Re: Extending varlena
От | Gregory Williamson |
---|---|
Тема | Re: Extending varlena |
Дата | |
Msg-id | 8B319E5A30FF4A48BE7EEAAF609DB233021F31FE@COMAIL01.digitalglobe.com обсуждение исходный текст |
Ответ на | Extending varlena (David Fetter <david@fetter.org>) |
Список | pgsql-hackers |
<p><font size="2">David Fetter wrote"<br /><br /> <...><br /> ><br /> > > This'd greatly simplify the<br />> > cleanup-dead-objects problem, and we could avoid addressing the<br /> > > permissions problem at all, sinceregular SQL permissions on the table<br /> > > would serve fine. But it's not clear what regular SQL fetch andupdate<br /> > > behaviors should be like for such a thing. (Fetching or storing the<br /> > > whole blobvalue is right out, IMHO.) ISTR hearing of concepts roughly<br /> > > like this in other DBs --- does it ringa bell for anyone?<br /> ><br /> > Informix has some pretty good blob-handling:<br /> ><br /> > <a href="http://publib.boulder.ibm.com/infocenter/idshelp/v10/index.jsp?topic=/com.ibm.sqlr.doc/sqlrmst101.htm">http://publib.boulder.ibm.com/infocenter/idshelp/v10/index.jsp?topic=/com.ibm.sqlr.doc/sqlrmst101.htm</a><br />><br /><br /> Agreed. I used Informix a few years back in a system that scanned both sides of multi-page financial documents;we stored them in Informix' blobs, which IIRC could be tuned to be given number of bytes. We found that 90% ofour images fit in a given size and since Informix raw disk access let them move up the whole blob in a single pass, itwas quite fast, and gave us all the warmth and fuzziness of ACID functionality. But we didn't fetch parts of the BLOB --metadata lived in its own table. There is/was an Illustra/Informix blade which let you in theory do some processing ofimages (indexing) but that seems like a very specialized case.<br /><br /> Greg Williamson<br /> Senior DBA<br /> DigitalGlobe<br/><br /> Confidentiality Notice: This e-mail message, including any attachments, is for the sole use of theintended recipient(s) and may contain confidential and privileged information and must be protected in accordance withthose provisions. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intendedrecipient, please contact the sender by reply e-mail and destroy all copies of the original message.<br /><br />(My corporate masters made me say this.)<br /></font>
В списке pgsql-hackers по дате отправления: