In the last entry posted to this blog , I described the mechanisms (including PUNC bits and commit log sequence numbers, aka CLSNs) used by Db2 for z/OS for lock avoidance purposes (lock avoidance here refers to a capability whereby Db2 can, in many cases, verify the committed state of a data value without having to get an S-lock – i.e., a read lock – on the page or row in which the value is located). As lock and unlock requests consume CPU cycles, lock avoidance is a CPU efficiency booster for Db2 …read more
Related Articles
Oracle EBS Suite blank Login page – Post Exadata migration
As part of EBS database migration on Exadata, we recently deployed a brand new Exadata X5-2L (eighth rack), and migrated an Oracle EBS Database from the typical storage/server technologies. Below are...
How to create macro for assign domain to attributes
Toad Data Modeler and its behavior can be easily customized in several ways. One of the ways to customize Toad Data Modeler is by creating a macro. Why would you create a macro? Macros help you auto...
SQL DB now supports 4TB max database size
Azure SQL Database (SQL DB) has increased its max database size from 1TB to 4TB at no additional cost. Customers using P11 and P15 premium performance levels can use up to 4 TB of included storage at...
