Vous pouvez maintenant limiter le nombre de sessions connectes au serveur. Pour ce faire, dfinissez le
paramtre de configuration LIMITNUMSESSIONS sur le nombre maximum de sessions autorises se
connecter au serveur de base de donnes. Vous pouvez, si vous le souhaitez, spcifier que le serveur
imprime des messages lorsque le nombre de sessions approche le nombre maximum spcifi. Utilisez les
commandes onmode -wm et onmode -wf pour activer/dsactiver ce paramtre de configuration ou
modifier sa valeur
Les valeurs par dfaut des paramtres de configuration Java sont mis jour dans le fichier
onconfig.std
Les paramtres de configuration Java sont dsormais dfinis sur les valeurs par dfaut suivantes dans le
fichier onconfig.std :
JVPJAVAHOME $INFORMIXDIR/extend/krakatoa/jre
JVPHOME $INFORMIXDIR/extend/krakatoa
JVPPROPFILE $INFORMIXDIR/extend/krakatoa/.jvpprops
JVPLOGFILE $INFORMIXDIR/jvp.log
#JDKVERSION 1.5
#JVPARGS -verbose:jni
#JVPCLASSPATH
$INFORMIXDIR/extend/krakatoa/krakatoa_g.jar:$INFORMIXDIR/extend/krakatoa/jdbc_g.jar
JVPCLASSPATH
$INFORMIXDIR/extend/krakatoa/krakatoa.jar:$INFORMIXDIR/extend/krakatoa/jdbc.jar
Dans les versions prcdentes, vous deviez arrter le gestionnaire de connexions pour modifier sa
configuration, puis le redmarrer pour rendre la nouvelle configuration effective. La nouvelle option de
rechargement (-r) vous permet de reconfigurer le gestionnaire de connexions sans l'arrter , ni le
redmarrer.
Vous pouvez dsormais dclarer ou rfrencer des objets de point de sauvegarde dans des instructions
SQL. Un point de sauvegarde identifie un emplacement arbitraire dans les instructions d'une transaction
SQL. Dans sa transaction, le point de sauvegarde ressemble un libell d'instruction sur lequel l'instruction
ROLLBACK SQL peut annuler toute modification apporte la base de donnes gnre par la transaction
entre le point de sauvegarde et l'instruction ROLLBACK. Une application client qui dclare un ou plusieurs
points de sauvegarde dans une transaction peut implmenter une logique de traitement d'erreurs qui
annule uniquement la portion de transaction qui suit le point de sauvegarde indiqu, plutt que d'annuler la
transaction entire si une exception se produit.
Les nouvelles instructions SQL suivantes sont implmentes pour des points de sauvegarde :
Cette dition de Dynamic Server prend directement en charge les instructions SQL qui dclarent ou
rfrencent les objets point de sauvegarde dans DB-Access et les UDR crites en langage SPL, C ou Java.
Les mthodes prenant en charge les points de sauvegarde sont galement prises en charge dans les
applications JDBC. Les applications crites en ESQL/C qui utilisent les instructions de point de sauvegarde
SQL sont galement prises en charge dans cette dition de Client SDK.
Lorsque vous crez une table, vous spcifiez la taille d'une premire extension en fonction de la taille
estime de la table. Si la taille de la table est plus grande ou plus petite que son estimation, vous pourriez
souhaiter modifier la taille de la premire extension pour viter de possder un trop grand nombre
d'extensions ou de crer des extensions dont la taille est trop grande. Vous pouvez dsormais modifier la
taille de la premire extension d'une table d'un dbspace. Lorsque vous modifiez la taille de la premire
extension, Dynamic Server enregistre la modification (dans le catalogue systme et la page de partition),
mais n'applique celle-ci que lorsque la table est re-gnre ou qu'une partition ou un fragment est cr.
Cette fonction, y compris la syntaxe de la nouvelle clause MODIFY EXTENT SIZE utilise avec l'instruction
ALTER TABLE
Vous pouvez dsormais mettre jour de manire dynamique la valeur des paramtres de configuration
LTXEHWM, LTXHWM et DYNAMIC_LOGS l'aide de la commande onmode -wf ou onmode -wm. La
commande onmode -wf modifie la valeur dans le fichier ONCONFIG. La commande onmode -wm modifie
la valeur dans la session en cours.
Les statistiques sont dsormais automatiquement values pour dterminer si elles doivent tre mises
jour et le sont, le cas chant, chaque nuit. Deux nouvelles tches intgres du planificateur effectuent ce
processus, comme dcrit dans le tableau suivant.
Tche Description
Actualisation automatique
Cette tche excute les commandes de statistiques fournies par la tche Evaluation
des statistiques de mise
des statistiques de mise jour automatique.
jour
Grce la connexion unique, les utilisateurs s'authentifient une fois et l'authentification est transfre de
manire scuris vers des rseaux de confiance ou non. Les utilisateurs fournissent un ID utilisateur et un
mot de passe valides lorsqu'ils se connectent un ordinateur client. Ils peuvent ensuite accder au serveur
de base de donnes et d'autres services compatibles SSO sans avoir se reconnecter. Auparavant, les
utilisateurs devaient se connecter plusieurs fois.
IDS offre la prise en charge de la connexion unique dans le module Generic Security Services
Communications Support (GSSCSM). GSSCSM fonctionne avec Kerberos, qui est un protocole
d'authentification en rseau. Vous devez dployer un protocole d'authentification Kerberos qui prend en
charge Generic Security Services Application Programming Interface (GSSAPI) avant avant de pouvoir
utiliser SSO avec IDS. Aprs avoir activ SSO, vous bnficiez de la gestion centralise de
l'authentification.
Cette fonction est principalement prsente dans le manuel IBM Informix - Guide de scurit.
Ajout de la prise en charge du chiffrement des donnes l'aide de communications Secure Sockets
Layer (SSL)
Vous pouvez dsormais configurer IDS pour qu'il utilise le protocole SSL, qui chiffre les donnes de
connexions du protocole TCP/IP entre deux points d'un rseau. Le protocole SSL est une alternative au
module de chiffrement CSM spcifique IDS et au mot de passe simple CSM pour les clients CSDK. Vous
devez utiliser SSL pour chiffrer les donnes dans les communications entre les clients IDS et DRDA.
Table 1. What's New in the IBM Informix Administrator's Reference for Version 11.50.xC9
Overview Reference
PN_STAGEBLOB_THRESHOLD configuration
Reserving space for BYTE and TEXT parameter
data in round-robin fragments
Overview Reference
LOW_MEMORY_RESERVE
configuration parameter with the
onmode -wm or -wf command.
Support for later versions of IBM GSKIT_VERSION Configuration Parameter
Global Security Kit (GSKit)
The following table lists the new features for Version 11.50.xC8.
Table 2. What's New in the IBM Informix Administrator's Reference for Version 11.50.xC8
Overview Reference
Overview Reference
The following table lists the new features for Version 11.50.xC6.
Table 3. What's New in the IBM Informix Administrator's Reference for Version 11.50.xC6
Overview Reference
You can now enable Informix to onstat -g scn command: Print scan information
perform light scans on compressed
tables, tables with rows that are larger IBM Informix Performance Guide
than a page, and tables with any data,
including VARCHAR, LVARCHAR, and
NVARCHAR data. The server does not
scan pieces of a row (such as smart
large objects) that are stored outside of
the row.
Overview Reference
archive.
You can now dynamically start, stop, or start listen argument: Start a listen thread dynamically
restart (stop and start) an existing listen (SQL administration API)
thread for a SOCTCP or TLITCP
network protocol without interrupting stop listen argument: Stop a listen thread dynamically
existing connections. Use the new (SQL administration API)
onmode -P commands or the new SQL
administration API admin() or task()
functions. restart listen argument: Stop and start a listen thread
dynamically (SQL administration API)
SQL Administration API Portal: SQL administration API portal: Arguments by functional
Arguments by Functional Categories category
You can dynamically add or remove onmode and p arguments: Add or remove virtual
BTS virtual processor by using the processors (SQL administration API)
onmode -p command or the SQL
administration API task() or admin()
function with onmode and p arguments.
View Event Alarms in the Scheduler Events in the ph_alert Table
The following table lists the new features for Version 11.50.xC5.
Table 4. What's New in the IBM Informix Administrator's Reference for Version 11.50.xC5
Overview Reference
Overview Reference
Down
The onshutdown script
Use the onclean utility to force the
database server to shut down when
normal shut down with the onmode
utility fails to shut down the server or
when you cannot restart the server.
The onclean utility cleans up shared
memory, semaphores, and stops
database server virtual processes.
The following table lists the new features for Version 11.50.xC4.
Table 5. What's New in the IBM Informix Administrator's Reference for Version 11.50.xC4
Overview Reference
Overview Reference
Overview Reference
The following table lists the new features for Version 11.50.xC3.
Table 6. What's New in IBM Informix Dynamic Server Administrator's Reference for Version
11.50.xC3
Overview Reference
Overview Reference
The following table lists the new features for Version 11.50.xC2.
Table 7. What's New in IBM Informix Dynamic Server Administrator's Reference for Version
11.50.xC2
Overview Reference
B-tree scanners can now compress indexes by set index compression argument: Change
merging two partially used index pages if the data index page compression (SQL administration
on those pages totals a set level (low, medium, or API)
high). You can specify the index compression
level by modifying the value of the compression
field of the BTSCANNER configuration parameter
option, by running an onmode -C compression
value command, or by running an SQL
Table 7. What's New in IBM Informix Dynamic Server Administrator's Reference for Version
11.50.xC2
Overview Reference
The following table lists the new features for Version 11.50.xC1.
Table 8. What's New in IBM Informix Dynamic Server Administrator's Reference for Version
11.50.xC1
Overview Reference
SSL_KEYSTORE_LABEL Configuration
Configuration parameter to use for Secure
Parameter
Sockets Layer (SSL) support
Overview Reference
Overview Reference
Overview Reference
administration API)
Tableau 1. Nouveauts dans IBM Informix - Guide de scurit pour Version 11.50.xC2
Prsentation Rfrence
Tableau 2. Nouveauts dans IBM Informix - Guide de scurit pour Version 11.50.xC1
Prsentation Rfrence
Prise en charge du chiffrement de donnes l'aide de communications SSL Voir Protocole SSL
(Secure Sockets
Vous pouvez prsent configurer IDS pour utiliser le protocole SSL, qui Layer).
chiffre les donnes des connexions TCP/IP entre deux points d'un rseau.
Le protocole SSL est une alternative au module de support des
communications (CSM) de chiffrement spcifique IDS et au module CSM
avec mot de passe simple pou les clients CSDK. Vous devez utiliser SSL
pour chiffrer les donnes des communications entre des systmes de
dtection d'intrusion et des clients DRDA clients.
Ajout d'une fonctionnalit de prise en charge de connexion unique Voir
Authentification
La connexion unique permet aux utilisateurs de ne s'authentifier qu'une fois SSO.
; cette authentification est poursuivie sur les rseaux scuriss et non
scuriss. Les utilisateurs fournissent un identificateur et un mot de passe
valides lors de la connexion un ordinateur client ; ils peuvent ensuite
accder au serveur de base de donnes et aux autre services compatibles
SSO sans devoir se connecter nouveau. Par le pass, les utilisateurs
devaient se connecter plusieurs fois.
A FOT index is an index that is similar to a B-Tree index, but an FOT index has multiple root
nodes and fewer levels. (B-Tree indexes have only one root node and more levels.) You can
think of levels in a FOT index as smaller subtrees (buckets). To retrieve an item from a
subtree, you compute a hash value from the column you chose when creating the index. This
hash value is then mapped to a bucket for storage or for getting a value of the row.
After successfully from converting Informix 11.50.xC7 to 11.70.xC1, you can use the
following command to a create FOT:
The command in Listing 1 creates a FOT index on tab_1 table on col1 with 1000 buckets
(subtrees). You can create a FOT on a new table created after conversion or on an existing
table.
Reversion impact: When you try to revert back to an older version, the following message is
displayed, and reversion is cancelled:
onmode -b 11.50.xC6
Database xdb: Drop FOT index fot_indx before reversion.
System catalog changes: A FOT index creates a new entry in the existing sysindices table.
List fragmentation fragments data based on a list of discrete values. This type of
fragmentation can help in the logical segregation of data. It is useful when a table has a finite
set of values for the fragment key (or partitioning key) and queries on the table have an
equality predicate on the fragment key.
After successfully converting from Informix 11.50.xC7 to 11.70.xC1, you can use the
following command to create a table with list fragmentation:
The command in Listing 4 creates a table called tab_list that fragments data based on column
state using list fragmentation. You can also change the fragmentation scheme of an existing
table to list using the ALTER FRAGMENT command.
Interval fragmentation fragments data based on an interval value. This type of fragmentation
allows the DBA to define a set of initial fragments and an interval value. The DBA does not
have to create all the possible fragments for a table up front. The server automatically creates
fragments based on the specified interval value when rows are inserted that do not fit in the
initial fragments.
After successfully converting from version 11.50.xC7 to 11.70.xC1, you can use the
following command to create table with interval fragmentation:
CREATE TABLE tab_interval (id INTEGER, name CHAR(32), dept CHAR(2), hiredate DATE)
FRAGMENT BY RANGE (id)
INTERVAL (100) STORE IN (dbspace1, dbspace2, dbspace3)
PARTITION p0 VALUES IS NULL IN dbspace0,
PARTITION p1 VALUES < 250 IN dbspace1,
PARTITION p2 VALUES < 500 IN dbspace2;
The command in Listing 5 creates a table called tab_interval that fragments data on column id
using interval fragmentation. The table has three initial fragments: p0, p1, and p2. When rows
are inserted with values of id columns >= 500, the server creates interval fragments based on
the specified interval value of 100 in one of the dbspaces specified in the STORE IN clause.
The above insert will result in the creation of an interval fragment with fragment expression
>= 600 and < 700. You can also change the fragmentation scheme of an existing table to
interval using the ALTER FRAGMENT command. Both list and interval fragmentation can be
used to fragment indexes.
Reversion impact: If you have tables fragmented by list or interval, you cannot revert to
11.50.xC7 unless those tables are dropped or the fragmentation scheme of those tables are
modified to make them non-fragmented. When you try to revert back to an older version, the
following message is displayed, and reversion is cancelled:
onmode -b 11.50.xC6
Database xdb:Table xuser.tab_list:Drop or alter the fragmentation strategy for
Table
before reversion
Database xdb:Table xuser.tab_interval:Drop or alter the fragmentation strategy for
Table
before reversion
After the tables are dropped or altered to make them non-fragmented, the reversion will be
successful.
drop tab_list;
drop tab_interval;
A new version column is added to sysfragments system catalog table to keep track of
changes to statistics information.
In addition to a row for each table fragment, the sysfragments system catalog table will have
rows for the following information pertaining to list and interval fragmented table or index:
Fragment key (or partitioning key), interval value, and dbspace list for interval fragments.
List fragmentation is represented by 'L,' and interval fragmentation is represented by 'N' in
the strategy column of sysfragments system catalog table.
Fragment-level statistics
This feature helps you to store data distributions per fragment. It allows you to define a data
change threshold, and statistics are refreshed only when the data change threshold is reached.
Run the update statistics command to create or refresh statistics.
After successfully converting from version 11.50.xC7 to 11.70.xC1, ensure you have a valid
smartblob space defined for the SYSSBSPACENAME onconfig parameter, and ensure the space
is allocated. Then use the following command to create fragment level statistics:
The STATCHANGE configuration parameter is a new ONCONFIG parameter that is used to define
the threshold. The integer value of the configuration parameter ranges between 0 to 100 or
AUTO; the default value is 10.
The STATLEVEL property is the level used to specify if the distributions must be created at
table level or fragment level. The default value is AUTO. You can also set STATLEVEL TABLE
or STATLEVEL FRAGMENT. When you specify STATLEVEL FRAGMENT, the distributions are
created per fragment.
The command in Listing 8 creates a fragmented table called tab_frag_stat. After you insert
rows and if any of the fragments reach the threshold when update statistics is run, the server
creates the distribution for that particular fragment. The default threshold is 10%. Fragment-
level statistics can be used for new tables created after conversion, or they can be used for
existing tables.
Reversion impact: When you try to revert to an older version, the server takes care of
dropping the catalog changes; there are no reversion messages. Any fragment-level statistics
are dropped, and all tables will use table-level statistics in the older version.
System catalog changes:
A new system catalog table, sysfragdist, is introduced for this feature. This table stores the
distributions per fragment.
New columns ustbuildduration and ustlowts were added to the sysindices table.
New columns statlevel and statchange were added to the systables table.
A new column ustbuildduration was added to sysdistrib table.
AUTO_STAT_MODE: Has a default value of 1, which enables the automatic update statistics
operation (fragment-level statistics is ON). The value 0 disables automatic update statistics
operation (original server behavior).
STATCHANGE: Has a default value of 10, which defines the percentage of threshold changes.
Integer values for the configuration parameter range from 0 to 100.
Storage provisioning
This feature allows you to automatically allocate a storage space when there is a depletion of
storage space. If you enable this feature, you no longer need DBA intervention to monitor the
space when the application might encounter the problem of depletion of storage space. The
server automatically takes care of adding the space from the storage pool that you specify. A
storage pool can be raw devices, cooked files, or directories. A storage space can be a
dbspace, sbspace, blobspace, temporary dbspace, or temporary sbspace. When there is any
depletion of storage space, existing chunks can be automatically extended, or new chunks can
be automatically added from the storage pool to that particular storage space.
After converting successfully from version 11.50.xC7 to 11.70.xC1, you can use the SQL
administration API commands to implement storage provisioning. For example, to add a
directory called /work/dbspaces/pool1 to the storage pool, specify the following:
Reversion impact: The storagepool table is automatically dropped during reversion. There
are no reversion messages for this feature.
SP_AUTOEXPAND: The default value is 1, which means enable automatic space expansion; 0
means disable automatic space expansion.
SP_WAITTIME: The default value is 30, and the range is 0 to 2147483647.
SP_THRESHOLD: The default value is 0. The server interprets1 to 50 (including decimals) as a
threshold percentage. The server interprets 1000 or above as the number of kilobytes.
Values between 50 to 1000 are invalid.
Trusted context
A trusted context is a database object defining the set of properties for a connection. When the
properties are met, a trusted connection is allowed. The connection is made by a specific user
and made from a trusted client. DBSECADM (Database Security Administrator ) has the
permissions to create, delete, or modify trusted context.
After converting successfully from version11.50.xC7 to 11.70.xC1, you can use the following
command to create trusted context:
CREATE TRUSTED CONTEXT TCX1 BASED UPON CONNECTION USING SYSTEM AUTHID usr3
ATTRIBUTES (ADDRESS '9.99.999.999')
WITH USE FOR usr2 WITHOUT AUTHENTICATION,usr1 WITH AUTHENTICATION ENABLE;
The command in Listing 10 creates a trusted context called TCX1. The address is the IP
address, and when usr3 requests a trusted connection, the request is accepted, because usr3
satisfies all the connection attributes. You can switch the user to usr2 without providing
authentication information, because usr2 is defined as a user of TCX1 without authentication.
However, you cannot switch to usr1 without authentication, because usr1 is defined as a user
of TCX1 with authentication. In order to connect to trusted context, you must have a client,
such as ESQLC, JCC, or JDBC.
Reversion impact: The server takes care of dropping the system catalog changes, and the
reversion goes through without any reversion messages.
Mapped user
Currently on UNIX or MS Windows, all the users of the server are also known to the
operating system. Using the mapped user feature, you can externally authenticate a user by
mapping the user to an appropriate user and group privileges, irrespective of whether a user
has an operating systems account. A user who is mapped this way is known as a mapped user.
A DBSA can map a user to an existing operating systems user, or the DBSA can map the user
to a default set of properties.
The authentication can be done using SSO or PAM. For more information on PAM
authentication, take a look at the information on Pluggable Authentication Modules (PAM) in
the IBM Informix Security Guide and in some of the client guides.
After converting successfully from version 11.50.xC7 to 11.70.xC1, you can use the
following command to create a mapped user:
In order to use this feature, the USERMAPPING configuration parameter can be set to basic or
admin. After authenticating usr1 through PAM, the grant command (used in Listing 11)
maps usr1 to idsuser (the user with the operating systems account), granting the properties of
idsuser to usr1.
Reversion impact: The server drops all of the catalog changes before reversion; the reversion
is successful without any reversion messages.
USERMAPPING: The default value is OFF, which means only users having operating system
accounts can connect to Informix. A value of BASIC means that users without operating
systems account can connect to Informix, but not as privileged users. A value of ADMIN
means that users without operating system accounts can connect to the server as privileged
users.
This feature is an enhancement of existing audit behavior. Using this feature, you can enable
row-level auditing. This improves the performance of the database server. In order to use the
SRLA feature, you must configure the adtcfg file by setting the new ADTROWS configuration
parameter to 1. You must also be a DBSSO.
After converting successfully from Informix 11.50.xC7 to 11.70.xC1, you can use the
following command to create SRLA:
onaudit -c
onaudit -R 1
onaudit -a -u usr1 -e INRW
ALTER table tab_audit ADD AUDIT;
You can check the audit configuration using onaudit -c. The onaudit -R 1 command is
used to enable SRLA. The onaudit -a -u _default -e INRW command creates the user
audit mask usr1, and the granularity is set to Insert Row. You can also set the granularity to
Delete Row (DLRW), Read Row (RDRW), or Update Row (UPRW). The above ALTER command
enables SRLA for the table tab_audit.
You can create a table WITH AUDIT clause or alter table ADD|DROP AUDIT clause.
onshowaudit
Reversion impact: When you try to revert to an older version, the following message is
displayed, and reversion is cancelled.
onmode -b 11.50.xC6
Database xdb: Drop the audit property from the table tab_audit before reversion.
New syntax for disabling an index for foreign key constraint was added to use with the ALTER
statement. When creating a foreign key, Informix automatically creates a B-Tree index on the
child table when creating a foreign key. In some situations, the index is not used for any
lookups, there are no updates/deletes from the parent table, and no queries that need this index
on the child table. In this scenario, the B-tree on the child table is simply not needed and
incurs unwanted overhead if the child table is inserted, updated, or deleted.
After converting successfully from version 11.50.xC7 to 11.70.xC1, you can use the
following commands to create a foreign key constraint with index disabled:
Listing 16. SQL syntax for foreign key constraint with index disabled
CREATE table tab_parent (col1 int, col2 int) EXTENT SIZE 16;
CREATE unique index indx_parent_col1 on tab_parent(col1);
ALTER table parent add constraint primary key(col1) constraint cons_parent_col1;
CREATE table tab_child(c1 int, c3 varchar(32)) EXTENT SIZE 16;
CREATE index indx_child_c1 on child(c1);
The commands in Listing 16 create a parent table, called tab_ parent, with the primary key
constraint cons_parent_col1. The table has a unique index, indx_parent_col1. The commands
also create child table, called tab_child table with a unique index, indx_chile_c1. The ALTER
command creates the foreign key constraint, cons_child_c1, with the indx_child_c1 index
disabled. During the foreign key enforcement, the server uses the sequential scan, instead of
foreign key index. The foreign key index will be disabled, and the sysobjstate catalog table
will reflect that state. This feature is very useful for data warehouse applications.
Reversion impact: When you try to revert back to an older version, the following message is
displayed, and reversion is cancelled:
onmode -b 11.50.xC6
Database xdb: Table xuser.child: Drop and recreate this referential constraint
cons_child_x1 before reversion.
To drop the foreign key constraint with index disabled and recreate this referential constraint,
issue the following command:
After the foreign key constraint with index disabled is dropped and recreated, the reversion
completes successfully.
Automatic allocation of secondary partition header pages for extending the extent map
Prior to 11.70xC1, if the partition page header has a large number of extent entries in it,
conversion would fail, if the server was not able to fit all the extent entries into a single
partition header page. Starting with version 11.70.xC1, if you are converting from a lower
version of Informix, and if a partition header page has a large number of extents entries,
Informix will internally allocate secondary partition header pages (if required) to extend the
extent map, so that conversion will be successful. If more extents are allocated after
converting to 11.70.xC1, and if you try to revert back to an older version, the reversion may
fail, if the server is not able to fit all extent entries into a single partition header page. In order
to successfully revert, you will be required to run defragmenter on such partitions. You can
find more information on Defragment in the IBM Informix 11.70 Information Center (see
Resources").
After conversion, when a UDT, UDR, or INDEX from a database extension (DataBlade
Module) is used, the database extension is automatically registered.
The above command creates a table called tab1, and it will automatically register the node
datablade.
Reversion impact: When you try to revert back to an older version, the following message is
displayed, and reversion is cancelled.
onmode -b 11.50.xC6
Database xdb: Must drop spl/udr (sysbldsqltextin) before attempting reversion.
There will be more reversion messages apart from the above-mentioned reversion message.
drop tab1;
execute function sysbldprepare('Node.*', 'drop');
unprep database name.
Reversion impact: All the new tasks will be dropped by the server before reversion; there are
no reversion messages.
Back to top
Conclusion
This article has provided information that should help you plan how to implement all the new
Version 11.70 features that have potential upgrade and reversion impact. After learning about
this upgrade impact, the system catalog changes, new ONCONFIG parameters, and reversion
impact, you are now ready to take full advantage of all the new features in Version 11.70.