- DBMS -
Home page
[back][up level][next][last]
NIKA_ROOT C-ISAM (V.5.0) Informix Software, Inc. => Informix Software, Inc.
C-ISAM (V.5.0)
    C-ISAM (V.5.0)
    C-ISAM (V.5.0)
        AT&T UNIX System V
        Altos
        Apollo
        Bull
        DEC/VMS, ULTRIX
        DG/DG/UX
        Harris
        IBM/AIX
        NCR
        OS/2
        PC-MS/DOS
        Prime
        SCO UNIX
        Sun/SunOS
        TI
        Unisys
      _
        3Com
        AT&T StarGroup
        Novell
        PC-LAN
      _
        C
      = $40,000 
      = Maint. fee $110 and up per yr.; addl. support 
      - 
      agreement available- 
      B-tree-based library of C functions. Creates/manipulates indexed file
      systems. Standard access method for UNIX. Provides retrieval,
      storage and protection.- 
      Library of C functions that manages indexed sequential access method
      files. Allows direct access to records from applications. Offers
      X/Open standards compliance, indexing options, data integrity, systems
      maintenance and file compatibility. Uses index entries as keys that
      point to records. Allows user to find the specific pieces of data
      needed, without having to look at extra records. Creates unlimited
      indexes for ISAM files. Each index can be from one to eight parts,
      with each part a different datatype. Allows user to build indexes on
      multiple fields or a single field, and in ascending or descending
      order for data in different parts of the same indexes. Automatically
      updates records as they are changed. Provides several mechanisms to
      keep data safe, including transaction management and logging recovery
      features to allow user to recover data should a system or disk fail,
      locking mechanisms to manage the concurrency of the data, and a bcheck
      utility to ensure index integrity. Offers built-in routines for
      transaction management that provide extra security. Logging
      facilities help ensure data integrity by recording each transaction in
      a log file. Offers locking options that ensure data integrity when
      multiple users access the same row concurrently. Records remain
      locked until the transaction is either committed or rolled back.
      Checks and repairs ISAM index files to further maintain integrity.
        programmer's library
      = 427 KB 
      = 1 MB 
      = No 
      EMS= No 
      MOUSE= No 
      = $225 and up 
      = 1992