Encrypt Usage Flags Arguments mode key perm Examples Encrypt This command encrypts inFile using the standard security handler as defined in PDF 32000-1:2008 . If provid...
Transport TCP HTTP Connect Unixdomain QUIC KCP reuseport TLS Transport rpcx can commnunicate via TCP, HTTP Connect, UnixDomain, QUIC and KCP. You can also access rpcx by...
Stemmer override token filter Stemmer override token filter Overrides stemming algorithms, by applying a custom mapping, then protecting these terms from being modified by stem...
Core Concept Logic column Cipher column Assisted query column Like query column Plain column Core Concept Logic column It is used to calculate the encryption and decryptio...
Core Concept Logic column Cipher column Assisted query column Like query column Plain column Core Concept Logic column It is used to calculate the encryption and decryptio...
Apache Druid aggregators based on Apache DataSketches library. Sketches are data structures implementing approximate streaming mergeable algorithms. Sketches can be ingested from...
Variable Hashtable Variable Hashtable At the moment when we lookup variable names in our language we just do a linear search over all of the variables in the environment. This...
Introduction Quick Example Create a user Authenticate a user Create a group Introduction A modern and framework agnostic authorization and authentication package featuring ...
Sorting and Related Functions Sorting Functions Order-Related Functions Sorting Algorithms Sorting and Related Functions Julia has an extensive, flexible API for sorting and...