Comparison of relational database management systems: Difference between revisions

Content deleted Content added
Filled in 31 bare reference(s) with reFill 2 | Cleaned up using AutoEd
bulleted lists for notes
Line 2,459:
|}
 
* <cite id="tb_1">[[#tb 1 back|Note (1):]]</cite> Server provides tempdb, which can be used for public and private (for the session) temp tables.<ref>{{Citation
| url = http://sybooks.sybase.com/onlinebooks/group-as/asg1250e/sag/@Generic__BookTextView/3225;
| archive-url = https://web.archive.org/web/20051023153932/http://sybooks.sybase.com/onlinebooks/group-as/asg1250e/sag/@Generic__BookTextView/3225;
Line 2,467:
| title = Online books
}}</ref>
* <cite id="tb_2">[[#tb 2 back|Note (2):]]</cite> Materialized views are not supported in Informix; the term is used in IBM's documentation to refer to a temporary table created to run the view's query when it is too complex, but one cannot for example define the way it is refreshed or build an index on it. The term is defined in the Informix Performance Guide.<ref>{{Citation
 
<cite id="tb_2">[[#tb 2 back|Note (2):]]</cite> Materialized views are not supported in Informix; the term is used in IBM's documentation to refer to a temporary table created to run the view's query when it is too complex, but one cannot for example define the way it is refreshed or build an index on it. The term is defined in the Informix Performance Guide.<ref>{{Citation
| publisher = IBM
| url = http://publib.boulder.ibm.com/infocenter/idshelp/v115/index.jsp?topic=/com.ibm.perf.doc/ids_prf_534.htm
Line 2,474 ⟶ 2,473:
| title = Informix Performance Guide
}}</ref>
* <cite id="tb_4">[[#tb 4 back|Note (4):]]</cite> Materialized views can be emulated using [[stored procedure]]s and triggers.<ref>{{Citation
 
<cite id="tb_4">[[#tb 4 back|Note (4):]]</cite> Materialized views can be emulated using [[stored procedure]]s and triggers.<ref>{{Citation
| publisher = Red Noize
| series = Pure
Line 3,247 ⟶ 3,245:
|}
 
* <cite id="idx_1">[[#idx 1 back|Note (1):]]</cite> The users need to use a function from freeAdhocUDF library or similar.<ref>{{Citation
| url = http://www.udf.adhoc-data.de/index_eng.html
| publisher = Ad Hoc Data
Line 3,256 ⟶ 3,254:
| url-status = dead
}}</ref>
* <cite id="idx_3idx_2">[[#idx 32 back|Note (32):]]</cite> Can be emulatedimplemented byfor indexingmost adata computedtypes column<ref>{{Citationusing expression-based indexes.
 
* <cite id="idx_2idx_3">[[#idx 23 back|Note (23):]]</cite> Can be implementedemulated forby mostindexing dataa typescomputed using expression-based indexes.column<ref>{{Citation
 
<cite id="idx_3">[[#idx 3 back|Note (3):]]</cite> Can be emulated by indexing a computed column<ref>{{Citation
| series = MSDN
| chapter-url = http://msdn.microsoft.com/library/default.asp?url=/library/en-us/createdb/cm_8_des_05_8os3.asp
Line 3,280 ⟶ 3,276:
| page = 300
}}</ref>).
* <cite id="idx_4">[[#idx 4 back|Note (4):]]</cite> Used for InMemory ColumnStore index, temporary hash index for hash join, Non/Cluster & fill factor.
 
* <cite id="idx_4idx_5">[[#idx 45 back|Note (45):]]</cite> UsedInnoDB forautomatically InMemorygenerates ColumnStore index, temporaryadaptive hash index for hash join, Non/Cluster & fill factor.<ref>{{Citation
 
<cite id="idx_5">[[#idx 5 back|Note (5):]]</cite> InnoDB automatically generates adaptive hash index<ref>{{Citation
| publisher = Oracle
| chapter-url = http://dev.mysql.com/doc/refman/5.0/en/innodb-adaptive-hash.html
Line 3,290 ⟶ 3,284:
| series = Development documentation
}}</ref> entries as needed.
* <cite id="idx_6">[[#idx 6 back|Note (6):]]</cite> Can be implemented using Function-based Indexes in Oracle 8i and higher, but the function needs to be used in the sql for the index to be used.
 
* <cite id="idx_6idx_7">[[#idx 67 back|Note (67):]]</cite> CanA bePostgreSQL implementedfunctional usingindex Function-based Indexes in Oracle 8i and higher, but the function needs tocan be used into the sql forreverse the indexorder toof bea usedfield.
* <cite id="idx_10">[[#idx 10 back|Note (10):]]</cite> B+ tree and full-text only for now.
 
* <cite id="idx_7idx_11">[[#idx 711 back|Note (711):]]</cite> AR-Tree indexing available in base edition with PostgreSQLLocator functionalbut indexsome canfunctionality berequires usedPersonal toEdition reverseor theEnterprise orderEdition ofwith aSpatial fieldoption.
 
<cite id="idx_10">[[#idx 10 back|Note (10):]]</cite> B+ tree and full-text only for now.
 
<cite id="idx_11">[[#idx 11 back|Note (11):]]</cite> R-Tree indexing available in base edition with Locator but some functionality requires Personal Edition or Enterprise Edition with Spatial option.
 
==Database capabilities==
Line 3,997 ⟶ 3,987:
|}
 
* <cite id="capa_1">[[#capa 1 back|Note (1):]]</cite> Recursive CTEs introduced in 11gR2 supersedes similar construct called CONNECT BY.
Recursive CTEs introduced in 11gR2 supersedes similar construct called CONNECT BY.
 
==Data types==
Line 4,860 ⟶ 4,849:
|}
 
* <cite id="other_1">[[#other 1 back|Note (1):]]</cite> Both '''function''' and '''procedure''' refer to internal routines written in SQL and/or procedural language like [[PL/SQL]]. '''External routine''' refers to the one written in the host languages, such as C, Java, Cobol, etc. "[[Stored procedure]]" is a commonly used term for these routine types. However, its definition varies between different database vendors.
* <cite id="other_2">[[#other 2 back|Note (2):]]</cite> In Derby, H2, LucidDB, and CUBRID, users code '''functions''' and '''procedures''' in Java.
 
* <cite id="other_2other_3">[[#other 23 back|Note (23):]]</cite> InENUM Derby,datatype H2,exists. LucidDB,CHECK andclause CUBRIDis parsed, users code '''functions'''but andnot '''procedures'''enforced in Javaruntime.
* <cite id="other_5">[[#other 5 back|Note (5):]]</cite> Informix supports external functions written in Java, C, & C++.
 
<cite id="other_3">[[#other 3 back|Note (3):]]</cite> ENUM datatype exists. CHECK clause is parsed, but not enforced in runtime.
 
<cite id="other_5">[[#other 5 back|Note (5):]]</cite> Informix supports external functions written in Java, C, & C++.
 
==Partitioning==
Line 5,643 ⟶ 5,629:
|}
 
* <cite id="ac_1">[[Comparison of relational database management systems#ac 1|Note (1):]]</cite> Network traffic could be transmitted in a secure way (not clear-text, in general SSL encryption). Precise if option is default, included option or an extra modules to buy.
* <cite id="ac_2">[[Comparison of relational database management systems#ac 2|Note (2):]]</cite> Options are present to set a minimum size for password, respect complexity like presence of numbers or special characters.
 
* <cite id="ac_2ac_3">[[Comparison of relational database management systems#ac 23|Note (23):]]</cite> OptionsHow aredo presentyou toget setsecurity aupdates? minimumIs sizeit forfree passwordaccess, respectdo complexityyou likeneed presencea oflogin numbersor to pay? Is there easy access through a Web/FTP portal or specialRSS charactersfeed or only through offline access (mail CD-ROM, phone).
* <cite id="ac_4">[[Comparison of relational database management systems#ac 4|Note (4):]]</cite> Does database process run as root/administrator or unprivileged user? What is default configuration?
 
* <cite id="ac_3ac_5">[[Comparison of relational database management systems#ac 35|Note (35):]]</cite> How do you get security updates? Is it free access, do you needthere a loginseparate oruser to pay?manage Isspecial thereoperation easylike accessbackup through(only a Webdump/FTPrestore portalpermissions), orsecurity RSSofficer feed(audit), oradministrator only(add throughuser/create offlinedatabase), accessetc.? (mailIs CD-ROM,it phone).default or optional?
* <cite id="ac_6">[[#ac 6 back|Note (6):]]</cite> Common Criteria certified product list.<ref>
 
<cite id="ac_4">[[Comparison of relational database management systems#ac 4|Note (4):]]</cite> Does database process run as root/administrator or unprivileged user? What is default configuration?
 
<cite id="ac_5">[[Comparison of relational database management systems#ac 5|Note (5):]]</cite> Is there a separate user to manage special operation like backup (only dump/restore permissions), security officer (audit), administrator (add user/create database), etc.? Is it default or optional?
 
<cite id="ac_6">[[#ac 6 back|Note (6):]]</cite> Common Criteria certified product list.<ref>
{{Citation
| publisher = Common Criteria Portal
Line 5,662 ⟶ 5,643:
}}
</ref>
* <cite id="ac_7">[[#ac 7 back|Note (7):]]</cite> FirebirdSQL seems to only have SYSDBA user and DB owner. There are no separate roles for backup operator and security administrator.
 
* <cite id="ac_7ac_8">[[#ac 78 back|Note (78):]]</cite> FirebirdSQLUser seemscan todefine onlya havededicated SYSDBAbackup user andbut DBnothing owner.particular Therein aredefault no separate roles for backup operator and security administratorinstall.<ref>
 
<cite id="ac_8">[[#ac 8 back|Note (8):]]</cite> User can define a dedicated backup user but nothing particular in default install.<ref>
{{Citation
| url = http://gentoo-wiki.com/HOWTO_Backup_MySQL
Line 5,677 ⟶ 5,656:
}}
</ref>
* <cite id="idx_5ac_9">[[#idxac 59 back|Note (59):]]</cite> InnoDB automatically generates adaptive hashAuthentication indexmethods.<ref>{{Citation
 
<cite id="ac_9">[[#ac 9 back|Note (9):]]</cite> Authentication methods.<ref>{{Citation
| url = https://www.postgresql.org/docs/8.4/interactive/auth-methods.html
| publisher = PostgreSQL community
Line 5,685 ⟶ 5,663:
| date = 24 July 2014
}}</ref>
* <cite id="ac_10">[[#ac 10 back|Note (10):]]</cite> Informix Dynamic Server supports PAM and other configurable authentication. By default uses OS authentication.
 
* <cite id="ac_10ac_11">[[#ac 1011 back|Note (1011):]]</cite> InformixAuthentication Dynamic Server supports PAM and other configurable authentication. By default uses OS authenticationmethods.<ref>{{Citation
 
<cite id="ac_11">[[#ac 11 back|Note (11):]]</cite> Authentication methods.<ref>{{Citation
| url = https://www.microsoft.com/en-us/sqlserver/common-criteria.aspx#tab6
| archive-url = https://web.archive.org/web/20140213221406/https://www.microsoft.com/en-us/sqlserver/common-criteria.aspx
Line 5,695 ⟶ 5,671:
| title = Common Criteria (CC, ISO15408)
}}</ref>
* <cite id="ac_12">[[#ac 12 back|Note (12):]]</cite> With the use of Pervasive AuditMaster.
 
* <cite id="ac_12ac_13">[[#ac 1213 back|Note (1213):]]</cite> WithUser-based thesecurity useis ofoptional Pervasivein AuditMasterPolyhedra, but when enabled can be enhanced to a role-based model with auditing.<ref name="Polyhedra-audit">{{Citation
 
<cite id="ac_13">[[#ac 13 back|Note (13):]]</cite> User-based security is optional in Polyhedra, but when enabled can be enhanced to a role-based model with auditing.<ref name="Polyhedra-audit">{{Citation
| url = http://developer.polyhedra.com/how-to-guides/auditing
| publisher = Enea AB