Overview
•
Transactions
•
Implementation techniques
•
Weak isolation issues
–
Explicit use of low levels
–
Use of replicas
–
Snapshot isolation