WFS必须是一个支持数据分区功能(DPF)的系统。
The WFS must be a data partitioning feature (DPF) enabled system.
在具有数据分区功能的联邦系统中,只能定义用户维护的MQT。
In a federated system with the data partitioning feature, you can only define user-maintained MQTs. Here is the process for defining and using user-maintained MQTs.
在具有数据分区功能的联邦系统中,对于昵称只支持用户维护的MQT。
In a federated system with the data partitioning feature, only user-maintained MQTs are supported for nicknames.
除了索引外,Design Advisor还提供关于物化查询表(MQT)、多维集群表(MDC)和数据分区功能(DataPartitioning Feature,DPF)分区键的建议。
The Design Advisor now provides advice on materialized query tables (MQTs), multidimensional clustering tables (MDCs), and Data partitioning Feature (DPF) partitioning keys, in addition to indexes.
分区策略必须借助功能分割或水平分区来支持底层数据库的水平扩展。
Partitioning strategies must support scaling out of the underlying databases, usually by functional segmentation or horizontal partitioning.
使用splitter功能将数据卸载到预分区文件来为并行加载做准备,轻松地将数据迁移到分区数据库或数据仓库。
Easily migrate data to a partitioned database or warehouse using the splitter function to unload into pre-split files ready for parallel loading.
企业版通过高级审计和透明数据加密功能为其增加了更高的安全性,还添加了拥有ColumnStore的数据仓库、压缩、以及分区。
The Enterprise edition adds more security through advanced auditing and transparent data encryption, and data warehousing with ColumnStore, compression, and partitioning.
首先,必须配置数据库使用具有两个或更多节点的DB 2DPF分区功能。
First, you must configure your databases to use DB2 DPF partitioning with two or more nodes. When setting up DB2 DPF, you should select a partitioning key that meets the following requirements.
具有全屏漫游、分区显示不同画面功能,能根据网络拓扑结构数据显示系统实时运行方式。
It has the entire screen roam and district display different menu function, it Can display the system real-time movement way according to the network topology data.
当保护功能被激活,该分区对于操作系统来说是隐形的,并且被敏感数据占用的空间将被显示为自由磁盘空间。
Passwords are encrypted and stored in the protected areas of the disk. Owing to this, the protection will work on any computers and can be controlled from any computer.
当保护功能被激活,该分区对于操作系统来说是隐形的,并且被敏感数据占用的空间将被显示为自由磁盘空间。
Passwords are encrypted and stored in the protected areas of the disk. Owing to this, the protection will work on any computers and can be controlled from any computer.
应用推荐