Optimizing Performance in DB2 Software |
From inside the book
Results 1-3 of 13
Page 29
... data that packs the data into the table more tightly . The effectiveness of this approach depends on a knowledge ... occurrences of data showing actual date of the month of the activity and the amount of the activity . When there are ...
... data that packs the data into the table more tightly . The effectiveness of this approach depends on a knowledge ... occurrences of data showing actual date of the month of the activity and the amount of the activity . When there are ...
Page 32
... occurrences of data . Names and text are common candidates for variable length fields . As a simple example , suppose the designer has specified NAME as a field in a table . Then JEANNE FRIEDMAN will require 15 bytes of information for ...
... occurrences of data . Names and text are common candidates for variable length fields . As a simple example , suppose the designer has specified NAME as a field in a table . Then JEANNE FRIEDMAN will require 15 bytes of information for ...
Page 119
... data elements are frequently accessed in a sequential manner , if the pattern of access is stable , and if the number of occurrences of nonkey data can be reliably calculated for the key values of a table , then the analyst should ...
... data elements are frequently accessed in a sequential manner , if the pattern of access is stable , and if the number of occurrences of nonkey data can be reliably calculated for the key values of a table , then the analyst should ...
Contents
Conceptual Data Base Design | 19 |
Chapter 3 | 43 |
Examples of Designed and Undesigned Transactions | 52 |
Copyright | |
14 other sections not shown
Common terms and phrases
ACCT activities algorithm American Management Systems amount of data amount of I/O analysis application archival data archival environment balance base table batch processing batch window bill of material buffer bytes clustered COBOL columns created cross-reference table data base design data elements data relationships Database DB2 data deleted denormalization depends encoded end user example execution exist extract Fast Path foreign key I/O required index entry iteration large data base level count locking multiple NEWLIMIT NEWRATE nonkey normal occurrences of data occurs online performance option page2 part-supplier PARTABLE partitions PARTNO DESCR peak-period processing physical data base pointer primary key processor production environment query recursive referential integrity reorganization retrieve scan SELECT PARTNO separate sequential access sequentially shown in Figure simple small data base space SQL program stack stored subassemblies supplier table Suppose technique undesigned transactions update usage utilization VARCHAR variable length fields VSAM