Devlive 开源社区 本次搜索耗时 0.596 秒,为您找到 351 个相关结果.
  • S3File

    Support Those Engines Key Features Description Supported DataSource Info Dependency Data Type Mapping JSON File Type Text Or CSV File Type Orc File Type Parquet File Type ...
  • AWS

    5953 2025-03-11 《Apache Iceberg 1.8.1》
    Iceberg AWS Integrations Iceberg provides integration with different AWS services through the iceberg-aws module. This section describes how to use Iceberg with AWS. Enabling ...
  • Acknowledgments

    5935 2024-05-06 《R Markdown Cookbook》
    As usual, first I want to thank my employer RStudio for giving me the freedom to work on this book. Since I started working on it, my weekly meeting time with my manager, Tareef K...
  • OssFile

    Support Those Engines Usage Dependency For Spark/Flink Engine For SeaTunnel Zeta Engine Key features Data Type Mapping JSON File Type Text Or CSV File Type Orc File Type Pa...
  • checkpoint-storage

    Checkpoint Storage Introduction Checkpoint Storage Checkpoint Storage Configuration OSS S3 HDFS LocalFile Enable cache Checkpoint Storage Introduction Checkpoint is a f...
  • GitHub 趋势日报 (2025年05月03日)

    📈 今日整体趋势 Top 10 📊 分语言趋势 Top 5 C++ C Rust PHP Java Dart Python Lua Go HTML Swift Ruby Vim Script TypeScript MDX Markdown JavaScript PowerShell C Shell Dockerfil...
  • JDOQL Typed API

    5794 2024-05-25 《Apache JDO 3.2.1》
    JDOQL Typed API Preparation Using Maven Using Eclipse Query Classes Limitations Filtering Ordering Methods Results Parameters Variables If-Then-Else Subqueries Candida...
  • Distributed services

    5788 2025-03-14 《Redisson 3.45.0》
    Remote service Redisson provides Java Remote Services to execute remote procedure call using Redis or Valkey. Remote interface could have any type of method parameters and result ...
  • FtpFile

    Description Key features Options host [string] port [int] user [string] password [string] path [string] connection_mode [string] custom_filename [boolean] file_name_expres...
  • Config File Encryption And Decryption

    Introduction How to use How to implement user-defined encryption and decryption Introduction In most production environments, sensitive configuration items such as passwords a...