In the last entry posted to this blog , I described the mechanisms (including PUNC bits and commit log sequence numbers, aka CLSNs) used by Db2 for z/OS for lock avoidance purposes (lock avoidance here refers to a capability whereby Db2 can, in many cases, verify the committed state of a data value without having to get an S-lock – i.e., a read lock – on the page or row in which the value is located). As lock and unlock requests consume CPU cycles, lock avoidance is a CPU efficiency booster for Db2 …read more
Related Articles
Common misconception about how Oracle handles deadlocks
Introduction In today's blog post, I'd like to uncover a common misconception about how Oracle handles deadlocks, but first let's talk about what deadlock is. Deadlock is a locking scenario that occur...
Data modeling tools: a comparison for enterprise vs department use
In a prior blog, I examined data modeling and data modeling tools at a very high level. I answered basic questions such as what is data modeling, why should I care, and what capabilities should data m...
New connection interface in Toad Data Point v3.5
Learn about the new connection interface in Toad Data Point v3.5....
