In the last entry posted to this blog , I described the mechanisms (including PUNC bits and commit log sequence numbers, aka CLSNs) used by Db2 for z/OS for lock avoidance purposes (lock avoidance here refers to a capability whereby Db2 can, in many cases, verify the committed state of a data value without having to get an S-lock – i.e., a read lock – on the page or row in which the value is located). As lock and unlock requests consume CPU cycles, lock avoidance is a CPU efficiency booster for Db2 …read more
Related Articles
Create and Automate Pivot Grids in Toad Data Point
This tutorial applies to Toad Data Point 4.3 or later. Summary This tutorial demonstrates how to create a Toad Pivot Grid file and how to use Automation to refresh the pivot grid and generate a repo...
Connection issues when connecting to an iSeries (AS400) database via...
Recently I had a customer who contacted me with the following problem: I have made my data base connection to the iSeries (AS400) and can see my files and library list structure. When I go to access...
Using Toad Edge Preview 2.0.0 with PostgreSQL 10 on Amazon ECS Fargate...
Docker has revolutionized software packaging and running. With Docker, software is packaged as Docker images. Applications are run in lightweight Docker containers. Multiple containers run in isolatio...
