Overview
•Transactions
•Implementation techniques
•Weak isolation issues
–Explicit use of low levels
–Use of replicas
–Snapshot isolation