file
      IBM errors
        Asynchronous I/O not enabled
        Incorrect permissions on device
        Another machine using device
        Error running chdev
    Administering Clusters with the Adaptive Server Plug-in
      Managing a shared-disk cluster
        Connecting to a cluster
        Disconnecting from a cluster with the toolbar
        Enabling Unified Agent functions in the Adaptive Server plug-in
        Changing server discovery settings
        Displaying cluster properties
          General properties tab
          Cluster tab
          Configuration tab
          Log Space tab
          Job Scheduler Server tab
          Localization tab
        Starting a cluster
        Shutting down a cluster
        Dropping a cluster
        Removing a server group
        Displaying the status of a cluster
        Managing a clustered instance
          Adding an instance to a cluster
          Dropping an instance from a cluster
          Displaying instance properties
          Starting an instance
          Shutting down an instance
        Creating shared database devices
      Managing multiple temporary databases
        Managing the local temporary databases
        System temporary databases
        Adding a user-created global temporary database
        Adding a user-created local temporary database
        Adding temporary databases to a group
          Adding a group
          Group properties
      Managing the workload
        Load profiles
          Deleting load profiles
          Associating a load profile with a logical cluster
          General tab for load profiles
          Metric Weights tab
          Thresholds tab
        Managing logical clusters
          Adding a logical cluster
          Dropping a logical cluster
        Logical cluster properties
          General tab
          Base Instances tab
          Failover Instances tab
          Load Profile tab
          Routes tab
        Viewing workload status
          Viewing workload status of an instance
      Managing routes
        Route properties
          Creating a route
    Administering Clusters Using sybcluster
      Using sybcluster
      sybcluster and the Unified Agent Framework
      Starting sybcluster
      Creating a cluster
      Connecting to the cluster
        Authenticating the user
        Setting the user name and password
        Identifying the Unified Agents
      Starting the cluster
      Managing the cluster
        Creating a cluster
        Verifying the cluster
        Displaying information about available Unified Agents
        Displaying cluster information
        Changing cluster configuration values
          Changing user names or passwords
          Changing localization values
          Changing the membership mode
        Disconnecting from the cluster
        Shutting the cluster down
        Dropping a cluster
      Managing an instance
        Displaying information about the instance
        Adding an instance
        Verifying the instance
        Changing the default instance
        Changing instance properties
        Shutting an instance down
        Dropping an instance
      Enabling sybcluster after manually creating the cluster
      Creating and managing auxiliary servers
        Creating auxiliary servers
        Dropping auxiliary servers
        Displaying listening port information
        Changing listening port information
      Upgrading the server
    Configuring the Operating System
      Using the stty setting
      Restoring correct permissions
      File descriptors and user connections
        For Linux
        For Sun Solaris
        For HP-UX
        Displaying current soft and hard limits
        Increasing the soft limit
        Increasing the hard limit
        Sample program
      Adjusting the client connection timeout period
        For Sun Solaris
        For Linux
        For HP-UX
      Checking for hardware errors
        For Sun Solaris
        For Linux
        For HP-UX
      Monitoring the use of operating system resources
      A sample C shell maintenance script
    Customizing Localization for the Cluster Edition
      Overview of localization support
        Language modules
        Default character sets for servers
          Changing the default language and character set
          Changing the default character set for servers
        Supported character sets
      Character set conversion
        Conversions between server and client
      Sort orders
        Available sort orders
      Language modules
        Installing a new language module
        Message languages
      Localization
        Localization directories
        About the directory
        About the charsets directory
        About the locales.dat file
          Format of locales.dat file entries
          How client applications use locales.dat
          Editing the locales.dat file
      Changing the localization configuration
        Cluster Edition localization
        Backup Server localization
          Configuring the Cluster Edition for other character sets
        Sort orders
        Character sets
        charset utility
    Adding Optional Functionality to the Cluster Edition
      Adding auditing
        Audit system devices and databases
        Running auditinit with the Cluster Edition
        Preinstallation tasks for auditing devices
        Installing auditing
      Installing online help for Transact-SQL syntax
        Online syntax help: sp_syntax
        Default device for the sybsyntax database
        Installing sybsyntax
    Logging Error Messages and Events
      Cluster Edition error logging
        Enabling and disabling error logging
      Setting error log paths
        Setting the Cluster Edition error log path
      Managing messages
        Logging user-defined messages
          New messages
          Existing messages
        Logging auditing events
    Setting Up Communications Across the Network
      How the Cluster Edition determines which directory service entry to use
      How a client uses directory services
      Creating a directory services entry
      Supported directory drivers
      Contents of an interfaces file
      Heterogeneous and homogeneous environments
      Understanding the format of the interfaces file
        Components of an interfaces file entry
      Creating a master interfaces file
        Using dsedit or dscp to create a master interfaces file
        Using a text editor to create a master interfaces file
      Configuring interfaces files for multiple networks
        Configuring the server for multiple network handlers
          Sample interfaces files for multiple network handlers
        Configuring the client connections
          Using one network-independent DSQUERY name
          Using different DSQUERY names
        Configuring for query port backup
      IPv6 support
        Understanding IPv6
        IPv6 infrastructure
        Starting the Cluster Edition as IPv6-aware
      Troubleshooting
        Server fails to start
        Error when executing an ESP
  Component Integration Services Users Guide 15.7
    Introduction
    Understanding Component Integration Services
      Basic concepts
        Access methods
        Server classes
        Object types
        Interface to remote servers
      Proxy tables
        Using the create table command
        Using the create existing table command
          Datatype conversions
          Example of remote table definition
        Using the create proxy_table command
        Remote procedures as proxy tables
        Server limits
          create new proxy table
          create existing proxy table
          create proxy_table
          alter table
          select, insert, delete, update
          RPC handling
          sp_tables
        Cascading proxy tables
      Proxy databases
        User proxy databases
          User proxy database schema synchronization
        System proxy databases
          System proxy database creation
          Schema synchronization when current database has a system proxy database
          Stored procedure execution within a system proxy database
          Additional behavior of the system proxy database
      File system access
        Security considerations
        Directory access
        Recursion through subordinate directories
        File access
      Remote servers
        Server class ASEnterprise
        Server class ASAnywhere
        Server class ASIQ
        Server class direct_connect
        Server class sds
        Server class RPCServer
        Connection management
        Connecting to remote servers without the interfaces file
        LDAP directory services
        Secure communication with SSL
          Trusted roots files
        Secure communication using Kerberos
          Kerberos security services
          Configuration for the remote Adaptive Server Kerberos principal name
          Configuration for Component Integration Services Remote Procedure Calls
        Security issues
          Using encrypted columns in CIS
        Remote server logins
          Trusted mode
          Connecting to Backup Server and XP Server
        Mapping external logins
        Remote server connection failover
        Remote server capabilities
      Query processing
        Processing steps
          Query parsing
          Query normalization
          Query preprocessing
          Decision point
          Component Integration Services plan generation
          Adaptive Server optimization and plan generation
          Component Integration Services plan generation
          Component Integration Services remote location optimizer
          Query plan execution
      RPC handling and Component Integration Services
        Site handler and outbound RPCs
        Component Integration Services and outbound RPCs
        Text parameters for RPCs
        Text parameter support for XJS/390
      Distributed Transaction Management
        Server classes and ASTC
        DTM-enabled servers
        Pre-DTM servers
        strict DTM enforcement
        enable xact coordination
        Enable Component Integration Services
        Transactional RPCs
        Restrictions on transaction management
      Adaptive Server to Adaptive Server update statistics
        Limitations
      Updating statistics on non-Adaptive Server backends
      Java in the database
        @@textsize
        @@stringsize
        Constraints on Java class columns
        Error messages
        Java abstract datatypes (ADTs)
          Java class definitions
      Datatypes
        Unicode support
          create table
          create existing table
          create proxy_table
          alter table
          select, insert, update, and delete statements
        Datatype conversions
        text and image datatypes
          Restrictions on text, image, and unitext columns
          Limits of @@textsize
          Odd bytes padded
          Converting text and image datatypes
          Pattern matching with text and unitext data
          Entering text and image values
          readtext using bytes
          text, image, and unitext with bulk copy
          Error logging
          text, unitext, and image data with server class ASEnterprise
          text, image, and unitext data with server class direct_connect
      Configuration and tuning
        Using sp_configure
          sysconfigures table
          Changing the configuration parameters
          Component Integration Services configuration parameters
        Global variables for status
    SQL Reference
      dbcc commands
        dbcc options
        Trace flags
      Functions
        Support for functions within Component Integration Services
        Aggregate functions
        Datatype conversion functions
        Date functions
        Mathematical functions
        Security functions
        String functions
        System functions
        Text and image functions
      Transact-SQL commands
        alter table
        case
        connect to...disconnect
        create existing table
        create index
        create table
        delete
        drop index
        fetch
        insert
        readtext
        select
        truncate table
        update
        update statistics
        writetext
      Passthrough mode
        connect to
        sp_autoconnect
        sp_passthru
        sp_remotesql
      Quoted identifier support
      Delimited identifier support
      auto identity option
      Triggers
    Tutorial
      Getting started with Component Integration Services
        Adding a remote server
          Overview
          Adding the remote server to the interfaces file
          Creating server entries in system tables
          Adding an alternate login and password
          Verifying connectivity
        Join between two remote tables
          Adding the remote servers to the interfaces file
          Defining the remote servers
          Mapping the remote tables to Adaptive Server
          Performing the join
    Troubleshooting
      Problems accessing Component Integration Services
      Problems using Component Integration Services
        Unable to access remote server
          Requested server name not found
          Driver call to connect two endpoints failed
          Login failed
        Unable to access remote object
        Problem retrieving data from remote objects
          Object is altered outside Component Integration Services
          Index is added or dropped outside Component Integration Services
      If you need help
  Compression Users Guide 15.7
    Data Compression Overview
      Enabling Data Compression
      Select Data into Compressed Tables
      Administering Compressed Databases
        Session-Level Data Compression
        Copy, Dump, and Load Compressed Data
      Limits for Database Compression
    Levels of Data Compression
      Row-Level Compression
      Page-Level Compression
    Creating Databases for Data Compression
      Altering the Compression Level of a Database
    Creating a Compressed Table
      Disabling Compression
      Altering the Compression Level of a Table or Partition
    Datatypes Available for Compression
    Compressed Data Storage Strategies
    Compressed Columns with Large Objects
      Creating a Compressed Database with LOB Datatypes
      Creating Compressed Tables with LOB Datatypes
      Altering Tables with Compressed LOB Datatypes
    Select Data into Compressed Tables
    Administering Compressed Databases
      Session-Level Data Compression
      Copy, Dump, and Load Compressed Data
    Limits for Database Compression
  Encrypted Columns Users Guide 15.7
    Overview of Encryption
    Creating and Managing Column Encryption Keys
      Protecting Data with Column Encryption Keys
        Creating column encryption keys
        Key protection
          Granting access to keys
          Changing the key
          Separating keys from data
        Dropping encryption keys
      Key encryption
        Protecting column encryption keys with the master key
        Protecting column encryption keys with the system-encryption password
        Protecting column encryption key with user-specified password
        Protecting column encryption keys with dual control
    Using Database-Level Master and Dual Master Keys
      Creating the master and dual master keys
        Creating master key copies
      Setting passwords for the master and dual master keys
      Altering passwords and key encryption keys for master key copies
      Regenerating master keys
      Dropping master keys and key copies
      Recovering the master key and dual master key
      Starting Adaptive Server in unattended start-up mode
        Configuring the unattended start-up mode
        Master key start-up file
        How Adaptive Server uses the master key start-up file
    Securing External Passwords and Hidden Text
      Service keys
        Creating service keys
        Dropping service keys
        Modifying service keys
          Changing the syb_extpasswdkey
          Changing the syb_syscommkey
        Using service keys with external passwords
          SSL passwords
          LDAP passwords
          Replication Agent passwords
        Using service keys with hidden text during upgrade
      Considerations for service keys encrypted with the master key
    Encrypting Data
      Specifying encryption on new tables
        Specifying encryption on select into
      Encrypting data in existing tables
      Creating indexes and constraints on encrypted columns
      Creating domain and access rules on encrypted columns
      Decrypt permission
        Revoking decryption permission
      Restricting decrypt permission
        Assigning privileges for restricted decrypt permissions
      Returning default values instead of decrypted data
        Defining a decrypt default
        Permissions and decrypt default
        Columns with decrypt default values
        Decrypt default columns and query qualifications
        decrypt default and implicit grants
        decrypt default and insert, update, and delete statements
        Removing decrypt defaults
      Length of encrypted columns
    Accessing Encrypted Data
      Processing encrypted columns
      Permissions for decryption
      Dropping encryption
    Protecting Data Privacy from the Administrator
      Role of the key custodian
        Users, roles, and data access
      Key protection using user-specified passwords
        Changing a key’s protection method
        Creating key copies
        Changing passwords on key copies
        Accessing encrypted data with user password
        Application transparency using login passwords on key copies
        Login password change and key copies
        Dropping a key copy
    Recovering Keys from Lost Passwords
      Loss of password on key copy
      Loss of login password
      Loss of password on base key
      Key recovery commands
      Changing ownership of encryption keys
    Auditing Encrypted Columns
      Auditing options
      Audit values
      Event names and numbers
      Masking passwords in command text auditing
      Auditing actions of the key custodian
    Performance Considerations
      Indexes on encrypted columns
      Sort orders and encrypted columns
      Joins on encrypted columns
      Search arguments and encrypted columns
      Movement of encrypted data as cipher text
  In-Memory Database Users Guide 15.7
    In-Memory Databases
      Cache and buffer support
      Durability levels
        Temporary databases and in-memory temporary databases
        Multidatabase transactions and database types
      Template databases
        Altering the database to use a new template
      Minimally logged commands
      Limits for in-memory and relaxed-durability databases
        Changed system procedures
    Managing In-Memory and Relaxed-Durability Databases
      Specifying named caches for in-memory databases
      Verifying changes to the configuration file
        Changing static configuration parameters for in-memory databases
      Creating in-memory devices
      Creating in-memory databases
      Creating disk-resident databases with relaxed durability
      Administering in-memory databases
        Resizing in-memory storage caches
        Deleting in-memory storage caches
        Increasing the size of in-memory databases
        Dumping and loading in-memory databases
          Configuring number of backup connections
        Dropping in-memory databases
        Dropping in-memory devices
    Minimally Logged DML
      Types of DML logging settings
        Database-level logging
        Table-level logging
        Session-level logging
        Additional minimal logging rules
      Transactional semantics
      Logging concurrent transactions
      Minimal logging with ddl in tran set to true
      Effect of referential integrity constraints
      Multistatement transactions in minimally logged mode
      Stored procedures and minimally logged DML
      Including set dml_logging in a trigger
      Using deferred updates
      Obtaining diagnostic information
    Performance and Tuning for In-Memory Databases
      Configuring in-memory storage cache
        Cache layout
      sp_sysmon output for in-memory databases
      Monitoring the default data cache performance
      Organizing physical data for in-memory devices
      Performance optimization for low-durability databases
        Tuning checkpoint intervals
      Minimally logged DML
      Dumping and loading in-memory databases
      Tuning for spinlock contention and network connections
        Improving contention for lock manager hashtable spinlock ratios
        Determining the number of network connections
  Java in Adaptive Server Enterprise 15.7
    An Introduction to Java in the Database
      Advantages of Java in the database
      Capabilities of Java in the database
        Invoking Java methods in the database
        Storing Java classes as datatypes
        Storing and querying XML in the database
      Java components
      Functional changes in Adaptive Server 15.0.3 and later
        Changes in class distribution
        The PCA/JVM runs in headless mode
        Changes in memory management
        Changes in ClassLoader behavior
      Standards
      Java in the database: questions and answers
        What are the key features?
        How are Java instructions stored in the database?
        How is Java executed in the database?
        Which Java Virtual Machines (JVMs) are supported?
        What is headless mode?
        What about JDBC?
        How can Java and SQL be used together?
        What is the Java API?
        Which Java classes are supported in the Java API?
        Can user-defined classes be installed in the database?
        Can data be accessed using Java?
        Can the same classes be used on the client and the server?
        How to use Java classes in SQL
        Where can information about Java in the database be found?
        What you cannot do with Java in the database
    Managing the Java Environment
      Components of the Java environment
        The JVM pluggable component
        Pluggable component adapter JVM (PCA/JVM)
        Pluggable component interface (PCI) and the PCI Bridge
        The PCI memory pool
        The sybpcidb database
        How configuration values are organized in sybpcidb
      When to change configuration values
        Server-level options
        Configuration options for the PCI Bridge
        Configuration options for the PCA/JVM
      Changing configuration values in a running server
        Changing configuration values by restarting Adaptive Server
        Changing configuration values before the JVM is initialized
        Changing configuration values after the JVM is initialized
      Restoring default configuration values to sybpcidb
      Using monitor tables to display information about the PCI Bridge
    Preparing for and Maintaining Java in the Database
      The Java runtime environment
        Java classes in the database
          Sybase runtime Java classes
          User-defined Java classes
        JDBC drivers
        The JVM
      Enabling Java
      Installing Java classes in the database
        Using installjava
          Installing uncompressed JARs
          Retaining the JAR file
          Updating installed classes
        Referencing other Java-SQL classes
      Viewing information about installed classes and JARs
      Downloading installed classes and JARs
      Removing classes and JARs
        Retaining classes
    Using Java Classes in SQL
      General concepts
        Java considerations
        Java-SQL names
      Using Java classes as datatypes
        Creating and altering tables with Java-SQL columns
          Altering partitioned tables
        Selecting, inserting, updating, and deleting Java objects
      Invoking Java methods in SQL
        Sample methods
        Exceptions in Java-SQL methods
      Representing Java instances
      Assignment properties of Java-SQL data items
      Datatype mapping between Java and SQL fields
      Character sets for data and identifiers
      Subtypes in Java-SQL data
        Widening conversions
        Narrowing conversions
        Runtime versus compile-time datatypes
      Treatment of nulls in Java-SQL data
        References to fields and methods of null instances
        Null values as arguments to Java-SQL methods
        Null values when using the SQL convert function
      Java-SQL string data
        Zero-length strings
      Type and void methods
        Java void instance methods
        Java void static methods
      Equality and ordering operations
      Evaluation order and Java method calls
        Columns
        Variables and parameters
        Deterministic Java functions in expressions
      Static variables in Java-SQL classes
        Changes for static variables for Adaptive Server 15.0.3 and later
        Changes for static variables for the Cluster Edition
      Java classes in multiple databases
        Scope
        Cross-database references
        Inter-class transfers
        Passing inter-class arguments
        Temporary and work databases
      Java classes
    Data Access Using JDBC
      Overview
      JDBC concepts and terminology
      Differences between client- and server-side JDBC
      Permissions
      Using JDBC to access data
        Overview of the JDBCExamples class
        The main( ) and serverMain( ) methods
          Using main( )
          Using serverMain( )
        Obtaining a JDBC connection: the Connecter( ) method
        Routing the action to other methods: the doAction( ) method
        Executing imperative SQL operations: the doSQL( ) method
        Executing an update statement: the updater( ) method
        Executing a select statement: the selecter( ) method
        Calling a SQL stored procedure: the caller( ) method
      Error handling in the native JDBC driver
      The JDBCExamples class
        The main( ) method
        The serverMain( ) method
        The connecter( ) method
        The doAction( ) method
        The doSQL( ) method
        The updater( ) method
        The selecter( ) method
        The caller( ) method
    SQLJ Functions and Stored Procedures
      Overview
        Compliance with SQLJ Part 1 specifications
        General issues
        Security and permissions
        SQLJ Examples
      Invoking Java methods in Adaptive Server
      Using Sybase Central to manage SQLJ functions and procedures
      SQLJ user-defined functions
        Handling null argument values
          Handling nulls when creating the function
          Handling nulls in the function call
        Deleting a SQLJ function name
      SQLJ stored procedures
        Modifying SQL data
        Using input and output parameters
        Returning result sets
          Deleting a SQLJ stored procedure name
      Viewing information about SQLJ functions and procedures
      Advanced topics
        Mapping Java and SQL datatypes
        Using the command main method
      SQLJ and Sybase implementation: a comparison
      SQLJExamples class
    Debugging Java in the Database
      Supported Java debuggers
      Setting up Java debugging
        Configuring the server to support debugging
        Attaching the remote debugger to the JVM debug agent
    File and Network Access Using Java
      File access using java.io
        User identity and permissions
        Specifying directories for file I/O: UNIX platforms
          Mask syntax
          Examples
        Specifying directories for file I/O: Windows platforms
          Mask syntax
          Examples
        File I/O changes
        Rules for opening existing files
          UNIX platforms
          Windows platforms
        Rules for creating files with a file open operation
        Final file check
      File access using java.net
        Examples
          Using socket classes
          Using the URL classes
    Additional Topics
      JDK requirement for Java classes in the server
      Assignments
        Assignment rules at compile-time
        Assignment rules at runtime
      Allowed conversions
      Transferring Java-SQL objects to clients
      Suggestions for improving performance
        Minimize the number of calls from SQL to the JVM
        Use the java.lang.Thread class with care
        Determine if you are running within the PCA/JVM
        Avoid SQL loops in a multi-engine environment
      Controlling access to native methods in the PCA/JVM
      Unsupported Java API packages, classes, and methods
        Restricted Java packages, classes, and methods
        Unsupported java.sql methods and interfaces
      Invoking SQL from Java
        Special considerations
      Transact-SQL commands from Java methods
      Datatype mapping between Java and SQL
      Java-SQL identifiers
      Java-SQL class and package names
      Java-SQL column declarations
      Java-SQL variable declarations
      Java-SQL column references
      Java-SQL member references
      Java-SQL method calls
    Glossary
  Job Scheduler Users Guide 15.7
    Overview
      Introduction
      Terminology and concepts
      Job Scheduler components and functionality
      Job Scheduler architecture
      Security
        js_user_role
        js_admin_role
        js_sa_role
        Shared objects
    Configuring and Running Job Scheduler
      Installing Job Scheduler manually
      Setting up Job Scheduler users
      Setting up access to target servers
    Using Templates to Create Jobs
      Introduction
      Installing stored procedures on a target server
      Installing the templates into Job Scheduler
      Using Job Scheduler templates
        Backup
        Statistics management
        Reorganization
        Reconfiguration
        Template updates
    Using Job Scheduler at the Command Line
      Creating a job
        Job state codes
      Creating a schedule
      Creating a scheduled job
      Deleting a scheduled job
      Modifying a scheduled job
      Invoking stored procedures on a target server
      Managing jobs
      Managing job history and logs
    Command Reference
      Command line stored procedures
      Command syntax
      sp_sjobcreate
      sp_sjobcmd
      sp_sjobmodify
      sp_sjobdrop
      sp_sjobhelp
      sp_sjobcontrol
      sp_sjobhistory
    Managing Job Scheduler in the Sybase Central ASE Plug-in
      Adding a scheduled job
      Adding a job
      Adding a schedule
      Scheduling an existing job
      Viewing job history
      Purging job history
      Administering Job Scheduler
      Showing all users
      Managing a scheduled job
      Editing properties
      Deleting a Job Scheduler object
    Troubleshooting
      Logging error messages
      A job fails to run at the time you scheduled it
      A scheduled job created from a template fails
      A job with multiple calls to sp_sjobcmd fails
      A stored procedure fails
  Unified Agent and Agent Management Console Users Guide 2.0.2
    About this book
    Overview
      What is Unified Agent?
      Services provided
      Agent Management Console
    Installing and Configuring Unified Agent and Agent Management Console
      Pre-installation tasks
      Installing Unified Agent
        Starting the JINI server
        Starting and stopping Unified Agent
        Starting Unified Agent as a service on UNIX platforms
        Starting Unified Agent as a service on Windows platforms
        Installing the Agent Management Console
      Configuring Unified Agent
        Post-configuration tasks
    Security
      Unified Agent security
        Encryption
        Authentication
          Login modules
          Security module control flags
        Authorization
        Role mappings
        Permissions
    Agent Management Console Features and Functionality
      Managing look-up services
        Creating a network lookup profile
        Discovering Unified Agents
        Deleting a network look-up profile
        Changing a network look-up profile
        Specifying a network plug-in name filter
      Managing Unified Agents
        Manually adding an agent
        Connecting to an agent
        Adding credentials
        Disconnecting from an agent
        Restarting an agent
        Retrieving the agent log
        Viewing and changing agent properties
      Managing discovery adaptors
        Creating a discovery adaptor
        Deleting a discovery adaptor
        Viewing and changing discovery adaptor properties
        Setting discovery adaptor password
      Managing security modules
        Creating a security module
        Deleting a security module
        Ordering the security module authentication
        Viewing and changing security module properties
        Setting a security module password
      Managing role mappings
        Creating a role mapping
      Managing agent services
        Starting an agent service
        Restarting an agent service
        Stopping an agent service
        Viewing agent service properties
      Managing agent plug-ins
        Loading an agent plug-in
        Unloading an agent plug-in
        Reloading an agent plug-in
        Viewing agent plug-in properties
        Server-based plug-ins
          Pinging the server
          Starting the server
          Restarting the server
          Stopping the server
          Retrieving the server log
      Managing attributes
        Viewing attributes
        Updating attribute values
        Viewing properties and changing permissions
      Managing operations
        Viewing operations
    Password Encryption and Security Configuration
      Password encryption utility
      Enabling Rivest-Shamir-Adleman (RSA) encryption
      Adaptive Server agent plug-in server password encryption
      Pluggable Authentication Module (PAM) configuration
    SNMP Agent Plug-in
      Overview
      Terminology
      Sybase Adaptive Server MIB
      Unified Agent SNMP services and plug-ins
        UAF SNMP Service
        UAF SNMP Service MIBs
      Adaptive Server-to-SNMP client architecture
      Security
        Security for connections from Adaptive Server
        Security for connections from SNMP
      Configuring Adaptive Server for the SNMP Agent Plug-in
      TDS services
      UAF SNMP Agent Service
      Adaptive Server runtime
      Using the Adaptive Server SNMP Agent Plug-in
        Viewing the SNMP information from NET-SNMP
      Sybase MIB
    Tabular Data Stream (TDS) Service
      What is TDS?
      Using the TDS service
      UAF services
        uaf_list_service_operations
        uaf_list_services
        uaf_list_service_operation_arguments
        uaf_invoke_service_operation
        uaf_list_service_attributes
        uaf_get_service_attribute
        uaf_set_service_attribute
      UAF plug-ins
        uaf_list_plugins
        uaf_list_plugin_operations
        uaf_list_plugin_operation_arguments
        uaf_invoke_plugin_operation
        uaf_list_plugin_attributes
        uaf_get_plugin_attribute
        uaf_set_plugin_attribute
      TDS listener client examples
        Setting up examples for the Adaptive Server client
        Examples for configuring the Adaptive Server client
        Examples for using the Adaptive Server client
        Examples for configuring the Adaptive Server client
      Reporting functionality and error recovery
  Using Backup Server with IBM Tivoli Storage Manager 15.7
    Creating Backups Using the IBM Tivoli Storage Manager
      Installing and setting up the backup system
        Installing the backup system
          Configuring TSM to allow different source and target machines
          Configuring TSM data compression
      TSM concepts and Backup Server
        Logical structures on TSM
        Object naming and data organization
      Backing up databases and transactions
        Using dump and load with the same and different databases
        Using dump and load when the source and target Adaptive Servers are different
        Using dump and load with multiple stripes
      Listing a server’s backup objects
      Deleting backup objects from TSM
  Using Sybase Failover in a High Availability System 15.7
    Failover and Failback
      What is failover?
        Client connections during fail over
        User logins in failover
      What is failback?
        Performing failback
      Cluster locks in a high availability node
    What is High Availability?
      Differences between active-active and active-passive
      Requirements for failover
      Resource requirements
      How does Sybase Failover work with high availability?
      Single-system presentation
      Special considerations for Sybase Failover
        Installing the monitoring table scripts
        Using disk mirroring
        Running the installhasvss script
        Creating a SYB_HACMP server entry
        Defining user-defined datatypes
        Adaptive Server and two-phase commit transactions
    Asymmetric and Symmetric Configurations
      Asymmetric and symmetric configuration
        Configuring the asymmetric companion
          Performance of Adaptive Server in an asymmetric configuration
        Configuring the symmetric companion
          Performance of Adaptive Server in a symmetric configuration
      Auditing in a high availability system
        Setting auditing options
          sybsecurity and Sybase Failover
          Audit trails and Sybase Failover
    Modes of Failover
      What are modes?
        Different modes of a companion server
        Determining the companion’s mode
      Domains
    Proxy Databases, User Databases, and Proxy System Tables
      Proxy databases
        Creating proxy databases
          When are proxy databases created?
        Size of the proxy databases
        Commands and system procedures in proxy databases
          Changes to commands in proxy databases
          Changes to system procedures in proxy databases
          Issuing user-defined stored procedures in proxy databases
        Manually updating the proxy databases
      Proxy system tables in master
    Running do_advisory
      What is the do_advisory option?
        Running the do_advisory option
      Quorum attributes
    Configuring Adaptive Server for Failover on HP
      Hardware and operating system requirements
      Preparing Adaptive Server for high availability
        Installing Adaptive Servers
        Adding entries for both Adaptive Servers to the interfaces file
          Adding entries to interfaces file for client connections
        Setting the value of $SYBASE
        Configuring sybha executable
        Creating a new default device other than master
        Adding the local server to sysservers
        Adding the secondary companion to sysservers
        Running installhasvss
        Assigning ha_role to system administrator
        Verifying configuration parameters
      Configuring HP for failover
        Creating the package configuration
        Editing the ASE_HA.sh script
          Creating the package control script
        Verifying and distributing the configuration
          Starting the primary and secondary companions
      Configuring companion servers for failover
        Running sp_companion with do_advisory option
        Creating an asymmetric companion configuration
        Creating the symmetric configuration
      Administering Sybase Failover
        Failing back to the primary companion and resuming normal companion mode
        Suspending companion mode
          Resuming normal companion mode from suspended mode
        Dropping companion mode
      Troubleshooting Sybase Failover on HP
        Error message 18750
        Recovering from a failed prepare_failback
        Location of error logs
      Upgrading Adaptive Server
    Configuring Adaptive Server for Failover on IBM AIX HACMP
      Hardware and operating system requirements
        Requirements for running Failover on IBM AIX HACMP
          Special considerations for running Adaptive Server on HACMP for AIX
      Preparing Adaptive Server to work with high availability
        Installing Adaptive Servers
        Adding entries for both Adaptive Servers to the interfaces file
          Adding entries to the interfaces file for client connections
        Setting the value of $SYBASE
        sybha executable
        Verifying configuration parameters
        Adding thresholds to the master log
        Creating a new default device other than master
        Adding a local server to sysservers
        Adding a secondary companion to sysservers
        Running installhasvss script
        Assigning ha_role to System Administrator
      Configuring the IBM AIX subsystem for Sybase Failover
        Modifying the ASE_HA.sh script
        Configuring resource groups in HACMP
      Configuring companion servers for failover
        Running sp_companion with do_advisory option
        Creating an asymmetric companion configuration
        Creating the symmetric configuration
        Starting the primary companion as a monitored resource
      Administering Sybase Failover
        Failing back to the primary node
          Failing back manually
        Suspending companion mode
          Restarting companion during suspended mode
        Resuming normal companion mode
          Resuming normal companion mode from suspended mode
          Resuming normal companion mode from failover mode
        Dropping companion mode
      Troubleshooting fail over for HACMP for AIX
        Error message 18750
        Recovering from a failed prepare_failback
        Location of error logs
      Upgrading Adaptive Server
    Active-Active Configuration for Sun Cluster 3.0 and 3.1
      Hardware and operating system requirements
        Active-active setup in Sun Cluster
      Preparing Adaptive Server for active-active setup
        Installing Adaptive Servers
        Adding entries for both Adaptive Servers to the interfaces file
        The value of $SYBASE is the same for both companions
        Executing sybha
        Creating new default devices
        Adding the local server to sysservers
        Adding secondary companion to sysservers
        Assigning the ha_role to System Administrator
        Running installhasvss script
        Verifying configuration parameters
        Adding thresholds to the master log
        Adding user and login for fault monitor
      Configuring the Sun Cluster subsystem
        Using the syscadm script
          Sample sysc_input_file
        Adaptive Server resource extension properties
        Configuring Adaptive Server resource groups
        Using SUNW.HAStoragePlus
      Configuring companion servers for failover
        High availability services library within Adaptive Server
        Running sp_companion with do_advisory
          Before initiating sp_companion
        Creating an asymmetric companion configuration
        Setting up a symmetric configuration
      Administering Sybase Failover
        Failing back to the primary companion
        Suspending normal companion mode
        Resuming normal companion mode
        Dropping companion mode
      Verifying high availability on Sun Cluster
      Configuring the resource groups manually
        Primary companion resource group
        Secondary companion resource group
      Upgrading Adaptive Server
      Troubleshooting
        Recovering from a failed prepare_failback
        Recovering from a secondary failover on the secondary companion
        Preventing the failover of secondary companion
        Changing resource and resource group state
        Location of the error logs
    Active-Passive Configuration for Sun Cluster 3.0 and 3.1
      Hardware and operating system requirements
      Active-passive setup in Sun Cluster
        Failing back in an active-passive configuration
        Clients in an active-passive configuration
      Preparing Adaptive Server for active-passive setup
        Installing Adaptive Server
        Passing environment to Adaptive Server
        Running the SySam license manager in the cluster
        Adding an entry for Adaptive Server to the interfaces file
          Configuring the interfaces file on the server side
          Configuring the interfaces file on the client side
        Verifying configuration parameters
        Adding thresholds to the master log
        Adding user and login for fault monitor
      Configuring the Sun Cluster subsystem
        Using the syscadm script
          Sample sysc_input_file
        Configuring the Adaptive Server resource group
        Using SUNW.HAStoragePlus
        Verifying the active-passive configuration
      Configuring the resource group manually
      Upgrading Adaptive Server
      Location of the error logs
    Configuring Adaptive Server for Failover on Veritas 5.0 and later
      Hardware and operating system requirements
      Preparing Adaptive Server to work with high availability
        Installing Adaptive Servers
        Adding entries for both Adaptive Servers to the interfaces file
          Adding entries to the interfaces file for client connections during fail over
        sybha executable
        Creating a new default device
        Adding the local server to sysservers
          Adding secondary companion to sysservers
        Assigning ha_role
        Installing high availability stored procedures
        Verifying configuration parameters
        Adding thresholds to the master log
      Configuring the Veritas subsystem for Sybase Failover
        Installing the HAase agent
        Creating an Adaptive Server login file
        Importing the HAase resource type
        Starting the HAase agent
        Adding the HAase resource
        Configuring an instance of the HAase resource for each service group
      Configuring companion servers for failover
        Adding user and login for high availability monitor
        Running sp_companion with do_advisory option
        Verifying the high availability agent
        Creating an asymmetric companion configuration
        Configuring for symmetric configuration
      Administering Sybase Failover
        During failover
        Failing back to the primary companion
        Suspending normal companion mode
        Resuming normal companion mode
        Dropping companion mode
      Upgrading from an agent of resource type Sybase
      Upgrading Adaptive Server
      Troubleshooting failover for Veritas Cluster
        Recovering from a failed prepare_failback
        Location of the logs
    Configuring Adaptive Server for Failover on Windows
      Hardware and operating system requirements
      Installing Adaptive Servers
        Changing the domain administration account
        Adding entries for both Adaptive Servers to sql.ini
          Adding entries to sql.ini for client connections
        Creating a new default device other than master
        Adding the primary companion as a local server
        Adding secondary companion to sysservers
        Assigning ha_role to the System Administrator
        Running insthasv to install high availability stored procedures
      Verifying configuration parameters
        Running sp_companion with do_advisory option
      Configuring Windows
        Asymmetric setup from the command line
        Symmetric configuration from the command line
        Configuring Sybase companion servers using the Windows management tools
      Configuring and securing Microsoft Cluster Server
        Securing the MSCS cluster
      Troubleshooting
        Error message 18750
        Recovering from a failed prepare_failback
      Upgrading Adaptive Server
    Open Client Functionality in a Failover Configuration
      CTLIB application changes
    Troubleshooting Secondary Points of Failure
      Troubleshooting with dbcc ha_admin
        Reinstalling installmaster
        Rerunning installhasvss
        Using dbcc ha_admin for rolling back failover commands
      Using @@hacmpservername
      Error messages
    Changes to Commands, System Procedures, and Databases
      Changes to commands
      Changes to system procedures
        System procedures hold table lock
        System procedures that synchronize changes
        Other changes to system procedures
        dbcc options for high availability systems
          dbcc dbrepair option
    Glossary
  Web Services Users Guide 15.7 ESD #2
    Understanding Adaptive Server Enterprise Web Services
      Overview
      Adaptive Server Enterprise Web Services
      Advantages of ASE Web Services
        Stored procedures and functions
        SQL
        Security
        LDAP
        User-defined Web services
      Web services standards
        XML
          Example
          XML document structure
        WSDL
        SOAP
          SOAP message structure
    Understanding the ASE Web Services Engine
      Producer of Web services
        Producer components
        Producer Web methods
        User-defined Web services
      Consumer of Web services
        Consumer components
          SDS server
          SOAP stack
        Proxy tables
      Web Services engine as a consumer versus producer
    Installing and Configuring ASE Web Services
      Installing Web Services
      Configuring Web Services
        Configuring during installation
        Configuring after installation
      Licensing
      Configuration files
      Security
        Configuring SSL
        Installing a certificate for Microsoft .NET
    Using ASE Web Services
      Using the ASE Web Services Engine
        Starting and stopping the ASE Web Services Engine
          Conditions
          Verification
        ASE Web Services methods
          execute
          login
          logout
        Using sp_webservices
          add
          help
          list
          modify
          remove
        Invoking a Web service
      Using user-defined Web services
        Commands for user-defined Web services
          create service
          drop service
        Using sp_webservices with user-defined Web services
          addalias
          deploy
          dropalias
          listudws
          listalias
          undeploy
        Security for user-defined Web services
        Auditing for user-defined Web services
          Auditing sp_webservices ā€˜deploy’
          Auditing sp_webservices ā€˜undeploy’
      ASE Web Services logging
        Rolling over log files
      Using Sybase Central
    Sample Applications
      Apache sample client
        Creating the sample client
        Using runexecute
      Microsoft .NET sample client
        Creating the sample client
        Using Execute.exe
    Troubleshooting
      Troubleshooting issues
        Remote server class definition setting
        Unmapped RPC/encoded Web method
        Truncated document/literal results
        Starting ASE Web Services Engine
        Locating WSDL
        Specifying entries in ws.properties
        Windows NT command-line arguments
        Run or stop scripts fail
        Null passwords
        Specifying SOAP endpoints with SSL
        Abnormal termination of sp_webservices ā€˜add’
        Web Services proxy table restrictions
        sysattributes table entry
      Diagnostic tools
        Detailed logging
        Enabling JDBC-level tracing
      Messages
    Installation Contents
      ASE Web Services directory tree
    Configuration Properties
      ws.properties
      myres.properties
      Specifying properties file entries
    SOAP and Adaptive Server Enterprise Datatype Mapping
      Datatype mapping
        SOAP-to-ASE datatype mappings
        ASE-to-SOAP datatype mappings for the create service command
    Glossary
  XA Interface Integration Guide for CICS, Encina, and TUXEDO 15.7
    The Sybase XA Environment
      Definitions
      Overview of the X/Open DTP model
        Components of the model
        How the components communicate
        How the components interact
        Recovery
      The Sybase XA environment
        Components of the Sybase XA environment
      Connections in the Sybase XA environment
        Identifying connections via LRMs
          Where is the connection information stored?
        Establishing connections
        Distributing work across LRMs
    Configuring the XA Environment
      Configuring Adaptive Server
      Open string parameters for the DTM XA Interface
        Open string parameters
        dtm_tm_role required for username
        Log file and trace flag parameters
          Labels for logfile entries
        xa_open() function behavior
      XA configuration file for DTM XA Interface
        Environment variable for specifying the configuration file
        [all] section for defining common LRM parameters
          Parameter definitions for [all] section
        Editing the XA configuration file
        Additional capabilities, properties, and options
      Using the DTM XA Interface with CICS
        Building the switch-load file
          Compiling the switch-load file on IBM RISC System/6000 AIX
          Compiling the switch-load file on HP9000 Series 800 HP-UX
          Compiling the switch-load file on Sun Solaris 2.x (SPARC)
        Adding a Sybase stanza to the CICS region XAD definition
      Using the DTM XA Interface with Encina
        Assigning an open string with monadmin create rm
        Initializing LRMs with mon_RegisterRmi
        Linking applications with DTM XA Interface libraries
        Establishing connections
      Using the DTM XA Interface with TUXEDO
        Linking
        Setting up the UBBCONFIG file
        Creating the TUXEDO configuration file
        Building the TMS
      Building the COBOL runtime environment
    Application Programming Guidelines
      X/Open DTP versus traditional Sybase transaction processing
      Managing transactions and connections
        Managing transactions
        Managing connections
        The current connection
        Nontransactional connections
      Deallocating cursor function with Client-Library
      Dynamic SQL
      Obtaining a Client-Library connection handle
      Multiple-thread environment issues
        Caveats of thread use
        Embedded SQL thread-safe code
        Tightly coupled transactions
      Linking with CT Library
      Sample embedded SQL COBOL fragment
      Sample embedded SQL C fragment
  XML Services 15.7
    Introduction to XML Services
      XML capabilities
      Overview
        XML in the database
        A sample XML document
          HTML display of Order data
        XML document types
    XML Query Functions
      XML query functions
        Example sections
      xmlextract
      xmltest
      xmlparse
      xmlrepresentation
      xmlvalidate
      option_strings: general format
        Option values for query functions.
    XML Language and XML Query Language
      Character set support
      URI support
      Namespace support
      XML schema support
      Predefined entities in XML documents
      Predefined entities in XPath queries
      White space
      Empty elements
      XML Query Language
        XPath-supported syntax and tokens
        XPath operators
          XPath basic operators
          XPath set operators
          XPath comparison operators
        XPath functions
          General guidelines and examples
          Functions
      Parenthesized expressions
        Parentheses and subscripts
        Parentheses and unions
    for xml Mapping Function
      for xml clause
        for xml subqueries
        for xml schema and for xml all
    XML Mappings
      SQLX options
        SQLX option definitions
      SQLX data mapping
        Mapping duplicate column names and unnamed columns
        Mapping SQL names to XML names
        Mapping SQL values to XML values
          Numeric values
          Character values
          Binary values
    XML Support for I18N
      Overview
        Unicode datatypes
        Surrogate pairs
        Numeric character representation
        Client-server conversions
        Character sets and XML data
      I18N in for xml
        Option strings
        Numeric Character Representation in for xml
        header option
        Exceptions
        Examples
          Example 1
          Example 2
          Example 3
          Example 4
          Example 5
          Example 6
          Example 7
      I18N in xmlparse
        Options
          Sort ordering in xmlparse
      I18N in xmlextract
        NCR option
        Sort ordering in xmlextract
        Sort ordering in XML Services
      I18n in xmlvalidate
        NCR option
    xmltable()
      Introduction
      xmltable and derived table syntax
      xmltable
    The sample_docs Example Table
      sample_docs table columns and rows
        Sample_docs table columns
        sample_docs table rows
      sample_docs tables
        Table script (for publishers table)
      Publishers table representation
      Titles table representation
    XML Services and External File System Access
      Getting Started
        Enabling XML services and External File System Access
        Character set conversions with external file systems
        Examples
        Setting up your XML documents and creating the proxy table
        Example: extracting the book title from the XML documents
        Example: importing XML documents or XML query results to an Adaptive Server table
        Example: storing parsed XML documents in the file system
        Example: 'xmlerror' option capabilities with External File Access
        Example: specifying the 'xmlerror=message’ option in xmlextract
        Example: parsing XML and non-XML documents with the 'xmlerror=message' option
        Example: using the option 'xmlerror=null' for non-XML documents
    Migrating Between the Java-based XQL Processor and the Native XML Processor
      Introduction
      Migrating documents and queries
        Migrating documents between the Java-based XQL processor and the native XML processor
        Migrating text documents between the Java-based XQL processor and the native XML processor
        Migrating documents from regenerated copies
        Regenerating text documents from the Java-based XQL processor
        Regenerating text documents from the native XML processor
        Migrating queries between the native XML processor and the Java-based XQL processor
    Sample Application for xmltable()
      Sample table
      Using the depts document
        The depts document structure
        Creating SQL tables from the depts document
          Normalizing the data from the depts document
          Generating tables using select
  New Features Summary Adaptive Server Enterprise 15.7 SP100
    Version 15.7 SP100
      Adaptive Server 15.7 SP100 Feature and Platform Matrix
      Shrinking Databases
      Enhancements to Backup and Restore
      Aggregating Metrics from Syntactically Similar Queries
      Updates to Precomputed Result Sets
      Improved Data Load Performance
      Incremental Reorganization
      Creating Indexes Without Blocking Access to Data
      Query Plan and Execution Statistics in HTML
      Gathering Hash-Based Statistics with create index
      Query Plan Optimization with Bloom Filters
      Support for Replication by Column Value
      Support for Multiple Scanner Threads
      Sybase Central Adaptive Server Plug-in
      Running Adaptive Server on VMware vSphere
      Support for OData
      Support for NTLM and MIT Kerberos on Windows 64-bit
      Properties Added to Responses File
      Automatic Physical Database Rearrangement
      System Changes for Adaptive Server Version 15.7 SP100
        Commands
        Functions
        System Stored Procedures
        Configuration Parameters
        System Tables
        Utilities
        Monitoring Table Changes
        Permission Changes for Commands and Functions
    Version 15.7 ESD #4
      15.7 ESD #4.2
        Improved Rollback Reporting
      15.7 ESD #4
        Remote Backup Server Maximum Name Length
        Support for Query Plan Pinning
        AF_UNIX Support
        Changes to sp_addthreshold and Roles
        System Changes for Adaptive Server Version 15.7 ESD #4
          Utilities
          Configuration Parameters
    Version 15.7 ESD #3
      sybrestore Utility
      System Changes for Adaptive Server Version 15.7 ESD #3
        Commands
        Functions
        System Stored Procedures
        Monitoring Table Changes
    Version 15.7 ESD #2
      Granular Permissions
      Predicated Privileges
      Deferred Table Creation
      Online Utilities
      Merging and Splitting Partitions
      Maximum Size of Query in the Statement Cache
      Enhancements to show_cached_plan_in_xml
      Fast-Logged Bulk Copy
      Precomputed Result Sets
      Concurrent dump database and dump transaction Commands
      Hash-Based Update Statistics
      Enhancements to dump and load
      alter table drop column without datacopy
      Expanded Maximum Database Size
      User-Defined Optimization Goal
      Shared Query Plans
      Initializing Databases Asynchronously
      In-Row Large Object Compression
      Configuring Shared Memory Dumps
      System Changes for Adaptive Server Version 15.7 ESD #2
        Commands
        Functions
        System Stored Procedures
        Configuration Parameters
        System Tables
        Utilities
        Monitoring Table Changes
    Version 15.7 ESD #1
      Proxy Table Support for In-row LOB Columns
      Support for System Procedures in Replicated Master Database
      Increased Number of Parameters
      Multiple Listeners on Windows
      Windows Supports Adaptive Server High Availability
      New and Changed Configuration Parameters
    Version 15.7
      Application Functionality Configuration Group
      New Adaptive Server Kernel
      Compressing Data in Adaptive Server
      New Security Features
        End-to-End CIS Kerberos Authentication
        Dual Control of Encryption Keys and Unattended Startup
        Securing Logins, Roles, and Password Management Extensions
        Login Profiles
        Employee Lifecycle Management
        External Passwords and Hidden Text
      Abstract Plans in Cached Statements
      Shrink Log Space
      Displaying Currently Set Switches with sysoptions
      Changes for Large Objects
        In-Row Off-Row LOB
        Using Large Object text, unitext, and image Datatypes in Stored Procedures
        Using LOB Locators in Transact-SQL Statements
        Extension to where Clause for Large Objects
      Showing Cached Plans in XML
      Padding a Character Field Using str
      Changes to select for update
      Creating Nonmaterialized, Non-null Columns
      Sharing Inline Defaults
      Retain Monitoring Data
      Analyze Dynamic Parameters
      Monitor Lock Timeouts
      Truncate Trailing Zeros
      Fully Recoverable DDL
      Transfer Rows from Source to Target Table Using merge
      View Statistics and Histograms with sp_showoptstats
      Changes to Cursors
        Release Cursor Locks at Cursor Close
        Enhanced Transaction Support for Cursors
        Monitor Cursor Statements
      Nested select Statement Enhancements
      Changes to Commands and System Procedures in Chained Transaction
      Expanded Variable-Length Rows
      Changes to like Pattern Matching
      Changes to Quoted Identifiers
      Allowing Unicode Noncharacters
      Reduce Query Processing Latency
      The sybdiag Utility
      The Optimizer Diagnostic Utility
      System Changes for Adaptive Server Version 15.7
        Commands
        Functions
        System Stored Procedures
        Configuration Parameters
        System Tables
        Utilities
        Monitoring Table Changes
          New Monitoring Tables
          Changes to Monitoring Tables
        Global Variables
    Version 15.5 Cluster Edition
      Adaptive Server 15.5 Cluster Edition Feature and Platform Matrix
      Multiple simultaneous failover
      Adding space to an archive database
      Distributed transaction management in the shared-disk cluster
      System Changes for Adaptive Server Version 15.5 Cluster Edition
        Changed commands
        Monitoring Tables
        Configuration Parameters
        Functions
    Version 15.5
      Adaptive Server 15.5 Feature and Platform Matrix
      In-Memory and Relaxed-Durability Databases
      Faster Compression for Backups
      Backup Server Support for the IBMĀ® TivoliĀ® Storage Manager
      Deferred Name Resolution for User-Defined Stored Procedures
      FIPS 140-2 Login Password Encryption
      Incremental Data Transfer
      bigdatetime and bigtime Datatypes
      Creating and Managing tempdb Groups
      System Changes for Adaptive Server Version 15.5
        Datatypes
        Functions
        System Stored Procedures
        Commands
        Configuration Parameters
        Monitoring Tables
        System Tables
        Utilities
        Auditing
    Version 15.0.3
      SQL Statement Replication
      Security Enhancements
        LDAPS User Authentication Enhancement
        Automatic LDAP User Authentication and Failback
        Login Mapping of External Authentication
        Using SSL to Specify a Common Name
        Concurrent Kerberos Authentication
      Virtually Hashed Tables
      Huge Pages
      Upgrading During a High Availability Configuration
        Reinstalling System Stored Procedures
      Distributed Transaction Management (DTM)
      Adaptive Server Plug-in Updates
      The Java Interface
      System Changes for Adaptive Server Version 15.0.3
        Functions
        System Stored Procedures
        Commands
        Configuration Parameters
        Monitoring Tables
        System Tables
    Version 15.0.2
      Encrypted Columns
      Archive Database Access
      Finding Slow-Running Queries
      Deferred Compilation
      Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
      Statistical Aggregate Functions
        Standard Deviation and Variance
      Eager and Lazy Aggregation
        Vector and Scalar Aggregation
      Improved Performance for Data Insertion
        Using Asynchronous Writes During a Page Split
        Improving Throughput of tempdb Transactions
        Post-commit Optimization
      Changes to the Query Processor
        Deferred Compilation
        Non-binary Character Set Histogram Interpolation
        Expression Histogramming Selectivity Estimates
      Viewing Current Optimizer Settings
      New Security Features
        PAM Support in 64-bit Adaptive Server on AIX
        Global Login Triggers Set Automatically
        SSL Support
        Improved Password Security
        Auditing Enhancements
          Hiding System Stored Procedure and Command Password Parameters
          Monitoring Failed Login Attempts
        High Availability Considerations
      Installing and Editing Monitoring Tables
      Monitoring Tables for the Statement Cache
      Row-Level Locking for System Tables
      The xmltable() Function
      Relocated Joins
      User-Defined SQL Functions
      instead of Triggers
      System Changes for Adaptive Server Version 15.0.2
        Trace Flags
        Commands
        Changes to the set Command
        Utilities
        System Stored Procedures
        System Tables
        Configuration Parameters
        Functions
        Global Variables
    Version 15.0.1
      Changes to Abstract Plans
        New Query-Level Settings
        Operator Name Alignment for the Abstract Plan and the Optimizer Criteria
        Extending the Optimizer Criteria Set Syntax
      Literal Parameterization
      System Changes for Adaptive Server Version 15.0.1
        Functions
        Configuration Parameters
        Commands
        Monitoring Tables
    Version 15.0
      Partition Support
      Row-Locked System Catalogs
      Query Processor
      Large Identifiers
      Computed Columns
        Differences Between Computed Columns and Function-Based Indexes
        Differences Between Materialized and Not Materialized Computed Columns
      Scrollable Cursors
      unitext Datatype Support
      big int Datatype Support
      Unsigned Integer Datatype Support
      Integer Identity
      Enhancements to XML Services
      Adaptive Server Plug-in Enhancements
      Interactive SQL
      User-Defined Web Services
      Very Large Storage Support
      Automatic Running of update statistics
      SySAM License Management
      Query Processing Metrics (qp Metrics)
      Updates to Abstract Plans
      showplan Changes
      Secure Socket Layer Uses FIPS 140-2
      System Changes for Adaptive Server Version 15.0
        Utilities
        Reserved Words
        Global Variables
        Configuration Parameters
        Functions
        Commands
        System Stored Procedures
        System Tables
        Monitoring Tables
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  New Features Guide Adaptive Server Enterprise 15.7 SP100
    Change in Release Version Number
    Shrinking Databases
      Shrinking a Database
      How Adaptive Server Shrinks the Database
      Shrink Operations on Databases That Contain Text or Image Data
      Restarting Partially Completed Shrink Operations
      Moving Data Before Shrinking the Database
        Restrictions for Moving the Transaction Log
        Locks Held During Data Movement
      Determine the Status of a Shrink Operation
      Upgrading or Downgrading Shrunken Databases
      Restrictions
    Enhancements to Backup and Restore
      Cumulative Dump
        Dump and Load Sequences
        Partially Logged Operations and Cumulative Dumps
        Restrictions
        System Changes Supporting Cumulative Dumps
      Changes to load database
        Apply Source Database Attributes to the Target Database
        Generate SQL for a Different Target Database
        Restore Databases in Tivoli Storage Manager to Different Target Databases
      The sybdumptran Utility
    Aggregating Metrics from Syntactically Similar Queries
    Updates to Precomputed Result Sets
    Improved Data Load Performance
      Enable Data Load Optimization
      Tables with Indexes
      Viewing Queries with bulkInsertRowCount
      Batch Insert Optimization
      Restrictions
    Incremental Reorganization
      Running reorg defrag
      Checking the Reorganization Status
      Clearing reorg defrag Information from sysattributes
      Logging Behavior
      Restrictions
    Creating Indexes Without Blocking Access to Data
    Query Plan and Execution Statistics in HTML
      set statistics Command Options
      Query Plan Tree Structure
      Query Timings
        Thread Usage
        CPU Usage
        Wait Distribution
      Query Text
      Query Detail
      Parallel Query Plan Fragments
      Writing HTML to an External File
    Gathering Hash-Based Statistics with create index
    Query Plan Optimization with Bloom Filters
      Example of showplan Output for Bloom Filters
      Example of Lava Operator Tree for Bloom Filters
      Disabling Bloom Filters
    Adaptive Server Support for Multiple Scanner Threads
    Adaptive Server Support for Replication by Column Value
    Sybase Central Adaptive Server Plug-in
    Running Adaptive Server on VMware vSphere 5.0
      Configure the BIOS Settings
      Configure the Guest Operating System
      CPU Considerations
        Recommendations for Virtual CPUs
        CPU Scheduling
      Memory Considerations
      Resource Management
      Hardware-Assisted Memory Virtualization
      Linux Huge Pages
      Networking
      Storage
    Automatic Physical Database Rearrangement on Load
    Support for OData
      OData Server Architecture
      OData Server Limitations
        Unsupported OData Protocol Features
      Security Considerations for OData Server
      Configuring OData Server
      Setting Up an HTTP Server for OData
      Create an OData Producer Service Model
      OData Server Sample Files
      Starting and Stopping OData Server
    MIT Kerberos and NTLM Security Services
      Using NT Lan Manager Security Services on Windows 64-bit
      Using MIT Kerberos Security Services on Windows 64-bit
    Solaris Asynchronous I/O Performance
    Properties Added to Responses File
    System Changes
      New Functions
        defrag_status
        loginfo
        show_condensed_text
        shrinkdb_status
      Changed Commands
        alter database
        create index
        create materialized view
        create precomputed result set
        dbcc
        dump database
        load database
        reorg
        select
        set
        update statistics
      Procedures
        New System Procedures
          sp_helpdefrag
          sp_dump_info
        Changed System Procedures
          sp_configure
          sp_config_rep_agent
          sp_dboption
          sp_depends
          sp_dump_history
          sp_extrapwdchecks
          sp_helpdb
          sp_helprotect
          sp_listener
          sp_optgoal
          sp_replication_path
          sp_showoptstats
          sp_sjobcreate and sp_sjobmodify
      Tables
        New System Tables
          sysdams
        Changed System Tables
        New Monitoring Tables
          monSysExecutionTime
          monRepCoordinator
          monRepSchemaCache
        Changed Monitoring Tables
      Utilities
        New Utilities
          sybdumptran
            Options for load transaction
        Changed Utilities
      Configuration Parameters
        Changed Configuration Parameters
        New Configuration Parameters
      Permission Changes for Commands and Functions
  Release Bulletin Adaptive Server Enterprise 15.7 SP100 for HP-UX
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
        In-Row LOB Column Replication
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Compressed LOB Column Replication
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server
    Known Issues for Adaptive Server
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise 15.7 SP100 for IBM AIX
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
        In-Row LOB Column Replication
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Compressed LOB Column Replication
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server
    Known Issues for Adaptive Server
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise 15.7 SP100 for Linux
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
        In-Row LOB Column Replication
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Compressed LOB Column Replication
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server
    Known Issues for Adaptive Server
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise 15.7 SP100 for Sun Solaris
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
        In-Row LOB Column Replication
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Compressed LOB Column Replication
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server
    Known Issues for Adaptive Server
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise 15.7 SP100 for Windows
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
        In-Row LOB Column Replication
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Compressed LOB Column Replication
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server
    Known Issues for Adaptive Server
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise 15.7 SP100 for HP-UX
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Memory Requirements
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Minimally Configuring Adaptive Server
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading to Adaptive Server
        Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Downgrading an Adaptive Server That Uses Encryption
      Downgrade Considerations for Adaptive Server with Replicated Databases
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise 15.7 SP100 for IBM AIX
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Making Input/Output Completion Port API Available for Adaptive Server
      Memory Requirements
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Minimally Configuring Adaptive Server
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading to Adaptive Server
        Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Downgrading an Adaptive Server That Uses Encryption
      Downgrade Considerations for Adaptive Server with Replicated Databases
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise 15.7 SP100 for Linux
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Memory Requirements
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Minimally Configuring Adaptive Server
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
      Raw Partitions on Linux
        Choosing a Raw Partition
        Examples for Creating Raw Partitions
        Red Hat Raw Device Administration
        SuSE Raw Device Administration
        Accessing Raw Devices from the Server
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading to Adaptive Server
        Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Downgrading an Adaptive Server That Uses Encryption
      Downgrade Considerations for Adaptive Server with Replicated Databases
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise 15.7 SP100 for Sun Solaris
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Memory Requirements
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Minimally Configuring Adaptive Server
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading Interactively Using sqlupgrade
        Upgrading Noninteractively Using sqlupgraderes
        Manually Upgrading to Adaptive Server
        Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
        Migrating Data by Replacing the Binary
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Downgrading an Adaptive Server That Uses Encryption
      Downgrade Considerations for Adaptive Server with Replicated Databases
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise 15.7 SP100 for Windows
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Preparing to Install Adaptive Server
        Managing Java in the Database During Installations and Upgrades
    Installing Adaptive Server
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Minimally Configuring Adaptive Server
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Postinstallation Tasks
      Stopping and Starting Services
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
        Adding a Server to the Interfaces File
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Preparing the Database and Devices
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading Adaptive Server on Windows
        Testing the Adaptive Server Upgrade
        Manually Upgrading to Adaptive Server
        Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Using bcp to Migrate Data
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading High Availability and Cluster Support
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Downgrading an Adaptive Server That Uses Encryption
      Downgrade Considerations for Adaptive Server with Replicated Databases
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Recovering from a Failed Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Configuration Guide for UNIX 15.7 ESD #2
    About Adaptive Server
      System-Specific Issues
      System User Roles
      Environment Variables
    Adaptive Server Devices and System Databases
      The master Device
      The sybsystemdb Device
      The sysprocsdev Device
      Optional Devices and Databases
        Pluggable Component Interface (PCI) Database
        Sample Databases
        sybsecurity Device and Database
        dbccdb Database
        sybmgmtdb Database
      Using Operating System Files as Database Devices
        The directio Parameter
        The dsync Parameter
      Determine the Size of a Database Device
        Support for Raw Partitions or Files
        Preparation of a Raw Partition Device
          Choosing a Raw Partition
    Client/Server Communication
    About Changing Adaptive Server Configuration
    Languages Other Than US English
    Adaptive Server Specifications
      Database Specifications
      Table Specifications
      Procedure Specifications
      Query Specifications
      Maximum Column Sizes
      Database Requirements for Varying Page Sizes
      Data Limits for Tables According to Page Size
    Start and Stop Servers
      Start Servers
        Server Start-up Parameters
        RUN_server_name File
        Using the startserver Command
      Start Servers When the Operating System Restarts
        Creating a System Restart Script for HP-UX
        Creating a System Restart Script for IBM RS/6000
        Creating a System Restart Script for Sun Solaris and Linux
      Starting XP Server After Initial Installation
      Stop Servers
        Stopping Adaptive Server
        Stopping Backup Server
        Using the kill Command
        Shutdown and Shared Memory Files
    Huge Pages on Linux
    Configure the Operating System
      Verifying Environment Variables
      Using the stty Setting
      Restore Correct Permissions
      File Descriptors and User Connections
        File Descriptors and User Connections for HP-UX
        File Descriptors and User Connections for AIX
        File Descriptors and User Connections for Linux
        File Descriptors and User Connections for Sun Solaris
        Displaying Current Soft and Hard Limits
        Increasing the Soft Limit
        Increasing the Hard Limit
      Enable Asynchronous Disk I/O
        Enabling Asynchronous Disk I/O on Linux
        Enabling Asynchronous Disk I/O on IBM AIX
        Enabling Asynchronous Disk I/O HP-UX
        Enabling Asynchronous I/O for File System Devices
        Enabling Asynchronous I/O for File Systems
      Adjust the Client Connection Timeout Period
        Adjusting the Client Connection Timeout for HP-UX
        Adjusting the Client Connection Timeout for IBM RS/6000
        Adjusting the Client Connection Timeout for Linux
      Check for Hardware Errors
      Monitor the Use of Operating System Resources
        Monitor Operating System Resources for HP-UX
        Monitor Operating System Resources for IBM RS/6000
        Monitor Operating System Resources for Sun Solaris and Linux
      Check Database Integrity
    Configuring New Servers with srvbuild
    Adaptive Server Default Configuration
      Default Settings
    Set Up Communications Across the Network
      How Adaptive Server Determines Which Directory Service Entry to Use
      How a Client Uses Directory Services
      Create a Directory Services Entry
      Supported Directory Drivers
      Contents of the interfaces File
      interfaces File Format
        Components of an interfaces File Entry
      Create a Master interfaces File
        Using dsedit or dscp to Create a Master interfaces File
        Using a Text Editor to Create a Master interfaces File
      Configure the interfaces File for Multiple Networks
        Configuring the Server for Multiple Network Handlers
        Configure Client Connections
          Manage One Network-Independent DSQUERY Name
          Using Different DSQUERY Names
        Configuring for Query Port Backup
      IPv6 Support
        IPv6 Infrastructure
    Troubleshoot
      Troubleshooting when the Server Fails to Start
      Troubleshooting an Error when Executing an ESP
    Use the Lightweight Directory Access Protocol as a Directory Service
      LDAP Directory Services Versus the Sybase Interfaces File
      The libtcl*.cfg File
      Enabling LDAP Directory Services
      Keywords for the LDAP URL Variables
      Adding a Server to the Directory Services
      Multiple Directory Services
      Encrypting the Password
      Performance
      Migrating from the interfaces File to LDAP
    Localization Support
      Language Modules
      Default Character Sets
      Supported Character Sets
        Arabic Character Sets
        Baltic Character Set
        Simplified Chinese Character Sets
        Traditional Chinese Character Set
        Cyrillic Character Sets
        Eastern European Character Sets
        Greek Character Sets
        Hebrew Character Sets
        Japanese Character Sets
        Korean Character Set
        Thai Character Sets
        Turkish Character Sets
        Unicode Character Set
        Vietnamese Character Set
        Western European Character Sets
      Character Set Names
      Load Character Sets
      Language Definition Files Sort Order
      Character Set Conversion
        Conversions Between Server and Client
      Sort Orders
        Available Sort Orders for Character Sets
      Language Modules
        Installing a New Language Module
        Message Languages
      Localization Directories
        About the locales Directory
        About the charsets Directory
        Format of locales.dat File Entries
        How Client Applications Use locales.dat
      Changing Adaptive Server Localization Configuration
        Configuring Adaptive Server for Other Character Sets
        Editing the locales.dat File
        Changing Backup Server Localization Configuration
    Adaptive Server Error Logging
      Set Error Log Paths
        Set the Adaptive Server Error Log Path
      Manage Messages
        Log User-Defined Messages
        Log Auditing Events
    Manage Database Devices
      Device Requirements
      Create Files for Database Devices
    Database Management System Auditing
      Audit System Devices and Databases
      Install Auditing
        Preinstallation Recommendations for Auditing Devices
        Configuring Adaptive Server for Auditing
        Creating a Device for the Audit Database Transaction Log
        Enabling Auditing
        Deleting a Device Entry
        Changing a Device Entry
    Install Online Help for Transact-SQL Syntax
      Default Device for the sybsyntax Database
      Installing sybsyntax
  Configuration Guide for Windows 15.7 ESD #2
    About Adaptive Server
      System-Specific Issues
      User Roles
      Environment Variables
    Adaptive Server Devices and System Databases
      The master Device
      The sybsystemdb Device
      The sysprocsdev Device
      Optional Devices and Databases
        Pluggable Component Interface (PCI) Database
        Sample Databases
        sybsecurity Device and Database
        dbccdb Database
      Using Operating System Files as Database Devices
        The dsync Parameter
        The directio Parameter
    Client/Server Communication
    About Changing Adaptive Server Configurations
    Languages Other Than US English
    Adaptive Server Specifications
      Database Specifications
      Table Specifications
      Query Specifications
      Procedure Specifications
      Extended-Limit Capabilities
    Start and Stop Servers
      Server Start-up Parameters
        Specifying Additional Start-up Parameters
      Starting and Stopping Servers Using Unified Agent
      Start and Stop Servers Using the Control Panel
        Starting Servers as an Automatic Service
          Setting Up Adaptive Server as an Automatic Service
        Starting, Stopping, and Pausing Servers Manually
      Stopping Backup Server
      Stopping Adaptive Server
    Monitor Servers
      Monitoring Servers with the Control Panel
    Adaptive Server Configurations
      Default Adaptive Server Configuration
        Default Adaptive Server Parameter Settings
        Default Backup and XP Server Settings
      Change Adaptive Server Configurations
        Starting Server Config
        Configuring Adaptive Server
          Setting Adaptive Server Parameters
          Changing the Default Backup Server
          Changing the Default XP Server
        Configuring Backup Server
        Configuring Job Scheduler and Self Management
    Network Communications Using sql.ini
      Client Connections to Adaptive Server
      Determine the Address to Listen for Client Connections
      Client Access to Adaptive Server
        Enabling Client Access to a Server
        Changing the Server Entries in sql.ini
      Components in the sql.ini File
        Server Name
        Network Driver
        Service Type
        Server Address
          Address Format
          IP Address
          Named Pipes Format
          Windows Sockets Format
            Increasing Windows Sockets Connections
              Modifying an Existing TcpNumConnections Value
              Adding a TcpNumConnections Value
            Using Multiple TCP/IP Network Interface Cards
            Controlling the Connection Timeout
              Increasing the TcpKeepTries Value
          NWLink IPX/SPX Format
            Available NWLink IPX/SPX Connection Formats
            Selecting Valid Connection Formats
      Share Network Configuration Information
        Creating a Master sql.ini File
        Windows Registry as a Directory Service
          Using Windows Registry as a Directory Service
      Verify Server Connections
      Configure ODBC Connections
        Configuring the ODBC Driver
      IPv6 Support
        IPv6 Infrastructure
    Lightweight Directory Access Protocol in Adaptive Server
      LDAP Directory Services versus the Sybase Interfaces File
      The libtcl.cfg File
      Enabling LDAP Directory Services
      Adding a Server to the Directory Services
        Adding a Server Entry to the Directory Service Using dsedit
      Multiple Directory Services
      Encrypting the Password
      Performance with LDAP
      Migrating from the sql.ini File to LDAP
    Localization Support
      Language Modules
      Default Character Sets for Servers
        Changing the Default Character Set for Servers
      Supported Character Sets
        Arabic Character Sets
        Baltic Character Set
        Simplified Chinese Character Sets
        Traditional Chinese Character Set
        Cyrillic Character Sets
        Eastern European Character Sets
        Greek Character Sets
        Hebrew Character Sets
        Japanese Character Sets
        Korean Character Set
        Thai Character Sets
        Turkish Character Sets
        Unicode Character Set
        Vietnamese Character Set
        Western European Character Sets
      Character Set Conversion
        Conversions Between Server and Client
      Sort Orders
        Available Sort Orders
      Language Modules
        Installing a New Language Module
        Message Languages
      Localization
        Localization Directories
        charsets and locales Directories
          Format of locales.dat File Entries
          Client Application Use of locales.dat
          Editing the locales.dat File
      Changing Adaptive Server and Backup Server Localization Configuration
        Completing Adaptive Server Localization Changes
        Completing Backup Server Localization Changes
        Configuring Adaptive Server for Other Character Sets
      Language-Specific Sort Orders
      Sybase Character Set Names
      charset Utility
    Log Error Messages and Events
      Adaptive Server Error Logging
      Windows Event Logging
        Setting Up Windows Event Logging
        Enable and Disable Windows Event Logging
          Enabling or Disabling Event Logging Using Server Config Utility
          Enabling or Disabling Event Logging Using sp_configure
        Windows Event Log Information
      Manage Logs
      Set Error Log Paths
        Setting the Adaptive Server Error Log Path
        Setting the Backup Server Error Log Path
      Manage Messages
        Log User-Defined Messages
          New Messages
          Existing Messages
        Log Auditing Events
        Log User-Defined Events
      Using a Remote Log
      Central Logging Site
        Log Messages from Multiple Adaptive Servers
        Set Up a Local Central Logging Site
          Creating a Registry key
          Defining a Registry Key
      View Messages
        Viewing Messages in the Windows Event Log
        Viewing Messages in the Adaptive Server Error Log
    Security Services with Windows LAN Manager
      How Login Authentication Works
      Administering Security Services Using LAN Manager
      Modify Configuration Files Required for a Unified Login
        Set Up Drivers for Network-Based Security
          Entries for Network Drivers
          Entries for Directory Services
          Entries for Security Drivers
            Editing the libtcl.cfg File
        Checking the LAN Manager's Local Name
        Specifying Security Information for Adaptive Server
      Identify Users and Servers to LAN Manager
      Configure Adaptive Server for LAN Manager Security
        Enabling and Disabling External Security Services
        Manage Unified Login
          Requiring Unified Login
          Establishing a Secure Default Login
          Map LAN Manager Login Names to Server Names
        Data Integrity Check
        Ensure Adequate Memory for Security Services
      Add Logins to Support Unified Login
        Adding Logins
      Define the Connection to a Server for Security Services
        Specifying the Principal Name
        Specifying Network-Based User Authentication
        Specifying the Name Assigned to LAN Manager
      Determining the Status of Security Services
      Configuration Parameters Used in Security Services
        Data Integrity Check
        Message Sequence Check
        Detect Interception or Replay
        Specify a Login
        Control User Authentication
      Manage Login Security on an Windows Computer
        Adaptive Server Security
        Combined Adaptive Server and Windows Login Security
          Trusted Connections and Combined Login Security
        Login Security Modes
          Standard Mode
          Integrated Mode
          Mixed Mode
        Manage the Login Security Features
          Permit Trusted Connections
          Windows Registry Parameters
            Default Login
            Default Domain
            SetHostName
            Character Mappings
            Modify the Parameter Values
        Administer Login Security Using System Procedures
          Assigning Trusted Connection Permissions
          Display the Current Registry Values
          Display Permissions and User Names
          Revoke Permissions Granted with sp_grantlogin
        Configuring Login Security
          Creating Windows Users and Groups
          Configuring Mapping and Default Domain Values
          Setting Login Security Mode
          Adding Network Login Names to syslogins
          Assigning Roles
        Change Login Security Options
          Enabling Standard Login Security Mode
          Enabling Integrated or Mixed Login Security Mode
    E-mail Messages and Adaptive Server
      Sybmail Messages
        Send Messages
        Receive Messages
      Preparing Windows Mail for Sybmail
        Connecting to a Post Office
        Creating a Mailbox for Adaptive Server
        Creating a Mail Profile for Adaptive Server
      Create an Adaptive Server Login for Sybmail
      Configuring Sybmail and Extended Stored Procedures
      Manage a Mail Session
        Start a Mail Session
          Start Sybmail Without Parameters
        Stop a Mail Session
        Stored and Extended Procedures for Handling Messages
      Outgoing Messages
      Incoming Messages
        Find the Next Message
        Read a Specific Message
        Delete a Message
        Processing Incoming Mail
      Sybmail Security
        Set Execution Privileges
        Set the Execution Context
          Name Both the User and the Database
          Name the User But Not the Database
          Name the Database But Not the User
          Name Neither the User Nor the Database
    Manage Adaptive Server Databases
      Manage Database Devices
        Device Requirements
        Creating .dat Files for Database Devices
      Back Up and Restore Data
        Backing Up Data with a Tape Drive
          Windows Tape Drive Names
          Set the Maximum Capacity for a Tape Drive
        Backing Up Data Using a Hard Disk
        Dumping Across a Network
        Examples of Backing Up and Restoring User Databases
          Back Up and Restore to a Database and Device
          Back Up and Restore on a Remote Backup Server
          Backup File Names
          Additional Dump Devices
          Tape Handling Options
          Get Information About Files
        Backing Up and Restoring System Databases
      Optimize Adaptive Server Performance and Tuning
        Using Dedicated Adaptive Server Operation
        Disk Drives and Adaptive Server Performance
          Monitor Disk Usage
      Monitoring Adaptive Server Statistics
    Database Management System Auditing
      Audit System Devices and Databases
      Preinstallation for Auditing Devices
      Installing Auditing
    Install Online Help for Transact-SQL Syntax
      Default Device for the sybsyntax Database
      Installing sybsyntax
    Troubleshoot Network Connections
      Running Server Ping
      Troubleshoot Connection Failures
        Using Returned Messages to Diagnose a Failure
          Troubleshooting a Connection Failure to Adaptive Server
          Failure to Load Net-Library DLLs
        Troubleshooting Failure of Other Applications
          Before Calling Sybase Technical Support
    Adaptive Server Registry Keys
      \SOFTWARE\SYBASE\Server\server_name
      \SOFTWARE\SYBASE\SQLServer\server_name\parameter
      \SOFTWARE\SYBASE\SQLServer
      \SYSTEM\CurrentControlSet\Services\SYBSQL_server_name
  Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for HP-UX
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
      Unsupported Features and Utilities
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server Cluster Edition
    Known Plug-In Issues for Adaptive Server Cluster Edition
    Known Issues for Adaptive Server Cluster Edition
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for IBM AIX
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
      Unsupported Features and Utilities
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server Cluster Edition
    Known Plug-In Issues for Adaptive Server Cluster Edition
    Known Issues for Adaptive Server Cluster Edition
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Linux
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
      Unsupported Features and Utilities
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server Cluster Edition
    Known Plug-In Issues for Adaptive Server Cluster Edition
    Known Issues for Adaptive Server Cluster Edition
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Sun Solaris
    Product Summary
      Adaptive Server Interoperability
      Product Compatibility
        Password Compatibility with Replication Server
      Changes That Affect Existing Applications
        Changes to Sybase Central
        Backup Server and IBM Tivoli Storage Manager
        Software Developer Kit (SDK) and Open Server
        Command Line Version of ddlgen
      Changed Functionality
        XML Services and External Entity Reference
        Support for db2 Server Class
      Unsupported Features and Utilities
    Installation and Configuration
      Special Installation Instructions
      Special Configuration Instructions
        Configure Adaptive Server for Clients Using EPEP Algorithm
      Special Upgrade and Downgrade Instructions
        TIPSA Flag 0x4000 Error After Upgrade
        Special Downgrade Instructions
        Loading Database Dumps into Earlier Versions
      Known Installation Issues for Adaptive Server Cluster Edition
    Known Plug-In Issues for Adaptive Server Cluster Edition
    Known Issues for Adaptive Server Cluster Edition
    Documentation Updates
      Enabling Custom Password Checks
      isql -K keytab_file Parameter
      Job Scheduler Parameter job scheduler interval
      Job Scheduler Command sp_sjobdrop
      Security Built-in Function Permissions
      Shareable Temporary Tables
      Hash-Based Update Statistics
      Additional Information for Windows Failover in a High Availability System
        Configure Adaptive Server for Failover on Windows
      Setting maximum failed logins
      Changing the maximum failed logins for specific roles
      Changing the maximum failed logins for specific logins
      Values for lock timeout pipe active
      dbcc page Parameter logical
      Behavior of Concurrent DDLs and reorg defrag
      Updates to Third-Party Licensing
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for HP-UX
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Cluster Edition System Requirements for Using Private Interconnect Technology
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Creating and Starting the Cluster
      Differences Between Private and Shared Installations
      Cluster Edition Preinstallation Checklist
        Creating a Simulated Cluster on a Single Node
      Before Creating a Cluster
        Creating a Cluster with Storage Foundation for Sybase Cluster Edition
        Worksheet for Creating a Cluster
        Create a Cluster Using sybcluster
          Configuring the Cluster Using sybcluster
          Starting and Stopping a Cluster Using sybcluster
          Verifying the Cluster Configuration
      Starting the Cluster When the Operating System Starts
      Cleaning Up After a Failed Cluster Installation
      Auxiliary Servers
        Configuring Backup Server Using sybcluster
        Installing Job Scheduler
        Configuring XP Server Using sybcluster
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Creating a Test Environment
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
      I/O Fencing
        Preparing to Set Up I/O Fencing
        Enabling I/O Fencing
      Manual Cluster Setup and Management
        Setting the Environment
        Raw Devices
        The Cluster Input File
        Manually Configuring the Cluster
          Configuring the Interfaces File
          Building the Master and Quorum Devices
          System Stored Procedures
            Initializing and Creating sybsystemprocs
          Creating Runserver Files
          Setting Up Local System and Temporary Databases
        Automatic Takeover of a Cluster
        Starting the Cluster
          Starting the Cluster After a System Failure
        Postconfiguration Tasks
        Shutting Down the Cluster or the Instance
          Shutting Down an Instance
        Reconfiguring the Cluster
        Enabling sybcluster and Sybase Control Center After a Manual Configuration
          A sybcluster Sample Session Configuration Values
          Sample sybcluster Session
          Configuring the Cluster Using an Input File
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Checking System and Upgrade Requirements
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        The runserver File Location
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Upgrading to a Private Installation
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading from One Version of Adaptive Server Cluster Edition to Another
        Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
          Verifying the Cluster Edition Server for Upgrade
          Upgrading the Cluster Edition Server Using an Input File
          Upgrading the Cluster Edition Server Interactively
          Responding to upgrade server Prompts
        Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Updating JAR and XML Files
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Migrating a Server Configured for High Availability
        Using bcp to Migrate Data
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      If the Cluster Edition Configuration Fails
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Re-running the Cluster Edition Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
        If Lack of Space Prevents an Upgrade
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for IBM AIX
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Making Input/Output Completion Port API Available for Adaptive Server
      Cluster Edition System Requirements for Using Private Interconnect Technology
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Creating and Starting the Cluster
      Differences Between Private and Shared Installations
      Cluster Edition Preinstallation Checklist
        Creating a Simulated Cluster on a Single Node
      Before Creating a Cluster
        Creating a Cluster with Storage Foundation for Sybase Cluster Edition
        Worksheet for Creating a Cluster
        Create a Cluster Using sybcluster
          Configuring the Cluster Using sybcluster
          Starting and Stopping a Cluster Using sybcluster
          Verifying the Cluster Configuration
      Starting the Cluster When the Operating System Starts
      Cleaning Up After a Failed Cluster Installation
      Auxiliary Servers
        Configuring Backup Server Using sybcluster
        Installing Job Scheduler
        Configuring XP Server Using sybcluster
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Creating a Test Environment
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
      I/O Fencing
        Preparing to Set Up I/O Fencing
          Setting Up Raw Disks For Multi-Node Access and I/O Fencing
          I/O Fencing via SCSI-3 PGR
        Enabling I/O Fencing
      Creating Logical Volumes
      Manual Cluster Setup and Management
        Setting the Environment
        Raw Devices
        The Cluster Input File
        Manually Configuring the Cluster
          Configuring the Interfaces File
          Building the Master and Quorum Devices
          System Stored Procedures
            Initializing and Creating sybsystemprocs
          Creating Runserver Files
          Setting Up Local System and Temporary Databases
        Automatic Takeover of a Cluster
        Starting the Cluster
          Starting the Cluster After a System Failure
        Postconfiguration Tasks
        Shutting Down the Cluster or the Instance
          Shutting Down an Instance
        Reconfiguring the Cluster
        Enabling sybcluster and Sybase Control Center After a Manual Configuration
          A sybcluster Sample Session Configuration Values
          Sample sybcluster Session
          Configuring the Cluster Using an Input File
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Checking System and Upgrade Requirements
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        The runserver File Location
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Upgrading to a Private Installation
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading from One Version of Adaptive Server Cluster Edition to Another
        Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
          Verifying the Cluster Edition Server for Upgrade
          Upgrading the Cluster Edition Server Using an Input File
          Upgrading the Cluster Edition Server Interactively
          Responding to upgrade server Prompts
        Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Updating JAR and XML Files
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Migrating a Server Configured for High Availability
        Using bcp to Migrate Data
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      If the Cluster Edition Configuration Fails
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Re-running the Cluster Edition Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
        If Lack of Space Prevents an Upgrade
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Linux
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Cluster Edition System Requirements for Using Private Interconnect Technology
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Installing Adaptive Server as a Shared Versus Private Installation
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Creating and Starting the Cluster
      Differences Between Private and Shared Installations
      Cluster Edition Preinstallation Checklist
        Creating a Simulated Cluster on a Single Node
      Before Creating a Cluster
        Creating a Cluster with Storage Foundation for Sybase Cluster Edition
        Worksheet for Creating a Cluster
        Create a Cluster Using sybcluster
          Configuring the Cluster Using sybcluster
          Starting and Stopping a Cluster Using sybcluster
          Verifying the Cluster Configuration
      Starting the Cluster When the Operating System Starts
      Cleaning Up After a Failed Cluster Installation
      Auxiliary Servers
        Configuring Backup Server Using sybcluster
        Installing Job Scheduler
        Configuring XP Server Using sybcluster
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Creating a Test Environment
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
      I/O Fencing
        Preparing to Set Up I/O Fencing
        Enabling I/O Fencing
      Raw Partitions on Linux
        Choosing a Raw Partition
        Examples for Creating Raw Partitions
        Red Hat Raw Device Administration
        SuSE Raw Device Administration
        Accessing Raw Devices from the Server
      Manual Cluster Setup and Management
        Setting the Environment
        Raw Devices
        The Cluster Input File
        Manually Configuring the Cluster
          Configuring the Interfaces File
          Building the Master and Quorum Devices
          System Stored Procedures
            Initializing and Creating sybsystemprocs
          Creating Runserver Files
          Setting Up Local System and Temporary Databases
        Automatic Takeover of a Cluster
        Starting the Cluster
          Starting the Cluster After a System Failure
        Postconfiguration Tasks
        Shutting Down the Cluster or the Instance
          Shutting Down an Instance
        Reconfiguring the Cluster
        Enabling sybcluster and Sybase Control Center After a Manual Configuration
          A sybcluster Sample Session Configuration Values
          Sample sybcluster Session
          Configuring the Cluster Using an Input File
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Checking System and Upgrade Requirements
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        The runserver File Location
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Upgrading to a Private Installation
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading from One Version of Adaptive Server Cluster Edition to Another
        Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
          Verifying the Cluster Edition Server for Upgrade
          Upgrading the Cluster Edition Server Using an Input File
          Upgrading the Cluster Edition Server Interactively
          Responding to upgrade server Prompts
        Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Updating JAR and XML Files
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Migrating a Server Configured for High Availability
        Using bcp to Migrate Data
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      If the Cluster Edition Configuration Fails
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Re-running the Cluster Edition Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
        If Lack of Space Prevents an Upgrade
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Sun Solaris
    Conventions
    Installation Task Overview
      Installation Workflows
        Installing Adaptive Server for the First Time
        Upgrading to a New Version of Adaptive Server
    Adaptive Server Components
      Adaptive Server Editions
        Determining the Edition You Have
      Adaptive Server Options
      Managing Adaptive Server Enterprise with Sybase Control Center
      Client Applications and Utilities
    System Requirements
      Cluster Edition System Requirements for Using Private Interconnect Technology
      System Requirements for Clients
    Planning Your Adaptive Server Installation
      Adaptive Server Release Bulletin
      Obtaining a License
        Understanding License Generation
        Determining Your License Deployment Model
          Comparing License Deployment Models
          Fault Tolerance, License Grace, and Redundancy
          Served License Deployment Model
            License Servers
        Determining Host IDs
          Determining Host IDs for Machines with Multiple Network Adapters
          Using Alternate Host IDs on Windows
        Knowing the Product License Type
          Optional Feature Licenses
          SySAM Licensing Checkout
          Sub-capacity licensing
        Generating Licenses at SPDC
          Logging in to SPDC and Beginning License Generation
            Generating Unserved Licenses
            Generating Served Licenses
          Regenerating, Renewing, and Rehosting Licenses
            Managing License Hosts
            Modifying Individual Licenses
        Generating Licenses at SMP
          Generating License Keys
      Installation Directory Contents and Layout
        PC-Client Product Descriptions and Layout
      Performing Administrative Tasks
        Creating the Sybase User Account
      Preparing to Install Adaptive Server
        Adjusting the Operating System Shared Memory Parameters
        Managing Java in the Database During Installations and Upgrades
        Multipathing
          Setting Up Multipathing
    Installing Adaptive Server
      Mounting the Installation Media
      Installing Adaptive Server with the GUI Wizard
      Installing Adaptive Server in Console Mode
      Installing Adaptive Server Using a Response File
        Creating a Response File
        Installing in Silent Mode
        Command Line Options
      Uninstalling Adaptive Server
        Removing an Existing Adaptive Server
    Installing Components from the PC-Client
      Creating a Response File for the Client
      Installing the Client in Unattended, Silent Mode
      Uninstalling PC-Client
    Starting and Stopping Sybase Control Center
    Creating and Starting the Cluster
      Differences Between Private and Shared Installations
      Cluster Edition Preinstallation Checklist
        Creating a Simulated Cluster on a Single Node
      Before Creating a Cluster
        Creating a Cluster with Storage Foundation for Sybase Cluster Edition
        Worksheet for Creating a Cluster
        Create a Cluster Using sybcluster
          Configuring the Cluster Using sybcluster
          Starting and Stopping a Cluster Using sybcluster
          Verifying the Cluster Configuration
      Starting the Cluster When the Operating System Starts
      Cleaning Up After a Failed Cluster Installation
      Auxiliary Servers
        Configuring Backup Server Using sybcluster
        Installing Job Scheduler
        Configuring XP Server Using sybcluster
    Postinstallation Tasks
      Verifying That Servers are Running
      Verifying Your Connection to the Servers
      Test the Installation and Network Connections
        Creating a Test Environment
        Configuring libtcl.cfg for LDAP
        Adding a Server to the Directory Service
      Setting the System Administrator Password
      Installing Sample Databases
        Default Devices for Sample Databases
        Running the Database Scripts
        Installing the interpubs Database
        Installing the jpubs Database
        Maintaining Sample Databases
      I/O Fencing
        Preparing to Set Up I/O Fencing
        Enabling I/O Fencing
      Manual Cluster Setup and Management
        Setting the Environment
        Raw Devices
        The Cluster Input File
        Manually Configuring the Cluster
          Configuring the Interfaces File
          Building the Master and Quorum Devices
          System Stored Procedures
            Initializing and Creating sybsystemprocs
          Creating Runserver Files
          Setting Up Local System and Temporary Databases
        Automatic Takeover of a Cluster
        Starting the Cluster
          Starting the Cluster After a System Failure
        Postconfiguration Tasks
        Shutting Down the Cluster or the Instance
          Shutting Down an Instance
        Reconfiguring the Cluster
        Enabling sybcluster and Sybase Control Center After a Manual Configuration
          A sybcluster Sample Session Configuration Values
          Sample sybcluster Session
          Configuring the Cluster Using an Input File
    Adaptive Server Upgrades
      Upgrading Adaptive Server
      Considerations for Component Integration Services
      Preparing to Upgrade
      Changes in Adaptive Server Directories
      Checking System and Upgrade Requirements
      Performing Tasks Before Upgrading
        Upgrade System Tables and Stored Procedures
        The runserver File Location
        Reserved Words
          Running a Reserved Word Check
          Addressing Reserved Words Conflicts
          Quoted Identifiers
        Upgrading to a Private Installation
        The sybprocsdev device
          Increasing the Size of the sybsystemprocs Database
          Increasing Device and Database Capacity for System Procedures
      Upgrade to Adaptive Server 15.7 SP100
        Upgrading from One Version of Adaptive Server Cluster Edition to Another
        Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
          Verifying the Cluster Edition Server for Upgrade
          Upgrading the Cluster Edition Server Using an Input File
          Upgrading the Cluster Edition Server Interactively
          Responding to upgrade server Prompts
        Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
          Determining the Adaptive Server Version
          Backing Up Adaptive Server
          Installing Adaptive Server Using the Binary Overlay
          The updatease Utility
        Upgrading in Silent Mode
      Postupgrade Tasks
        Updating JAR and XML Files
        Running the instmsgs.ebf Script
        Restoring Functionality in Adaptive Server After Upgrading
        Reenabling Auditing
          Updating Threshold Procedures for Audit Segments
        Restoring Permissions
        Reenabling Replication Server After the Dataserver Upgrade
          Restoring Replication on Replicate Databases
          Restoring Replication on Primary Databases
      Migrate
        Migrating Data Using a Dump-and-Load Method
        Migrating a Server Configured for High Availability
        Using bcp to Migrate Data
      Adaptive Server Components and Related Products
        Upgrading Job Scheduler
          Upgrading Job Scheduler Templates
        Upgrading Java in the Database
          Enabling Java in the Database in a High Availability System
        Upgrading Backup Server
        Upgrading Databases Using Dump and Load
        How Compiled Objects Are Handled When Upgrading Adaptive Server
          Finding Compiled Object Errors Before Production
            Quoted Identifier Errors
            Determining Whether to Change select * in Views
    Adaptive Server Downgrades
      Preparing to Downgrade Adaptive Server
      Downgrading from Adaptive Server 15.7 SP100
      Downgrading to an Earlier Version of Adaptive Server 15.7
      Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
      Additional Considerations for New Features Used
      Performing an In-Place Downgrade
      Downgrading Job Scheduler
      Post-downgrade Tasks for Adaptive Server
    Troubleshooting SySAM Errors
      Where to Find License Error Information
      SySAM Problems and Solutions
        Installing for the First Time
        Possible Causes of a License Server Failure
        Solution for Problem: Product Cannot Find License for Optional Features
        Unserved License Deployment Models
        Served License Deployment Models
      Contacting SySAM Technical Support
    Troubleshoot the Server
      Error Logs for Installation Utilities
      Error Logs for Sybase Servers
      Troubleshooting Common Installation Problems
        Stopping Adaptive Server After a Failure
        Recovering from a Failed Installation
          If the Installation Quits While You Are Configuring Adaptive Server
      If Adaptive Server Fails the Preupgrade Eligibility Test
      If the Cluster Edition Configuration Fails
      When an Upgrade Fails
        If You Can Identify the Cause of the Upgrade Failure
        Restoring Databases After a Failed Upgrade
        Re-running the Cluster Edition Upgrade
        If You Cannot Identify the Cause of an Upgrade Failure
        If Lack of Space Prevents an Upgrade
    Obtaining Help and Additional Information
      Technical Support
      Downloading Product Updates
      Product and Component Certifications
      Accessibility Features
  Utility Guide 15.7 SP100
    Utility Commands Reference
      Threaded Versions of Utilities
      Installation or Configuration Utilities
      Utilities for Languages, Character Sets, and Sort Orders
      Utilities to Start Servers
      Database Creation and Manipulation Utilities
      Utilities to Gather Information
      Tuning Utility
      Utility to Manage a Cluster
      backupserver
      bcp
        Usage for bcp
          Copying Tables with Indexes or Triggers Using bcp
          Using bcp with Compressed Data
      buildmaster
      certauth
        Usage for certauth
          Accomplish Certificate Management Tasks Using Open Source Utility
          Creating a Server Certificate File that Adaptive Server Understands
      certpk12
      certreq
      charset
      cobpre
      cpre
      dataserver
        Usage for dataserver
          Dependencies and Conditions of -b and -w Options
          Potential Issues of Using -f and -w Options Together
      ddlgen
        Usage for ddlgen
          Hiding Passwords in ddlgen
          ddlgen for Encrypted Columns
          Encrypted Columns and Specifying the -XOD Flag in ddlgen
          ddlgen Support for Key Copies
          EKC Encryption Key Copy Filter and ddlgen
          Create Table DDL
      defncopy
      dscp
      dsedit
      extractjava
      installjava
        Usage for installjava
          Cases When Adding New JARs Causes Exceptions
          Updating JARs and Classes
          Locks
      isql
        Usage for isql
          Interactive isql Commands
          isql Session Commands
          Prompt Labels and Double Wildcards in an isql Session
          Command History in isql
      langinstall
      optdiag
        Usage for optdiag
          Byte Ordering and Binary optdiag Files
          optdiag Input Mode
      preupgrade
        Usage for preupgrade
          The preupgrade -D Parameter
      pwdcrypt
      qrmutil
      qptune
      showserver
      sqldbgr
        Usage for sqldbgr
          Error Messages in sqldbgr
      sqlloc
      sqllocres
      sqlsrvr
        Usage for sqlsrvr
          Starting Adaptive Server
          startsrvr Dependencies and Conditions with -b and -w
      sqlupgrade
      sqlupgraderes
      srvbuild
        Usage for srvbuild
          Using LDAP with srvbuild in a 64-bit Environment
      srvbuildres
      startserver
        Usage for startserver
          The runserver File
      sybcluster
      sybdiag
        Usage for sybdiag
          Configuration Options for sybdiag
      sybmigrate
      sybrestore
      sybtsmpasswd
      updatease
      xpserver
    Transferring Data to and from Adaptive Server with bcp
      Methods for Moving Data
        Import and Export Data with bcp
      bcp Modes
      bcp Requirements
        bcp Permissions
        Before You Transfer
      Copy Data to Partitions Using bcp
      Improve bcp Performance
        Fast, Fast-logged, and Slow bcp
          Slow bcp
          Fast bcp
          Fast-logged bcp
          Copying Tables with Indexes
            Locking Scheme and Fast bcp
          Space Requirements for Copying
        Summary of Steps for Fast and Fast-logged bcp
        Bulk Copying Data into Partitioned Tables
          Copying Data Randomly into Partitions
          Monitoring bcp Sessions with dbcc checktable and sp_helpsegment
          Reducing Logging by Increasing Page Allocations
        Using Parallel Bulk Copy to Copy Data into a Specific Partition
          bcp in and Locks
          Parallel Bulk Copy Methods
          Parallel Bulk Copy Syntax
          Using Parallel Bulk Copy on Round-robin Partitioned Tables
          Parallel Bulk Copy and IDENTITY Columns
            Retaining Sort Order
            Specifying the Value of a Table’s IDENTITY Column
      Bulk Copying Encrypted Data
      bcp Options
        Using the Default Formats
          Native Format
          Character Format
        Change Terminators from the Command Line
      Change the Defaults in Interactive bcp
        Respond to bcp Prompts
        File Storage Type
        Prefix Length
        Field length
        Field and Row Terminators
          Choose Terminators
      Format Files
      Examples of Copying Out Data Interactively
      Examples of Copying In Data Interactively
      bcp and Alternate Languages
      Support for Initialization Strings
      bcp and Row-Level Access Rules
      Copy In and Batch Files
        Improve Recoverability
        Batches and Partitioned Tables
      Copy Out and Text and Image Data
      Specify a Network Packet Size
      Copy In and Error Files
      Copy Out and Error Files
      Data Integrity for Defaults, Rules, and Triggers
      How bcp Differs from Other Utilities
    Building Servers Using dataserver
      Building a New Master Device
        Environments When Using dataserver
        Specifying Device and Logical Page Sizes When Building a New Adaptive Server
        Starting an Existing Adaptive Server
        Upgrading to a Server With Larger Page Sizes
        Viewing the Current Server Limits
    Viewing and Editing Server Entries Using dscp
      Starting dscp
        Working with Server Entries
          Adding and Modifying Server Entries
            Adding a Server Entry
            Modifying or Deleting a Server Entry
          Copy Server Entries
          List and View Contents of Server Entries
          Delete Server Entries
        Exiting dscp
    Viewing and Editing Server Entries Using dsedit
      Add, View, and Edit Server Entries
      Using dsedit in UNIX
        Starting dsedit in UNIX
        Open an Editing Session in UNIX
        Modify Server Entries in UNIX
          Adding a New Server Entry in UNIX
          Viewing or Modifying a Server Entry in UNIX
          Add or Edit Network Transport Addresses
            TCP/IP Addresses
            SPX/IPX Addresses
        Copying a Server Entry to Another Interfaces File in UNIX
        Copying Server Entries Within the Current Session
        Copying Server Entries Between Sessions
      Using dsedit in Windows
        Starting dsedit in Windows
        Open an Editing Session in Windows
          Opening a Session in Windows
          Opening Additional Sessions in Windows
          Switching Between Sessions in Windows
        Modify Server Entries in Windows
          Adding a Server Entry
          Modifying a Server Attribute
          Renaming a Server Entry
          Deleting a Server Entry
        Copying server entries within the current session in Windows
        Copying server entries between sessions in Windows
      Troubleshooting dsedit
    Using Interactive isql from the Command Line
      Starting isql
      Stopping isql
      Using Transact-SQL in isql
        Formatting isql Output
        Correcting isql Input
        set Options that Affect Output
      Changing the Command Terminator
      Performance Statistics Interaction with Command Terminator Values
      Input and Output Files
        UNIX command line redirection
    Using Interactive SQL in Graphics Mode
      Starting Interactive SQL
      The Main Interactive SQL Window
        Plan Dialog Tab
      The Interactive SQL Toolbar
      Open Multiple Windows
      Keyboard Shortcuts
      Display Data Using Interactive SQL
      Edit Table Values in Interactive SQL
        Copying Rows from the Interactive SQL Result Set
        Editing Rows from the Interactive SQL Result Set
        Inserting Rows into the Database from the Interactive SQL Result Set
        Deleting Rows from the Database Using Interactive SQL
      SQL Statements in Interactive SQL
        Canceling an Interactive SQL Command
        Combining Multiple Statements
        Looking Up Tables, Columns, and Procedures
        Recall Commands
        Logging Commands
      Configure Interactive SQL
        General Dialog Box
        Result Dialog Box
        Import/Export Dialog Box
        Messages Dialog Tab
        Editor Dialog Box
        Query Editor Dialog Box
      Processing Command Files
        Saving SQL Statements to a File
        Executing Command Files
        Saving, Loading, and Running Command Files
      The SQL Escape Syntax in Interactive SQL
      Interactive SQL Commands
    Interactive sybcluster Commands Reference
      Commands Active Before Connecting to a Cluster
      Commands Active After Connecting to a Cluster
      add backupserver
      add instance
      connect
      create backupserver
      create cluster
      create xpserver
      deploy plugin
      diagnose cluster
      diagnose instance
      disconnect
      drop backupserver
      drop cluster
      drop instance
      drop xpserver
      exit
      help
      localize
      quit
      set backupserver
      set cluster
      set instance
      set xpserver port
      show agents
      show backupserver config
      show cluster
      show instance
      show membership mode
      show session
      show xpserver
      shutdown cluster
      shutdown instance
      start cluster
      start instance
      upgrade server
      use
    Migrating Data Using sybmigrate
      What sybmigrate Does
      What sybmigrate Does Not Do
      Before You Begin
        Permissions
          Changing Target Login Accounts
        Platforms
        Environment Settings
        Migrating Proxy Tables
      Migration process
        Overview of the Migration Process
        Pre-migration Considerations
        Configuration and Tuning for Higher Performance
          Configuration Considerations for Adaptive Server
        Possible Errors to Avoid
        Auto-select Dependent Objects for Migration
        Migrating an Archive Database
          Upgrading an Adaptive Server with an Archive Database
          Downgrading an Adaptive Server with an Archive Database
        GUI mode
          Setting up source databases for migration
          Begin the migration
          Validating the migration
          Migration and Validation Progress
        Resource File Mode
      Using sybmigrate with Encrypted Columns
      Post-migration Activities
      Migrate Databases in the Replication Server Domain
        Preparing for migration
        Postmigration Procedures
          Restoring primary databases
          Restoring the RSSD
          Amending system tables when the logical page size changes
          Restoring Replicate Databases
          Logs
        Migrating Databases That Support Wide Data
      Limitations
        Stopping High Availability
        Other Limitations
      Troubleshooting and Error Messages
    Restoring a Database Using sybrestore
      Noninteractive Mode
      Interactive Mode
      Before You Begin
      Using sybrestore
        Compatibility Geometry Check
        sybrestore Syntax
          Interactive Mode Syntax
          Noninteractive Mode Syntax
      Restoring a Database in Noninteractive Mode
      Restoring a Database in Interactive Mode
        Providing a Mapping Directory
        Restoring a Database Using the Interactive Command Line
          Restoring a database
          Restoring a database to a point in time
        Example of Restore to a Point-in-time
  Transact-SQL Users Guide 15.7
    SQL Building Blocks
      SQL in Adaptive Server
        Queries, data modification, and commands
        Tables, columns, and rows
        Relational operations
        Compiled objects
          Saving or restoring source text
          Verifying and encrypting source text
      Compliance to ANSI standards
        Federal Information Processing Standards (FIPS) flagger
        Chained transactions and isolation levels
        Identifiers
        SQL standard-style comments
        Right truncation of character strings
        Permissions required for update and delete statements
        Arithmetic errors
        Synonymous keywords
        Treatment of nulls
      Naming conventions
        SQL data characters
        SQL language characters
        Identifiers
          Multibyte character sets
          Delimited identifiers
          Uniqueness and qualification conventions
          Remote servers
      Expressions in Adaptive Server
        Arithmetic and character expressions
          Operator precedence
          Arithmetic operators
          Bitwise operators
          The string concatenation operator
          The comparison operators
          Nonstandard operators
          Character expression comparisons
          Empty strings
          Quotation marks
        Relational and logical expressions
          any, all, and in
          and and or
      Transact-SQL extensions
        compute clause
        Control-of-flow language
        Stored procedures
        Extended stored procedures
        Triggers
        Defaults and rules
        Error handling and set options
        Additional Adaptive Server extensions to SQL
      Adaptive Server login accounts
      isql utility
        Default databases
        Network-based security services with isql
      Displaying SQL text
    Queries: Selecting Data from a Table
      Queries
        select syntax
          Checking for identifiers in a select statement
      Choosing columns using the select clause
        Choosing all columns using select *
        Choosing specific columns
        Rearranging the column order
        Renaming columns in query results
        Using expressions
          Quoted strings in column headings
          Character strings in query results
          Computed values in the select list
          Arithmetic operator precedence
        Selecting text, unitext, and image values
          Using readtext
        Select list summary
      Using select for update
        Using select for update in cursors and DML
        Concurrency issues
      Eliminating duplicate query results with distinct
      Specifying tables with the from clause
      Selecting rows using the where clause
        Comparison operators in where clauses
        Ranges (between and not between)
        Lists (in and not in)
      Matching patterns
        Matching character strings: like
          Using not like
          Getting different results using not like and ^
          Using wildcard characters as literal characters
          Interaction of wildcard characters and square brackets
          Using trailing blanks and %
          Using wildcard characters in columns
        ā€œUnknownā€ values: NULL
          Testing a column for null values
          Difference between false and unknown
          Substituting a value for NULLs
          Expressions that evaluate to NULL
          Concatenating strings and NULL
          System-generated NULLs
        Connecting conditions with logical operators
          Logical operator precedence
      Using multiple select items in a nested exists query
      Using a column alias in nested select statements
    Using Aggregates, Grouping, and Sorting
      Using aggregate functions
        Aggregate functions and datatypes
        count vs. count (*)
        Aggregate functions with distinct
        Null values and the aggregate functions
        Using statistical aggregates
          Standard deviation and variance
      Organizing query results into groups: the group by clause
        group by and SQL standards
        Nesting groups with group by
        Referencing other columns in queries using group by
        Expressions and group by
        Using group by in nested aggregates
        Null values and group by
        where clause and group by
        group by and all
        Aggregates without group by
      Selecting groups of data: the having clause
        How the having, group by, and where clauses interact
        Using having without group by
      Sorting query results: the order by clause
        order by and group by
        order by and group by used with select distinct
      Summarizing groups of data: the compute clause
        Row aggregates and compute
          Rules for compute clauses
        Specifying more than one column after compute
        Using more than one compute clause
        Applying an aggregate to more than one column
        Using different aggregates in the same compute clause
        Generating totals: compute without by
      Combining queries: the union operator
        Guidelines for union queries
        Using union with other Transact-SQL commands
    Joins: Retrieving Data from Several Tables
      How joins work
        Join syntax
        Joins and the relational model
      How joins are structured
        The from clause
        The where clause
          Join operators
          Datatypes in join columns
          Joins and text and image columns
      How joins are processed
      Equijoins and natural joins
      Joins with additional conditions
      Joins not based on equality
      Self-joins and correlation names
      The not-equal join
        Not-equal joins and subqueries
      Joining more than two tables
      Outer joins
        Inner and outer tables
        Outer join restrictions
        Views used with outer joins
        ANSI inner and outer joins
          Correlation name and column referencing rules for ANSI joins
          ANSI inner joins
        ANSI outer joins
          Should the predicate be in the on or where clause?
          Nested ANSI outer joins
          Converting outer joins with join-order-dependency
        Transact-SQL outer joins
          Using outer joins and aggregate extended columns
      Relocated joins
        Using relocated joins
        Configuring relocated joins
      How null values affect joins
      Determining which table columns to join
    Subqueries: Using Queries Within Other Queries
      How subqueries work
        Subquery restrictions
        Example of using a subquery
        Qualifying column names
        Subqueries with correlation names
        Multiple levels of nesting
        Using an asterisk in nested select statements
          Using table-name qualifiers
          Using nested queries with group by
          Examples
          Usage
        Subqueries in update, delete, and insert statements
        Subqueries in conditional statements
        Subqueries instead of expressions
      Types of subqueries
        Expression subqueries
          Using scalar aggregate functions to guarantee a single value
          Using group by and having in expression subqueries
          Using distinct with expression subqueries
        Quantified predicate subqueries
          Subqueries with any and all
        Subqueries used with in
        Subqueries used with not in
        Subqueries using not in with NULL
        Subqueries used with exists
        Subqueries used with not exists
        Finding intersection and difference with exists
        Subqueries using SQL derived tables
      Using correlated subqueries
        Correlated subqueries with correlation names
        Correlated subqueries with comparison operators
        Correlated subqueries in a having clause
    Using and Creating Datatypes
      How Transact-SQL datatypes work
      Using system-supplied datatypes
        Exact numeric types: integers
        Exact numeric types: decimal numbers
        Approximate numeric datatypes
        Money datatypes
        Date and time datatypes
        Character datatypes
          unichar datatype
          text datatype
          unitext datatype
        Binary datatypes
          image datatype
        The bit datatype
        The timestamp datatype
        The sysname and longsysname datatype
      Using LOB Locators in Transact-SQL Statements
        Creating a LOB locator
          Explicitly creating a locator
          Implicitly creating a locator
        Converting the locator value to the LOB value
        Locator scope
      Converting between datatypes
      Mixed-mode arithmetic and datatype hierarchy
        Working with money datatypes
        Determining precision and scale
      Creating user-defined datatypes
        Specifying length, precision, and scale
        Specifying null type
        Associating rules and defaults with user-defined datatypes
        Creating user-defined datatype with IDENTITY property
        Creating IDENTITY columns from user-defined datatypes
        Dropping a user-defined datatype
      Getting information about datatypes
    Adding, Changing, Transferring, and Deleting Data
      Referential integrity
      Transactions
      Using the sample databases
      Datatype entry rules
        char, nchar, unichar, univarchar, varchar, nvarchar, unitext, and text
        date and time
          Entering times
          Entering dates
          Searching for dates and times
        binary, varbinary, and image
        money and smallmoney
        float, real, and double precision
        decimal and numeric
        Integer types and their unsigned counterparts
        timestamp
      Adding new data
        Adding new rows with values
        Inserting data into specific columns
          Restricting column data: rules
          Using the NULL character string
          Inserting NULLs into columns that do not allow them
          Adding rows without values in all columns
          Changing a column’s value to NULL
          Adaptive-Server-generated values for IDENTITY columns
          Explicitly inserting data into an IDENTITY column
          Retrieving IDENTITY column values with @@identity
          Reserving a block of IDENTITY column values
          Reaching the IDENTITY column’s maximum value
        Adding new rows with select
          Using computed columns
          Inserting data into some columns
          Inserting data from the same table
      Creating nonmaterialized, non-null columns
        Adding nonmaterialized columns
        Tables that already have nonmaterialized columns
        Nonmaterialized column storage
        Altering nonmaterialized columns
        Limitations
      Changing existing data
        Using the set clause with update
          Assigning variables in the set clause
        Using the where clause with update
        Using the from clause with update
        Performing updates with joins
        Updating IDENTITY columns
      Changing text, unitext, and image data
      Trucating trailing zeros
      Transferring data incrementally
        Marking tables for incremental transfer
        Transferring tables from a destination file
        Converting Adaptive Server datatypes to IQ
        Storing transfer information
        Exceptions and errors
        Sample session for incremental data transfer
          Replacing data with new rows
      Deleting data
        Using the from clause with delete
        Deleting from IDENTITY columns
      Deleting all rows from a table
        truncate table syntax
    Creating Databases and Tables
      Databases and tables
        Enforcing data integrity in databases
        Permissions within databases
      Using and creating databases
        Choosing a database: use
        Creating a user database with create database
          The on clause
          The log on clause
          for load option
        quiesce database command
      Altering the sizes of databases
      Dropping databases
      Creating tables
        Maximum number of columns per table
        Example
        Choosing table names
        Creating tables in different databases
        create table syntax
        Using IDENTITY columns
          Creating IDENTITY columns with user-defined datatypes
          Referencing IDENTITY columns
          Referring to IDENTITY columns with syb_identity
          Automatically creating ā€œhiddenā€ IDENTITY columns
        Allowing null values in a column
          Constraints and rules used with null values
          Defaults and null values
          Nulls require variable-length datatypes
          text, unitext, and image columns
        Using temporary tables
          Ensuring that the temporary table name is unique
          Manipulating temporary tables in stored procedures
          General rules for temporary tables
      Managing identity gaps in tables
        Parameters for controlling identity gaps
        Comparison of identity burning set factor and identity_gap
          Reducing the identity number gap
        Setting the table-specific identity gap
        Changing the table-specific identity gap
        Displaying table-specific identity gap information
        Gaps from other causes
        When table inserts reach IDENTITY column maximum value
      Defining integrity constraints for tables
        Specifying table-level or column-level constraints
        Creating error messages for constraints
        After creating a check constraint
        Specifying default column values
        Specifying unique and primary key constraints
        Specifying referential integrity constraints
          Table-level or column-level referential integrity constraints
          Maximum number of references allowed for a table
          Using create schema for cross-referencing constraints
          General rules for creating referential integrity constraints
        Specifying check constraints
        Designing applications that use referential integrity
      Designing and creating a table
        Making a design sketch
        Creating the user-defined datatypes
        Choosing the columns that accept null values
        Defining the table
      Creating new tables from query results: select into
        Checking for errors
        Using select into with IDENTITY columns
          Selecting an IDENTITY column into a new table
          Selecting the IDENTITY column more than once
          Adding a new IDENTITY column with select into
          Defining a column for which the value must be computed
          IDENTITY columns selected into tables with unions or joins
      Altering existing tables
        Objects using select * do not list changes to table
        Using alter table on remote tables
        Adding columns
          Adding columns appends column IDs
          Adding NOT NULL columns
          Adding constraints
        Dropping columns
          Dropping columns renumbers the column ID
          Dropping constraints
        Modifying columns
          Converting datatypes
          Modifying tables may prevent successful bulk copy of previous dump
          Decreasing column length may truncate data
          Modifying datetime columns
          Modifying the NULL default value of a column
          Modifying columns that have precision or scale
          Modifying text, unitext, and image columns
        Adding, dropping, and modifying IDENTITY columns
          Adding IDENTITY columns
          Dropping IDENTITY columns
          Modifying IDENTITY columns
        Data copying
          Changing exp_row_size
        Modifying locking schemes and table schema
        Altering columns with user-defined datatypes
          Adding a column with user-defined datatypes
          Dropping a column with user-defined datatypes
          Modifying a column with user-defined datatypes
        Errors and warnings from alter table
          Errors and warnings generated by alter table modify
          Scripts generated by if exists()...alter table
        Renaming tables and other objects
          Renaming dependent objects
      Dropping tables
      Computed columns
        Using computed columns
          Computed columns example
        Indexes on computed columns
        Deterministic property
          How does the deterministic property affect computed columns?
          Examples
          How does the deterministic property affect function-based indexes?
      Assigning permissions to users
      Getting information about databases and tables
        Getting help on databases
        Getting help on database objects
          Using sp_help on database objects
          Using sp_helpconstraint to find a table’s constraint information
          Finding out how much space a table uses
          Listing tables, columns, and datatypes
          Finding an object name and ID
    SQL-Derived Tables
      Advantages of SQL-derived tables
        SQL-derived tables and optimization
      SQL-derived table syntax
        Derived column lists
        Correlated SQL-derived tables
      Using SQL-derived tables
        Nesting
        Subqueries using SQL-derived tables
        Unions
        Unions in subqueries
        Renaming columns with SQL-derived tables
        Constant expressions
        Aggregate functions
        Joins with SQL-derived tables
        Creating a table from a SQL-derived table
          Using views with SQL-derived tables
        Correlated attributes
    Partitioning Tables and Indexes
      Upgrading from Adaptive Server 12.5.x and earlier
      Data partitions
      Index partitions
      Partition IDs
      Locks and partitions
      Partitioning types
        Range partitioning
        Hash partitioning
        List partitioning
        Round-robin partitioning
        Composite partitioning keys
        Partition pruning
      Indexes and partitions
        Global indexes
          Global nonclustered index on unpartitioned table
          Global clustered index on unpartitioned table
          Global clustered index on round-robin partitioned table
          Global nonclustered index on partitioned table
        Local indexes
          Local clustered indexes
          Local nonclustered indexes
        Guaranteeing a unique index
      Creating and managing partitions
        Partitioning tasks
        Creating data partitions
          Creating a range-partitioned table
          Creating a hash-partitioned table
          Creating a list-partitioned table
          Creating a round-robin–partitioned table
        Creating partitioned indexes
          Creating global indexes
          Creating local indexes
          Creating clustered indexes on partitioned tables
        Creating a partitioned table from an existing table
      Altering data partitions
        Changing an unpartitioned table to a partitioned table
        Adding partitions to a partitioned table
        Changing the partitioning type
        Changing the partitioning key
        Unpartitioning round-robin–partitioned tables
        Using the partition parameter
        Altering partition-key columns
      Configuring partitions
      Updating, deleting, and inserting in partitioned tables
      Updating values in partition-key columns
      Displaying information about partitions
        Using functions
      Truncating a partition
      Using partitions to load table data
      Updating partition statistics
    Virtually hashed tables
      Structure of a virtually hashed table
      Creating a virtually hashed table
      Limitations for virtually hashed tables
      Commands that support virtually hashed tables
      Query processor support
      Monitor counter support
      System procedure support
    Views: Limiting Access to Data
      How views work
        Advantages of views
          Security
          Logical data independence
        Examples
      Creating views
        create view syntax
        Using the select statement with create view
          View definition with projection
          View definition with a computed column
          View definition with an aggregate or built-in function
          View definition with a join
          Views used with outer joins
          Views derived from other views
          distinct views
          Views that include IDENTITY columns
        Validating a view’s selection criteria
          Views derived from other views
      Retrieving data through views
        View resolution
        Redefining views
        Renaming views
        Altering or dropping underlying objects
      Modifying data through views
        Restrictions on updating views
          Computed columns in a view definition
          group by or compute in a view definition
          NULL values in underlying objects
          Views created using with check option
          Multitable views
          Views with IDENTITY columns
      Dropping views
      Using views as security mechanisms
      Getting information about views
        Using sp_help and sp_helptext to display view information
        Using sp_depends to list dependent objects
        Listing all views in a database
        Finding an object name and ID
    Creating Indexes on Tables
      How indexes work
        Comparing the two ways to create indexes
        Guidelines for using indexes
      Creating indexes
        create index syntax
        Indexing more than one column: composite indexes
        Indexing with function-based indexes
        Using the unique option
        Including IDENTITY columns in nonunique indexes
        Ascending and descending index-column values
        Using fillfactor, max_rows_per_page, and reservepagegap
      Indexes on computed columns
      Function-based indexes
      Using clustered or nonclustered indexes
        Creating clustered indexes on segments
      Specifying index options
        Using the ignore_dup_key option
        Using the ignore_dup_row and allow_dup_row options
        Using the sorted_data option
        Using the on segment_name option
      Dropping indexes
      Determining what indexes exist on a table
      Updating statistics about indexes
    Defining Defaults and Rules for Data
      How defaults and rules work
      Creating defaults
        create default syntax
        Binding defaults
        Unbinding defaults
        How defaults affect NULL values
      Dropping defaults
      Creating rules
        create rule syntax
        Binding rules
          Rules bound to columns
          Rules bound to user-defined datatypes
          Precedence of rules
        Rules and NULL values
        Unbinding rules
      Dropping rules
      Getting information about defaults and rules
      Sharing inline defaults
        Creating an inline shared default
        Unbinding a shared inline default
        Limitations
    Using Batches and Control-of-Flow Language
      Introduction
      Rules associated with batches
        Examples of using batches
        Batches submitted as files
      Using control-of-flow language
        if...else
        case expression
          Using case expression for alternative representation
          case and division by zero
          Using rand functions in case expressions
          case expression results
          case expressions and set ansinull
          case expression requires at least one non-null result
          Determining the result set
          case and value comparisons
          coalesce
          nullif
        begin...end
        while and break...continue
        declare and local variables
        goto
        return
        print
        raiserror
        Creating messages for print and raiserror
        waitfor
        Comments
          Slash-asterisk style comments
          Double-hyphen style comments
      Local variables
        Declaring local variables
        Local variables and select statements
        Local variables and update statements
        Local variables and subqueries
        Local variables and while loops and if…else blocks
        Variables and null values
      Global variables
        Transactions and global variables
          Checking for errors with @@error
          Checking IDENTITY values with @@identity
          Checking the transaction nesting level with @@trancount
          Checking the transaction state with @@transtate
          Checking the nesting level with @@nestlevel
          Checking the status from the last fetch
    Using Transact-SQL Functions in Queries
      Setting up a query
      Built-in functions
        System functions
        String functions
          Concatenating expressions
          Nesting string functions
          Limits on string functions
        Text and image functions
          Using readtext on unitext columns
        Aggregate functions
          Limitations
          Aggregate functions used with the group by clause
          Aggregate functions and null values
          Vector and scalar aggregates
          Aggregate functions as row aggregates
        Statistical aggregate functions
          Formulas for computing standard deviations
        Mathematical functions
        Date functions
        Datatype conversion functions
          Using the convert function for explicit conversions
          Datatype conversion guidelines and constraints
          Changing the date format
          Conversion error handling
        Security functions
        XML functions
      User-created functions
    Using Stored Procedures
      How stored procedures work
        Examples
        Permissions
        Performance
      Creating and executing stored procedures
        Using deferred name resolution
        Parameters
        Default parameters
          Using default parameters in stored procedures
          NULL as the default parameter
          Wildcard characters in the default parameter
        Using more than one parameter
        Using large object text, unitext, and image datatypes in stored procedures
        Procedure groups
        Using with recompile in create procedure
          Using with recompile
        Using with recompile in execute
        Nesting procedures within procedures
        Using temporary tables in stored procedures
        Setting options in stored procedures
          Query optimization settings
          Arguments for stored procedures
          Length of expressions, variables, and arguments
        Executing stored procedures
          Executing procedures after a time delay
          Executing procedures remotely
      Deferred compilation in stored procedures
      Returning information from stored procedures
        Return status
          Reserved return status values
          User-generated return values
        Checking roles in procedures
        Return parameters
          Passing values in parameters
          The output keyword
      Restrictions associated with stored procedures
        Qualifying names inside procedures
      Renaming stored procedures
        Renaming objects referenced by procedures
      Using stored procedures as security mechanisms
      Dropping stored procedures
      System procedures
        Executing system procedures
        Permissions on system procedures
        Types of system procedures
        Other Sybase-supplied procedures
          Catalog stored procedures
          System extended stored procedures
          dbcc procedures
      Getting information about stored procedures
        Getting a report with sp_help
        Viewing the source text of a procedure with sp_helptext
        Identifying dependent objects with sp_depends
          Using sp_depends with deferred_name_resolution
        Identifying permissions with sp_helprotect
    Using Extended Stored Procedures
      Overview
        XP Server
        Dynamic link library support
        Open Server API
        ESPs and permissions
        ESPs and performance
      Creating functions for ESPs
        Files for ESP development
        Open Server data structures
        Open Server return codes
        Outline of a simple ESP function
        ESP function example
        Building the DLL
          Search order for DLLs
          Sample makefile (UNIX)
          Sample definitions file
      Registering ESPs
        Using create procedure
        Using sp_addextendedproc
      Removing ESPs
        Renaming ESPs
      Executing ESPs
      System ESPs
      Getting information about ESPs
      ESP exceptions and messages
    Cursors: Accessing Data
      Selecting rows with cursors
      Sensitivity and scrollability
      Types of cursors
      Cursor scope
      Cursor scans and the cursor result set
      Making cursors updatable
        Determining which columns can be updated
      How processes cursors
      Monitoring cursor statements
      Using declare cursor
        declare cursor examples
      Opening cursors
      Fetching data rows using cursors
        fetch syntax
        Checking cursor status
        Getting multiple rows with each fetch
        Checking the number of rows fetched
      Updating and deleting rows using cursors
        Updating cursor result set rows
        Deleting cursor result set rows
      Closing and deallocating cursors
      Scrollable and forward-only cursor examples
        Forward-only (default) cursors
        Example table for scrollable cursors
        Insensitive scrollable cursors
        Semisensitive scrollable cursors
      Using cursors in stored procedures
      Cursors and locking
        Cursor-locking options
      Enhanced transaction support for updatable cursors
      Getting information about cursors
      Using browse mode instead of cursors
        Browsing a table
        Browse-mode restrictions
        Timestamping a new table for browsing
        Timestamping an existing table
        Comparing timestamp values
    Triggers: Enforcing Referential Integrity
      How triggers work
        Using triggers versus integrity constraints
      Creating triggers
        create trigger syntax
          SQL statements that are not allowed in triggers
      Using triggers to maintain referential integrity
        Testing data modifications against the trigger test tables
        Insert trigger example
        Delete trigger examples
          Cascading delete example
          Restricted delete examples
        Update trigger examples
          Restricted update triggers
          Updating a foreign key
      Multirow considerations
        Insert trigger example using multiple rows
        Delete trigger example using multiple rows
        Update trigger example using multiple rows
        Conditional insert trigger example using multiple rows
      Rolling back triggers
      Global login triggers
      Nesting triggers
        Trigger self-recursion
      Rules associated with triggers
        Triggers and permissions
        Trigger restrictions
        Implicit and explicit null values
        Triggers and performance
        set commands in triggers
        Renaming and triggers
        Trigger tips
      Disabling triggers
      Dropping triggers
      Getting information about triggers
        sp_help
        sp_helptext
        sp_depends
    In-Row Off-Row LOB
      Overview
      Compressing in-row LOB columns
      Migrating off-row LOB data to use in-row storage
        In-row LOB columns and bulk copy
        Examples of methods for migrating existing data
        Guidelines for selecting the in-row LOB length
      Downgrading with tables containing in-row LOB columns
    Using instead of Triggers
      Inserted and deleted logical tables
      Triggers and transactions
      Nesting and recursion
      instead of insert triggers
        Example
      instead of update trigger
      instead of delete trigger
      searched and positioned update and delete
      Getting information about triggers
    Transactions: Maintaining Data Consistency and Recovery
      How transactions work
        Transactions and consistency
        Transactions and recovery
      Using transactions
        Allowing data definition commands in transactions
        System procedures that are not allowed in transactions
        Beginning and committing transactions
        Rolling back and saving transactions
        Checking the state of transactions
        Nested transactions
        Example of a transaction
      Selecting the transaction mode and isolation level
        Choosing a transaction mode
          Transaction modes and nested transactions
          Finding the status of the current transaction mode
        Choosing an isolation level
          Default isolation levels for Adaptive Server and ANSI SQL
          Dirty reads
          Repeatable reads
          Finding the status of the current isolation level
          Changing the isolation level for a query
          Isolation level precedences
          Cursors and isolation levels
          Stored procedures and isolation levels
          Triggers and isolation levels
        Compliance with SQL standards
        Using the lock table command to improve performance
      Using transactions in stored procedures and triggers
        Errors and transaction rollbacks
        Transaction modes and stored procedures
          Running system procedures in chained mode
          Setting transaction modes for stored procedures
      Using cursors in transactions
      Issues to consider when using transactions
      Backup and recovery of transactions
    Locking Commands and Options
      Setting a time limit on waiting for locks
        wait/nowait option of the lock table command
        Setting a session-level lock-wait limit
        Setting a server-wide lock-wait limit
        Information on the number of lock-wait timeouts
      Readpast locking for queue processing
        Incompatible locks during readpast queries
        Allpages-locked tables and readpast queries
        Effects of isolation levels select queries with readpast
          Session-level transaction isolation levels and readpast
          Query-level isolation levels and readpast
        Data modification commands with readpast and isolation levels
        text, unitext, and image columns and readpast
        Readpast-locking examples
    The pubs2 Database
      Tables in the pubs2 database
        publishers table
        authors table
        titles table
        titleauthor table
        salesdetail table
        sales table
        stores table
        roysched table
        discounts table
        blurbs table
        au_pix table
      Diagram of the pubs2 database
    The pubs3 Database
      Tables in the pubs3 database
        publishers table
        authors table
        titles table
        titleauthor table
        salesdetail table
        sales table
        stores table
        store_employees table
        roysched table
        discounts table
        blurbs table
      Diagram of the pubs3 database
  Security Administration Guide 15.7 ESD #2
    Introduction to Security
      Introduction to security
      What is ā€œinformation security?ā€
      Information security standards
        Common Criteria configuration evaluation
        FIPS 140-2 validated cryptographic module
    Getting Started with Security Administration in Adaptive Server
      General process of security administration
      Recommendations for setting up security
      An example of setting up security
      Security features in Adaptive Server
        Identification and authentication
          External authentication
          Managing remote servers
        Discretionary access control
          Row-level access control
          Predicated Privileges
        Division of roles
          Role hierarchy
          Restrictions on role activation
          Mutual exclusivity
        Auditing for accountability
        Confidentiality of data
    Managing Adaptive Server Logins and Database Users
      Introduction to logins and login profiles
      Managing login accounts
        Creating login accounts
        Last login and managing inactive accounts
          Defining a stale period
          Tracking the last login
          Preventing inactive accounts from being locked
        Authentication mechanisms for login
      Changing login accounts
      Dropping login accounts
      Choosing and creating a password
        Setting and changing the maximum login attempts
        Logging in after losing a password
        Displaying password information
        Checking passwords for at least one digit
        Setting and changing minimum password length
        Password complexity checks
          Disallowing simple passwords
          Custom password-complexity checks
          Specifying characters in a password
          Password complexity option cross-checks
          Setting password complexity checks
        Enabling custom password checks
        Setting the login and role expiration interval for a password
          Password expiration turned off for pre-12.x passwords
          Circumventing password protection
          Creating a password expiration interval for a new login
          Creating a password expiration interval for a new role
          Creation date added for passwords
          Changing or removing password expiration interval for login or role
          Securing login passwords on the network
        Securing login passwords stored on disk and in memory
        Character set considerations for passwords
        Upgrade and downgrade behavior
          Login password downgrade
          Behavior changes on upgraded master database
          Behavior changes in a new master database
          Retaining password encryption after upgrading then downgrading
          Expiring passwords when allow password downgrade is set to 0
        Using passwords in a high-availability environment
          High-availability configuration
          Passwords updated after upgrade
      Establishing a password and login policy
      Login failure
      Locking Adaptive Server login accounts and roles
        Locking and unlocking logins
        Locking and unlocking login accounts
        Using syslogins to track if an account is locked
        Locking and unlocking roles
        Locking logins that own thresholds
      Managing login profiles
        Login profile attributes
        Applying login profile and password policy attributes
        Creating a login profile
        Creating a default login profile
        Associating a login profile with a login account
        Ignoring a login profile
        Transfer existing login account values to a new login profile
        Manual replication of login profiles
        Granting roles to login profiles
        Invoking a login script
        Displaying login profile information
          Displaying the login profile name
          Displaying the login profile ID
          Displaying login profile binding information
        Modifying login profiles
          Adding or dropping auto-activated roles
          Changing a login profile to be the default login profile
        Dropping a login profile
      Adding users to databases
        Adding a ā€œguestā€ user to a database
          ā€œguestā€ user permissions
          ā€œguestā€ user in user databases
          ā€œguestā€ user in installed system databases
          ā€œguestā€ user in pubs2 and pubs3
        Adding a guest user to the server
        Adding remote users
      Creating groups
        Changing a user’s group membership
        Setting up groups and adding users
      Using aliases in databases
        Adding aliases
        Dropping aliases
        Getting information about aliases
      Getting information about users
        Reporting on users and processes
        Getting information about login accounts
        Getting information about database users
        Finding user names and IDs
      Changing user information
        Changing passwords
          Requiring new passwords
          Null passwords
          Logging in after lost password
        Changing user session information
      Dropping users and groups
        Dropping users
        Dropping groups
      Monitoring license use
        How licenses are counted
        Configuring the License Use Monitor
        Monitoring license use with the housekeeper task
        Logging the number of user licenses
      Number of user and login IDs
        Limits and ranges of ID numbers
        Login connection limitations
      Getting information about usage: chargeback accounting
        Reporting current usage statistics
          Displaying current accounting totals
          Initiating a new accounting interval
        Specifying the interval for adding accounting statistics
    Managing Roles
      Creating and assigning roles to users
        System-defined roles
        System administrator privileges
        System security officer privileges
        Operator privileges
        Sybase Technical Support
        Replication role
        Distributed Transaction Manager role
        High availability role
        Monitoring and diagnosis
        Job Scheduler roles
        Real-time messaging role
        Web Services role
        Key custodian role
        Planning user-defined roles
        Creating a user-defined role
        Adding and removing passwords from a role
        Role hierarchies and mutual exclusivity
          Defining and changing mutual exclusivity of roles
          Defining and changing a role hierarchy
        Setting up default activation at login
        Setting conditions for role activation
        Dropping user-defined roles
        Activating and deactivating roles
        Displaying information about roles
          Finding role IDs and names
          Viewing active system roles
          Displaying a role hierarchy
          Viewing user roles in a hierarchy
          Determining mutual exclusivity
          Determining role activation
          Checking for roles in stored procedures
      Granting and revoking roles
        Granting roles
        Understanding grant and roles
        Revoking roles
        Roles granted to login profiles
      Securing role passwords
        Character set considerations
        Locked roles and syssrvroles
        Login password policy checks to role passwords
          High-availability support for password policy options
        Setting up Adaptive Server for roles
          Installing
          Upgrading Adaptive Server
          Downgrading Adaptive Server
    External Authentication
      Configuring Adaptive Server for network-based security
        Security services and Adaptive Server
        Administering network-based security
        Setting up configuration files for security
          Specifying security information for the server
          Preparing libtcl.cfg to use network-based security
          The objectid.dat file
        Identifying users and servers to the security mechanism
        Configuring Adaptive Server for security
          Enabling network-based security
          Requiring unified login
          Establishing a secure default login
          Mapping security mechanism login names to server names
          Requiring message confidentiality with encryption
          Requiring data integrity
          Memory requirements for network-based security
        Adding logins to support unified login
          General procedure for adding logins
        Establishing Kerberos security for remote connections
          Unified login and the remote server logins
          Getting information about remote servers
        Connecting to the server and using the security services
          Using security mechanisms for the client
        Getting information about available security services
          Determining supported security services and mechanisms
          Determining active security services
          Determining whether a security service Is enabled
        Using Kerberos
          Kerberos compatibility
          Starting Adaptive Server under Kerberos
          Configuring Kerberos
        Using principal names
          Specifying the Adaptive Server principal name
          Using sybmapname to handle user principal names
      Concurrent Kerberos authentication
      Configuring Adaptive Server for LDAP user authentication
        Composed DN algorithm
        Searched DN algorithm
        Configuring LDAP
        LDAP user authentication administration
          LDAP user authentication password information changes
          Failover support
        Adaptive Server logins and LDAP user accounts
        Secondary lookup server support
        LDAP server state transitions
        LDAP user authentication tuning
        Adding tighter controls on login mapping
          Login mapping of external authentication
        Troubleshooting LDAP user authentication errors
        Configuring an LDAP server
      LDAPS user authentication enhancements
      Automatic LDAP user authentication and failback
        Setting the LDAP failback time interval
          Examples
      Configuring Adaptive Server for authentication using PAM
        Enabling PAM in Adaptive Server
          Configuring operating systems
          Running a 32- and 64-bit server on the same machine
          Configuring Adaptive Server for PAM user authentication
          Adaptive Server logins and PAM user accounts
      Enhanced login controls
        Forcing authentication
        Mapping logins using sp_maplogin
          Displaying mapping information
          Determining the authentication mechanism
    Managing User Permissions
      Overview
      Permissions for creating databases
        Changing database ownership
      Database owner privileges
      Database object owner privileges
      Other database user privileges
      Permissions on system procedures
      Granting and revoking permissions
        Object access permissions
          Concrete identification
          Special requirements for SQL92 standard compliance
          Examples of granting object access permissions
          Examples of revoking object access permissions
        Granting permissions on dbcc commands
          Server-wide and database-specific dbcc commands
          dbcc grantees and users in databases
        Permissions on system tables
          Granting default permissions to system tables and stored procedures
        Combining grant and revoke statements
        Understanding permission order and hierarchy
        Grant dbcc and set proxy issue warning for fipsflagger
      Acquiring the permissions of another user
        Using setuser
        Using proxy authorization
          Using set proxy to restrict roles
          Executing proxy authorization
          Proxy authorization for applications
      Changing database object ownership
        Supported object types
        Authorization
        Transferring ownership
          Transferring ownership of objects in the system database
          Transferring ownership of database owner objects
          Using preserve permissions
          Security issues
          Transferring ownership of encryption keys
      Reporting on permissions
        Querying the sysprotects table for proxy authorization
        Displaying information about users and processes
        Reporting permissions on database objects or users
        Reporting permissions on specific tables
      Using views and stored procedures as security mechanisms
        Using views as security mechanisms
        Using stored procedures as security mechanisms
          Roles and stored procedures
        Understanding ownership chains
          Example of views and ownership chains
          Example of procedures and ownership chains
        Permissions on triggers
      Executing a procedure with execute as owner or execute as caller
        Creating a procedure with references to an object with an unqualified name
        Procedures that invoke a nested procedure in another database with a fully qualified name
      Using row-level access control
        Access rules
          Syntax for access rules
          Using access and extended access rules
          Access rule examples
          Access rules and alter table command
          Access rules and bcp
          Access rules as user-defined Java functions
        Using the Application Context Facility
          Setting permissions for using application context functions
        Creating and using application contexts
          set_appcontext
          get_appcontext
          list_appcontext
          rm_appcontext
        SYS_SESSION system application context
        Solving a problem using an access rule and ACF
        Using login triggers
          Creating login triggers
          Configuring login triggers
          Executing a login trigger
          Understanding login trigger output
          Using login triggers for other applications
          Login trigger restrictions
          Issues and information
          Disabling execute privilege on login triggers
        Exporting set options from a login trigger
        Setting global login triggers
    Granting Predicated Privileges
      Introduction to predicated privileges
      Commands used for predicated privileges
      Configuring Adaptive Server to use predicated privileges
        enable predicated privileges
      Granting predicated privileges
        Granting access to select data
        Granting access to update data
        Granting access to delete data
        Using predicated privileges to enforce a data privacy policy
      Revoking predicated privileges
      How Adaptive Server saves predicated privileges in sysprotects
      Predicated role activation
      Combining predicates to enforce row-level privileges
      Understanding SQL behavior with predicated privileges
      Chain-of-ownership effect on predicated privileges
      ansi_permissions and predicated privileges
      Permissions on accesses made by predicates
      Using triggers with predicated privileges
      Recompiling predicated privileges
      Disallowing recursive predicate processing
      Information leakage through predicates
    Using Granular Permissions
      Introduction to granular permissions
      Configuring Adaptive Server to use granular permissions
      System privileges
      Effect of privileges as part of system-defined roles
      Permission management
        manage security permissions privilege
        manage server permissions privilege
        manage database permissions privilege
        manage any object permission privileges
      Privileges granted to system-defined roles
      Privileges assigned to the database owner
      Roles added with granular permissions
        sa_serverprivs_role
      Default roles granted to the system administrator
      Limiting the power of the system administrator and database owner
      Enable granular permissions and sybsecurity
      Logging in to a locked-out Adaptive Server
      General use scenarios
        Scenario 1: Permissions for an application server user
        Scenario 2: Permissions for a database access manager
        Scenario 3: Permissions for a database backup manager
        Scenario 4: Permissions for a help desk operator
        Scenario 5: Permissions for a security auditor
      System table master.dbo.sysprotects
      Database user usedb_user
      Grantable system privileges
    Confidentiality of Data
      Secure Sockets Layer (SSL) in Adaptive Server
        Internet communications overview
          Public-key cryptography
          SSL overview
        SSL in Adaptive Server
          SSL filter
          Authentication via the certificate
          Connection types
        Enabling SSL
          Obtaining a certificate
          Creating server directory entries
          Administering certificates
        Performance
        Cipher Suites
          @@ssl_ciphersuite
        Setting SSL cipher suite preferences
          Examples sp_ssladmin
          Other considerations
      Using SSL to specify a common name
        Specifying a common name with sp_listener
        Stored procedure sp_addserver changed
      Kerberos confidentiality
      Dumping and loading databases with password protection
        Passwords and earlier versions of Adaptive Server
        Passwords and character sets
    Auditing
      Introduction to auditing in Adaptive Server
        Correlating Adaptive Server and operating system audit records
        The audit system
          The sybsecurity database
          The audit queue
          Auditing configuration parameters
          Auditing grant and revoke commands
          Auditing DML statements
          Auditing login and login profile commands
          Auditing stored procedures
          System procedures for auditing
          Managing deployed source in source code control systems
      Installing and setting up auditing
        Installing the audit system
          Tables and devices for the audit trail
          Device for the syslogs transaction log table
          Preinstallation tasks for auditing devices
        Installing auditing with auditinit
        Installing auditing with installsecurity
        Moving the auditing database to multiple devices
          Moving sybsecurity without saving global audit settings
          Moving sybsecurity and saving global audit settings
        Setting up audit trail management
          Setting up threshold procedures
          Setting auditing configuration parameters
        Setting up transaction log management
          Truncating the transaction log
          Managing the transaction log with no truncation
        Enabling and disabling auditing
        Single-table auditing
          Establishing and managing single-table auditing
          Threshold procedure for single-table auditing
          What happens when the current audit table is full?
          Recovering when the current audit table is full
        Restarting auditing
      Setting global auditing options
        Auditing options: types and requirements
          Examples of setting auditing options
        Hiding system stored procedure and command password parameters
        Determining current auditing settings
        Adding user-specified records to the audit trail
          Examples of adding user-defined audit records
      Querying the audit trail
      Understanding the audit tables
        Reading the extrainfo column
        Monitoring failed login attempts
        Auditing login failures
  Sybase Control Center for Adaptive Server Enterprise 3.2.8
    About Sybase Control Center for Adaptive Server
      New Features in Sybase Control Center for Adaptive Server Enterprise
      User Interface Overview
      Toolbar Icons
      Status Icons
      Display and Copy Options in Adaptive Server monitors
      Common Display Options
      Keyboard Shortcuts
      Displaying the Versions of SCC Components
      Style and Syntax Conventions
      Accessibility Features
      Sybase Control Center Accessibility Information
    Get Started
      Quick Start for an Evaluation
      Get Started in a Production Environment
      Deploying an Instance from a Shared Disk Installation
        Enabling and Disabling Shared-Disk Mode
        Shared-Disk Mode
        sccinstance Command
      Launching Sybase Control Center
        Registering the ODBC Driver in Windows
        Starting and Stopping Sybase Control Center in Windows
        Starting and Stopping Sybase Control Center in UNIX
        Configuring Memory Usage
          Changing a Memory Option on the Command Line
          Changing a Memory Option for a Sybase Control Center Windows Service
          Changing a Memory Option for an SCC UNIX Service
        scc Command
      Logging in to Sybase Control Center
      Logging out of Sybase Control Center
      Setting Up Security
        Security
        Configuring Authentication for Windows
        Configuring a Pluggable Authentication Module (PAM) for UNIX
        Configuring an LDAP Authentication Module
          LDAP Configuration Properties
        Mapping Sybase Control Center Roles to LDAP or OS Groups
        Encrypting a Password
        Configuring Ports
      Configuring the E-mail Server
      Configuring the Automatic Logout Timer
      Configuring Retrieval Thresholds for the Administration Console
      User Authorization
        Assigning a Role to a Login or a Group