摘要: Transactional isolation is usually implemented by locking whatever is accessed in a transaction. There are two different approaches to transactional l 阅读全文
posted @ 2017-06-20 13:38 许仙儿 阅读(180) 评论(0) 推荐(0) 编辑