DB-EnginesInfluxDB: Focus on building software with an easy-to-use serverless, scalable time series platformEnglish
Deutsch
Knowledge Base of Relational and NoSQL Database Management Systemsprovided by solid IT

DBMS > Memcached vs. Microsoft Access vs. Sqrrl

System Properties Comparison Memcached vs. Microsoft Access vs. Sqrrl

Please select another system to include it in the comparison.

Editorial information provided by DB-Engines
NameMemcached  Xexclude from comparisonMicrosoft Access  Xexclude from comparisonSqrrl  Xexclude from comparison
Sqrrl has been acquired by Amazon and became a part of Amazon Web Services. It has been removed from the DB-Engines ranking.
DescriptionIn-memory key-value store, originally intended for cachingMicrosoft Access combines a backend RDBMS (JET / ACE Engine) with a GUI frontend for data manipulation and queries. infoThe Access frontend is often used for accessing other datasources (DBMS, Excel, etc.)Adaptable, secure NoSQL built on Apache Accumulo
Primary database modelKey-value storeRelational DBMSDocument store
Graph DBMS
Key-value store
Wide column store
DB-Engines Ranking infomeasures the popularity of database management systemsranking trend
Trend Chart
Score20.74
Rank#32  Overall
#4  Key-value stores
Score105.40
Rank#11  Overall
#8  Relational DBMS
Websitewww.memcached.orgwww.microsoft.com/­en-us/­microsoft-365/­accesssqrrl.com
Technical documentationgithub.com/­memcached/­memcached/­wikideveloper.microsoft.com/­en-us/­access
DeveloperDanga Interactive infooriginally developed by Brad Fitzpatrick for LiveJournalMicrosoftAmazon infooriginally Sqrrl Data, Inc.
Initial release200319922012
Current release1.6.25, March 20241902 (16.0.11328.20222), March 2019
License infoCommercial or Open SourceOpen Source infoBSD licensecommercial infoBundled with Microsoft Officecommercial
Cloud-based only infoOnly available as a cloud servicenonono
DBaaS offerings (sponsored links) infoDatabase as a Service

Providers of DBaaS offerings, please contact us to be listed.
Implementation languageCC++Java
Server operating systemsFreeBSD
Linux
OS X
Unix
Windows
Windows infoNot a real database server, but making use of DLLsLinux
Data schemeschema-freeyesschema-free
Typing infopredefined data types such as float or datenoyesyes
Secondary indexesnoyesyes
SQL infoSupport of SQLnoyes infobut not compliant to any SQL standardno
APIs and other access methodsProprietary protocolADO.NET
DAO
ODBC
OLE DB
Accumulo Shell
Java API
JDBC
ODBC
RESTful HTTP API
Thrift
Supported programming languages.Net
C
C++
ColdFusion
Erlang
Java
Lisp
Lua
OCaml
Perl
PHP
Python
Ruby
C
C#
C++
Delphi
Java (JDBC-ODBC)
VBA
Visual Basic.NET
Actionscript
C infousing GLib
C#
C++
Cocoa
Delphi
Erlang
Go
Haskell
Java
JavaScript
OCaml
Perl
PHP
Python
Ruby
Smalltalk
Server-side scripts infoStored proceduresnoyes infosince Access 2010 using the ACE-engineno
Triggersnoyes infosince Access 2010 using the ACE-engineno
Partitioning methods infoMethods for storing different data on different nodesnonenoneSharding infomaking use of Hadoop
Replication methods infoMethods for redundantly storing data on multiple nodesnone infoRepcached, a Memcached patch, provides this functionallitynoneselectable replication factor infomaking use of Hadoop
MapReduce infoOffers an API for user-defined Map/Reduce methodsnonoyes
Consistency concepts infoMethods to ensure consistency in a distributed systemImmediate Consistency infoDocument store kept consistent with combination of global timestamping, row-level transactions, and server-side consistency resolution.
Foreign keys infoReferential integritynoyesno
Transaction concepts infoSupport to ensure data integrity after non-atomic manipulations of datanoACID infobut no files for transaction loggingAtomic updates per row, document, or graph entity
Concurrency infoSupport for concurrent manipulation of datayesyesyes
Durability infoSupport for making data persistentnoyes infobut no files for transaction loggingyes
User concepts infoAccess controlyes infousing SASL (Simple Authentication and Security Layer) protocolno infoa simple user-level security was built in till version Access 2003Cell-level Security, Data-Centric Security, Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC)

More information provided by the system vendor

We invite representatives of system vendors to contact us for updating and extending the system information,
and for displaying vendor-provided information such as key customers, competitive advantages and market metrics.

Related products and services

We invite representatives of vendors of related products to contact us for presenting information about their offerings here.

More resources
MemcachedMicrosoft AccessSqrrl
DB-Engines blog posts

Redis extends the lead in the DB-Engines key-value store ranking
3 February 2014, Matthias Gelbmann

New DB-Engines Ranking shows the popularity of database management systems
3 October 2012, Matthias Gelbmann, Paul Andlinger

show all

MS Access drops in DB-Engines Ranking
2 May 2013, Paul Andlinger

Microsoft SQL Server regained rank 2 in the DB-Engines popularity ranking
3 December 2012, Matthias Gelbmann

New DB-Engines Ranking shows the popularity of database management systems
3 October 2012, Matthias Gelbmann, Paul Andlinger

show all

Recent citations in the news

Why DDoS Threat Actors Are Shifting Their Tactics
15 March 2024, Infosecurity Magazine

Ubuntu 24.04 Helping Achieve Greater Performance On Intel Xeon Scalable Emerald Rapids
8 March 2024, Phoronix

What are memcached servers, and why are they being used to launch record-setting DDoS attacks?
6 March 2018, GeekWire

Memcached DDoS: The biggest, baddest denial of service attacker yet
1 March 2018, ZDNet

Why Redis beats Memcached for caching
14 September 2017, InfoWorld

provided by Google News

Abusing Microsoft Access "Linked Table" Feature to Perform NTLM Forced Authentication Attacks
9 November 2023, Check Point Research

MS access program to increase awareness and independence of those living with MS and disability
10 July 2023, Nebraska Medicine

Hackers Exploit Microsoft Access Feature to Steal Windows User’s NTLM Tokens
11 November 2023, CybersecurityNews

After installing Navisworks, Office 2016 (32-bit) applications stopped launching
8 October 2023, Autodesk Redshift

ACCDE File (What It Is and How to Open One)
27 July 2023, Lifewire

provided by Google News

Amazon acquires cybersecurity startup Sqrrl
8 June 2023, cisomag.com

Amazon's cloud business acquires Sqrrl, a security start-up with NSA roots
23 January 2018, CNBC

Millennials possess the advantage of time for wealth creation, says Yashoraj Tyagi of Sqrrl | Mint
18 September 2023, Mint

AWS beefs up threat detection with Sqrrl acquisition
24 January 2018, TechCrunch

Will Amazon Buy Cybersecurity Firm Sqrrl?
18 December 2017, PYMNTS.com

provided by Google News



Share this page

Featured Products

Datastax Astra logo

Bring all your data to Generative AI applications with vector search enabled by the most scalable
vector database available.
Try for Free

Milvus logo

Vector database designed for GenAI, fully equipped for enterprise implementation.
Try Managed Milvus for Free

AllegroGraph logo

Graph Database Leader for AI Knowledge Graph Applications - The Most Secure Graph Database Available.
Free Download

Ontotext logo

GraphDB allows you to link diverse data, index it for semantic search and enrich it via text analysis to build big knowledge graphs. Get it free.

Neo4j logo

See for yourself how a graph database can make your life easier.
Use Neo4j online for free.

Present your product here