login pg soft All of these capabilities are intended to be utilized to lock application-outlined resources, which can be recognized either by a single 64-little bit key price or two 32-little bit crucial values (Observe that both of these key spaces tend not to overlap). If A different session already retains a conflicting lock on the identical