Solved

cursor name length limit

Posted on 1999-01-12
1
433 Views
Last Modified: 2012-06-27
Using sqlanywhere 5.05.
What is a  limit in characters  for a cursor name ?
Found painfully that 30 char caused the problem
of client being locked when both odbc and embedded
apps tried to access db. Truncated cursor name to 25
chars but not sure what is a limit. Could not find anywhere.
0
Comment
Question by:mosur
1 Comment
 
LVL 9

Accepted Solution

by:
david_levine earned 50 total points
ID: 1098542
Found the issue on the support site and it says the limit is 29 characters. It was supposed to be increased in SQL Anywhere 5, but it wasn't.

Below is a statement from the issue on the site as well as the link to it:

http://info.sybase.com/cgi-bin/folioisa.dll/ptipswdb.nfo/query=+cursor+name+length/doc/{@3465}?

--------------------------------------------------------------

A new feature has been added to the database engine. The text of the description follows:

-----------

Feature:DESCRIBE LONG NAMES FOR ...

Version:5.0.03 and above

Description:

A new form of the Embedded SQL DESCRIBE statement has been created for retrieving column names for a statement or cursor. This can get names of arbitrary length as opposed to the 30 character limit on the existing form of describe. The syntax is:

EXEC SQL DESCRIBE LONG NAMES FOR [CURSOR] <stmt | cursor> INTO <sqlda>;

The sqlda is treated differently with this form of describe. It must be a sqlda set up like a FETCH sqlda is set up. There must be one entry for each column and the entry must be a string type. The DESCRIBE will put information into the strings fields as if you were fetchingfrom a cursor (the names go into memory pointed to by the SQLDATA sqlda members).


At this point, no mention has been made of changing ODBC to use this feature. I am enquiring.

0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Learn to move / copy / export exchange contacts to iPhone without using any software. Also see the issues in configuration of exchange with iPhone to migrate contacts.
Is your company's data protection keeping pace with virtualization? Here are 7 dynamic ways to adapt to rapid breakthroughs in technology.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now