An application lock could not be acquired for materializing views.
无法为具体化视图获取应用程序锁。
In this situation, if no lock is available at the time of the request, the application immediately receives a -911.
在这种情形中,如果请求时没有可用的锁,那么应用程序立刻会接收到- 911。
The locking problems normally indicate some fairly significant concurrency problems in the application that should be dealt with before the lock list parameter is increased.
锁定问题通常表明应用程序中存在一些相当严重的并发性问题,在增大锁列表参数的值之前应当解决这些问题。
In this situation, the application will wait for a lock (if one is not available at the time of the request) until either the lock is granted or until a deadlock occurs.
在这种情形中,应用程序将等待获取锁(如果请求时没有可用的锁),一直到被授予了锁或出现死锁为止。
The lock escalations, lock timeouts and deadlocks will indicate some potential problems in your system or application.
锁升级、锁超时和死锁将表明系统或应用程序中存在某些潜在问题。
A simple example application will help you understand how you can use the JLA to help find areas of lock contention.
一个简单的应用程序示例将帮助您了解如何使用JLA帮助查找锁争用的区域。
When a table holds a Z lock, no concurrent application can read or update data in that table.
当表持有z锁时,任何并发应用程序都不能读取和更新该表中的数据。
The database manager determines which locks to escalate by looking through the lock list for the application and finding the table with the most row locks.
数据库管理器通过查看应用程序的锁列表并查找行锁最多的表,来决定对哪些锁进行升级。
As all rows in the EMPLOYEE table are X-locked by the first transaction, the second application goes into lock wait mode.
由于employee表中的所有行都被第一个事务独占锁定,第二个应用程序进入了锁等待模式。
Thus, the lock contention is significantly reduced in your database, and your application server has shorter and more discrete units of work, which reduces CPU and JVM memory overhead.
因此,您数据库中的锁争用将明显降低,并且您的应用程序服务器具有更短且更分散的工作单元,这将降低CPU和JVM的内存开销。
Without information on what the distribution of lock times will be for a given application, most JVMs are conservative and simply suspend a thread when it fails to acquire a lock.
由于没有指定应用程序的锁定时间分布信息,所以多数JVM 采取保守策略,在得不到锁的时候只是暂挂线程。
When the number of locks held by any one application reaches this percentage of the total lock list size, lock escalation occurs for the locks held by that application.
当任何一个应用程序所持有的锁数量达到整个锁列表大小的这个百分比时,对该应用程序所持有的锁进行锁升级。
The transaction owning the lock belongs to an application executed by user A. The transaction of user B is waiting on that lock.
持有锁的事务属于用户A执行的一个应用程序。 而用户B 的事务正在等待那个锁。
Since pessimistic session locks can be removed as described above, the application that obtained the lock should always check to see if it is still in force before updating data.
如上所述,由于可以删除悲观会话锁,因此获得锁的应用程序始终需要在更新数据之前检测锁是否有效。
Furthermore, a granted lock must not be affected by DB2 transactions within the application.
另外,授予的锁必须不受应用程序中d B2事务的影响。
A lock associates the resource with an application, called the lock owner, to control how other applications can access the same resource.
锁将资源与应用程序(叫做锁拥有者)相关联,以控制其他应用程序对同一资源的访问。
Once you have identified problematic locks, you should rewrite the application to reduce the contention on the lock.
确定问题锁后,您应该重写应用程序来减少该锁的争用。
So the DBA now knows that application 30 is holding the lock on which application 34 is waiting.
所以dba现在知道,应用程序30正持有应用程序34所等待的锁。
The capital W in the FD column indicates that the application has a write lock on the whole file.
FD列中的大写W表示该应用程序具有对整个文件的写锁。
In particular, this feature was driven by the SAP application, but the work is generally applicable to a lock avoidance schemes for a much greater customer base.
特别地,该特性是由SAP应用程序驱动的,但是通常也适用于更多客户的锁避免机制。
The last SQL statement executed by application 30 that is holding the lock was the statement with last anchor ID 60 and last statement ID 1.
持有锁的应用程序30最近执行的SQL语句是最近锚ID60和最近语句 ID1 所标识的 SQL 语句。
Application 2 can establish an IX lock on the table and an X row lock, because the table lock IX is compatible to the IN table lock from A1.
应用程序2可以在表上建立一个IX锁定和一个x行锁定,因为表锁定ix兼容a1的in表锁定。
Stop WebSphere Application Server, since it contains a lock on the database.
停止WebSphereApplicationServer,因为其中包含对数据库的锁定。
Application 1 will execute the export operation and Application 2 will get a lock snapshot while Application 1 is running.
Application1将执行导出操作,Application2将在Application 1运行的同时获得一个锁快照。
With the db2cos with db2pd approach, you would only see the last statement executed by the lock owner's application - in this scenario the query on the EMPLOYEE table.
使用db 2 cos与db 2 pd相结合的方法,只能看到锁持有者的应用程序执行的最后一条语句—在这个场景中是对employee表的查询。
This means that when the JLAGui is started, you will be able to view lock statistics for the lifetime of the application.
这意味着当启动JLAGui 时,您将能够查看整个应用程序生命周期中的锁统计信息。
If a concurrently connected application happens to be holding an incompatible row lock, the import utility pauses until that application commits or rolls back its transaction.
如果一个并发连接的应用程序碰巧持有不兼容的行锁,那么import工具就会暂停,直到该应用程序提交或回滚其事务。
SaaS application architectures which force you to make decisions that lock you into a particular technology stack will compromise the ability of a SaaS application to evolve and adapt.
强制您作出选择并使您锁定到某种特定的技术堆栈,这种SaaS应用程序架构将不利于SaaS应用程序的未来演变和适应能力。
When using CS in application A1, there will be an IS (intent share) table lock.
在应用程序a 1中使用CS时,将有一个IS (intentshare)表锁定。
The Monitor.TryEnter method is used to ensure the application does not wait too long for the lock.
TryEnter方法用来确保应用程序不会为锁等待太久。
应用推荐