Chena Lee

41%
Flag icon
The most common implementation of snapshot isolation requires a monotonically increasing transaction ID.
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
Rate this book
Clear rating
Open Preview