
| laptop computers: replication | Server-to-laptop replication for mobile workforces |
| laptop computers: SQL Remote | Server-to-laptop replication for mobile workforces |
| limitations: conflict resolution | Implementing conflict resolution |
| limitations: Enterprise to Enterprise | Limitations for Enterprise to Enterprise replication |
| loading databases | Creating a database from the reload files |
| locking: in a replication system | Design issues overview Design issues overview |
| locking: publication design | Ensuring unique primary keys The primary key pool table Ensuring unique primary keys The primary key pool |
| log management: SQL Remote | Replication system recovery procedures |
| log transfer interface: the Message Agent | Transaction log management |
| LONG BINARY data type: replication | Replication of blobs |
| LONG VARCHAR data type: replication | Replication of blobs |
| LOOP statement: passthrough mode | Operations not replicated in passthrough mode |
| Lotus Notes: SQL Remote | Using message types The VIM message system The VIM message system |
| LTM: SQL Remote | Scanning the transaction log |