In the last entry posted to this blog , I described the mechanisms (including PUNC bits and commit log sequence numbers, aka CLSNs) used by Db2 for z/OS for lock avoidance purposes (lock avoidance here refers to a capability whereby Db2 can, in many cases, verify the committed state of a data value without having to get an S-lock – i.e., a read lock – on the page or row in which the value is located). As lock and unlock requests consume CPU cycles, lock avoidance is a CPU efficiency booster for Db2 …read more
Related Articles
How a Code Review Tool Can Help You Write Team-friendly PL/SQL [Webcast]
Anyone writing PL/SQL code knows there’s a good chance other team members will have to read, interpret, alter and maintain that code at some point. That’s why it’s so important to use a good code revi...
How To Write a Cross-Database Query
Introduction When writing a normal SQL query, the user is typically working in a SQL authoring program that is connected directly to the RDBMS in which the query will be run. 1 – Simple Client Conn...
Creating or Updating Models from Excel Files
Microsoft Excel is a powerful tool. I think I can say it excels in many areas, but… can it be used for database modeling? Yes and No. As you probably know, Toad Data Modeler introduced support for im...
