When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Block contention - Wikipedia

    en.wikipedia.org/wiki/Block_contention

    To reduce contention for table blocks due to delete, select or update statements, reduce the number of rows per block. This can be done by using a smaller block size. To reduce contention for table blocks due to insert statements, increase the number of freelists, or buffer frames.

  3. Two-phase locking - Wikipedia

    en.wikipedia.org/wiki/Two-phase_locking

    In databases and transaction processing, two-phase locking (2PL) is a pessimistic concurrency control method that guarantees conflict-serializability. [1] [2] It is also the name of the resulting set of database transaction schedules (histories).

  4. Double-checked locking - Wikipedia

    en.wikipedia.org/wiki/Double-checked_locking

    In software engineering, double-checked locking (also known as "double-checked locking optimization" [1]) is a software design pattern used to reduce the overhead of acquiring a lock by testing the locking criterion (the "lock hint") before acquiring the lock. Locking occurs only if the locking criterion check indicates that locking is required.

  5. Optimistic concurrency control - Wikipedia

    en.wikipedia.org/wiki/Optimistic_concurrency_control

    Optimistic concurrency control (OCC), also known as optimistic locking, is a non-locking concurrency control method applied to transactional systems such as relational database management systems and software transactional memory. OCC assumes that multiple transactions can frequently complete without interfering with each other.

  6. Record locking - Wikipedia

    en.wikipedia.org/wiki/Record_locking

    Record locking is the technique of preventing simultaneous access to data in a database, to prevent inconsistent results.. The classic example is demonstrated by two bank clerks attempting to update the same bank account for two different transactions.

  7. Isolation (database systems) - Wikipedia

    en.wikipedia.org/wiki/Isolation_(database_systems)

    Isolation is typically enforced at the database level. However, various client-side systems can also be used. It can be controlled in application frameworks or runtime containers such as J2EE Entity Beans [2] On older systems, it may be implemented systemically (by the application developers), for example through the use of temporary tables.

  8. Distributed lock manager - Wikipedia

    en.wikipedia.org/wiki/Distributed_lock_manager

    A lock value block is associated with each resource. This can be read by any process that has obtained a lock on the resource (other than a null lock) and can be updated by a process that has obtained a protected update or exclusive lock on it. It can be used to hold any information about the resource that the application designer chooses.

  9. Berkeley DB - Wikipedia

    en.wikipedia.org/wiki/Berkeley_DB

    Starting with the 6.0.21 (Oracle 12c) release, all Berkeley DB products are licensed under the GNU AGPL. [ 8 ] [ 9 ] Previously, Berkeley DB was redistributed under the 4-clause BSD license (before version 2.0), and the Sleepycat Public License, which is an OSI -approved open-source license as well as an FSF -approved free software license .