VMware Greenplum 7 Documentationessential security requirements fall into the following categories: Authentication covers the mechanisms that are supported and that can be used by the Greenplum database server to establish the identity for storing JSON (JavaScript Object Notation) data: json and jsonb. To implement efficient query mechanisms for these data types, Greenplum Database also provides the jsonpath data type described in jsonpath database objects to be defined. In fact, the built-in objects are implemented using nearly the same mechanisms. This extensibility implies some overhead, for example due to function calls. To reduce that overhead0 码力 | 2221 页 | 14.19 MB | 1 年前3
VMware Greenplum v6.18 DocumentationDocumentation VMware, Inc. 270 plac Command line arguments parser pluggy Plugin and hook calling mechanisms preshed Cython hash table that trusts the keys are pre-hashed protobuf Protocol buffers py Cross-python transparent and easy for administrators to troubleshoot. Segment mirroring and any replication mechanisms in place remain active, so fault-tolerance is uncompromised and disaster recovery measures remain standard fault-tolerance mechanisms—such as segment mirroring—remain active, consistent, and effective. Replication and disaster recovery. Any existing replication mechanisms continue to function during0 码力 | 1959 页 | 19.73 MB | 1 年前3
VMware Greenplum v6.19 Documentationinstalling Python packages plac Command line arguments parser pluggy Plugin and hook calling mechanisms preshed Cython hash table that trusts the keys are pre-hashed protobuf Protocol buffers py Cross-python transparent and easy for administrators to troubleshoot. Segment mirroring and any replication mechanisms in place remain active, so fault-tolerance is uncompromised and disaster recovery measures remain standard fault-tolerance mechanisms—such as segment mirroring—remain active, consistent, and effective. Replication and disaster recovery. Any existing replication mechanisms continue to function during0 码力 | 1972 页 | 20.05 MB | 1 年前3
VMware Greenplum v6.17 Documentationinstalling Python packages plac Command line arguments parser pluggy Plugin and hook calling mechanisms preshed Cython hash table that trusts the keys are pre-hashed protobuf Protocol buffers py Cross-python transparent and easy for administrators to troubleshoot. Segment mirroring and any replication mechanisms in place remain active, so fault-tolerance is uncompromised and disaster recovery measures remain standard fault-tolerance mechanisms—such as segment mirroring—remain active, consistent, and effective. Replication and disaster recovery. Any existing replication mechanisms continue to function during0 码力 | 1893 页 | 17.62 MB | 1 年前3
VMware Tanzu Greenplum v6.20 Documentationinstalling Python packages plac Command line arguments parser pluggy Plugin and hook calling mechanisms preshed Cython hash table that trusts the keys are pre-hashed protobuf Protocol buffers py Cross-python transparent and easy for administrators to troubleshoot. Segment mirroring and any replication mechanisms in place remain active, so fault-tolerance is uncompromised and disaster recovery measures remain standard fault-tolerance mechanisms—such as segment mirroring—remain active, consistent, and effective. Replication and disaster recovery. Any existing replication mechanisms continue to function during0 码力 | 1988 页 | 20.25 MB | 1 年前3
VMware Greenplum 6 DocumentationModule Name Description/Used For plac Command line arguments parser pluggy Plugin and hook calling mechanisms preshed Cython hash table that trusts the keys are pre-hashed protobuf Protocol buffers py Cross-python essential security requirements fall into the following categories: Authentication covers the mechanisms that are supported and that can be used by the Greenplum database server to establish the identity supported. To insert large amounts of data, use external tables or the COPY command. These load mechanisms are more efficient than INSERT for inserting large quantities of rows. See Loading and Unloading0 码力 | 2445 页 | 18.05 MB | 1 年前3
VMware Greenplum 6 Documentationinstalling Python packages plac Command line arguments parser pluggy Plugin and hook calling mechanisms preshed Cython hash table that trusts the keys are pre-hashed protobuf Protocol buffers py Cross-python essential security requirements fall into the following categories: Authentication covers the mechanisms that are supported and that can be used by the Greenplum database server to establish the identity supported. To insert large amounts of data, use external tables or the COPY command. These load mechanisms are more efficient than INSERT for inserting large quantities of rows. See Loading and Unloading0 码力 | 2374 页 | 44.90 MB | 1 年前3
VMware Tanzu Greenplum v6.23 Documentationinstalling Python packages plac Command line arguments parser pluggy Plugin and hook calling mechanisms preshed Cython hash table that trusts the keys are pre-hashed protobuf Protocol buffers py Cross-python essential security requirements fall into the following categories: Authentication covers the mechanisms that are supported and that can be used by the Greenplum database server to establish the identity supported. To insert large amounts of data, use external tables or the COPY command. These load mechanisms are more efficient than INSERT for inserting large quantities of rows. See Loading and Unloading0 码力 | 2298 页 | 40.94 MB | 1 年前3
VMware Tanzu Greenplum 6 Documentationinstalling Python packages plac Command line arguments parser pluggy Plugin and hook calling mechanisms preshed Cython hash table that trusts the keys are pre-hashed protobuf Protocol buffers py Cross-python essential security requirements fall into the following categories: Authentication covers the mechanisms that are supported and that can be used by the Greenplum database server to establish the identity supported. To insert large amounts of data, use external tables or the COPY command. These load mechanisms are more efficient than INSERT for inserting large quantities of rows. See Loading and Unloading0 码力 | 2311 页 | 17.58 MB | 1 年前3
VMware Greenplum v6.25 Documentationinstalling Python packages plac Command line arguments parser pluggy Plugin and hook calling mechanisms preshed Cython hash table that trusts the keys are pre-hashed protobuf Protocol buffers py Cross-python essential security requirements fall into the following categories: Authentication covers the mechanisms that are supported and that can be used by the Greenplum database server to establish the identity supported. To insert large amounts of data, use external tables or the COPY command. These load mechanisms are more efficient than INSERT for inserting large quantities of rows. See Loading and Unloading0 码力 | 2400 页 | 18.02 MB | 1 年前3
共 11 条
- 1
- 2













