文档章节

2000个软件开发领域的高频特殊词及精选例句(三)

杨尚川
 杨尚川
发布于 2015/03/20 23:05
字数 59727
阅读 135
收藏 0

superword是一个Java实现的英文单词分析软件,主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。

551、单词 ibm 的匹配文本:


  1. The Basic Edition includes HDFS, Hbase, MapReduce, Hive, Mahout, Oozie, Pig, ZooKeeper, Hue, and several other open source tools, as well as a basic version of the IBM installer and data access tools. Professional Hadoop Solutions


  2. In the past two years, Joe has written more than a dozen articles and tutorials for the IBM developerWorks web site, including articles on Adobe Flex, Facebook applications, ExtJS, Adobe AIR, IBM DB2, and more. Beginning CouchDB


  3. Microsoft and IBM have their share of the pie too. HBase in Action


  4. Finally we would like to recognize the generous support of our equipment donors IBM, Intel, and Sun and our funders. The anatomy of a large-scale hypertextual Web search engine


  5. There are Hadoop distributions from the large, established enterprise vendors, including EMC, IBM, Microsoft, and Oracle, as well as from specialist Hadoop companies such as Cloudera, Hortonworks, and MapR. Hadoop:The Definitive Guide 3rd Edition


  6. Our case studies in chapter 12 will describe how companies including New York Times , China Mobile , and IBM are using Hadoop. Hadoop in Action


  7. Of course I’m talking about the Information Management System (IMS) hierarchical database, invented in 1966 at IBM. Cassandra The Definitive Guide


  8. The IBM InfoSphere Big Insights distribution is available at http://www-01.ibm.com/software/data/infosphere/ biginsights/ and (like MapR) offers commercial improvements and extensions to the open source Hadoop core. Hadoop Beginners Guide


  9. Solutions for a category of middleware that provides asynchronous, reliable message queuing such as IBM WebSphere MQ, SonicMQ, TIBCO Rendezvous, and Apache ActiveMQ, commonly used for Enterprise Application Integration (EAI) purposes. ActiveMQ in Action


  10. For example, the following query compares Apple (symbol AAPL) and IBM (symbol IBM) Programming Hive



552、单词 dismax 的匹配文本:


  1. Let's create a dismax query that will combine two queries: a simple term query and a prefix query. Mastering ElasticSearch


  2. The dismax query parser, which is described in a later chapter, makes this easy. Solr 3 Enterprise Search Server


  3. I chose the dismax handler (that's its name defined by the name attribute) Solr 3.1 Cookbook


  4. To do that, run the following query to your Solr instance: http://localhost:8983/solr/select?defType=dismax&pf=title^100&q=20 Apache Solr 4 Cookbook



553、单词 rfc 的匹配文本:


  1. Finally, there are some undocumented properties on the syslog sources that allow for adding additional regular expression matching patterns for messages that do not conform to the RFC standards. Apache Flume Distributed Log Collection for Hadoop


  2. Some of the major goals (expressed in RFC 871[1]) were to achieve: Java Network Programming and Distributed Computing


  3. The bSocket protocol has been standardized by IETF under RFC 6455 Java EE 7 Specification


  4. No matter which CA you use, you'll eventually be sent back the certificate, which will be in RFC 1421 format. Java Security 2nd Edition


  5. A typical example is how the WebSocket protocol is upgraded from HTTP, as described in the Opening Handshake section of RFC 6455 Java EE 7 Essentials


  6. For the format of the HTTP request headers, see RFC 2616 Core Java Volume II Advanced Features 9th Edition


  7. This permits the String to be parsed using the RFC 2045 grammar specifications. Java 7 New Features Cookbook


  8. This command uses the following options: -alias, -file, -keystore, -rfc, -storepass, -storetype, and -v. Java in a Nutshell 5th Edition


  9. Despite the name, a published RFC is a finished work. Java Network Programming 4th Edition


  10. The original specification for JSON can be found in RFC 4627, and it was written by Douglas Crockford. The Definitive Guide to MongoDB



554、单词 modularity 的匹配文本:


  1. Netty’s pipeline and encoder classes encourage modularity by separating serialization and deserialization from application logic. Netty in Action MEAP V08


  2. As it turns out, one of the strong points of Web Flow (which we haven’t really discussed until now) is its support for composition and modularity. Pro Spring MVC


  3. In fact, event-based architectures help to enforce the separation of concerns and modularity that MVC advocates. Testable JavaScript


  4. Strategy Pattern A big part of the pluggability and modularity of the framework is achieved thanks to the wide use of the Strategy pattern. Pro Spring Security


  5. This gives you a simple and useful kind of modularity, so that you can work with very large bodies of code without different parts of the code trampling on each other. Programming in Scala 2nd Edition


  6. Because of their modularity, pure functions are easier to test, to reuse, to parallelize, to generalize, and to reason about. Functional Programming in Scala


  7. We still have to embed the implementation code in the class somehow, compromising modularity. Programming Scala


  8. In contrast, OSGi provides strong modularity support but it’s not xv. Spring Dynamic Modules in Action


  9. On the other hand, most scripting languages lack features that are beneficial for programming complex applications, such as strong typing, encapsulation, and modularity. Core Java Volume II Advanced Features 9th Edition


  10. Object-oriented concurrent programming differs from multithreaded systems programming in languages such as C mainly due to the encapsulation, modularity, extensibility, security, and safety features otherwise lacking in C. Concurrent Programming in Java Design Principles and Pattern



555、单词 coprocessors 的匹配文本:


  1. We have set HBase to use the Kerberos authentication, and HBase coprocessors-based authorization. HBase Administration Cookbook


  2. Here you learn about the latest developments in both HDFS (federation) and HBase new file formats, and coprocessors. Professional Hadoop Solutions


  3. Chapter 5 introduces coprocessors, a mechanism for pushing computation out to your HBase cluster. HBase in Action


  4. Coprocessors Earlier we discussed how you can use filters to reduce the amount of data being sent over the network from the servers to the client. HBase:The Definitive Guide



556、单词 jee 的匹配文本:


  1. JEE-specific web componen and static content like images and CSS files. Gradle in Action


  2. First, you can use Spring to build any application in Java (e.g., stand-alone, Web, JEE applications, etc.), unlike many other frameworks such as Apache Struts, which is limited to web applications. Pro Spring 3


  3. The framework combines best practices for Java Enterprise Edition (JEE) development from the industry and integration with the best-of-breed third-party frameworks. Pro Spring MVC


  4. In this section we will look at an example of how to deploy your Java web or JEE application to an application server such as Tomcat, JBoss, or GlassFish. Jenkins The Definitive Guide


  5. In this respect, Spring is like JEE and even its earlier J2EE incarxvii. Spring in Practice


  6. Bnd scans most of the elements that have attributes relative to class or interface (such as bean@class) in most of the Spring namespaces (beans, aop, context, jee, lang, osgi, util, and webflow-config) Spring Dynamic Modules in Action


  7. That’s understandable considering it’s the predominant Java-based API for messaging and sits among the standards of the Java Enterprise Edition (JEE) Spring Integration in Action


  8. Although J2EE (now known as JEE) was able to catch up with Spring, Spring never stopped moving forward. Spring in Action 4th Edition



557、单词 func 的匹配文本:


  1. The IsUseragentBot class extends the abstract class FilterFunc, which allows us to override the exec(Tuple t) method. Hadoop RealWorld Solutions Cookbook


  2. Note that by-name parameters are implemented as scala.Func tion0 objects. Programming Scala


  3. Discover how to use the REGISTER and DEFINE statements to register and define an alias for your LoadFunc, and how to use your LoadFunc in combination with the LOAD statement. Hadoop in Practice


  4. Filter UDFs are all subclasses of FilterFunc, which itself is a subclass of EvalFunc. Hadoop:The Definitive Guide 3rd Edition


  5. Version 0.7.0 of Pig introduced the LoadFunc/StoreFunc classes and functionality, which allows you to load and store data from sources other than the usual HDFS. HBase:The Definitive Guide


  6. For pushing the data into the Kafka cluster, the AvroKafkaStorage class (extends Pig's StoreFunc class) takes the Avro schema as its first argument and connects to the Kafka URI. Apache Kafka


  7. To create an eval UDF you make a Java class that extends the abstract EvalFunc class. Hadoop in Action


  8. The Pig integration code (a LoadFunc implementation) is found in the contrib section of Cassandra’s source download. Cassandra The Definitive Guide


  9. Because the group operator returns a record for each group, with a bag containing all the records in that group, your eval func still takes one record and returns one record. Programming Pig


  10. For instance, suppose that a function named DUMMY_FUNC accepted one parameter and returned a value. Java 7 Recipes A Problem-Solution Approach



558、单词 denoted 的匹配文本:


  1. The units denoted by the value vary according to the metric module. Monitoring with Ganglia


  2. As we’ve seen, design documents are normal JSON documents, denoted by the fact that their DocID is prefixed with _design/ CouchDB The Definitive Guide


  3. Remember that paths are denoted by a colon character (:) Gradle in Action


  4. The root project is denoted by a colon (:) and has no explicit name. Gradle Effective Implementation Guide


  5. This recipe will use the MapReduce API and the distributed cache to mark any lines in the news archive dataset that contain one or more keywords denoted in a list. Hadoop RealWorld Solutions Cookbook


  6. To evaluate the effectiveness of the Contraction phase, we consider the two different levels of memoization in Incoop: (i) the coarse-grained, task-level memoization performed in the implementation, denoted as Task, and (ii) the fine-grained approach that adds the Contraction phase in the implementation, denoted as Contraction. Incoop MapReduce for Incremental Computations


  7. Mahout didn't do a great job of picking initial random cluster locations (denoted with gray crosses) Hadoop in Practice


  8. A region is denoted by the table it belongs to, its first row, inclusive, and last row, exclusive. Hadoop:The Definitive Guide 3rd Edition


  9. Finally the phone attribute has an array value, which is denoted by the surrounding square brackets and the fact that the type attribute is repeated. Cassandra The Definitive Guide


  10. Note that we expect the end of the file to be denoted by the end of the stream (or -1) ActiveMQ in Action



559、单词 se5 的匹配文本:


  1. Many of the Java SE5 language changes were designed to improve the experience of the programmer. Thinking in Java 4th Edition



560、单词 md5 的匹配文本:


  1. If you are a cautious person, go to the backup site and get the PGP checksum or the MD5 checksum of the download file. Pro Hadoop


  2. The revision number is the md5 hash of the transport representation of a document with an N- prefix denoting the number of times a document got updated. CouchDB The Definitive Guide


  3. By generating an MD5 check-sum from the key, we randomize which node the data for that key will be stored on. Cassandra High Performance Cookbook


  4. If the preceding example had used the argument --update-key md5, the generated code would have run like the following: Hadoop RealWorld Solutions Cookbook


  5. MD5 is a good choice because you want twits to be stored in groups by user. HBase in Action


  6. MD5 hash, so that later you can visually compare that your. Hadoop in Practice


  7. The MD5 digests are the same, showing that the file survived its trip to HDFS and is back intact. Hadoop:The Definitive Guide 3rd Edition


  8. The row key is the MD5 hash of the line to generate a random key. HBase:The Definitive Guide


  9. It uses a BigIntegerToken with an MD5 hash applied to it to determine where to place the keys on the node ring. Cassandra The Definitive Guide


  10. After starting the HDFS cluster, we wait for a moment and then use MD5 cryptographic checksums to verify that both locations contain the identical fsimage. Hadoop Beginners Guide



561、单词 centric 的匹配文本:


  1. The vertex-centric approach is reminiscent of MapReduce in that users focus on a local action, processing each item independently, and the system composes these actions to lift computation to a large dataset. Pregel  -  A System for Large-Scale Graph Processing


  2. For example, an admin over 20,000 systems is far more likely to be running a configuration management engine such as Puppet/Chef or CFEngine and will therefore have fewer qualms about host-centric configuration. Monitoring with Ganglia


  3. Yet another benefit is that the shell script can interact with services, systems, and tools that are not Java centric. MapReduce Design Patterns


  4. Because some of Hadoop’s tools (such as Hive and real-time Hadoop queries) provide a low entry barrier to Hadoop for people more familiar with database queries, some people limit their knowledge to only a few database-centric tools in the Hadoop ecosystem. Professional Hadoop Solutions


  5. This recipe does not require a full understanding of the Giraph API, but it does assume some familiarity with Bulk Synchronous Parallel (BSP) and the design goals of vertex-centric APIs including Apache Giraph and Google Pregel. Hadoop RealWorld Solutions Cookbook


  6. Let’s wrap all the user-centric HBase interactions in a single class. HBase in Action


  7. The best_fields type is also field centric and suffers from similar problems. Elasticsearch The Definitive Guide


  8. We focus on practices unique to data-centric programming within Hadoop. Hadoop in Action


  9. It may appear strange to accuse a project fully implemented in Java of being Java-centric, but the consideration is from a client's perspective. Hadoop Beginners Guide


  10. One can take two complementary views of any OO system, object-centric and activity-centric: Concurrent Programming in Java Design Principles and Pattern



562、单词 multiproject 的匹配文本:


  1. Gradle provides powerful support for defining and organizing multiproject builds, as well as modeling dependencies between projects. Gradle in Action


  2. For multiproject setup, the build.scala file is used to define common settings and tasks for multiple projects. Scala in Action


  3. Role-based strategy is relatively new in Jenkins, but it is an excellent way to simplify the task of managing permissions in large, multiteam and multiproject organizations. Jenkins The Definitive Guide


  4. The beforeEvaluate() hook is not particularly useful in this case, since there is no way in a single build file to advise the build to do something before it is evaluated.3 Beforehooks are only useful in the case of a multiproject build. Gradle Beyond The Basics


  5. Multiproject Build Structure A multiproject is generally hierarchical in nature: it typically has a master project with one or more subprojects. Building and Testing with Gradle



563、单词 serializing 的匹配文本:


  1. Since multiple proposers may submit values with proposal number zero, serializing at this replica ensures only one value corresponds with that proposal number for a particular log position. Megastore - Providing Scalable, Highly Available Storage for Interactive Services


  2. By working with the grain and letting CouchDB do this for us, we save ourselves a tremendous amount of CPU cycles that would otherwise have been spent serializing object graphs from SQL, converting them into domain objects, and using those objects to do application-level validation. CouchDB The Definitive Guide


  3. The nested data model backs a platform-neutral, extensible mechanism for serializing structured data at Google. Dremel - Interactive Analysis of WebScale Datasets


  4. Because a BloomFilter is also a Writable object, serializing it is fairly trivial. MapReduce Design Patterns


  5. Recipes include techniques for serializing data, storing large objects, time series, normalized, and de-normalized data. Cassandra High Performance Cookbook


  6. Our primary-copy caching strategy makes a single authoritative MDS responsible for managing cache coherence and serializing updates for any given piece of metadata. Ceph A Scalable, High-Performance Distributed File System


  7. In the preceding example, we use the Writable types as the fields of our custom Writable type and use the readFields() method of the fields for de-serializing the data from the DataInput object. Hadoop MapReduce Cookbook


  8. The DataOutput and DataInput interfaces have a rich set of methods for serializing and deserializing Java primitives, so, in general, you have complete control over the wire format of your Writable object. Hadoop:The Definitive Guide 3rd Edition


  9. This is because the MapReduce framework has a certain defined way of serializing the key/value pairs to move them across the cluster’s network, and only classes that support this kind of serialization can function as keys or values in the framework. Hadoop in Action


  10. As we'll see, Flume makes assumptions about the data format and provides no ways of serializing data outside of these. Hadoop Beginners Guide



564、单词 remoting 的匹配文本:


  1. Under the covers, Akka uses JBoss Netty and Google Protocol Buffers libraries to make the remoting happen seamlessly. Programming Concurrency on the JVM


  2. Akka implements transparent remoting, where the remoteness of the actor is completely configured at deployment time. Scala in Action


  3. Remoting Support Accessing or exposing remote components in Java has never been the simplest of jobs. Pro Spring 3


  4. This handler adapter is mostly used by Spring Remoting to support some of the HTTP remoting options. Pro Spring MVC


  5. Remote scaling is more complex: it requires a remoting technology like Java Messaging Service (JMS) or GridGain, and you must plug in scaling to batch processing using Spring Batch hooks. Spring Batch in Action


  6. As emphasized on the Direct Web Remoting (DWR) website (http://directwebremoting. Spring Dynamic Modules in Action


  7. This allows the application developer to focus on the business logic and not worry about lowlevel transaction and state management details, remoting, concurrency, multithreading, connection pooling, or other complex low-level APIs. Java EE 7 Essentials


  8. With certain environments that have high latency or lower bandwidths, rendering internal frames across the network can be too expensive (for example, remoting using a VPN) Java 7 Recipes A Problem-Solution Approach


  9. Business methods for components are intercepted by the application server in order to apply services such as concurrency, transaction management, security, and remoting. Pro JPA2


  10. Even though Spring integrates with several popular MVC frameworks, its web and remoting module comes with a capable MVC framework that promotes Spring’s loosely coupled techniques in the web layer of an application. Spring in Action 4th Edition



565、单词 har 的匹配文本:


  1. The HTTP Archive (HAR) format is the standard for capturing this information; Testable JavaScript


  2. The disadvantages of HAR files are that they can’t be optimized for local disk access in MapReduce, and they can’t be compressed. Hadoop in Practice


  3. Now we can run the archive command: % hadoop archive -archiveName files.har /my/files /my. Hadoop:The Definitive Guide 3rd Edition


  4. A HAR file is similar to a familiar tar, JAR, or Zip file, but file system operation can address the individual files for the archive, and a HAR file can be used transparently as the input to a MapReduce job. The Hadoop Distributed File System


  5. It can capture the performance data from a web application in an HTML Archive (HAR) format, as well as manipulate the browser behavior and traffic, such as whitelisting and blacklisting content, simulating network traffic and latency, and rewriting HTTP requests and responses. Selenium Testing Tools Cookbook


  6. The ALTER TABLE … ARCHIVE PARTITION statement captures the partition files into a Hadoop archive (HAR) file. Programming Hive


  7. The way that BrowserMob Proxy does this is by capturing the network traffic and pushing it into a format called HTTP Archive, or most commonly known as HAR. Selenium 2 Testing Tools Beginner's Guide



566、单词 watcher 的匹配文本:


  1. Watcher: The watcher watches watchables! In our examples, the watcher is WatchService and it monitors the file system changes (the file system is a FileSystem instance) Pro Java 7 NIO.2


  2. Most of the action is in the modelWatcher object B. Mahout in Action


  3. Getting the watcher data from GitHub requires a web service call to the GitHub API (http://developer.github.com/v3/) Spring in Practice


  4. In this case, once the data is written to HDFS, a data watcher (HDFS watcher) invokes a MapReduce JobTracker, informing it about the availability of a new data. Professional Hadoop Solutions


  5. The Watcher object receives callbacks from ZooKeeper to inform it of various events. Hadoop:The Definitive Guide 3rd Edition


  6. All the master cluster region servers keep a watcher on one another to be notified when one dies (just like the master does) HBase:The Definitive Guide


  7. A producer maintains a pool of broker connections, and constantly updates it using ZooKeeper watcher callbacks. Apache Kafka


  8. It does a few more interesting things: (a) one can register a watcher on a path and get notified when the children of a path or the value of a path has changed; (b) a path can be created as ephemeral (as oppose to persistent), which means that if the creating client is gone, the path is automatically removed by the Zookeeper server; (c) zookeeper replicates its data to multiple servers, which makes the data highly reliable and available. Kafka a Distributed Messaging System for Log Processing


  9. The pool consists of master and worker nodes, plus an overall gatekeeper called the master watcher. Tenzing - A SQL Implementation On The MapReduce Framework


  10. Other HotSpot VM helper threads such as watcher threads and stat sampler are started. Java Performance



567、单词 varargs 的匹配文本:


  1. Note You can use the @SafeVarargs annotation to defeat the restriction against generic array creation, using this method: Core Java Volume I Fundamentals 9th Edition


  2. It provides three Files.copy() methods to accomplish this task and provides a set of options for controlling the copy process—the methods take a varargs argument represented by these options. Pro Java 7 NIO.2


  3. The ACC_VARARGS flag indicates that this method takes a variable number of arguments at the source code level. The Java Virtual Machine Specification Java SE 7 Edition


  4. The second form provides a convenient syntax to create and call methods that can produce an effect similar to C’s variable argument lists (known as “varargs” in C) Thinking in Java 4th Edition


  5. Applying a SafeVarargs annotation to the method declaration prevents generation of these unchecked warnings at the method invocation expressions. The Java Language Specification Java SE 7 Edition


  6. One could pass in an array, iterable, or varargs of any object. Getting Started with Google Guava


  7. A minor advantage of builders over constructors is that builders can have multiple varargs parameters. Effective Java 2nd Edition


  8. The @SafeVarargs annotation has been introduced to flag a method as safe. Java 7 New Features Cookbook


  9. Varargs methods to define and invoke methods that accept an arbitrary number of arguments. Java in a Nutshell 5th Edition


  10. The of method has a varargs parameter, so you can construct a stream from any number of arguments: Java SE 8 for the Really Impatient



568、单词 troubleshoot 的匹配文本:


  1. As a provider of a website, 10 years ago, your application logs were only used to help you troubleshoot your website. Apache Flume Distributed Log Collection for Hadoop


  2. Useful Resources In this section, we will describe helpful online/offline resources to help you troubleshoot issues with Ganglia. Monitoring with Ganglia


  3. In the following section, I’ll show how to troubleshoot version conflict and tweak Gradle’s dependency resolution strategy to your specific use case. Gradle in Action


  4. We will also describe steps to verify and troubleshoot a Hadoop cluster configuration. Hadoop Operations and Cluster Management Cookbook


  5. In addition to that, it covers functionalities that allow us to troubleshoot ElasticSearch, such as describing how segments merging works, how to see what ElasticSearch does beneath its high-level interface, and how to limit the I/O operations. Mastering ElasticSearch


  6. Doing this is helpful when trying to troubleshoot errors that users may be reporting. Cassandra High Performance Cookbook


  7. It likely will not prevent you from having to troubleshoot issues dealing with scale or data validity, but it will eliminate a large majority of the compile time and control flow issues. Hadoop RealWorld Solutions Cookbook


  8. If you’re somewhat new to Linux systems and you want to run Cassandra on Linux (which is recommended), you may want to check out Jonathan Ellis’s blog entry on using a variety of Linux performance monitoring tools to help you understand the performance of your underlying platform so that you can troubleshoot in the right place. Cassandra The Definitive Guide


  9. The interaction between these layers is what makes a system like this so complex and so difficult to troubleshoot. Hadoop Operations


  10. If you were unable to successfully run the Java examples, then you’ll need to troubleshoot the situation. ActiveMQ in Action



569、单词 idioms 的匹配文本:


  1. You may want to change the behavior of an existing task or add your own idioms for describing your business domain. Gradle in Action


  2. In a nutshell, such code, called functions in the functional programming community, can be passed around and combined in a way to produce powerful programming idioms that you’ll see in Java 8 guise throughout this book. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. In contrast, writing this query in the Java MapReduce API is challenging, because implementation of the ORDER BY clause might require knowledge of the specialized programming idioms. Professional Hadoop Solutions


  4. However, using generic classes requires an understanding of the pre-Java 5 idioms for generic programming. Data Structures and Algorithm Analysis in Java 3rd Edition


  5. Chapter 3, Functional Programming with Guava introduces the functional programming idioms provided by Guava. Getting Started with Google Guava


  6. The platform is much bigger now than it was in 2001 and more complex, but once you learn the patterns and idioms for using the new features, they make your programs better and your life easier. Effective Java 2nd Edition


  7. There are only a few common Java idioms for which parentheses are required. Java in a Nutshell 5th Edition


  8. There’s a real opportunity to eliminate reinventing these idioms by letting “higher-level” tools handle them automatically. Programming Hive


  9. The solutions provided by lock utility classes come at the price of more awkward coding idioms and less automatic enforcement of correct usage. Concurrent Programming in Java Design Principles and Pattern


  10. It’s easy to show nesting relationships in XML, but it’s hard to express program flow and data access the way most common programming language idioms express them. Building and Testing with Gradle



570、单词 scalaz 的匹配文本:


  1. The best example of unicode and non-unicode operators comes from the Scalaz library. Scala in Depth


  2. In chapter 6 you’ll learn how to create a simple web application using the SBT and the Scalaz HTTP module. Scala in Action


  3. It’s possible to program in a purely functional way using the excellent Scalaz library,a. Functional Programming Patterns in Scala and Clojure


  4. Scalaz Scalaz is a library that fills in gaps in the standard library. Programming Scala



571、单词 pluggable 的匹配文本:


  1. Centralized configuration was replaced with a simple on-disk configuration file (although the configuration provider is pluggable so that it can be replaced) Apache Flume Distributed Log Collection for Hadoop


  2. In the current version of gmond, there are two types of pluggable modules, C/C++ and Python. Monitoring with Ganglia


  3. The authentication system is pluggable, so you can integrate with existing services to authenticate users to CouchDB using an HTTP layer, using LDAP integration, or through other means. CouchDB The Definitive Guide


  4. Finally, an administrator may configure the NM with a set of pluggable, auxiliary services. Apache Hadoop YARN Yet Another Resource Negotiator


  5. The good news is that Hadoop scheduler is pluggable, and it comes with two other schedulers. Hadoop MapReduce Cookbook


  6. To reduce the probability of data loss when multiple simultaneous nodes fail, we implemented a pluggable block placement policy that constrains the placement of block replicas into smaller, configurable node groups. Apache Hadoop Goes Realtime at Facebook


  7. Fortunately, starting with version 0.19, Hadoop has a pluggable architecture for the scheduler, and two new schedulers have become available for resolving job contention. Hadoop in Action


  8. You can also use your own pluggable comparator for sorting if you wish. Cassandra The Definitive Guide


  9. Linux supports, via Pluggable Authentication Modules (PAM) system, the ability to control resources such as file descriptors and virtual memory at the user level. Hadoop Operations


  10. Pluggable persistence and security—ActiveMQ provides multiple flavors of persistence and you can choose between them. ActiveMQ in Action



572、单词 recommenders 的匹配文本:


  1. Chapter 3 discusses how you can represent the data that recommenders use in an efficient way. Mahout in Action


  2. In this chapter we’ll look at the Mahout MapReduce implementations of recommenders, classifiers, and clusterers. Hadoop in Practice


  3. Mahout provides implementations of such common ML techniques as clustering and recommenders. Hadoop Beginners Guide



573、单词 swf 的匹配文本:


  1. The Flash bytecode format is known as SWF, and SWF files are produced by the Flex compiler. Thinking in Java 4th Edition


  2. In SWF, you model each process with flows (see chapter 5 for more details) Spring in Practice


  3. The dyn-swf sub-Workflow includes the clustering and ranging actions, and e-mail notification in case of failure. Professional Hadoop Solutions


  4. It captures a screen using the VNC protocol and generates a Shockwave Flash (SWF) movie file. Selenium Testing Tools Cookbook



574、单词 whirr 的匹配文本:


  1. Using Apache Whirr to automate the provisioning and deployment of. Storm Blueprints Patterns for Distributed Real-time Computation


  2. If you’re deploying in the cloud, Apache Whirr (http://whirr.apache.org) is a framework that can come to your rescue and make spinning up and configuring instances easy. HBase in Action


  3. We will also use Apache Whirr, a cloud neutral library for deploying services on cloud environments, to provision Apache Hadoop and Apache HBase clusters on cloud environments. Hadoop MapReduce Cookbook


  4. Apache Whirr Amazon Elastic Compute Cloud (EC2) is a computing service that allows customers to rent computers (instances) on which they can run their own applications. Hadoop:The Definitive Guide 3rd Edition


  5. Apache Whirr Recently, we have seen an increase in the number of users who want to run their cluster in dynamic environments, such as the public cloud offerings by Amazon’s EC2, or Rackspace Cloud Servers, as well as in private server farms, using open source tools like Eucalyptus. HBase:The Definitive Guide



575、单词 cardinality 的匹配文本:


  1. The maximum number of dimensions possible is the cardinality of the vector. Mahout in Action


  2. Each data point in these graphs was obtained by averaging the measurements over 30 runs, in each of which a set of columns of a given cardinality was chosen at random. Dremel - Interactive Analysis of WebScale Datasets


  3. Index Cardinality Cardinality refers to how many distinct values there are for a field in a collection. MongoDB The Definitive Guide 2nd Edition


  4. Using this codec for high cardinality fields can speed up queries on such fields. Mastering ElasticSearch


  5. The performance of building an inverted index depends mostly on the computational cost of parsing the content in the mapper, the cardinality of the index keys, and the number of content identifiers per key. MapReduce Design Patterns


  6. An instance template specifies a cardinality and a set of roles that run on each instance of. Hadoop:The Definitive Guide 3rd Edition


  7. The partial key scan mechanism is quite powerful, as you can use it as a lefthand index, with each added field adding to its cardinality. HBase:The Definitive Guide


  8. Clearly, this can consume a lot of memory, especially for high cardinality. Elasticsearch The Definitive Guide


  9. A FetchType of LAZY benefits entities with one-to-many or many-to-many relationships, where the cardinality of the relationship is high, and the attributes are not accessed immediately after the entity is loaded. Java Performance


  10. Cardinality It isn’t very often that a project has only a single employee working on it. Pro JPA2



576、单词 thresholds 的匹配文本:


  1. Monitoring Ganglia Metrics with Nagios Because Nagios has no built-in means of polling data from remote hosts, Nagios users have historically employed various remote execution schemes to collect a litany of metrics with the goal of comparing them against static thresholds. Monitoring with Ganglia


  2. This means that Sonar not only gives you the option to apply specific metric rule sets and thresholds per project, but also allows you to decide whether you want to use the analysis tools provided by Sonar to generate metrics. Gradle in Action


  3. This decider allows us to configure thresholds when a shard can be allocated to a node and when ElasticSearch should try to relocate shard to another node. Mastering ElasticSearch


  4. When thresholds are reached, a Memtable is flushed to disk in a sorted format called an SSTable. Cassandra High Performance Cookbook


  5. Add to these graphs things like thresholds, and you can easily find out if the system isn’t performing in the expected range of operation. HBase in Action


  6. Region servers are responsible for all read and write requests for all regions they serve, and also split regions that have exceeded the configured region size thresholds. HBase:The Definitive Guide


  7. If tasks fail due to software errors, Hadoop will retry them within configurable thresholds. Hadoop Beginners Guide


  8. Alert thresholds and performance data of MapReduce is inherently coupled to that of HDFS when services are stacked in this manner, making it difficult to detect the root cause of a failure across service and host boundaries. Hadoop Operations


  9. When using Threads, granularity thresholds must in general be substantially higher than when using lightweight executable classes (although still substantially lower than those needed in distributed parallel designs) Concurrent Programming in Java Design Principles and Pattern


  10. You may want to create thresholds for components to expand and contract. Java 7 Recipes A Problem-Solution Approach



577、单词 cypher 的匹配文本:


  1. Neo4J also provides the Cypher query language to query the graph. NoSQL Distilled


  2. In the example, I will also introduce the option to exchange password encoders in order to use different algorithms to cypher the passwords, instead of storing them in plain text. Pro Spring Security


  3. In the next chapter, we’ll look at Cypher, which is a pattern-matching language tuned to the way we tend to describe graphs using diagrams. Graph Databases


  4. With the declarative Cypher query language, Neo4j makes it easier to get started for everyone who knows SQL from working with relational databases. Spring Data Modern Data Access for Enterprise Java


  5. Query Declares a property to automatically provide an iterable that’s built by executing a given Cypher query. Spring in Action 4th Edition



578、单词 spam 的匹配文本:


  1. If clicking a link or visiting a web page could install arbitrary code on the user’s computer, criminals would have an easy time stealing confidential information, accessing financial data, or taking over users’ machines to send spam. Core Java Volume I Fundamentals 9th Edition


  2. In addition to extremely large-scale pipelines for Yahoo! Search, scientists optimizing advertising analytics, spam filtering, and content optimization drove many of its early requirements. Apache Hadoop YARN Yet Another Resource Negotiator


  3. Classifiers have widespread applications such as e-mail spam filtering, finding most promising products, selecting customers for closer interactions, and taking decisions in machine learning situations, and so on. Hadoop MapReduce Cookbook


  4. Examples of classification include email spam filtering and detection of fraudulent credit card transactions. Hadoop in Practice


  5. A low clustering coefficient could indicate widely dispersed interest (as it does with @THE_REAL_SHAQ), or it could indicate the kind of inorganic community that a spam account would engender. Hadoop:The Definitive Guide 3rd Edition


  6. As an example, the following query looks for emails that contain "business opportunity" and must either be starred, or both be in the Inbox and not marked as spam: Elasticsearch The Definitive Guide


  7. However, in these days of spam floods, most servers have built-in checks and only accept requests from users or IP address ranges that they trust. Core Java Volume II Advanced Features 9th Edition


  8. For example, you want to build a spam filter   to know the words frequently used in the millions of spam emails you’ve received. Hadoop in Action


  9. Somewhat more subtly, an applet could take advantage of the user’s system to forge email, generate spam, or launch hacking attempts on other systems. Java in a Nutshell 5th Edition


  10. Examples of such use cases include: Responding to customer requests, spam analysis, dealing with alerts in highly critical revenue systems, or monitoring and assessing changes to production systems. PowerDrill - Processing a Trillion Cells per Mouse Click



579、单词 martin 的匹配文本:


  1. To circumvent this problem, Mahout implements techniques to identify groups of words that have an unusually high probability of occurring together, such as Martin Luther King Jr or Coca Cola. Mahout in Action


  2. NoSQL distilled : a brief guide to the emerging world of polyglot persistence / Pramod J Sadalage, Martin Fowler. NoSQL Distilled


  3. Knut Ola Hellan (creator of Pillow) and Martin Brown (from Couchbase) both provided valuable feedback which helped to make this book better. Scaling CouchDB


  4. In Scala, we use a simplified version of a technique introduced in a paper written by Scala’s designer, Martin Odersky. Functional Programming Patterns in Scala and Clojure


  5. Martin Gardner, the mathematics and science writer, once said in an interview: Beyond calculus, I am lost. Hadoop:The Definitive Guide 3rd Edition


  6. The name of this design comes from Martin Fowler’s book Patterns of. SQL Antipatterns


  7. Martin Odersky’s amazing balance between theory and reality make Scala possible, and the people he has attracted into the community are brilliant. Beginning Scala


  8. Martin Porter, and it’s best defined in his own words: Lucene in Action 2nd Edition


  9. The text of the book is set in 10/11 point FF Scala and Scala Sans, designed by Martin Majoor, and distributed by FSI FontShop International. Fundamental Networking in Java


  10. Special thanks also go to Brian Aker, Martin “MC” Brown, and Paul Kinzelman for their reviews and suggestions. Understanding MySQL Internals



580、单词 idempotent 的匹配文本:


  1. The PUT operation is idempotent; that is, the content of the URL specifies the name of the object we are creating through the HTTP request. Getting Started with CouchDB


  2. Combiners also must be idempotent, as they may be run an arbitrary number of times by the Hadoop framework over a given map task’s output. Pro Hadoop


  3. The key feature of infrastructure automation is that deployment scripts are idempotent—that is, running your scripts multiple times will have the same intended effect as running them once, something that becomes critical when a script fails halfway through. CouchDB The Definitive Guide


  4. Applying plugins is an idempotent operation, and therefore is only executed once for a specific plugin. Gradle in Action


  5. We rely on the application writer to make such side-effects atomic and idempotent. MapReduce - Simplied Data Processing on Large Clusters


  6. If the mutations fail, it is safe to submit the entire list again as mutations are idempotent due to the time stamp associated with them. Cassandra High Performance Cookbook


  7. An idempotent operation produces the same result no matter how many times it’s executed. Hadoop in Practice


  8. Another reason for turning off speculative execution is for tasks that are not idempotent. Hadoop:The Definitive Guide 3rd Edition


  9. The records in this application log are idempotent, and can be applied multiple times without any data loss. Apache Hadoop Goes Realtime at Facebook


  10. Your tasks are no longer guaranteed to be idempotent and you’ll need to understand how various failure scenarios can affect your tasks. Hadoop in Action



581、单词 intellij 的匹配文本:


  1. JetBrains IntelliJ Idea continues to forge creative new paths in development tools. Thinking in Java 4th Edition


  2. This chapter explains Gradle’s capabilities for generating project files for popular IDEs like Eclipse, IntelliJ, and NetBeans. Gradle in Action


  3. In the next chapter, we will learn how we can integrate Gradle with Integrated Development Environments (IDEs) Eclipse and JetBrains IntelliJ. Gradle Effective Implementation Guide


  4. Don’t be turned off by these issues though; there’s good news! Most integrated development environments (IDEs) such as NetBeans and IntelliJ support this refactoring and will automatically ensure these gotchas don’t arise. Java 8 in Action Lambdas, Streams and Functional-style Programming


  5. Modern IDEs have great support for many code quality tools—Checkstyle, PMD, and FindBugs all have plugins for Eclipse, NetBeans, and IntelliJ, which provide rapid feedback for developers on code quality issues. Jenkins The Definitive Guide


  6. The application server is easy to use (ZIP installer and NetBeans/ Eclipse/IntelliJ integration), lightweight (downloads starting at 37 MB, small disk/ memory footprint), and modular (OSGi-based, containers start on demand) Java EE 7 Essentials


  7. Once the JAR file is downloaded, add it as an external library to your IDE (IntelliJ, NetBeans, or Eclipse) Getting Started with Google Guava


  8. The other big change in the platform is the widespread adoption of modern Integrated Development Environments (IDEs), such as Eclipse, IntelliJ IDEA, and NetBeans, and of static analysis tools, such as FindBugs. Effective Java 2nd Edition


  9. IDEs like Eclipse and IntelliJ IDEA communicate with source code repositories like. Java Network Programming 4th Edition


  10. Although the steps described here are for NetBeans, you can also develop using other IDEs such as Eclipse, IntelliJ, or vi. Java 7 Recipes A Problem-Solution Approach



582、单词 snippets 的匹配文本:


  1. Many of the code snippets used in the following sections were taken from the mod_example gmond metric module source code. Monitoring with Ganglia


  2. With flexibility comes a lot of duplicated code snippets that are copied from one project to another. Gradle in Action


  3. They typically support only a single tag, whereas in real life, a user can be interested in getting XML snippets for multiple tags. Professional Hadoop Solutions


  4. Those code snippets evolve and grow over the course of a section or chapter. HBase in Action


  5. Previous chapters showed you some MapReduce snippets in action when working with data serialization. Hadoop in Practice


  6. Please note that the provided code snippets have been simplified due to space constraints; for download details for the full code listings, refer to the Preface. Hadoop:The Definitive Guide 3rd Edition


  7. The snippets extracted from Hush show you how the feature is used in context, and since it is part of the publicly available repository accompanying the book, you have the full source available as well. HBase:The Definitive Guide


  8. Many applications like to highlight snippets of text from each search result so that the user can see why the document matched their query. Elasticsearch The Definitive Guide


  9. For other events, you write short snippets of event-handling code. Core Java Volume II Advanced Features 9th Edition


  10. As we walk through the different tuning options for ActiveMQ, we’ll demonstrate them with example snippets of code, finally pulling all the tuning techniques together in an example data feed application. ActiveMQ in Action



583、单词 alpha 的匹配文本:


  1. And although release Version 2.0.x is the most feature-rich Hadoop release, it is still in alpha state requiring further improvements. Hadoop Operations and Cluster Management Cookbook


  2. When used (in order to use it, we need to use the laplace value as its name), a constant value equal to the value of the alpha parameter (which is by default 0.5) will be added to counts to balance the weights of frequent and infrequent n-grams. Mastering ElasticSearch


  3. Note, however, that some processor architectures (specifically, Alpha and DSM architectures) may have more implementation issues for correct handling of accesses to final fields. JSR-133 Java Memory Model and Thread


  4. CouchDB is still in the alpha stage of development, and as a result its security features are incomplete and constantly evolving. Beginning CouchDB


  5. Overlaying a partially transparent rectangle on an image In the Java 2D API, transparency is described by an alpha channel. Core Java Volume II Advanced Features 9th Edition


  6. The alpha value of zero means our window will be completely transparent. Java 7 New Features Cookbook


  7. It includes the major HDFS improvements such as namenode high availability, as well as also a forward port of the battle-tested MRv1 daemons (in addition to the alpha version of YARN) so as to be production-ready. Hadoop Operations


  8. There are several free packages available for parsing class files, including CFParse from the IBM alphaWorks site, http://www.alphaworks.ibm.com/tech/cfparse. Java Performance Tuning 2nd Edition


  9. The t-statistic is compared to a value obtained from a Student’s t-distribution for an a (alpha) and degrees of freedom. Java Performance


  10. This powerful API allows you to do things such as drawing geometric shapes, image processing, alpha compositing (combining images), text font rendering, antialiasing, clipping, creating transformations, stroking, filling, and printing. Java 7 Recipes A Problem-Solution Approach



584、单词 jsps 的匹配文本:


  1. These technologies are suited to mediumto large-scale application development, and include topics such as Enterprise Java Beans (EJBs), Java Server Pages (JSPs), and much more. Java Network Programming and Distributed Computing


  2. The introductory portion ends with the Error Handling with Exceptions chapter, but you may also want to supplement this with an introduction to JDBC, Servlets and JSPs. Thinking in Java 4th Edition


  3. Directory holding dynamic scripting view components in form of JSPs. Gradle in Action


  4. Develop JavaServer Pages (JSPs) to display both static and dynamic content in a web browser. Jenkins Continuous Integration Cookbook


  5. For the web pages, the primary technology used is Java Server Pages (JSPs) Pro Spring MVC


  6. Hadoop provides several JavaServer Pages (JSPs), enabling you to visualize MapReduce execution. Professional Hadoop Solutions


  7. It's similar to JSPs, ASPs, PHPs, and so on, but simpler with a syntax consisting of just a handful of commands. Solr 3 Enterprise Search Server


  8. For example, an application server generating plenty of Java Server Pages (JSPs) on the fly reduces a static compiler to a JIT compiling JVM, only slower and less adaptive. Oracle JRockit The Definitive Guide


  9. For this reason, Java Performance Tuning, Second Edition includes four new chapters: a new chapter on J2EE application tuning in general followed by chapters on tuning JDBC, servlets and JSPs, and EJBs. Java Performance Tuning 2nd Edition


  10. Each application can contain one or more Java Servlets and JSPs. Java Performance



585、单词 fifo 的匹配文本:


  1. If all jobs in the waiting queue have the same priority, the Fair Scheduler can be configured to schedule these jobs with either Fair Scheduler or FIFO Scheduler. Hadoop Operations and Cluster Management Cookbook


  2. Hadoop is by default configured with a First in First out (FIFO) scheduler, which executes jobs in the same order as they arrive. Hadoop MapReduce Cookbook


  3. By default MapReduce uses a FIFO scheduler to determine how tasks should be scheduled if there are multiple jobs running at the same time. Hadoop in Practice


  4. Job Scheduling Early versions of Hadoop had a very simple approach to scheduling users’ jobs: they ran in order of submission, using a FIFO scheduler. Hadoop:The Definitive Guide 3rd Edition


  5. Another storage data structure that is often required at scale is a FIFO queue, like that provided by GFS [7] RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.


  6. Under Hadoop’s default FIFO scheduler , as soon as a job is sent to Hadoop for execution, the JobTracker will assign as many TaskTrackers as necessary to process that job. Hadoop in Action


  7. Each worker constantly monitors a common area for new tasks and picks up new tasks as they arrive on a FIFO basis. Tenzing - A SQL Implementation On The MapReduce Framework


  8. This has hidden the fact that, by default, Hadoop places subsequent job submissions into a First In, First Out (FIFO) queue. Hadoop Beginners Guide


  9. None of the three scheduler plug-ins (including the default FIFO scheduler) provide access control over which jobs are submitted to which. Hadoop Operations


  10. The indexes maintain the FIFO data structure for queues and the durable subscriber pointers to their topic messages. ActiveMQ in Action



586、单词 persisting 的匹配文本:


  1. For instance, persisting Jabber instant messages to CouchDB might use ejabberd and Hovercraft. CouchDB The Definitive Guide


  2. Most of this saving can be attributed to scheduling and launching overheads of multiple MapReduce jobs and avoiding the unnecessary steps of persisting outputs of the intermediate MapReduce jobs to HDFS. Apache Hadoop YARN Yet Another Resource Negotiator


  3. This comes in handy if you are persisting the results of the concatenation and want a very descriptive column header. Hadoop RealWorld Solutions Cookbook


  4. Persisting data into structures that arrange themselves based on data values can result in worst-case data distribution. HBase in Action


  5. Gateway is the component of Elasticsearch responsible for persisting your data to disk, so that you don't lose it when the node goes down. Elasticsearch in Action MEAP V07 cHAPTER 1


  6. Use of a BackupNode provides the option of running the NameNode without persistent storage, delegating responsibility for the namespace state persisting to the BackupNode. The Hadoop Distributed File System


  7. So, after it has opened all the storage files, the HLog is initialized to reflect where persisting ended and where to continue. HBase:The Definitive Guide


  8. In addition to persisting all of these messages, a new threading model also requires messages to be stored for each participating user. Apache Hadoop Goes Realtime at Facebook


  9. Although one of the most important aspects of message persistence is that the messages will survive in long-term storage, there are a number of cases where messages are required to be available for consumers that were disconnected from the broker, but persisting the messages in a database is too slow. ActiveMQ in Action


  10. It works by persisting output to a file which could be stored on HDFS or locally. Programming Hive



587、单词 iterators 的匹配文本:


  1. There is an important conceptual difference between iterators in the Java collections library and iterators in other libraries. Core Java Volume I Fundamentals 9th Edition


  2. How many times do you find yourself reimplementing these operations using iterators? Most databases let you specify such operations declaratively. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. The recipes leverage many of its unique features, including iterators, combiners, scan authorizations, and constraints. Hadoop RealWorld Solutions Cookbook


  4. But since scans are similar to iterators, you do not have a scan() call, but rather a getScanner(), which returns the actual scanner instance you need to iterate over. HBase:The Definitive Guide


  5. Similarly, implementations of the collection interfaces, such as Set and List, typically use nonstatic member classes to implement their iterators: Effective Java 2nd Edition


  6. In addition, the second section will examine the use of empty iterators to avoid null pointer exceptions. Java 7 New Features Cookbook


  7. A third approach to traversal is for a collection class to support fast-fail iterators that throw an exception if the collection is modified in the midst of a traversal. Concurrent Programming in Java Design Principles and Pattern


  8. A HashMap does not guarantee the order of the elements stored in the map, and this extends to its iterators. Java 7 Recipes A Problem-Solution Approach


  9. In fact, Percolator presents the user with a database-like interface: it supports transactions, iterators, and secondary indexes. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications


  10. The MapReduce jobs consist of DAGs of relational operators (such as filter, select (project), join, aggregation) that operate as iterators: each operator forwards a data tuple to the next operator after processing it. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



588、单词 monads 的匹配文本:


  1. The map method is associated with functors, and the flatMap method is associated with monads. Scala in Depth


  2. That’s because Scala is looking for the IOMonad type in the io.monads package, not in another top-level package called monads. Scala in Action


  3. Because for expressions are equivalent to applications of these three methods, they can be seen as syntax for monads. Programming in Scala 2nd Edition


  4. All monads are functors, but not all functors are monads. Functional Programming in Scala


  5. In fact, the sequence comprehensions we went over are both examples of a technique popularized by the highly functional language Haskell that is known as monadic transformations, which rely on a concept from category theory known as monads. Functional Programming Patterns in Scala and Clojure


  6. Monads in Scala Method map (see Section 2.13) has some really interesting properties. Steps in Scala An Introduction to Object-Functional Programming


  7. NOTE: These operations are important in the theory of monads, but you don’t need to know the theory to understand map and flatMap. Java SE 8 for the Really Impatient



589、单词 jaxb 的匹配文本:


  1. Classes for abstraction of XML marshaling and unmarshaling and support for popular tools like Castor, JAXB, XMLBeans, XStream, and so on, are packed into this module. Pro Spring 3


  2. The OXM module provides an abstraction layer that offers simplified and consistent support for popular Object/XML mapping tools such as Castor, the Java Architecture for XML Binding (JAXB), JiBX, XMLBeans, and XStream. Spring in Practice


  3. The simplest way to do this is to use Java Architecture for XML Binding (JAXB) to generate Java binding (based on the Workflow schema), and use these bindings as a Java API to create Oozie Workflows. Professional Hadoop Solutions


  4. To provide the eb services support, the JAX-RPC technology has evolved into the JAXhnology, which makes heavy use of the JAXB technology to bind Java to XML data. Java EE 7 Specification


  5. We use Castor here, but XStream, JAXB 2, or XMLBeans would work as well. Spring Batch in Action


  6. The @XmlRootElement annotation ensures that an automatic mapping from Java to XML occurs following JAXB mapping and an XML representation of the resource is returned. Java EE 7 Essentials


  7. From case to case, this can be achieved in different ways, such as through Java serialization or using XML marshalling through mechanisms such as Java Architecture for XML Binding (JAXB) Spring Integration in Action


  8. For the purpose of discussion, the Jackson serializer for JSON and JAXB for XML were selected. Java Performance


  9. However, in Java 7, you will find that the Java API for XML Processing (JAXP), Java API for XML Binding (JAXB), and even the Java API for XML Web Services (JAXWS) have been included in the core runtime libraries. Java 7 Recipes A Problem-Solution Approach


  10. Registered if JAXB v2 libraries are present on the classpath. Spring in Action 4th Edition



590、单词 columnar 的匹配文本:


  1. By combining multi-level execution trees and columnar data layout, it is capable of running aggregation queries over trillion-row tables in seconds. Dremel - Interactive Analysis of WebScale Datasets


  2. Column families were originally introduced by columnar databases for fast analytical queries. Professional Hadoop Solutions


  3. This book covers unloading/loading to and from HDFS, graph analytics with Giraph, batch data analysis using Hive, Pig, and MapReduce, machine-learning approaches with Mahout, debugging and troubleshooting MapReduce jobs, and columnar storage and retrieval of structured data using Apache Accumulo. Hadoop RealWorld Solutions Cookbook


  4. Although there is some overlap, making a columnar data store like HBase hum involves a different bag of tricks from those you use to tweak, say, MySQL. HBase in Action


  5. Installing HBase HBase is a highly scalable NoSQL data store that supports columnar-style data storage. Hadoop MapReduce Cookbook


  6. Hive provides another binary storage format called RCFile, short for Record Columnar File. Hadoop:The Definitive Guide 3rd Edition


  7. This is also where the majority of similarities end, because although HBase stores data on disk in a column-oriented format, it is distinctly different from traditional columnar databases: whereas columnar databases excel at providing real-time analytical access to data, HBase excels at providing key-based access to a specific cell of data, or a sequential range of cells. HBase:The Definitive Guide


  8. A manager who wants to understand the advantages (and disadvantages) of Cassandra and related columnar databases to help make decisions about technology strategy. Cassandra The Definitive Guide


  9. Tenzing supports a mostly complete SQL implementation (with several extensions) combined with several key characteristics such as heterogeneity, high performance, scalability, reliability, metadata awareness, low latency, support for columnar storage and structured data, and easy extensibility. Tenzing - A SQL Implementation On The MapReduce Framework


  10. It combines the advantages of columnar data layout with other known techniques (such as using composite range partitions) and extensive algorithmic engineering on key data structures. PowerDrill - Processing a Trillion Cells per Mouse Click



591、单词 ttl 的匹配文本:


  1. This is done by commenting out the multicast address and time to live (TTL) settings, and adding a dedicated master Gmond node (master2) in the gmond.conf file. HBase Administration Cookbook


  2. Every time when packet crosses route, the TTL is decreased. Mastering ElasticSearch


  3. A compromise is achieved by implementing a configurable cache time-to-live (TTL) parameter, thus limiting cache presence in each Lucene instance. Professional Hadoop Solutions


  4. Time To Live (TTL) is a setting that makes a column self-delete a specified number of seconds after the insertion time. Cassandra High Performance Cookbook


  5. We talk about Time To Live (TTL) later, as a part of advanced column family configurations. HBase in Action


  6. The time-to-live (or TTL) sets a threshold based on the timestamp of a value and the internal housekeeping is checking automatically if a value exceeds its TTL. HBase:The Definitive Guide


  7. Usually it is straightforward to pick a suitable TTL value, but if prompt replacement of failed services is desired, the TTL can become small enough to overload the DNS servers. Chubby - The lock service for loosely-coupled distributed systems


  8. Cassandra 0.7 introduced an optional time to live (TTL) value, which allows columns to expire a certain amount of time after creation. Cassandra The Definitive Guide


  9. As far as the application itself, you need to pay attention to an additional header field in the datagrams called the Time-To-Live (TTL) value. Java Network Programming 4th Edition


  10. The networkTTL property denotes the maximum number of remote brokers a message can pass through before being discarded. ActiveMQ in Action



592、单词 appends 的匹配文本:


  1. Log appends are acknowledged at the master in parallel with. Megastore - Providing Scalable, Highly Available Storage for Interactive Services


  2. If it finds it, it appends the value to the location of the design document itself to build the URL. CouchDB The Definitive Guide


  3. You may also encounter a project version that appends a SNAPSHOT designator to indicate that the built project artifact is in the state of development. Gradle in Action


  4. The key idea is this: we create a finite state machine (FSM) that reads the field values and levels for each field, and appends the values sequentially to the output records. Dremel - Interactive Analysis of WebScale Datasets


  5. Similarly, the Google File System [7] is optimized for very large files and a workload consisting largely of reads and file appends. Ceph A Scalable, High-Performance Distributed File System


  6. As HFile writer appends a block, an in-memory index of the first key of each block is formed, along with its in-file offset. Hadoop in Action


  7. As Cassandra receives updates, every write value is written immediately to the commit log in the form of raw sequential file appends. Cassandra The Definitive Guide


  8. Sqoop exports by default do a series of appends, adding each record as a new row in the table. Hadoop Beginners Guide


  9. Random and sequential writes perform better than random reads since each tablet server appends all incoming writes to a single commit log and uses group commit to stream these writes efficiently to GFS. Bigtable - A Distributed Storage System for Structured Data


  10. Each succeeding call appends its closure to the end of the list to be executed in order (Example 2-18) Building and Testing with Gradle



593、单词 terabytes 的匹配文本:


  1. This feature allows you to grow storage incrementally, regardless of whether you need terabytes or petabytes of space. Monitoring with Ganglia


  2. Our implementation of MapReduce runs on a large cluster of commodity machines and is highly scalable: a typical MapReduce computation processes many terabytes of data on thousands of machines. MapReduce - Simplied Data Processing on Large Clusters


  3. The uncompressed dataset is tens of terabytes, which is small compared to many NoSQL instances, but was large enough to cause difficulties with sharded MySQL. Spanner - Google’s Globally-Distributed Database


  4. Google has thousands of machines working on hundreds of terabytes of data, spread across the World Wide Web. Beginning CouchDB


  5. Such a configuration might have a hundred terabytes of data to be processed, distributed across some or all of the machines. Interpreting the Data Parallel Analysis with Sawzall


  6. They needed to go through terabytes   and petabytes   of data to figure out which websites were popular, what books were in demand, and what kinds of ads appealed to people. Hadoop in Action


  7. It performs blazingly fast writes, can store hundreds of terabytes of data, and is decentralized and symmetrical so there’s no single point of failure. Cassandra The Definitive Guide


  8. Picture a much larger input file measured in terabytes, and the split model makes more sense. Hadoop Beginners Guide


  9. The Bigtable clusters used by these products span a wide range of configurations, from a handful to thousands of servers, and store up to several hundred terabytes of data. Bigtable - A Distributed Storage System for Structured Data


  10. The search process is challenging because of the large amount of data: The raw documents comprise several tens of terabytes of uncompressed data, and the inverted index resulting from this raw data is itself many terabytes of data. Web search for a planet the google cluster architecture



594、单词 invariant 的匹配文本:


  1. Spanner depends on the following disjointness invariant: for each Paxos group, each Paxos leader’s lease interval is disjoint from every other leader’s. Spanner - Google’s Globally-Distributed Database


  2. All nodes on joining the cluster contact the leader who tells them for what ranges they are replicas for and leader makes a concerted effort to maintain the invariant that no node is responsible for more than N-1 ranges in the ring. Cassandra A Decentralized Structured Storage System


  3. Cuckoo hashing maintains the invariant that an item is always stored in one of these two locations. Data Structures and Algorithm Analysis in Java 3rd Edition


  4. Multiupdate is very useful for building structures in ZooKeeper that maintain some global invariant. Hadoop:The Definitive Guide 3rd Edition


  5. As we know that this job’s correctness is invariant to the ordering, we can ignore the differences. Hadoop in Action


  6. The exception’s detail method should indicate which invariant is violated (Item 63) Effective Java 2nd Edition


  7. A related use of the assert statement is to verify a class invariant. Java in a Nutshell 5th Edition


  8. But it is still surprising to see that in these cases the final size almost seems like an invariant. PowerDrill - Processing a Trillion Cells per Mouse Click


  9. Invariant state constraints, such as the facts that the currentVolume always remains between zero and capacity, and that capacity is nonnegative and never changes after construction. Concurrent Programming in Java Design Principles and Pattern


  10. When the selection result is zero, the set of selected keys is empty, so the following invariant holds: Fundamental Networking in Java



595、单词 substring 的匹配文本:


  1. You can extract a substring from a larger string with the substring method of the String. Core Java Volume I Fundamentals 9th Edition


  2. The String.substring method is used for extracting the actual IP address data from the raw string. Pro Hadoop


  3. Using a String data type works great for simple use cases, but what if you want to know the exact minor version of your project? You’ll have to parse the string value, search for the dot character, and filter out the substring that identifies the minor version. Gradle in Action


  4. You can do exact matches, substring matches, or regular-expression matches and filter out data that doesn’t match. HBase in Action


  5. We convert the Text value containing the line of input into a Java String, then use its substring() method to extract the columns we are interested in. Hadoop:The Definitive Guide 3rd Edition


  6. The second filter does a regular expression match, while the third uses a substring match approach. HBase:The Definitive Guide


  7. The substring method returned a new filename starting with the first character and ending with the character immediately preceding the period. Java 7 New Features Cookbook


  8. Instead, therefore, we have an opportunity to introduce several of Hive's built-in functions, in particular, those to convert a string to lowercase (LOWER), to extract a substring from a string (SUBSTR) and to return the number of characters in a string (LENGTH) Hadoop Beginners Guide


  9. Returns the substring for the index’s match using the regex_pattern. Programming Hive


  10. We observe a reversal of the general rule that Hive adds an overhead cost to hand-coded Hadoop in the “small” (substring) aggregation task (the time taken by Hive is represented by the lower part of the Hadoop bar in Fig. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



596、单词 posix 的匹配文本:


  1. In a regular Portable Operating System Interface (POSIX) style filesystem, if you open a file and write data, it still exists on disk before the file is closed. Apache Flume Distributed Log Collection for Hadoop


  2. Redis is written in ANSI C and works in most POSIX systems, such as Linux, without any external dependencies. MapReduce Design Patterns


  3. Data-Oriented Access Control Other than ACLs and POSIX-based file permissions (read and write) for users and groups on HDFS, Hadoop does not natively keep track of the access control policies for its data. Professional Hadoop Solutions


  4. The Ceph file system has three main components: the client, each instance of which exposes a near-POSIX file system interface to a host or process; a cluster of OSDs, which collectively stores all data and metadata; and a metadata server cluster, which manages the namespace (file names and directories) while coordinating security, consistency and coherence (see Figure 1) Ceph A Scalable, High-Performance Distributed File System


  5. Alternatively, CouchDB can be built from source on virtually any POSIX system. Beginning CouchDB


  6. The client presents a filesystem interface similar to a Portable Operating System Interface (POSIX), so the user code does not need to know about the namenode and datanode to function. Hadoop:The Definitive Guide 3rd Edition


  7. Permission settings for directories also closely follow the POSIX   model. Hadoop in Action


  8. If you’re on Windows, you’ll first have to get the Cygwin POSIX emulator and then install Git. Cassandra The Definitive Guide


  9. It also offers native integration with NFS file systems, which makes processing of existing data much easier; MapR replaced HDFS with a full POSIX-compliant filesystem that can easily be mounted remotely. Hadoop Beginners Guide


  10. These systems are fantastic as the backing store for relational databases, content delivery systems, and similar types of data storage needs because they can support full-featured POSIX semantics, scale to meet the size requirements of these systems, and offer low-latency access to data. Hadoop Operations



597、单词 jtext 的匹配文本:


  1. Each user interface component has a wrapper class (such as JButton or JTextField) that stores the model and the view. Core Java Volume I Fundamentals 9th Edition


  2. But what should the result of pressing that button be? We’d like to see something change on the screen, so a new Swing component will be introduced: the JTextField. Thinking in Java 4th Edition


  3. A DefaultCellEditor can be constructed with a JTextField, a JCheckBox, or a JComboBox. Core Java Volume II Advanced Features 9th Edition


  4. Otherwise, you mostly use the methods it inherits from the JTextField superclass. Java Network Programming 4th Edition


  5. In the inheritance hierarchy, all Swing components such as the JLabel, JTextField and JPanel classes extend from the JComponent class. Java 7 Recipes A Problem-Solution Approach



598、单词 rrd 的匹配文本:


  1. It is usually installed on the same physical hardware as gmetad, because it needs access to the RRD databases created by the poller. Monitoring with Ganglia


  2. Many of these are built on top of RRDTool (http://www.rrdtool.org), which stores time-series data in round-robin database (RRD) files. High Performance MySQL 3rd Edition


  3. Next, the rrdgraph report processor that converts transaction reports into RRD-based graphs. Pro Puppet


  4. Each gmond process relays data to a central gmetad process that records data in a series of RRD, or round-robin database files, which are fixed-size files that efficiently store time series data. Hadoop Operations



599、单词 sstables 的匹配文本:


  1. SSTables are not written to again after they are flushed; if there are changes to the data, a new SSTable is written. NoSQL Distilled


  2. It does this by isolating the disk traffic for Commit Log activity from the traffic used for reads as well as flush Memtables and compact SSTables. Cassandra High Performance Cookbook


  3. It also has scripts for converting SSTables (the datafiles) to JSON and back. Cassandra The Definitive Guide


  4. Of these updates, the recently committed ones are stored in memory in a sorted buffer called a memtable; the older updates are stored in a sequence of SSTables. Bigtable - A Distributed Storage System for Structured Data


  5. SSTables are stored in GFS; Bigtable relies on GFS to preserve data in the event of disk loss. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



600、单词 completable 的匹配文本:


  1. As you’ll see in this chapter, the Future interface and particularly its new CompletableFuture implementation are your best tools in such circumstances. Java 8 in Action Lambdas, Streams and Functional-style Programming


  2. The CompletableFuture class that we will discuss in Chapter 6 has an operation that does just what map should do, but it is called thenApply. Java SE 8 for the Really Impatient



601、单词 jnlp 的匹配文本:


  1. Then, prepare a descriptor file in the Java Network Launch Protocol (JNLP) format. Core Java Volume I Fundamentals 9th Edition


  2. If you are in a situation where you can ensure that users have a JRE installed (such as inside a corporate environment), then applets (or JNLP/Java Web Start, described later in this chapter) might be the perfect way to distribute client programs and automatically update everyone’s machine without the usual cost and effort of distributing and installing new software. Thinking in Java 4th Edition


  3. When you click on the Launch button on either of these sites in Firefox, the browser will ask if you want to open a file called jenkins.jnlp using Java Web Start. Jenkins The Definitive Guide


  4. A future version of this ation may require that Java EE products be able to deploy application clients that allows them to be launched by a JNLP client, and that application ntainers be able to launch application clients deployed using the JNLP. Java EE 7 Specification


  5. The Embedding a JNLP file in an HTML page recipe provides a demonstration of this technique. Java 7 New Features Cookbook


  6. If the URL of a JNLP (Java Network Launching Protocol) is specified on the command line, javaws launches the specified application. Java in a Nutshell 5th Edition


  7. Underneath the covers, Java Web Start provides a network launching protocol called JNLP. Java 7 Recipes A Problem-Solution Approach



602、单词 auth 的匹配文本:


  1. The token lifetime can be configured with the timeout (in seconds) setting in the couch_httpd_auth configuration section. CouchDB The Definitive Guide


  2. Getting ready Install the Twitter plugin (http://wiki.hudson-ci.org/display/HUDSON/ Twitter+Plugin) and download auth.jar from the same wiki page. Jenkins Continuous Integration Cookbook


  3. And if your Jenkins server requires authentication, just pass in the -auth username:password option: Jenkins The Definitive Guide


  4. Hadoop Auth provides HTTP SPNEGO authentication for protected web application resources, and sets a signed HTTP cookie that contains a Kerberos authentication token (which can be used until the cookie expires) Professional Hadoop Solutions


  5. App annotat in whic authent Users”) roles, w environ all auth method. Java EE 7 Specification


  6. To do this, the server uses the setNeedClientAuth( ) method on its server socket as follows: Java Security 2nd Edition


  7. This ensures that the getUserPrincipal, getRemoteUser, and getAuthType methods return valid values. Java EE 7 Essentials


  8. The AuthTest program authenticates a user and runs a simple action that retrieves a system property. Core Java Volume II Advanced Features 9th Edition


  9. If your server desires or requires authentication by its clients, call setWantClientAuth( ) or setNeedClientAuth( ) Java in a Nutshell 5th Edition


  10. Next, we set the needClientAuth parameter in the SSL transport URI, which instructs the broker to check connecting client certificates and allow access only to those that are found in the truststore. ActiveMQ in Action



603、单词 arg 的匹配文本:


  1. Inspect the local variables and check the value of the arg variable: Core Java Volume I Fundamentals 9th Edition


  2. One can validly pop types matching the argument types given in Descriptor and an uninitialized type, UninitializedArg, off the incoming operand stack, yielding OperandStack. The Java Virtual Machine Specification Java SE 7 Edition


  3. That parameter will now be available in the Oozie application execution context, and can be used, for example, as a parameter for java action invocation inside the <arg> element. Professional Hadoop Solutions


  4. Entities A POJO with a no-arg public constructor is used to define the mapping with one or more relational database tables. Java EE 7 Essentials


  5. Implement a class with a method public static void premain(String arg, Instrumentation instr) Core Java Volume II Advanced Features 9th Edition


  6. Do this by using one of the constructors other than the no-arg constructor. Java in a Nutshell 5th Edition


  7. Although the Serializable interface requires serializable objects to have no-arg constructors, deserialized objects do not actually use that (or any) constructor. Java Performance Tuning 2nd Edition


  8. Also, when discussing invocations of the form obj.msg(arg), the recipient (that is, the object bound to variable obj) is called the target object. Concurrent Programming in Java Design Principles and Pattern


  9. Note You will need an empty (no-arg) constructor for classes that implement the Externalizable interface. Java 7 Recipes A Problem-Solution Approach


  10. The standard idiom is to wrap the code in a no-arg lambda: Java SE 8 for the Really Impatient



604、单词 subtypes 的匹配文本:


  1. Note that the last four subtypes are interfaces—the virtual machine instantiates suitable classes that implement these interfaces. Core Java Volume I Fundamentals 9th Edition


  2. If you had a hundred different lambdas for expressing a Comparator, that would mean a hundred different subtypes of Comparator. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. There are actually several subtypes of FileCollection that may be in use in any of these cases. Gradle Beyond The Basics


  4. Finally, all the key and value types   must be subtypes of Writable , which ensures a serialization interface for Hadoop to send the data around in a distributed cluster. Hadoop in Action


  5. The Liskov substitution principle says that any important property of a type should also hold for its subtypes, so that any method written for the type should work equally well on its subtypes [Liskov87] Effective Java 2nd Edition


  6. The other two types were both of the type application, but had different subtypes. Java 7 New Features Cookbook


  7. When defining an abstract type (e.g., Shape) that you expect to have many subtypes (e.g., Circle, Rectangle, Square), you are often faced with a choice between interfaces and abstract classes. Java in a Nutshell 5th Edition


  8. In addition, nonstandard custom types and subtypes can be freely defined as long as they begin with x- Java Network Programming 4th Edition


  9. Therefore, the following would be valid assignments because both Integer and Double are subtypes of Number: Java 7 Recipes A Problem-Solution Approach


  10. In general, reading is covariant (subtypes are okay) and writing is contravariant (supertypes are okay) Java SE 8 for the Really Impatient



605、单词 ceph 的匹配文本:


  1. Being a part of Hadoop core and serving as a storage layer for the Hadoop MapReduce framework, HDFS is also a stand-alone distributed file system like Lustre, GFS, PVFS, Panasas, GPFS, Ceph, and others. HDFS scalability the limits to growth


  2. MooseFS (Moose File System) is a shared file system ; it implements the same rough concepts of shared storage solutions - such as Ceph, Lustre or even GlusterFS. bk-compute-adminguide-grizzly


  3. Rados block device (RBD) Stores images inside of a Ceph storage cluster using Ceph's RBD interface. bk-admin-guide-cloud-latest


  4. Abstract We have developed Ceph, a distributed file system that provides excellent performance, reliability, and scalability. Ceph A Scalable, High-Performance Distributed File System


  5. Ceph [17] has a cluster of namespace servers (MDS) and uses a dynamic subtree partitioning algorithm in order to map the namespace tree to MDSs evenly. The Hadoop Distributed File System


  6. Built as part of the Ceph distributed file system [27], RADOS facilitates an evolving, balanced distribution of data and workload across a dynamic and heterogeneous storage cluster while providing applications with the illusion of a single logical object store with well-defined safety semantics and strong consistency guarantees. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.


  7. Ceph was originally developed by one of the founders of DreamHost and is currently used in production there. OpenStack Operations Guide



606、单词 geospatial 的匹配文本:


  1. On the other hand, only MyISAM supports geospatial search inside MySQL. High Performance MySQL 3rd Edition


  2. It combines the ability to scale out with features such as secondary indexes, range queries, sorting, aggregations, and geospatial indexes. MongoDB The Definitive Guide 2nd Edition


  3. A typical example would be geospatial processing based on the bounding box discussed in the following example. Professional Hadoop Solutions


  4. There are also examples for building an efficient geospatial row key and performing batch analysis using MapReduce. Hadoop RealWorld Solutions Cookbook


  5. Recently, David has been focusing his attention on the intersection of geospatial technologies with Lucene and Solr. Solr 3 Enterprise Search Server


  6. In chapter 8, you get a glimpse at using HBase for geospatial data. HBase in Action


  7. It supports powerful full-text search, hit highlighting, faceted search, dynamic clustering, database integration, rich document handling (for example, Word and PDF), and geospatial search. Hadoop MapReduce Cookbook


  8. In that time, graph databases have helped solve important problems in the areas of social networking, master data management, geospatial, recommendations, and more. Graph Databases


  9. Leveraging Geospatial Indexes One form of indexing worthy of special mention is geospatial indexing. The Definitive Guide to MongoDB


  10. The kinds of indexes supported include all the ones you’d find in an RDMBS; ascending, descending, unique, compound-key, and even geospatial indexes are supported. MongoDB in Action



607、单词 postfix 的匹配文本:


  1. Install the Postfix e-mail server to let Nagios send out e-mails: HBase Administration Cookbook


  2. There are actually two forms of these operators; you’ve just seen the postfix form of the operator that is placed after the operand. Core Java Volume I Fundamentals 9th Edition


  3. There are two versions of each type of operator, often called the prefix and postfix versions. Thinking in Java 4th Edition


  4. You can also use a postfix of other criteria to cover queries with the index. MongoDB The Definitive Guide 2nd Edition


  5. Exec and Notify Subscribing a service to a file is very convenient, but what if we need to do something more explicit when a file resource changes? I’ll use a postfix transport map as an example. Managing Infrastructure with Puppet


  6. A postfix expression followed by a ++ operator is a postfix increment expression. The Java Language Specification Java SE 7 Edition


  7. You’ll discover how to use Puppet to manage Postfix, Apache and MySQL servers, as well as how to load-balance your Puppet Masters. Pro Puppet


  8. Two of our highest-volume log formats are produced by the Postfix mail transfer agent and Microsoft Exchange Server. Hadoop:The Definitive Guide 3rd Edition


  9. The columns form the actual counters, and their name is a combination of the date, plus an optional dimensional postfix—for example, the country code. HBase:The Definitive Guide


  10. These operators, in both prefix and postfix forms, are most commonly used to increment or decrement the counter that controls a loop. Java in a Nutshell 5th Edition



608、单词 scalar 的匹配文本:


  1. Not only can you construct an index with scalar values like strings and integers, you can also use JSON structures as keys for your views. CouchDB The Definitive Guide


  2. Each scalar expression in the SELECT clause emits a value at the same level of nesting as the most-repeated input field used in that expression. Dremel - Interactive Analysis of WebScale Datasets


  3. Removing low scoring data If you can score your data with some sort of scalar value, you can filter out records that don’t meet a certain threshold. MapReduce Design Patterns


  4. Unstructured text works well when you’re working with scalar or tabular data. Hadoop in Practice


  5. Some eval functions are aggregate functions, which means they operate on a bag of data to produce a scalar value; MAX is an example of an aggregate function. Hadoop:The Definitive Guide 3rd Edition


  6. The simplest form of the update request accepts a partial document as the "doc" parameter which just gets merged with the existing document—objects are merged together, existing scalar fields are overwritten. Elasticsearch The Definitive Guide


  7. A scalar function is a function that returns a single value. Core Java Volume II Advanced Features 9th Edition


  8. These include filter functions (eval functions that return a Boolean) and aggregate functions (eval functions that take a bag and return a scalar value) Hadoop in Action


  9. This pattern fuses together two scalar values with a separator to create an aggregate. Cassandra The Definitive Guide


  10. Similarly, array objects holding scalar elements possess locks, but their individual scalar elements do not. Concurrent Programming in Java Design Principles and Pattern



609、单词 pojos 的匹配文本:


  1. In the next section we will look into the various way to serialize Pojos and how Netty allows you to do so by make use of different serialization libraries. Netty in Action MEAP V08


  2. In Java, classes that follow the bean conventions are called plain-old Java objects (POJOs) Gradle in Action


  3. JavaBeans (also known as POJOs, for Plain Old Java Objects) provide a standard mechanism for creating Java resources that are configurable in a number of ways. Pro Spring 3


  4. Indexing POJOs POJOs (Plain Old Java Objects) typically follow the JavaBean naming pattern for properties that each have a getter and setter method. Solr 3 Enterprise Search Server


  5. You can also define listeners for all these events as annotated POJOs. Spring Batch in Action


  6. Thanks to this mechanism, simple POJOs can be exposed as OSGi services, and OSGi services can be injected into regular Spring beans by using the appropriate elements. Spring Dynamic Modules in Action


  7. Transactional annotation brings transactional semantics to POJOs (plain old Java objects), outside of an EJB (Enterprise JavaBean) Java EE 7 Essentials


  8. These are Plain Old Java Objects (POJOs) that act as if they’re message driven. ActiveMQ in Action


  9. This makes it easy to cache the results of method calls in your POJOs without having to explicitly manage the process of checking for the existence of a cache entry, loading new ones, and expiring old cache entries. Spring Data Modern Data Access for Enterprise Java


  10. It empowered plain old Java objects (POJOs) with powers previously only available using EJB and other enterprise Java specifications. Spring in Action 4th Edition



610、单词 deserialization 的匹配文本:


  1. Passing by reference eliminates a serialization and deserialization for the key/value, a potential speed increase. Pro Hadoop


  2. If the versions are different you may run into issues, for example, not being able to connect or problems with response deserialization. Mastering ElasticSearch


  3. Deserialization of this Bloom filter is demonstrated in the setup method of the following Mapper code. MapReduce Design Patterns


  4. No serialization or deserialization of objects (both memory and processing) Professional Hadoop Solutions


  5. Serialization and deserialization take data from an in-memory form and persist it to a back-end data store. Cassandra High Performance Cookbook


  6. You can also review a Google Code project called hive-json-serde,9 which can support both serialization and deserialization. Hadoop in Practice


  7. Deserialization is the reverse process of turning a byte stream back into a series of structured objects. Hadoop:The Definitive Guide 3rd Edition


  8. The constructor without any parameters is only for deserialization purposes and should not be used directly. HBase:The Definitive Guide


  9. However, this proved to be inefficient because of the serialization and deserialization costs associated with translating to and from Sawzall’s native type system. Tenzing - A SQL Implementation On The MapReduce Framework


  10. The main purpose of this interface is to provide mechanisms for the serialization and deserialization of data as it is passed across the network or read and written from the disk. Hadoop Beginners Guide



611、单词 nontrivial 的匹配文本:


  1. It does, however, add a nontrivial amount of load to the Nagios server. Monitoring with Ganglia


  2. To bring everything together, I take you through the step-by-step development of a nontrivial MapReduce application. Pro Hadoop


  3. Building a system for general-purpose, distributed, parallel computation is nontrivial. HBase in Action


  4. The objective of this part of the book is to present techniques to address nontrivial questions asked about your data, and to create new insights into your data. Hadoop in Practice


  5. A natural question to ask is: can you do anything useful or nontrivial with it? The answer is yes. Hadoop:The Definitive Guide 3rd Edition


  6. Selecting one server type over the others is a nontrivial task, as it depends on your use case. HBase:The Definitive Guide


  7. Decomposing a data processing application into mappers and reducers is sometimes nontrivial. Hadoop in Action


  8. Not to mention the administration overhead, which can be nontrivial if things start breaking in the early hours of the morning. Hadoop Beginners Guide


  9. To demonstrate the use of CLUSTER BY, let’s see a nontrivial example: another way to perform the Word Count algorithm that we introduced in Chapter 1 Programming Hive


  10. Yet all of the parallel databases mentioned above have a nontrivial cost, often coming with seven figure price tags for large installations. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



612、单词 datacenter 的匹配文本:


  1. The combined volume of events is written together in HDFS in datacenter 1 Apache Flume Distributed Log Collection for Hadoop


  2. The underlying data is stored in a scalable NoSQL datastore in each datacenter (see Figure 1) Megastore - Providing Scalable, Highly Available Storage for Interactive Services


  3. The official NVML module is a valuable tool for cluster administrators who manage GPUs in an HPC cluster or datacenter environment. Monitoring with Ganglia


  4. Zones are also the unit of physical isolation: there may be one or more zones in a datacenter, for example, if different applications’ data must be partitioned across different sets of servers in the same datacenter. Spanner - Google’s Globally-Distributed Database


  5. Chapter 8, Multiple Datacenter Deployments: Cassandra is designed to work both when nodes are deployed in a local area network and when nodes are separated by larger geographical distances such as a wide area network. Cassandra High Performance Cookbook


  6. All messages that users write or read are stored in HBase.16 The system supporting Facebook messages needs to deliver high write throughput, extremely large tables, and strong consistency within a datacenter. HBase in Action


  7. Cluster mirroring in Kafka The Kafka mirroring feature is used for creating the replica of an existing cluster, for example, for the replication of an active datacenter into a passive datacenter. Apache Kafka


  8. Each datacenter has multiple racks (R), and each rack has multiple machines. Hadoop in Action


  9. Figure Kafka cluster co-located with each datacenter where our userfacing services run. Kafka a Distributed Messaging System for Log Processing


  10. Also, the “peaky” nature of the MapReduce workload made it hard to fully utilize the resources of a datacenter compared to Percolator’s much smoother resource usage. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



613、单词 hudson 的匹配文本:


  1. Hudson started out as an open source project in 2004 at Sun Microsystems. Gradle in Action


  2. The second script iterates through instances of slave objects (http://javadoc.jenkins-ci.org/hudson/slaves/SlaveComputer.htm) Jenkins Continuous Integration Cookbook


  3. For a CI (Continuous Integration) system, we advise you to check out Jenkins4 (which was called Hudson before they changed the name for legal reasons) Pro Spring MVC


  4. Seven years ago, I wrote the first line of code that started this whole project that is now known as Jenkins, and was originally called Hudson. Jenkins The Definitive Guide


  5. The sole purpose of this module is to output test results, in JUnit XML format, to the console upon test completion (YUI supports other output formats that you can use instead; use whatever your build tool understands—for example, Hudson/Jenkins understands JUnit XML) Testable JavaScript


  6. In most cases, the platform was sitting next to a Hudson/Jenkins build server in a continuous integration setup. Sonar Code Quality Testing Essentials


  7. This approach is ideal when a large number of developers are sharing a project, or with continuous integration tools such as Hudson that build and test code in a completely automated and unattended manner. Cassandra High Performance Cookbook


  8. If you want to download the most cutting-edge builds, you can get the source from Hudson, which the Cassandra project uses as its Continuous Integration tool. Cassandra The Definitive Guide


  9. His current topics of research center around project automation, including: build tools (Gradle, Leiningen, Maven, Ant), distributed version control (Git, Mercurial), testing frameworks (Geb, Spock, JUnit, TestNG, Mockito), continuous integration (Jenkins, Hudson, Bamboo) and code quality metrics (Sonar, CodeNarc, PMD) Building and Testing with Gradle


  10. The first book to include detailed screenshots and recipes for using Jenkins continuous integration server (formerly known as Hudson) Selenium 2 Testing Tools Beginner's Guide



614、单词 fibonacci 的匹配文本:


  1. Programming tasks such as calculating factorial, Fibonacci numbers, anagrams, and Sierpinski carpet are just a few of the well-known tasks that can be accomplished through the recursive programming technique. Pro Java 7 NIO.2


  2. Here’s a second implementation of Generator, this time to produce Fibonacci numbers: Thinking in Java 4th Edition


  3. The Fibonacci series is famous as a classic programming exercise. Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. Another set of problems that are not applicable for MapReduce are recursive problems (for example, a Fibonacci problem) Professional Hadoop Solutions


  5. We chose to calculate a Fibonacci number in our test program because we used a. Java Threads 3rd Edition


  6. The second measures function invocation using a recursive function to calculate the first 35 Fibonacci numbers. Interpreting the Data Parallel Analysis with Sawzall


  7. The running time is analyzed in much the same way as for the program that computes the Fibonacci numbers. Data Structures and Algorithm Analysis in Java 3rd Edition


  8. Let’s start with a very simple example: calculating Fibonacci numbers: Beginning Scala


  9. Fibonacci, also known as Leonardo di Pisa, in his thirteenth century book Liber abaci posed the following question: Two young rabbits, one of each sex, are placed on an island. Java Performance


  10. We'll illustrate the basic steps with a very boring and unrealistic, but very simple classic example: recursively computing fib, the Fibonacci function. Concurrent Programming in Java Design Principles and Pattern



615、单词 ints 的匹配文本:


  1. Finally, you see the use of the += operator to append a string to s, and the use of parentheses to control the order of evaluation of the expression so that the ints are actually summed before they are displayed. Thinking in Java 4th Edition


  2. Mark the channel finish • Read all ints out of the outbound output of the EmbeddedChannel and check if it only. Netty in Action MEAP V08


  3. For example, you can convert an array of primitive ints into an IntStream as follows: Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. These particular tables are sum tables; they add up the values emitted to them, ints or floats as appropriate. Interpreting the Data Parallel Analysis with Sawzall


  5. But the most serious problem with this technique is that when you access an array that is indexed by an enum’s ordinal, it is your responsibility to use the correct int value; ints do not provide the type safety of enums. Effective Java 2nd Edition


  6. Therefore, if you want to do anything with the bytes returned by getAddress(), you need to promote the bytes to ints and make appropriate adjustments. Java Network Programming 4th Edition


  7. Any data type manipulation other than with ints or booleans produced highly varying and misleading times. Java Performance Tuning 2nd Edition


  8. A TermFreqVector instance has several methods for retrieving the vector information, primarily as matching arrays of Strings and ints (the term value and frequency in the field, respectively) Lucene in Action 2nd Edition


  9. By defining these constants as ints, it is possible to assign an invalid value to a variable that is supposed to only be allowed to hold one of the constant values: Java 7 Recipes A Problem-Solution Approach


  10. NOTE: The Random class has methods ints, longs, and doubles that return primitive type streams of random numbers. Java SE 8 for the Really Impatient



616、单词 abort 的匹配文本:


  1. If a test fails, the project will abort, but if all tests pass, the project continues. Gradle Effective Implementation Guide


  2. The coordinator leader then logs a commit record through Paxos (or an abort if it timed out while waiting on the other participants) Spanner - Google’s Globally-Distributed Database


  3. The do attribute value of abort tells Tsung to abort the session if the match condition is true. Scaling CouchDB


  4. You don’t want to abort processing the file if a line is malformed, so you update a counter and. Hadoop in Practice


  5. Use the timeout because it is important to your SLA, not because you want to abort the execution of long running queries. Elasticsearch The Definitive Guide


  6. This is particularly useful in very long running jobs where the errors may cause you to abort the job. Hadoop Beginners Guide


  7. If the shared edits path is not writable or becomes unavailable for any reason, the namenode process will abort. Hadoop Operations


  8. After you’re finished with the transaction, you can either commit it or abort it by sending the appropriate frame (COMMIT or ABORT), of course with the transaction ID passed as the transaction header. ActiveMQ in Action


  9. Since cleanup is synchronized on the primary lock, it is safe to clean up locks held by live clients; however, this incurs a performance penalty since rollback forces the transaction to abort. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications


  10. This approach is different from most parallel databases which abort unfinished queries upon a node failure and restart the entire query processing (using a replica node instead of the failed node) HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



617、单词 logn 的匹配文本:


  1. There is a recursive and relatively complicated O(N logN) solution to this problem, which we now describe. Data Structures and Algorithm Analysis in Java 3rd Edition



618、单词 pagination 的匹配文本:


  1. As we’ll see in Part III, once you have a working list, adding pagination is trivial. CouchDB The Definitive Guide


  2. Repeat this 11 times, and verify that pagination is displayed. Gradle in Action


  3. Run the script ant pipe the output to more command to control pagination: Cassandra High Performance Cookbook


  4. It allows you to create, modify, and delete databases and documents as you please, and it has advanced pagination and sorting functionality on every screen. Beginning CouchDB


  5. A filter that uses this functionality is the PageFilter, checking if the number of rows to be returned for one iteration in the pagination process is reached, returning true afterward. HBase:The Definitive Guide


  6. And you can use the from and size parameters for pagination: Elasticsearch The Definitive Guide


  7. Always be careful when working with textual data such as capitalization, punctuation, hyphenation, pagination, and other aspects, as they can skew how the data is perceived. Hadoop Beginners Guide


  8. Use pagination to restrict the number of entities retrieved from the database. Java Performance


  9. Java code is presented in various formats as dictated by space and pagination considerations. Fundamental Networking in Java


  10. Each increment of results displayed is called a page, and the process of navigating through the results is called pagination. Pro JPA2



619、单词 bmi 的匹配文本:


  1. Here is an example of a BMI Calculator application page and HTML code written to render this page in a browser as displayed in the following screenshots: Selenium Testing Tools Cookbook



620、单词 functionalities 的匹配文本:


  1. The current mailing-lists are hosted at SourceForge and the search functionalities are subpar. Monitoring with Ganglia


  2. For this purpose, we discussed two useful functionalities: deploying a WAR file to a CloudBees web container and retrieving runtime information about this application. Gradle in Action


  3. A plugin basically adds extra functionalities such as tasks and properties to our project. Gradle Effective Implementation Guide


  4. In addition to that, it covers functionalities that allow us to troubleshoot ElasticSearch, such as describing how segments merging works, how to see what ElasticSearch does beneath its high-level interface, and how to limit the I/O operations. Mastering ElasticSearch


  5. In addition, similar new functionalities ought to be straightforward to implement and maintainable in the long term. Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. We are going to demonstrate the basic functionalities provided by Guava and how it can help with some of the common everyday tasks encountered in programming. Getting Started with Google Guava


  7. To make it work across a cluster of distributed machines, we find that we need to add a number of functionalities: Hadoop in Action


  8. The failover transport connector plays an important role in achieving advanced functionalities such as high availability and load balancing as will be explained in chapter 12 ActiveMQ in Action


  9. With each version, Java increases the functionalities offered to programmers to facilitate the development of concurrent programs. Java 7 Concurrency Cookbook


  10. Via the use of the Calendar add() method, each of these two functionalities can be easily performed. Java 7 Recipes A Problem-Solution Approach



621、单词 etl 的匹配文本:


  1. Chapter 6, Interceptors, ETL, and Routing, explains how to transform data in flight as well as extract information from the payload to use with channel selectors to make routing decisions. Apache Flume Distributed Log Collection for Hadoop


  2. Chukwa: A Monitoring Service Chukwa’s goal is to provide extract, transform, and load (ETL) services for cluster logging data, thereby providing end users with a simple and efficient way to find the logging events that are actually important. Pro Hadoop


  3. They might use a combination of Pig and MapReduce for extract, transform, load (ETL) implementation; MapReduce for the actual data processing; and Hive for analytic queries. Professional Hadoop Solutions


  4. The next recipe, Setting up a "Shadow" data center for running only MapReduce Jobs shows how to use Cassandra's built-in replication to partition a cluster with nodes dedicated for ETL-type workloads and others dedicated for serving low-latency requests. Cassandra High Performance Cookbook


  5. Chapter 3, Extracting and Transforming Data, includes recipes that show basic Hadoop ETL over several different types of data sources. Hadoop RealWorld Solutions Cookbook


  6. Introduction Hadoop MapReduce together with the supportive set of projects makes for a good framework choice to process large text datasets and to perform ETL-type operations. Hadoop MapReduce Cookbook


  7. DataBee An in-house Extract, Transform, Load (ETL) workflow software that is used to provide a common framework for reliable batch processing across all data processing jobs. Hadoop:The Definitive Guide 3rd Edition


  8. For example, we often use MapReduce   in the ETL-like process of taking humongous log files and computing a much smaller and more manageable set of statistics for analysts to look at. Hadoop in Action


  9. There are many ways of building workflows; a common approach is with Extract Transform and Load (ETL) tools such as Pentaho Kettle (http://kettle.pentaho.com) and Spring Batch (http://static.springsource.org/spring-batch) Hadoop Beginners Guide


  10. Those that primarily run ETL-style or other high input to output data ratio MapReduce jobs may prefer the additional bandwidth of a 10 Gb network. Hadoop Operations



622、单词 summarizes 的匹配文本:


  1. It knows what hosts exist, and what metrics are available for those hosts, but it doesn’t make you click through hierarchal lists of metrics to see graphs; rather, it graphically summarizes the entire grid using graphs that combine metrics by cluster and provides sane click-throughs for increased specificity. Monitoring with Ganglia


  2. Figure 10 summarizes the results graphically, considering the impact of scaling ttask as an additional dimension. Omega - flexible, scalable schedulers for large compute clusters


  3. Table 2 summarizes the name-node throughput with respect to the two internal operations. HDFS scalability the limits to growth


  4. For reference, see Figure 3 which summarizes the repetition and definition levels for all atomic fields in our sample records. Dremel - Interactive Analysis of WebScale Datasets


  5. As a result, Spanner requires a scope expression for every read-only transaction, which is an expression that summarizes the keys that will be read by the entire transaction. Spanner - Google’s Globally-Distributed Database


  6. Table 6-5 summarizes the main elements and attributes of the XML Coordinator language. Professional Hadoop Solutions


  7. One of the most fundamental Hadoop jobs at Last.fm takes the incoming listening data and summarizes it into a format that can be used for display purposes on the Last.fm website as well as for input to other Hadoop programs. Hadoop:The Definitive Guide 3rd Edition


  8. Figure 9-2 summarizes the effects of using the KeyValue fields. HBase:The Definitive Guide


  9. Table 10.2 summarizes the read and write operators in Pig Latin. Hadoop in Action


  10. Google Analytics summarizes this data and makes it available to webmasters. Bigtable - A Distributed Storage System for Structured Data



623、单词 vmware 的匹配文本:


  1. The libvirt project has created a common set of tools for managing virtualization resources on different virtualization platforms, currently including: Xen, QEMU, KVM, LXC, OpenVZ, User Mode Linux, VirtualBox, and VMware ESX and GSX. Monitoring with Ganglia


  2. Configuration Files for the Sample Cluster The examples provided in this section were run using the VMware images provided by Cloudera as part of its boot camp (http://www.cloudera.com/hadoop-training-basic) Pro Hadoop


  3. VMware, the company behind Spring and Grails, made significant investments in choosing Gradle. Gradle in Action


  4. Another class of related technologies comes from the world of cloud infrastructures such as EC2, Azure, Eucalyptus and VMWare offerings. Apache Hadoop YARN Yet Another Resource Negotiator


  5. It also includes Nectar-only functionality such as automatic scaling to VMWare virtual machines. Jenkins The Definitive Guide


  6. Cloudera makes the distribution available in a number of different formats: source and binary tar files, RPMs, Debian packages, VMware images, and scripts for running CDH in the cloud. HBase:The Definitive Guide


  7. For the purpose of producing JRockit examples, the author has used the hosted hypervisor VMware Fusion to run a Linux version of JRockit on his home computer. Oracle JRockit The Definitive Guide


  8. In March of 2010, VMWare took over as project sponsor of Redis. Cassandra The Definitive Guide


  9. For performance or scalability testing, you would use real hardware in a cluster configuration.) You run the VM in VMWare, KVM, or VirtualBox, start the Impala service through the Cloudera Manager web interface, and then interact with Impala through the impalashell interpreter or the ODBC and JDBC interfaces. Cloudera Impala


  10. Most of the preconfigured virtual machines (VMs) available are only designed for VMWare, but if you prefer VirtualBox you may find instructions on the Web that explain how to import a particular VM into VirtualBox. Programming Hive



624、单词 liveness 的匹配文本:


  1. Specifically, a per-cluster ResourceManager (RM) tracks resource usage and node liveness, enforces allocation invariants, and arbitrates contention among tenants. Apache Hadoop YARN Yet Another Resource Negotiator


  2. Concurrent programming involves a fundamental tradeoff between safety (avoiding errors such as update conflicts) and liveness (responding quickly to clients) NoSQL Distilled


  3. In most cases, existing replication traffic serves as a passive confirmation of liveness, with no additional communication overhead. Ceph A Scalable, High-Performance Distributed File System


  4. Cascading aims to help developers build powerful applications quickly and simply, through a well-reasoned API, without needing to think in MapReduce, and while leaving the heavy lifting of data distribution, replication, distributed process management, and liveness to Hadoop. Hadoop:The Definitive Guide 3rd Edition


  5. Though it is not important to understand what the code generator has done here in detail, the main idea is that several program points in the assembly code are annotated with liveness information. Oracle JRockit The Definitive Guide


  6. The result is a liveness failure: the program fails to make progress. Effective Java 2nd Edition


  7. In particular, multithreaded servers (and other multithreaded programs) require developers to address concerns that aren’t issues for single-threaded programs, particularly issues of safety and liveness. Java Network Programming 4th Edition


  8. The HotSpot VM’s JIT compilers use a bytecode analysis called Method Liveness that computes for every Java local field whether there’s a bytecode later in the method that might use its value. Java Performance


  9. Liveness failures lead to no behavior — things just stop running. Concurrent Programming in Java Design Principles and Pattern


  10. Percolator uses simple mechanisms to determine the liveness of another transaction. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



625、单词 derby 的匹配文本:


  1. Start the Oozie web application (with an internal Tomcat web server and Derby database) Professional Hadoop Solutions


  2. By default Hive uses Derby to store the metastore, which is an embedded Java relational database. Hadoop in Practice


  3. By default, the metastore service runs in the same JVM as the Hive service and contains an embedded Derby database instance backed by the local disk. Hadoop:The Definitive Guide 3rd Edition


  4. If this is your first experience with databases, we recommend that you use the Apache Derby database that is a part of most versions of JDK 7 Core Java Volume II Advanced Features 9th Edition


  5. Out-of-the-box Hive comes with an open source, lightweight, embedded SQL database called Derby, 4 which is installed and run on the client machine along with Hive. Hadoop in Action


  6. The Derby database engine will be used for the database examples. Java 7 New Features Cookbook


  7. Similarly, the JDBC channel uses an embedded Derby database to store events in a recoverable fashion. Hadoop Beginners Guide


  8. When using the JDBC message store, the default JDBC driver used in ActiveMQ is Apache Derby. ActiveMQ in Action


  9. By default, Hive uses a built-in Derby SQL server, which provides limited, singleprocess storage. Programming Hive


  10. Solution Use an embedded database such as the Derby database. Java 7 Recipes A Problem-Solution Approach



626、单词 encapsulation 的匹配文本:


  1. Encapsulation (sometimes called information hiding) is a key concept in working with objects. Core Java Volume I Fundamentals 9th Edition


  2. Code sources An encapsulation of the location from which certain Java classes were obtained. Java Security 2nd Edition


  3. JavaServer Faces • Faces Flow provides an encapsulation of related views/pages with applicationdefined entry and exit points. Java EE 7 Essentials


  4. On the other hand, most scripting languages lack features that are beneficial for programming complex applications, such as strong typing, encapsulation, and modularity. Core Java Volume II Advanced Features 9th Edition


  5. This concept, known as information hiding or encapsulation, is one of the fundamental tenets of software design [Parnas72] Effective Java 2nd Edition


  6. When applied to fields, this ability to hide members enables an object-oriented design technique known as data encapsulation. Java in a Nutshell 5th Edition


  7. It’s a picture that makes some NoSQL solutions seem perhaps less radical and less scary than we may have thought at first, and more like a natural expression and encapsulation of some of the work that was already being done to manage very large databases. Cassandra The Definitive Guide


  8. These specifications enable encoding of XML content as MIME body parts and encapsulation of those parts within SOAP 1.2 envelopes. Java Performance


  9. Object-oriented concurrent programming differs from multithreaded systems programming in languages such as C mainly due to the encapsulation, modularity, extensibility, security, and safety features otherwise lacking in C. Concurrent Programming in Java Design Principles and Pattern


  10. This encapsulation can help to make code more readable and reusable. Java 7 Recipes A Problem-Solution Approach



627、单词 subsets 的匹配文本:


  1. A common pattern in most languages, frameworks, and databases is using types to distinguish between subsets of your data. CouchDB The Definitive Guide


  2. Filtering is the way to pull subsets back out and deliver them to analysis shops that are interested in just that subset. MapReduce Design Patterns


  3. These subsets (or partitions) are the inputs to the reduce tasks. Professional Hadoop Solutions


  4. Instead of passing the whole dataset, similar to how the EvalFunc class works, the Accumulator interface allows for subsets of the data to be passed to the UDF. Hadoop RealWorld Solutions Cookbook


  5. They don’t need to have all the tuples in a group at one time to perform their operations, and they can work on subsets of the data and produce intermediate values that can be aggregated in the reducer. Hadoop in Practice


  6. Views may also be used to restrict users’ access to particular subsets of tables that they are authorized to see. Hadoop:The Definitive Guide 3rd Edition


  7. If you only need subsets of the data, narrowing the scan’s scope is playing into the strengths of HBase, since data is stored in column families and omitting entire families from the scan results in those storage files not being read at all. HBase:The Definitive Guide


  8. Furthermore, the equivalent transformation property must hold when the combiner is applied to arbitrary subsets of the intermediate data. Hadoop in Action


  9. Through the use of multiple partition columns, it is possible to create a rich hierarchical structure and for large tables with queries that require only small subsets of data it is worthwhile spending some time deciding on the optimal partitioning strategy. Hadoop Beginners Guide


  10. Also, whether you move old data to an “archive” location or delete it outright, the risk of tampering with newer data is reduced since the data subsets are in separate directories. Programming Hive



628、单词 validly 的匹配文本:


  1. An aaload instruction is type safe iff one can validly replace types matching int and an array type with component type ComponentType where ComponentType is a subtype of Object, with ComponentType yielding the outgoing type state. The Java Virtual Machine Specification Java SE 7 Edition


  2. If a client holds a proxy to an object in the server, it is important that the server does not garbage-collect that object until the client releases the proxy (and it can be validly garbage-collected) Java Performance Tuning 2nd Edition



629、单词 ejbs 的匹配文本:


  1. These technologies are suited to mediumto large-scale application development, and include topics such as Enterprise Java Beans (EJBs), Java Server Pages (JSPs), and much more. Java Network Programming and Distributed Computing


  2. Much of the extra work in Enterprise JavaBeans (EJBs), for example, is eliminated through the use of annotations in EJB3.0 Thinking in Java 4th Edition


  3. On the reverse side, Spring also provides simple annotation for injecting Spring beans into EJBs. Pro Spring 3


  4. All applica base na names r server i conflict new un differen a default application name of "bigapp", and defines four modules with names "ejbs/inventory", "ejbs/accounts", "ui/store", and "ui/admin" Java EE 7 Specification


  5. You can use managed beans to capture the data, session scope variables to pass information between pages, button clicks to invoke the business logic in backing EJBs, and (conditional) navigation rules to go from one page to another. Java EE 7 Essentials


  6. For this reason, Java Performance Tuning, Second Edition includes four new chapters: a new chapter on J2EE application tuning in general followed by chapters on tuning JDBC, servlets and JSPs, and EJBs. Java Performance Tuning 2nd Edition


  7. Just as with other APIs such as JDBC, JNDI, EJBs, and so on, it’s common to abstract the use of JMS APIs so as to not intermingle the JMS code with the business logic. ActiveMQ in Action


  8. One general tuning guideline is to set the steady state pool size to the number of hardware threads and maximum size to be equal to the maximum size of the HTTP worker thread pool (plus ORB thread pool size if remote EJBs or MDBs are invoked) Java Performance


  9. As a result, many web applications today sidestep EJBs entirely, going directly from servlets to the database. Pro JPA2


  10. But even though early EJBs were such an easy target, invasive programming could easily be found in earlier versions of Struts, WebWork, Tapestry, and countless other Java specifications and frameworks. Spring in Action 4th Edition



630、单词 supertype 的匹配文本:


  1. In a nutshell, the compiler autoboxed the parameters into a Double and two Integer objects, and then it tried to find a common supertype of these classes. Core Java Volume I Fundamentals 9th Edition


  2. That is, v is a subtype of X if the direct supertype of v is a subtype of X. The Java Virtual Machine Specification Java SE 7 Edition


  3. It’s also possible to go the other way, and use supertype wildcards. Thinking in Java 4th Edition


  4. The behavior of these supertypes may be important in some cases, but we’ll confine our attention to the common supertype here. Gradle Beyond The Basics


  5. Here, the referent can be inserted into any queue whose element type is a supertype of the type T of the referent; T is the lower bound for the wildcard. The Java Language Specification Java SE 7 Edition


  6. In object-oriented polymorphism, two subtypes can be referenced similarly because they implicitly share a common supertype. SQL Antipatterns


  7. Clients of an anonymous class can’t invoke any members except those it inherits from its supertype. Effective Java 2nd Edition


  8. Specifically, we’ll examine the Comparable interface and the Enum class (the supertype of enumerated types, described later in this chapter) and will learn about an important but infrequently used feature of generics known as lowerbounded wildcards. Java in a Nutshell 5th Edition


  9. In this example, ? super Integer means any type that is either an Integer or any supertype of Integer. Java 7 Recipes A Problem-Solution Approach


  10. If the supertype is abstract and has only one abstract method, you don’t even have to give the method name. Java SE 8 for the Really Impatient



631、单词 xmpp 的匹配文本:


  1. Finally, we describe interfacing directly with CouchDB from Erlang, which can be a useful technique if you want to integrate CouchDB storage with a server for non-HTTP protocols, like SMTP (email) or XMPP (chat) CouchDB The Definitive Guide


  2. By 2005, Extensible Messaging and Presence Protocol (XMPP) had become a respected standard for open instant messaging, and one of the foremost implementations was the Erlang-based ejabberd server package by Alexey Shchepin. RabbitMQ in Action


  3. Most did not stick, and those that did, like SOAP and XMPP, are on the complex side of things. ZeroMQ


  4. Using the XMPP protocol with Storm to send alerts and notifications Use case. Storm Blueprints Patterns for Distributed Real-time Computation


  5. Tip  Other ideas for Puppet report processors include RSS feeds for new reports, IRC, XMPP or instant messaging, or SMS notifications of new reports. Pro Puppet


  6. The chapter begins with the XMPP adapters that enable plugging into instant messaging systems. Spring Integration in Action


  7. As you can see from the output in the following listing, a number of different adapter options are available, from ftp, jdbc, and jms to some new adapters that were added in recent releases of Roo, such as twitter and xmpp. Spring Roo in Action


  8. There is also coverage of command-line tools, the command agent, use of XMPP, JConsole, and the web console. ActiveMQ in Action



632、单词 getters 的匹配文本:


  1. Basic Getters and Setters The methods in this section get and set basic types: Pro Hadoop


  2. You have to manually define the constructor that initializes all fields, two getters, and two setters. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. This object has two private member variables and getters and setters for each variable. MapReduce Design Patterns


  4. This is another data container class (getters/setters methods are omitted for brevity) Professional Hadoop Solutions


  5. The first part of the implementation is straightforward: there are two Text instance variables, first and second, and associated constructors, getters, and setters. Hadoop:The Definitive Guide 3rd Edition


  6. Note that the getters listed in Table 3-1 for the Put class only retrieve what you have set beforehand. HBase:The Definitive Guide


  7. Add getters/setters by right-clicking on the editor pane and selecting Insert Code (use the Control + I shortcut on Mac) Java EE 7 Essentials


  8. This tells the encoder to call the getName, getSalary, and getHireDay property getters and write the resulting values into the object expression. Core Java Volume II Advanced Features 9th Edition


  9. Hard-line object-oriented programmers feel that such classes are anathema and should always be replaced by classes with private fields and public accessor methods (getters) and, for mutable classes, mutators (setters): Effective Java 2nd Edition


  10. Encapsulate the private fields by making getters and setters to access them. Java 7 Recipes A Problem-Solution Approach



633、单词 jframe 的匹配文本:


  1. The Swing version of this class is called JFrame and extends the Frame class. Core Java Volume I Fundamentals 9th Edition


  2. Swing basics Most Swing applications will be built inside a basic JFrame, which creates the window in whatever operating system you’re using. Thinking in Java 4th Edition


  3. Suppose you want to save a JFrame object to a file so that you can retrieve it later. Core Java Volume II Advanced Features 9th Edition


  4. All the recipes of this chapter use a JFrame-based application. Java 7 New Features Cookbook


  5. After expanding the references, you will eventually see that they are being held by an Icon, which in turn is held by a JFrame. Java 7 Recipes A Problem-Solution Approach



634、单词 threadsafe 的匹配文本:


  1. AtomicLong provides threadsafe methods to modify and retrieve the values of a simple long variable. Programming Concurrency on the JVM


  2. This receives the message and stuffs it into a threadsafe SharedQueue instance inside of the consumer object. RabbitMQ in Action


  3. A set of classes that provide threadsafe operations without synchronization. Java Threads 3rd Edition


  4. As a result, you do have to worry about whether message objects are threadsafe. Programming in Scala 2nd Edition


  5. An entity manager and persistence context are not required to be threadsafe. Java EE 7 Essentials


  6. When writing code that must be threadsafe, you must obtain locks (using a synchronized method or statement) when required. Java in a Nutshell 5th Edition


  7. As long as the containing class accesses the unsafe class only in a threadsafe fashion and as long as it never lets a reference to the private field leak out into another object, the class is safe. Java Network Programming 4th Edition


  8. If you are accessing the values of the map from different threads, you should make sure that the values are threadsafe. Java 7 Recipes A Problem-Solution Approach


  9. However, the object is mutated, and that is not threadsafe. Java SE 8 for the Really Impatient


  10. If the appropriate threadsafe counterpart is not detected, the protective mutex is enabled as the last resort. Understanding MySQL Internals



635、单词 serde 的匹配文本:


  1. It allows you to use a custom serializer and deserializer (known as SerDe) for different file formats. Professional Hadoop Solutions


  2. We explicitly tell the SerDe that a tab character separates each field and a newline character separates each record. Hadoop RealWorld Solutions Cookbook


  3. As we will describe in the later sections, this can be achieved by providing a jar that implements the SerDe java interface to Hive. Hive A Petabyte Scale Data Warehouse Using Hadoop


  4. You can also review a Google Code project called hive-json-serde,9 which can support both serialization and deserialization. Hadoop in Practice


  5. When acting as a deserializer, which is the case when querying a table, a SerDe will deserialize a row of data from the bytes in the file to objects used internally by Hive to operate on that row of data. Hadoop:The Definitive Guide 3rd Edition


  6. Hive uses an input format to split input streams into records, an output format to format records into output streams (i.e., the output of queries), and a SerDe to parse records into columns, when reading, and encodes columns into records, when writing. Programming Hive



636、单词 rsa 的匹配文本:


  1. For example, suppose that you need to factor a large integer—a computation that is required for breaking the RSA cipher. Core Java Volume I Fundamentals 9th Edition


  2. The NOW team had clustered together Sun workstations using Myrinet switches and specialized software to win RSA key-cracking challenges and break a number of sort benchmark records. Monitoring with Ganglia


  3. In addition, the rsa public key generated in step 2 of the previous recipe must be distributed and installed on every node in the cluster using the ssh-copy-id command. Hadoop RealWorld Solutions Cookbook


  4. Pick the default file in which to save the key, likely ~/.ssh/id_rsa. Scaling CouchDB


  5. First, generate an RSA key pair by typing the following in the hadoop user account: Hadoop:The Definitive Guide 3rd Edition


  6. For example, the RSA algorithm (the encryption algorithm invented by Rivest, Shamir, and Adleman) depends on the difficulty of factoring large numbers. Core Java Volume II Advanced Features 9th Edition


  7. Having verified that SSH is correctly installed on all nodes of the cluster, we use sshkeygen on the master node to generate an RSA key pair. Hadoop in Action


  8. This is accomplished from the command prompt by executing the following command: keytool -genkey -keystore mySrvKeystore -keyalg RSA. Java 7 New Features Cookbook


  9. If the key is an RSA key, the default signature algorithm is “MD5withRSAJava in a Nutshell 5th Edition


  10. Warning: Permanently added 'localhost' (RSA) to the list of known hosts. Hadoop Beginners Guide



637、单词 grams 的匹配文本:


  1. This could simply be the measured weight in grams or kilograms. Mahout in Action


  2. Whenever a collection of data is sent by TCP using data grams, a timer is started. Java Network Programming and Distributed Computing


  3. The n-gram approach divides terms in the index into grams: word fragments are built of one or more letters. Mastering ElasticSearch


  4. This recipe will demonstrate how to use the Java MapReduce API to calculate n-grams over news archives. Hadoop RealWorld Solutions Cookbook


  5. The size of the n-grams (the number of contiguous words used to create features) Hadoop in Practice


  6. Query time search-as-you-type Index time optimizations Ngrams for partial matching Index time search-as-you-type Preparing the index Querying the field Edge n-grams and postcodes Ngrams for compound words 16 Elasticsearch The Definitive Guide


  7. For example, a workflow consisting of careful extraction of a person’s name from the title followed by name-specific variant generation is likely to yield much higher-quality answers than a workflow that only generates all possible n-grams of the title of a page. Hadoop in Action


  8. Tokenizers that create shingles (n-grams from multiple tokens) from another TokenStream. Lucene in Action 2nd Edition


  9. Like ngrams, but looks for n-grams that begin with the second array of words in each outer array. Programming Hive


  10. Please remember that using n-grams will make your index a bit larger. Apache Solr 4 Cookbook



638、单词 hadoopdb 的匹配文本:


  1. Recently, several hybrid approaches (e.g., HadoopDB and Hive) between parallel databases and Hadoop have been introduced to the database community. Tajo A Distributed Data Warehouse System on Large Clusters


  2. HadoopDB [3] is a research system in this hybrid category. Dremel - Interactive Analysis of WebScale Datasets


  3. HadoopDB: an architectural hybrid of MapReduce and DBMS technologies for analytical workloads” Spanner - Google’s Globally-Distributed Database


  4. HadoopDB[15] reuses most of Hive’s system, except, it uses traditional database instances in each of the nodes to store data instead of using a distributed file system. Hive A Petabyte Scale Data Warehouse Using Hadoop


  5. HadoopDB: an architectural hybrid of MapReduce and DBMS technologies for analytical workloads. Tenzing - A SQL Implementation On The MapReduce Framework


  6. In this paper, we describe our implementation of and experience with HadoopDB, whose goal is to serve as exactly such a hybrid system. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



639、单词 factorial 的匹配文本:


  1. Listing 11.1 prints the stack trace of a recursive factorial function. Core Java Volume I Fundamentals 9th Edition


  2. Programming tasks such as calculating factorial, Fibonacci numbers, anagrams, and Sierpinski carpet are just a few of the well-known tasks that can be accomplished through the recursive programming technique. Pro Java 7 NIO.2


  3. Unfortunately, a join over n tables will have n-factorial combinations of join orders to examine. High Performance MySQL 3rd Edition


  4. But if you’ve read the earlier chapters of this book, then you know that Java 8 streams provide an even simpler declarative way of defining factorial, as the next listing shows. Java 8 in Action Lambdas, Streams and Functional-style Programming


  5. Suppose you have a Java program to compute the factorial of. Java Threads 3rd Edition


  6. Here is the definition of a method using that type, which calculates the factorial of a passed integer value:5 Programming in Scala 2nd Edition


  7. But to start, suppose we wanted to adapt our program to print out both the absolute value of a number  the factorial of another number. Functional Programming in Scala


  8. Here is an implementation of a factorial calculator, where we use a conventional technique of calling a second, nested method to do the work: Programming Scala


  9. The factorial of an integer is the product of the number and all positive integers less than the number. Java in a Nutshell 5th Edition


  10. I will take the factorial example used in the text. Java Performance Tuning 2nd Edition



640、单词 virtualized 的匹配文本:


  1. In the cloud, virtualized GPUs will provide thin clients such as smartphones and tablets and access to a high-performance graphics experience. Monitoring with Ganglia


  2. Virtualized and shared resources can be harder to troubleshoot, especially because you don’t have access to the underlying physical hardware to inspect and measure what’s happening. High Performance MySQL 3rd Edition


  3. Handling Network Disk IO Issues One of the biggest problems with using virtualized hardware is that you are generally sharing a disk with other tenants, which exacerbates the disk slowness mentioned previous because everyone is competing for disk IO. MongoDB The Definitive Guide 2nd Edition


  4. Volumes are persistent virtualized block devices independent of any particular instance. bk-admin-guide-cloud-latest


  5. One example, although very uncommon, is based on virtualized servers. HBase:The Definitive Guide


  6. Removing the OS layer from a virtualized Java setup is less problematic than one might think. Oracle JRockit The Definitive Guide


  7. Now along comes Hadoop and everything you read says commodity, scale-out, share-nothing hardware, but what about the existing investment in blades, shared storage systems, and virtualized infrastructure? Hadoop, generally speaking, does not benefit from virtualization. Hadoop Operations


  8. How It Works Java Swing’s JDesktopPane is a container component similar to a JPanel except that it manages mini internal frames (JInternalFrame) similar to a virtualized desktop. Java 7 Recipes A Problem-Solution Approach


  9. If you’re running on virtualized hardware (such as Amazon’s EC2), then you may find that a sufficiently large instance isn’t available. MongoDB in Action


  10. Many enterprises are shifting away from deploying their analytical databases on high-end proprietary machines, and moving towards cheaper, lower-end, commodity hardware, typically arranged in a shared-nothing MPP architecture, often in a virtualized environment inside public or private “clouds” HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



641、单词 dag 的匹配文本:


  1. A DAG is a data structure from computer science and contains the following two elements: Gradle in Action


  2. Gradle builds up a Directed Acyclic Graph (DAG) with all the tasks before any task is executed. Gradle Effective Implementation Guide


  3. Efforts to combat these artifacts achieved mixed results; while spreading TaskTrackers across racks made intra-rack reads of shared datasets more likely, the shuffle of records between map and reduce tasks would necessarily cross racks, and subsequent jobs in the DAG would have fewer opportunities to account for skew in their ancestors. Apache Hadoop YARN Yet Another Resource Negotiator


  4. Compile to Dryad data flow plan (DAG), and executed by the runtime job manager. MapReduce and Parallel DBMSs Friends or Foes


  5. In mathematics and computer science, a Directed Acyclic Graph (DAG) is a directed graph with no cycles. Professional Hadoop Solutions


  6. If it is a multi-project build, there is also a DAG of project objects, one for each project. Gradle Beyond The Basics


  7. We will also be discussing other advanced Hadoop features such as using DistributedCache for distribute data, using Hadoop Streaming for quick prototyping of Hadoop computations, and using Hadoop counters to report custom metrics for your computation as well as adding job dependencies to manage simple DAG-based workflows of Hadoop MapReduce computations. Hadoop MapReduce Cookbook


  8. JobControl When there is more than one job in a MapReduce workflow, the question arises: how do you manage the jobs so they are executed in order? There are several approaches, and the main consideration is whether you have a linear chain of jobs or a more complex directed acyclic graph (DAG) of jobs. Hadoop:The Definitive Guide 3rd Edition


  9. Configuration is the phase in which those task objects are assembled into an internal object model, usually called the DAG (for directed acyclic graph) Building and Testing with Gradle


  10. The logical plan generator then creates a DAG of relational operators, the query plan. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



642、单词 utils 的匹配文本:


  1. When the fillCup() method finds there’s not enough coffee, rather than returning an error code, it invokes StmUtils’s retry() method. Programming Concurrency on the JVM


  2. Depending on your platform and installation type, your browser may have already been opened with the correct link; if not, you can access Futon, the built-in administration interface to CouchDB by going to the URL: http://127.0.0.1:5984/_utils/index.html Futon is a web-based interface to the main functionality in CouchDB and provides support for editing the configuration information, creating databases, documents, design documents (and therefore views, shows and lists) and starting and requesting replication. Getting Started with CouchDB


  3. Visit http://127.0.0.1:5984/_utils/database.html?blog/_all_docs and you should see a document with an ID corresponding to the one you just saved. CouchDB The Definitive Guide


  4. The perfect match is the class CharUtils from the Apache Commons Lang library. Gradle in Action


  5. Nonetheless, the user could modify the method Utils.paint in his game to use the method setRelativeSize because the paint method expects a list of Resizable objects as argument. Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. Open your favorite web browser, and navigate to the URL http://127.0.0.1:5984/_utils. Beginning CouchDB


  7. We have an implementation available for you in the provided code under the utils package. HBase in Action


  8. You’ll make frequent use of the StringUtils class for tokenization. Hadoop in Practice


  9. This is evident in MapTempera tureReducer, where we have to convert the input value into an integer (using a convenience method in HadoopUtils) and then the maximum value back into a string before it’s written out. Hadoop:The Definitive Guide 3rd Edition


  10. Raise a DTrace USDT probe from BTrace action method • DTraceProbe method in BTraceUtils class. BTrace Java Platform Observability by Bytecode Instrumentation



643、单词 verifier 的匹配文本:


  1. It must either reject class files that do not verify via type checking, or else consistently failover to the type inferencing verifier whenever type checking fails. The Java Virtual Machine Specification Java SE 7 Edition


  2. Hence any program that passes the verifier must have defined semantics. JSR-133 Java Memory Model and Thread


  3. Chapter 3 This chapter discusses the memory protections built into the Java language, how those protections provide a measure of security, and how they are enforced by the bytecode verifier. Java Security 2nd Edition


  4. The reason it all works is that the Java bytecode verifier does not check the declarations, anyway! The Java compiler checks, but not the verifier. Programming in Scala 2nd Edition


  5. The verifier objects because the result of new Super() cannot be passed as an argument in place of a formal parameter of type Hyper, because Super is not a subclass of Hyper. The Java Language Specification Java SE 7 Edition


  6. If the verifier reports the content of the component to be invalid, the component immediately regains focus. Core Java Volume II Advanced Features 9th Edition


  7. For example, the casting operation in Java compiles down to a bytecode that checks that the class can actually be cast to the right thing and the verifier ensures that there’s no code path that could put an unchecked value into a variable. Beginning Scala


  8. In this situation, the verify( ) method of the HostnameVerifier is called to determine whether the connection should proceed or not. Java in a Nutshell 5th Edition



644、单词 decoupling 的匹配文本:


  1. Standardizing the metrics simplifies monitoring by decoupling agents from performance monitoring applications, allowing measurements to be made once and shared among different monitoring applications. Monitoring with Ganglia


  2. The main motivation for decoupling the namespace from the data is the scalability of the system. HDFS scalability the limits to growth


  3. Complete decoupling Whenever a method works with a class instead of an interface, you are limited to using that class or its subclasses. Thinking in Java 4th Edition


  4. Such an abstraction provides decoupling between how data is stored (HDFS files, HBase tables) from how it is seen by an application (table format) Professional Hadoop Solutions


  5. A service provider framework is a system in which multiple service providers implement a service, and the system makes the implementations available to its clients, decoupling them from the implementations. Effective Java 2nd Edition


  6. The first general idea is that failure detection should be flexible, which is achieved by decoupling it from the application being monitored. Cassandra The Definitive Guide


  7. Many enterprise filesystems support advanced features such as snapshots to minimize the window of time required to get a consistent capture of the data on disk and decoupling it from the time required to copy said data elsewhere. Hadoop Operations


  8. Decoupling the application processes from the I/O operations means that, ideally, your application does not spend time waiting for I/O. Java Performance Tuning 2nd Edition


  9. Without enterprise messaging, developers wouldn’t have an option beyond synchronous calls for application development, and the concept of decoupling an application design wouldn’t exist in nearly the same form. ActiveMQ in Action


  10. It may seem strange at first, but decoupling the transaction logic from the operation logic makes this class more portable to the Java EE environment. Pro JPA2



645、单词 lambdas 的匹配文本:


  1. JRuby allows us to fluently pass lambdas where closures are expected, so we took advantage of that here. Programming Concurrency on the JVM


  2. Scala also provides placeholder notation when defining anonymous functions (aka, lambdas) Scala in Depth


  3. Lambdas and closures are different concepts, but they’re closely related. Scala in Action


  4. Linear interpolation Linear interpolation is the last smoothing model that takes the values of the lambdas provided in the configuration and uses them to calculate weights of trigrams, bigrams and unigrams. Mastering ElasticSearch


  5. It introduces a new notation (anonymous functions, or lambdas) that enables you to write just. Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. Ruby has a collection of overlapping features that allow passing blocks, Procs, and lambdas as parameters to methods. Beginning Scala


  7. Clearly, you can repeat that process if you have more methods or lambdas that yield Optional values. Java SE 8 for the Really Impatient



646、单词 inlining 的匹配文本:


  1. A more sophisticated optimization is the elimination (or “inlining”) of function calls. Core Java Volume I Fundamentals 9th Edition


  2. Of course, if a method is big, then your code begins to bloat, and you probably wouldn’t see any performance gains from inlining, since any improvements will be dwarfed by the amount of time spent inside the method. Thinking in Java 4th Edition


  3. Inlining requires all attribute values to be stored in the index many times, once for each time a document ID is stored. High Performance MySQL 3rd Edition


  4. Better performance could be achieved by generating new code to represent the appropriate composition of the user’s functions, and then applying traditional optimizations such as inlining to the resulting code. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  5. The inlining process must preserve the semantics of the method invocation. The Java Language Specification Java SE 7 Edition


  6. A method may even contain parts of other methods due to inlining. Oracle JRockit The Definitive Guide


  7. These methods are also candidates for inlining at runtime by a just-in-time compiler ( JIT) or similar optimization tool. Java in a Nutshell 5th Edition


  8. Compiler inlining is another frequently used technique that can significantly improve compiled code. Java Performance Tuning 2nd Edition


  9. The most basic classes of optimizations are simple identity transformations, constant folding, common subexpression elimination, and inlining of functions. Java Performance


  10. Support for inlining the name of the schema with the table name is nonstandard. Pro JPA2



647、单词 incrementing 的匹配文本:


  1. Metrics submitted using a “positive” slope generate RRDs that are created as COUNTERs; however, this mechanism is not ideal for situations involving incrementing values that submit on each iteration (i.e., Apache httpd page serving counts without log-scraping) Monitoring with Ganglia


  2. Figure 14.12 Setting a dynamic, incrementing version number at the initial phase of the build pipeline. Gradle in Action


  3. Other options are incrementing the previous value or use an auto-increment value from another source. Cassandra High Performance Cookbook


  4. The distinct IP count is calculated by incrementing a counter whenever we see an IP that does not equal a previously seen IP. Hadoop RealWorld Solutions Cookbook


  5. First, CouchDB looks at the incrementing part of the revision number (the part before the "-“) and the document with the highest number wins. Scaling CouchDB


  6. Sqoop supports two types, append, which works for numerical data that’s incrementing over time, such as auto-increment keys; and lastmodified, which works on timestamped data. Hadoop in Practice


  7. Job, Task, and Task Attempt IDs The format of a job ID is composed of the time that the jobtracker (not the job) started and an incrementing counter maintained by the jobtracker to uniquely identify the job to that instance of the jobtracker. Hadoop:The Definitive Guide 3rd Edition


  8. Periodically the leader will initiate a map update by incrementing the map epoch and using the Paxos update protocol to distribute the update proposal to other monitors, simultaneously revoking leases. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.


  9. On subsequent runs the document already exists so the scriptupdate is applied instead, incrementing the views counter. Elasticsearch The Definitive Guide


  10. In reality, the primary key would much more likely be an auto-incrementing, numeric employee ID. Hadoop Beginners Guide



648、单词 hostnames 的匹配文本:


  1. Note that we use IP addresses, and not hostnames in the topology. HBase Administration Cookbook


  2. Such a poller needs only a list of hostnames that specifies at least one host per cluster. Monitoring with Ganglia


  3. I’ve seen DNS resolution failures transiently appear, and as a general rule, I now use IP addresses instead of hostnames in the configuration files. Pro Hadoop


  4. The dfs-exclude.txt file contains the DataNode hostnames, one per line, that are to be decommissioned from the cluster. Hadoop Operations and Cluster Management Cookbook


  5. Add the hostnames of the nodes that are to be decommissioned to the exclude file. Hadoop MapReduce Cookbook


  6. A web server log is a good example of a set of records that is not normalized (for example, the client hostnames are specified in full each time, even though the same client may appear many times), and this is one reason that logfiles of all kinds are particularly well-suited to analysis with MapReduce. Hadoop:The Definitive Guide 3rd Edition


  7. After you have started the cluster, you should verify that all the region servers have registered themselves with the master and appear in the appropriate table with the expected hostnames (that a client can connect to) HBase:The Definitive Guide


  8. Client List The most straightforward way to connect to a cluster is to maintain a list of the addresses or hostnames of the servers in the cluster and cycle through them on the client side. Cassandra The Definitive Guide


  9. With the block IDs and datanode hostnames, the client can now contact the most appropriate datanode directly and read the block data it needs. Hadoop Operations


  10. The simplest way to get up and running is through the Cloudera Manager application, where you can bootstrap the whole process of setting up a Hadoop cluster with Impala just by specifying a list of hostnames for the cluster. Cloudera Impala



649、单词 mike 的匹配文本:


  1. The blog post http://bit.ly/flumePerfPt1 from Flume committer Mike Percy should give you some good starting points. Apache Flume Distributed Log Collection for Hadoop


  2. O’Reilly, including, but not limited to, Mike Loukides, Julie Steele, and Melanie Yarbrough, who gave me the opportunity and helped me turn the raw text into a good looking book. Getting Started with CouchDB


  3. After you show it to your coworker, Mike, he says he wants to join forces and bring the application to the next level by adding more advanced features. Gradle in Action


  4. More information about this structure can be found in a great post by Mike McCandless at http://blog.mikemccandless. Mastering ElasticSearch


  5. A sincere thanks to the many people who read the early drafts of these chapters, and provided comments, edits, insights, and ideas — specifically Mike Daconta, Ralph Perko, Praveena Raavichara, Frank Tyler, and Brian Uri. Professional Hadoop Solutions


  6. Mike Loukides, this book’s editor, and the rest of the