Welcome to jBASE's new documentation site! Many answers to your questions can be found by searching the Knowledgebase or viewing the jBASE Documentation. We also have a Google Group for peer discussion about jBASE. If you are unable to find the information you are looking for, jBASE Support will be glad to assist in resolving your technical problems. Enjoy and please provide comments and feedback .

How can we help you?

File Integrity


The jBASE hash files systems have been found to provide a very high level of file integrity in comparison to legacy systems. The main reason for this high level of integrity is mainly due to the jBASE hash file design. Each hash file is a separate entity, and as such can only be updated, from jBASE applications, by the relevant database driver.

Other processes or activities such as the spooler, which is well known on some legacy systems for causing file corruption cannot actually directly access the hash file systems and therefore can not cause file corruption. Even updates to hash files can not cause a file corruption problem on another hash file.

Unlike other systems jBASE is not an environment or operating system in itself and so obviates the need to recover from any of kind of jBASE environment failure as such a thing does not exist.

The only real time jBASE hash files can suffer from file corruption is when the base operating system fails completely. Even in these situations it is highly likely that actual file corruption has been avoided if the hash files were correctly sized. The reason being, that file corruption can occur if one memory page has been written to disk, containing a pointer to another memory page and the second memory page did not make it to disk before the system failed. Or as another example, a process was in the middle of writing to a memory mapped file when the system failed. With correctly size files these scenarios should be greatly reduced.

However given that the file is not corrupted does not preclude the fact that updates performed since the last memory flush may be lost. Therefore although the file and its integrity may have survived the system crash the last few updates may well have been casualties.

The following commands can be used to help in the general maintenance of hash files.

Command  Description
displays hash file statistics
check hash file integrity
modifies hash file parameters
resizes hash files
compare hash file contents

Was this article helpful?