When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Record locking - Wikipedia

    en.wikipedia.org/wiki/Record_locking

    Record locking is the technique of preventing simultaneous access to data in a database, to prevent inconsistent results. The classic example is demonstrated by two bank clerks attempting to update the same bank account for two different transactions. Clerks 1 and 2 both retrieve (i.e., copy) the account's record. Clerk 1 applies and saves a ...

  3. Block contention - Wikipedia

    en.wikipedia.org/wiki/Block_contention

    To reduce contention for table blocks due to delete, select or update statements, reduce the number of rows per block. This can be done by using a smaller block size. To reduce contention for table blocks due to insert statements, increase the number of freelists, or buffer frames.

  4. Multiversion concurrency control - Wikipedia

    en.wikipedia.org/wiki/Multiversion_concurrency...

    A structure to hold a record for a database using MVCC could look like this in Rust. struct Record { /// Insert transaction identifier stamp. insert_transaction_id : u32 , /// Delete transaction identifier stamp. delete_transaction_id : u32 , /// The length of the data. data_length : u16 , /// The content of the record. data : Vec < u8 > , }

  5. Update (SQL) - Wikipedia

    en.wikipedia.org/wiki/Update_(SQL)

    An SQL UPDATE statement changes the data of one or more records in a table. Either all the rows can be updated, or a subset may be chosen using a condition. The UPDATE statement has the following form: [1] UPDATE table_name SET column_name = value [, column_name = value ...] [WHERE condition]

  6. Isolation (database systems) - Wikipedia

    en.wikipedia.org/wiki/Isolation_(database_systems)

    Isolation is typically enforced at the database level. However, various client-side systems can also be used. It can be controlled in application frameworks or runtime containers such as J2EE Entity Beans [2] On older systems, it may be implemented systemically (by the application developers), for example through the use of temporary tables.

  7. Two-phase locking - Wikipedia

    en.wikipedia.org/wiki/Two-phase_locking

    For 2PL, the only used data-access locks are read-locks (shared locks) and write-locks (exclusive locks). Below are the rules for read-locks and write-locks : A transaction is allowed to read an object if and only if it is holding a read-lock or write-lock on that object.

  8. Merge (SQL) - Wikipedia

    en.wikipedia.org/wiki/Merge_(SQL)

    A relational database management system uses SQL MERGE (also called upsert) statements to INSERT new records or UPDATE or DELETE existing records depending on whether condition matches. It was officially introduced in the SQL:2003 standard, and expanded [citation needed] in the SQL:2008 standard.

  9. Multiple granularity locking - Wikipedia

    en.wikipedia.org/wiki/Multiple_granularity_locking

    For example, a database may have files, which contain pages, which contain records. This can be thought of as a tree of objects, where each node contains its children. A lock on this structure (such as a shared or exclusive lock) locks the targeted node as well as all of its descendants. [1]