Even folks who suspect they aren’t journal users are likely to be - - which may come as somewhat of a surprise. That’s because there’s a subtle variety of journaling which kicks in behind the scenes if the operating system suspects that your database keyed access paths are bigger than a breadbox. This normally clandestine form of journaling often uses hidden journal receivers. Not all access paths (you may know them better as SQL indexes and/or Keyed Logical Files) have such ...

REGISTER NOW TO ACCESS THIS ARTICLE

All registered users get access to premium content on iPro Developer for free.

Already registered? here.