Hacker News new | past | comments | ask | show | jobs | submit login
Analyzing a read-only transaction anomaly under snapshot isolation (01/2016) (schleier-smith.com)
2 points by AkihiroSuda on July 19, 2016 | hide | past | favorite



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: