Search



Search Results
Displaying 691 to 700 of 4413 total results
https://dev.mysql.com/doc/ndbapi/en/mccj-using-clusterj-annotations.html
The implementation of this interface is created dynamically by ClusterJ at runtime. In ClusterJ (as in JPA), annotations are used to describe how the interface is mapped to tables in a database. The annotation @PersistenceCapable(table="employee") ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-replication-conflict-resolution.html
The NDB$EPOCH() and NDB$EPOCH_TRANS() functions discussed later in this section work by comparing the relative order of replication epochs applied on a primary and secondary NDB Cluster, and do not make use of timestamps. Individual rows read on the ...Some types of conflict resolution supported by NDB Cluster (NDB$OLD(), NDB$MAX(), and NDB$MAX_DELETE_WIN(); NDB$MAX_INS() and NDB$MAX_DEL_WIN_INS()) implement this user-defined column as a “timestamp” column (although its type cannot be TIMESTAMP, as explained later in this ... Requirements Source Column Control Conflict Resolution Control Conflict Resolution ...
https://dev.mysql.com/doc/refman/8.4/en/arithmetic-functions.html
* Multiplication: mysql> SELECT 3*5; -> 15 mysql> SELECT 18014398509481984*18014398509481984.0; -> 324518553658426726783156020576256.0 mysql> SELECT 18014398509481984*18014398509481984; -> out-of-range error The last expression produces an error ...
https://dev.mysql.com/doc/internals/en/x-protocol-notices-notices.html
Global Notices Global Notices are sent by the server in case of events happen that are unrelated to the currently active message sequence: server is shutting down node disconnected from group schema or table dropped binlog events Server Shutting ...
https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-audit.html
MySQL Enterprise Audit enables standard, policy-based monitoring and logging of connection and query activity, providing an auditing and compliance solution for applications that are governed by both internal and external regulatory guidelines.
https://dev.mysql.com/doc/heatwave/en/mys-hwaml-using-an-anomaly-detection-model.html
If enabled, summaries are generated for log segments that are labeled as an anomaly or exceed the value set for the summary_threshold. If a value is set for summary_threshold, any non-anomaly rows that exceed the value of the summary_threshold. Note ...To generate predictions, use the sample data from the two anomaly detection datasets: credit_card_train and ...
https://dev.mysql.com/doc/mysql-ai/9.5/en/mys-ai-aml-using-an-anomaly-detection-model.html
If enabled, summaries are generated for log segments that are labeled as an anomaly or exceed the value set for the summary_threshold. If a value is set for summary_threshold, any non-anomaly rows that exceed the value of the summary_threshold. Note ...To generate predictions, use the sample data from the two anomaly detection datasets: credit_card_train and ...
https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-connect.html
The second method uses RSA key pair-based password exchange over an unencrypted connection. The first method uses the TLS (Transport Layer Security) protocol to establish an encrypted connection. The following procedures assume that mysql clients ...
https://dev.mysql.com/doc/x-devapi-userguide/en/connecting-to-one-of-multiple-hosts.html
You can provide multiple MySQL Router or server endpoints (as host and an optional port, or Unix sockets) when creating a session. You specify a URI-like string which contains multiple hosts, ports, and optional priority. This enables the connector ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-flow-control.html
This approach works well if the total number of writes to the group does not exceed the write capacity of any member in the group. Whenever the size of one of these queues exceeds the user-defined threshold, the throttling mechanism is triggered.
Displaying 691 to 700 of 4413 total results