firebird 40 language reference. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481 Table of Contents 10 8.11. Cryptographic Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . type; non-string or non-binary types are converted to string hash Cryptographic hash algorithm to apply CRYPT_HASH returns a cryptographic hash calculated from the input argument using the specified algorithm Functions 439 • The MD5 and SHA1 algorithms are not recommended for security purposes due to known attacks to generate hash collisions. These two algorithms are provided for backward-compatibility0 码力 | 778 页 | 3.43 MB | 1 年前3
The Vitess 6.0 Documentation/101_initial_cluster.sh Code Reviews Every GitHub pull request must go through a code review and get approved before it will be merged into the master branch. What to look for in a Review Both authors and Me) Merging a Pull Request The Vitess team will merge your pull request after the PR has been approved and CI tests have passed. GitHub Workflow If you are new to Git and GitHub, we recommend to read function where the input value yields itself as the keyspace id. However, one could also choose other algorithms like hashing or mod functions. Vitess supports the concept of a lookup vindex, or what is also0 码力 | 210 页 | 846.79 KB | 1 年前3
The Vitess 5.0 Documentation/101_initial_cluster.sh Code Reviews Every GitHub pull request must go through a code review and get approved before it will be merged into the master branch. What to look for in a Review Both authors and Me) Merging a Pull Request The Vitess team will merge your pull request after the PR has been approved and CI tests have passed. GitHub Workflow If you are new to Git and GitHub, we recommend to read parallel. The lists of query-parts generated by the shards are merged and returned to the caller. Two algorithms are supported: EQUAL_SPLITS If this algorithm is selected then only the first ‘split_column’ given0 码力 | 206 页 | 875.06 KB | 1 年前3
VMware Greenplum v6.19 Documentationwill use legacy hash operators when loading the data. This is because Greenplum 6 has new hash algorithms that map distribution keys to segments, but the data in the backup set must be restored to the performance than an asymmetric scheme and should be used when the key can be shared safely. Use cryptographic functions to encrypt data on disk. The data is encrypted and decrypted in the database process PGP encryption functions to compress data before encrypting. When compiled with OpenSSL, more algorithms will be available. Because pgcrypto functions run inside the database server, the data and passwords0 码力 | 1972 页 | 20.05 MB | 1 年前3
VMware Tanzu Greenplum v6.20 Documentationwill use legacy hash operators when loading the data. This is because Greenplum 6 has new hash algorithms that map distribution keys to segments, but the data in the backup set must be restored to the performance than an asymmetric scheme and should be used when the key can be shared safely. Use cryptographic functions to encrypt data on disk. The data is encrypted and decrypted in the database process PGP encryption functions to compress data before encrypting. When compiled with OpenSSL, more algorithms will be available. Because pgcrypto functions run inside the database server, the data and passwords0 码力 | 1988 页 | 20.25 MB | 1 年前3
VMware Greenplum 6 Documentationperformance improvements as you only need to return the columns of interest to you. All compression algorithms can be used with either row or column-oriented tables, but Run-Length Encoded (RLE) compression will use legacy hash operators when loading the data. This is because Greenplum 6 has new hash algorithms that map distribution keys to segments, but the data in the backup set must be restored to the PGP encryption functions to compress data before encrypting. When compiled with OpenSSL, more algorithms will be available. Because pgcrypto functions run inside the database server, the data and passwords0 码力 | 2445 页 | 18.05 MB | 1 年前3
VMware Greenplum 6 Documentationperformance improvements as you only need to return the columns of interest to you. All compression algorithms can be used with either row or column-oriented tables, but Run-Length Encoded (RLE) compression will use legacy hash operators when loading the data. This is because Greenplum 6 has new hash algorithms that map distribution keys to segments, but the data in the backup set must be restored to the PGP encryption functions to compress data before encrypting. When compiled with OpenSSL, more algorithms will be available. Because pgcrypto functions run inside the database server, the data and passwords0 码力 | 2374 页 | 44.90 MB | 1 年前3
VMware Tanzu Greenplum v6.23 Documentationperformance improvements as you only need to return the columns of interest to you. All compression algorithms can be used with either row or column-oriented tables, but Run-Length Encoded (RLE) compression will use legacy hash operators when loading the data. This is because Greenplum 6 has new hash algorithms that map distribution keys to segments, but the data in the backup set must be restored to the PGP encryption functions to compress data before encrypting. When compiled with OpenSSL, more algorithms will be available. Because pgcrypto functions run inside the database server, the data and passwords0 码力 | 2298 页 | 40.94 MB | 1 年前3
VMware Greenplum v6.25 Documentationperformance improvements as you only need to return the columns of interest to you. All compression algorithms can be used with either row or column-oriented tables, but Run-Length Encoded (RLE) compression will use legacy hash operators when loading the data. This is because Greenplum 6 has new hash algorithms that map distribution keys to segments, but the data in the backup set must be restored to the allows PGP encryption functions to compress data before encrypting. When compiled with OpenSSL, more algorithms will be available. VMware Greenplum 6 Documentation VMware, Inc. 508 Because pgcrypto functions0 码力 | 2400 页 | 18.02 MB | 1 年前3
VMware Tanzu Greenplum 6 Documentationperformance improvements as you only need to return the columns of interest to you. All compression algorithms can be used with either row or column-oriented tables, but Run-Length Encoded (RLE) compression will use legacy hash operators when loading the data. This is because Greenplum 6 has new hash algorithms that map distribution keys to segments, but the data in the backup set must be restored to the PGP encryption functions to compress data before encrypting. When compiled with OpenSSL, more algorithms will be available. Because pgcrypto functions run inside the database server, the data and passwords0 码力 | 2311 页 | 17.58 MB | 1 年前3
共 160 条
- 1
- 2
- 3
- 4
- 5
- 6
- 16













