beautypg.com

Safe programming techniques, Unsafe programming techniques, Suspect programming techniques – IBM Transaction Server OS User Manual

Page 22: Avoiding the effects of transaction affinity

Safe programming techniques, Unsafe programming techniques, Suspect programming techniques | Avoiding the effects of transaction affinity | IBM Transaction Server OS User Manual | Page 22 / 103 Safe programming techniques, Unsafe programming techniques, Suspect programming techniques | Avoiding the effects of transaction affinity | IBM Transaction Server OS User Manual | Page 22 / 103