The first can be used to find failures, backup procedures and other goodies in the database log. The second can be used to trace heavy UPDATE, DELETE and INSERT transactions in the transaction log of a specific database.
Keep Performing,
News, Personal view and perspective of the software performance field, cloud computing and industry based on my experience