The developerWorks tutorial "Locking down your PHP applications" (see Resources) talks about SQL injections: the art of sending malformed data to a database to cause harm or unwarranted access.
In short, locking is the means by which data integrity can be maintained when two or more application processes simultaneously request access to the same data.
Document libraries appear as network places in the Windows Explorer, giving you easy access to document management functions such as locking, versioning, and editing.
The initial version of the script contains the local baseline for a queue manager, such as setting the dead queue, locking down remote administrative access, and tuning channels.
I mean, who doesn't want a product that is easier to use, has less locking contention, minimizes storage administration, makes access to administrative data easier, and so on?
As mentioned previously, the EJB components control the access to the back-end data and manage the current transactions and database locking internally.
This article Outlines the locking behavior of the DB2 UDB data movement utilities, and provides an overview of how concurrent access to data is managed while these utilities are running.
Pessimistic session locking should be used with great discretion, as it serializes access to data across a business process that includes user think time.
You might have some ideas about using file locking or other operating system-specific tricks to synchronize access to a file in a distributed environment.
This locking was done for both index scans and table access whether or not the row of data was committed or whether it would have been excluded based on the statement's predicates.