PostgreSQL 8.1.11 Documentation
the integer itself will sign-extend on the left. 9.7. Pattern Matching There are three separate approaches to pattern matching provided by PostgreSQL: the traditional SQL LIKE operator, the more recent 2 Thomas Thai (), 2001-11-20 1.5W NetBSD MIPS 7.2.1 Warwick Hunter ( agile.tv>), 2002-06-13 1.5.3 NetBSD PowerPC 7.2 Bill Studenmund ( ), 2001-11-28 1 conf file after running initdb, before you start the server for the first time. (Other reasonable approaches include using ident authentication or file system permissions to restrict connections. See Chapter 0 码力 | 1582 页 | 12.19 MB | 1 年前3PostgreSQL 8.1 Documentation
the integer itself will sign-extend on the left. 9.7. Pattern Matching There are three separate approaches to pattern matching provided by PostgreSQL: the traditional SQL LIKE operator, the more recent 2 Thomas Thai (), 2001-11-20 1.5W NetBSD MIPS 7.2.1 Warwick Hunter ( agile.tv>), 2002-06-13 1.5.3 NetBSD PowerPC 7.2 Bill Studenmund ( ), 2001-11-28 1 conf file after running initdb, before you start the server for the first time. (Other reasonable approaches include using ident authentication or file system permissions to restrict connections. See Chapter 0 码力 | 1548 页 | 11.54 MB | 1 年前3PostgreSQL 8.0 Documentation
the integer itself will sign-extend on the left. 9.7. Pattern Matching There are three separate approaches to pattern matching provided by PostgreSQL: the traditional SQL LIKE operator, the more recent 2 Thomas Thai (), 2001-11-20 1.5W NetBSD MIPS 7.2.1 Warwick Hunter ( agile.tv>), 2002-06-13 1.5.3 NetBSD PowerPC 7.2 Bill Studenmund ( ), 2001-11-28 1 conf file after running initdb, before you start the server for the first time. (Other reasonable approaches include using ident authentication or file system permissions to restrict connections. See Chapter 0 码力 | 1422 页 | 9.92 MB | 1 年前3PostgreSQL 8.0 Documentation
the integer itself will sign-extend on the left. 9.7. Pattern Matching There are three separate approaches to pattern matching provided by PostgreSQL: the traditional SQL LIKE operator, the more recent 2 Thomas Thai (), 2001-11-20 1.5W NetBSD MIPS 7.2.1 Warwick Hunter ( agile.tv>), 2002-06-13 1.5.3 NetBSD PowerPC 7.2 Bill Studenmund ( ), 2001-11-28 1 conf file after running initdb, before you start the server for the first time. (Other reasonable approaches include using ident authentication or file system permissions to restrict connections. See Chapter 0 码力 | 1332 页 | 9.76 MB | 1 年前3PostgreSQL 8.2 Documentation
the integer itself will sign-extend on the left. 9.7. Pattern Matching There are three separate approaches to pattern matching provided by PostgreSQL: the traditional SQL LIKE operator, the more recent Installation Instructions OS Processor Version Reported Remarks NetBSD MIPS 7.2.1 Warwick Hunter (agile.tv>), 2002-06-13 1.5.3 NetBSD PowerPC 7.2 Bill Studenmund ( ), 2001-11-28 1 conf file after running initdb, before you start the server for the first time. (Other reasonable approaches include using ident authentication or file system permissions to restrict connections. See Chapter 0 码力 | 1762 页 | 5.43 MB | 1 年前3PostgreSQL 8.2 Documentation
the integer itself will sign-extend on the left. 9.7. Pattern Matching There are three separate approaches to pattern matching provided by PostgreSQL: the traditional SQL LIKE operator, the more recent Installation Instructions OS Processor Version Reported Remarks NetBSD MIPS 7.2.1 Warwick Hunter (agile.tv>), 2002-06-13 1.5.3 NetBSD PowerPC 7.2 Bill Studenmund ( ), 2001-11-28 1 conf file after running initdb, before you start the server for the first time. (Other reasonable approaches include using ident authentication or file system permissions to restrict connections. See Chapter 0 码力 | 1748 页 | 13.12 MB | 1 年前3The Vitess 9.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 The various approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The variables and end-points need to reflect these changes. In previous discussions, alternate approaches that did not require a TabletServer refactor were suggested. Given that the TabletServer refactor “dont_serve” code path. But this needs to be fixed for future-proofing. Many approaches were discussed in #6645. Those approaches are all non-viable because they don’t address all of the above concerns.0 码力 | 417 页 | 2.96 MB | 1 年前3The Vitess 11.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 The various approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The variables and end-points need to reflect these changes. In previous discussions, alternate approaches that did not require a TabletServer refactor were suggested. Given that the TabletServer refactor “dont_serve” code path. But this needs to be fixed for future-proofing. Many approaches were discussed in #6645. Those approaches are all non-viable because they don’t address all of the above concerns.0 码力 | 481 页 | 3.14 MB | 1 年前3The Vitess 10.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392 The various approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The variables and end-points need to reflect these changes. In previous discussions, alternate approaches that did not require a TabletServer refactor were suggested. Given that the TabletServer refactor “dont_serve” code path. But this needs to be fixed for future-proofing. Many approaches were discussed in #6645. Those approaches are all non-viable because they don’t address all of the above concerns.0 码力 | 455 页 | 3.07 MB | 1 年前3The Vitess 12.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468 The various approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The variables and end-points need to reflect these changes. In previous discussions, alternate approaches that did not require a TabletServer refactor were suggested. Given that the TabletServer refactor “dont_serve” code path. But this needs to be fixed for future-proofing. Many approaches were discussed in #6645. Those approaches are all non-viable because they don’t address all of the above concerns.0 码力 | 534 页 | 3.32 MB | 1 年前3
共 89 条
- 1
- 2
- 3
- 4
- 5
- 6
- 9