Next Generation Patient Record Locking
which results in significantly improved business productivity -- especially for large employee offices;
Full support for MySQL, DB2, and DB2/400 (the AS/400 version of DB2 from IBM), to include functionality such as record locking
, optimization, and other database-specific features.
Implement the same file protection and record locking
strategies you would use on a non-RAID system.
Compaq Computer Corp claims that Sun Microsystems Inc's recent TPC-C performance record of 115,395 tpmC on a single 64-way StarFire server running a single copy of Oracle indicates that the company can't handle the kind of distributed record locking
it achieves with Tru64 Unix and TruCluster system software.
Implementing record locking
so that large databases can be accessed by multiple users at the same time, is complex on a single server; across multiple servers.
2] provides database record locking
innovation allowing up to six host systems running OS 2200 to access a shared database concurrently -- even down to the same record.
For example, Unix clients running NFSv2 and NFSv3 support only advisory record locking
, while Windows clients running SMB/CIFS support mandatory file and record locks, as well as advisory cache locks.
Optimistic Record Locking
lets multiple users view and edit the same database record, without locking anyone out.
This database record locking
innovation allows up to four host systems running OS 2200 to access a shared database concurrently - even down to the same record.
Unisys Corporation today announced the release of the eXtended Processor Complex - Locking (XPC-L), a database record locking
innovation for multi-host clustered mainframe environments.
The tight integration of these applications enables the sharing of server volumes and printers, as well as file and record locking
to protect against concurrent write access by Macintosh and Windows clients.
The Sidewinder G2 Enterprise Manager's powerful Windows management package supports many advanced features not normally seen in first-release products and builds on the Gauntlet GEMS architecture, including distributed administrator roles with record locking
to mitigate any administration conflicts, and comprehensive audit logs of every database modification that will satisfy even the strictest security audit.