[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Frequently queried table

Posted on 2004-04-21
9
Medium Priority
?
194 Views
Last Modified: 2010-04-05
Hi all. I have several SQL tables queried frequently. Can I do anything to store them in memory, not on my hard disk? This slows me down greatly.
0
Comment
Question by:hls1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 

Expert Comment

by:ben_afferson
ID: 10883039
Yeap, I’m interested too. I use tables to store preferences in most of my projects. RAM forever! :)
0
 

Accepted Solution

by:
eagle20001 earned 100 total points
ID: 10883053
The answer is simple – www.componentAce.com with their great product aka Absolute Database. The guys have developed something cool, I tell you. You’ll never regret that you work with it!
0
 

Expert Comment

by:mrnov1
ID: 10883067
AFAIK many DMS optimize most popular queries.
0
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

 
LVL 11

Assisted Solution

by:shaneholmes
shaneholmes earned 100 total points
ID: 10883084
Borland has an example of implementing in-memory tables:

http://info.borland.com/devsupport/bde/delphifiles.html

In-Memory table example with source (Updated 02/17/98, Size 230,760 bytes)

In-Memory table example with source (Package Version) (Size 15,422 bytes)

In-Memory table example with source (Packaged EXE) (Size 22,528 bytes)
This examples takes a table, places all the information into an in-memory table, and then displays all the information in a string grid.

Hope this helps!

Shane
0
 

Expert Comment

by:eagle20001
ID: 10883085
AbsDB does it better, I’ve checked. More than +150% in performance.
0
 
LVL 11

Expert Comment

by:shaneholmes
ID: 10883182
How do I implement In-memory table?

http://www.experts-exchange.com/Programming/Programming_Languages/Delphi/Q_20068246.html?query=memory+tables&searchType=topic

Search on the Delphi Super Page (http://delphi.icm.edu.pl/ or the mirror http://sunsite.informatik.rwth-aachen.de/delphi/) for the Memory table component. I believe there's a MemoryTable component there. I just can't find it now... (But I'll keep on looking...)

There's a way to implement your own version, btw, but it requires the BDE and knowledge of the BDE API. Or you start at the lowest point: TDataset and create your own TDataset-compatible component. Both are harder than just finding this existing component... ^_^
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question