Re: [HACKERS] bytea_output output of base64 - Mailing list pgsql-hackers

From Jim Nasby
Subject Re: [HACKERS] bytea_output output of base64
Date
Msg-id 053017e1-ea48-4b80-2935-5680ed3ac74d@BlueTreble.com
Whole thread Raw
In response to Re: [HACKERS] bytea_output output of base64  (Bruce Momjian <bruce@momjian.us>)
Responses Re: [HACKERS] bytea_output output of base64  (Fabien COELHO <coelho@cri.ensmp.fr>)
List pgsql-hackers
On 2/23/17 8:22 PM, Bruce Momjian wrote:
> I was just curious because it seems more compact than hex and many
> exchange formats use it, like SSL certificates and keys.  I know you can
> encode() but I thought it might help make pg_dump output smaller.

It undoubtedly would make pg_dump smaller, though I'm not sure how much 
that's worth since if you care at all about that you'll gzip it.

But, the other thing it might do is speed up COPY, especially on input. 
Some performance tests of that might be interesting.
-- 
Jim Nasby, Data Architect, Blue Treble Consulting, Austin TX
Experts in Analytics, Data Architecture and PostgreSQL
Data in Trouble? Get it in Treble! http://BlueTreble.com
855-TREBLE2 (855-873-2532)



pgsql-hackers by date:

Previous
From: Michael Paquier
Date:
Subject: Re: [HACKERS] Automatic cleanup of oldest WAL segments with pg_receivexlog
Next
From: Robert Haas
Date:
Subject: Re: [HACKERS] Documentation improvements for partitioning