In the last entry posted to this blog , I described the mechanisms (including PUNC bits and commit log sequence numbers, aka CLSNs) used by Db2 for z/OS for lock avoidance purposes (lock avoidance here refers to a capability whereby Db2 can, in many cases, verify the committed state of a data value without having to get an S-lock – i.e., a read lock – on the page or row in which the value is located). As lock and unlock requests consume CPU cycles, lock avoidance is a CPU efficiency booster for Db2 …read more
Related Articles
Using Schema Compare with PowerShell in Toad DevOps ToolKit
This video demonstrates the use of the Schema Compare feature in the Toad DevOps Toolkit. The demo covers the basics features and function utilizing PowerShell. Sample script used in this video: Demo_...
Toad for Oracle Data Grid – Why can’t I edit the results of a query in...
Query statements MUST return the ROWID to be updatable. For example: select * from employee where salary > 2000 would not be updatable, whereas: select employee.*, rowid from employee where salary >...
Toad Data Point Tutorials: SQL Table Joins
Introduction SQL table joins are common practice in the relational database world. They are a way of eliminating data redundancy and allowing the user of the data to select what they want from the dat...
