Last month's article introduced transactions. In order for a transaction to meet the requirements of ACID, locks are employed to insure data integrity and multi-user access. This month, we will begin by introducing several different types of lock modes employed by MS SQL.

This story continues at http://www.databasejournal.com/featu...le.php/3530811