Execution plan retention and reuse

Encapsulation of business rules and policies

Sharing of application logic between applications

Access to database objects that is both secure and niform

Consistent, safe data modification

Network bandwidth conservation

Improved security

Reduced development cost and incr as d r liability

Centralized security, administration, and maint nance for common routines.