Apache ShardingSphere 5.0.0-alpha Document
misconception that ShardingSphere uploads a large amount of meaningless data to the memory and has the risk of memory overflow. Actually, it can be known from the principle of stream merger, only memory group‐by after the scaling is completed. Advantages: 1. No effect for origin data during scaling. 2. No risk for scaling failure. 3. No limited by sharding strategies. 3.5. Scaling 80 Apache ShardingSphere secu‐ rity department. When the encryption scenario changes, the encryption system often faces the risk of reconstruction or modification. In addition, for the online business system, it is relatively0 码力 | 311 页 | 2.09 MB | 1 年前3Apache ShardingSphere 5.4.1 Document
secu‐ rity department. When the encryption scenario changes, the encryption system often faces the risk of reconstruction or modification. In addition, for the online business system, it is relatively relatively complex to realize seamless encryption transformation with transparency, security and low risk without modifying the business logic and SQL. 8.7.3 Goal Provides a security and transparent data encryption reuse. When the masking scenario changes, the masking function maintained by itself often faces the risk of refactoring or modification. 8.8.3 Goal According to industry needs for data masking and the0 码力 | 572 页 | 3.73 MB | 1 年前3Apache ShardingSphere v5.5.0 document
secu‐ rity department. When the encryption scenario changes, the encryption system often faces the risk of reconstruction or modification. In addition, for the online business system, it is relatively relatively complex to realize seamless encryption transformation with transparency, security and low risk without modifying the business logic and SQL. 8.7.3 Goal Provides a security and transparent data encryption reuse. When the masking scenario changes, the masking function maintained by itself often faces the risk of refactoring or modification. 8.8.3 Goal According to industry needs for data masking and the0 码力 | 602 页 | 3.85 MB | 1 年前3Apache ShardingSphere 5.0.0 Document
secu‐ rity department. When the encryption scenario changes, the encryption system often faces the risk of reconstruction or modification. In addition, for the online business system, it is relatively relatively complex to realize seamless encryption transformation with transparency, security and low risk without modifying the business logic and SQL. 4.7.3 Goal Provides a security and transparent data encryption misconception that ShardingSphere uploads a large amount of meaningless data to the memory and has the risk of memory overflow. Actually, it can be known from the principle of stream merger, only memory group‐by0 码力 | 403 页 | 3.15 MB | 1 年前3Apache ShardingSphere 5.1.1 Document
secu‐ rity department. When the encryption scenario changes, the encryption system often faces the risk of reconstruction or modification. In addition, for the online business system, it is relatively relatively complex to realize seamless encryption transformation with transparency, security and low risk without modifying the business logic and SQL. 4.8. Encryption 58 Apache ShardingSphere document, v5.1 misconception that ShardingSphere uploads a large amount of meaningless data to the memory and has the risk of memory overflow. Actually, it can be known from the principle of stream merger, only memory group‐by0 码力 | 458 页 | 3.43 MB | 1 年前3Apache ShardingSphere 5.2.0 Document
secu‐ rity department. When the encryption scenario changes, the encryption system often faces the risk of reconstruction or modification. In addition, for the online business system, it is relatively relatively complex to realize seamless encryption transformation with transparency, security and low risk without modifying the business logic and SQL. 3.8.3 Goal Provides a security and transparent data encryption misunderstand that ShardingSphere uploads a large amount of meaningless data to the memory and has the risk of memory overflow. Actually, it can be known from the principle of stream merger that only memory0 码力 | 483 页 | 4.27 MB | 1 年前3Apache ShardingSphere 5.2.1 Document
secu‐ rity department. When the encryption scenario changes, the encryption system often faces the risk of reconstruction or modification. In addition, for the online business system, it is relatively relatively complex to realize seamless encryption transformation with transparency, security and low risk without modifying the business logic and SQL. 3.8. Encryption 44 Apache ShardingSphere document, v5.2 misunderstand that ShardingSphere uploads a large amount of meaningless data to the memory and has the risk of memory overflow. Actually, it can be known from the principle of stream merger that only memory0 码力 | 523 页 | 4.51 MB | 1 年前3Apache ShardingSphere 5.1.2 Document
secu‐ rity department. When the encryption scenario changes, the encryption system often faces the risk of reconstruction or modification. In addition, for the online business system, it is relatively relatively complex to realize seamless encryption transformation with transparency, security and low risk without modifying the business logic and SQL. 4.8. Encryption 60 Apache ShardingSphere document, v5.1 misconception that ShardingSphere uploads a large amount of meaningless data to the memory and has the risk of memory overflow. Actually, it can be known from the principle of stream merger, only memory group‐by0 码力 | 503 页 | 3.66 MB | 1 年前3Mybatis 3.3.0 中文用户指南
different entities in the same row hence this may result in undesired mappings. To understand the risk have a look at the following sample:0 码力 | 98 页 | 2.03 MB | 1 年前3
共 9 条
- 1