文档章节

2000个软件开发领域的高频特殊词及精选例句(三)

杨尚川
 杨尚川
发布于 2015/03/20 23:05
字数 59727
阅读 135
收藏 0

superword是一个Java实现的英文单词分析软件,主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。

551、单词 ibm 的匹配文本:


  1. The Basic Edition includes HDFS, Hbase, MapReduce, Hive, Mahout, Oozie, Pig, ZooKeeper, Hue, and several other open source tools, as well as a basic version of the IBM installer and data access tools. Professional Hadoop Solutions


  2. In the past two years, Joe has written more than a dozen articles and tutorials for the IBM developerWorks web site, including articles on Adobe Flex, Facebook applications, ExtJS, Adobe AIR, IBM DB2, and more. Beginning CouchDB


  3. Microsoft and IBM have their share of the pie too. HBase in Action


  4. Finally we would like to recognize the generous support of our equipment donors IBM, Intel, and Sun and our funders. The anatomy of a large-scale hypertextual Web search engine


  5. There are Hadoop distributions from the large, established enterprise vendors, including EMC, IBM, Microsoft, and Oracle, as well as from specialist Hadoop companies such as Cloudera, Hortonworks, and MapR. Hadoop:The Definitive Guide 3rd Edition


  6. Our case studies in chapter 12 will describe how companies including New York Times , China Mobile , and IBM are using Hadoop. Hadoop in Action


  7. Of course I’m talking about the Information Management System (IMS) hierarchical database, invented in 1966 at IBM. Cassandra The Definitive Guide


  8. The IBM InfoSphere Big Insights distribution is available at http://www-01.ibm.com/software/data/infosphere/ biginsights/ and (like MapR) offers commercial improvements and extensions to the open source Hadoop core. Hadoop Beginners Guide


  9. Solutions for a category of middleware that provides asynchronous, reliable message queuing such as IBM WebSphere MQ, SonicMQ, TIBCO Rendezvous, and Apache ActiveMQ, commonly used for Enterprise Application Integration (EAI) purposes. ActiveMQ in Action


  10. For example, the following query compares Apple (symbol AAPL) and IBM (symbol IBM) Programming Hive



552、单词 dismax 的匹配文本:


  1. Let's create a dismax query that will combine two queries: a simple term query and a prefix query. Mastering ElasticSearch


  2. The dismax query parser, which is described in a later chapter, makes this easy. Solr 3 Enterprise Search Server


  3. I chose the dismax handler (that's its name defined by the name attribute) Solr 3.1 Cookbook


  4. To do that, run the following query to your Solr instance: http://localhost:8983/solr/select?defType=dismax&pf=title^100&q=20 Apache Solr 4 Cookbook



553、单词 rfc 的匹配文本:


  1. Finally, there are some undocumented properties on the syslog sources that allow for adding additional regular expression matching patterns for messages that do not conform to the RFC standards. Apache Flume Distributed Log Collection for Hadoop


  2. Some of the major goals (expressed in RFC 871[1]) were to achieve: Java Network Programming and Distributed Computing


  3. The bSocket protocol has been standardized by IETF under RFC 6455 Java EE 7 Specification


  4. No matter which CA you use, you'll eventually be sent back the certificate, which will be in RFC 1421 format. Java Security 2nd Edition


  5. A typical example is how the WebSocket protocol is upgraded from HTTP, as described in the Opening Handshake section of RFC 6455 Java EE 7 Essentials


  6. For the format of the HTTP request headers, see RFC 2616 Core Java Volume II Advanced Features 9th Edition


  7. This permits the String to be parsed using the RFC 2045 grammar specifications. Java 7 New Features Cookbook


  8. This command uses the following options: -alias, -file, -keystore, -rfc, -storepass, -storetype, and -v. Java in a Nutshell 5th Edition


  9. Despite the name, a published RFC is a finished work. Java Network Programming 4th Edition


  10. The original specification for JSON can be found in RFC 4627, and it was written by Douglas Crockford. The Definitive Guide to MongoDB



554、单词 modularity 的匹配文本:


  1. Netty’s pipeline and encoder classes encourage modularity by separating serialization and deserialization from application logic. Netty in Action MEAP V08


  2. As it turns out, one of the strong points of Web Flow (which we haven’t really discussed until now) is its support for composition and modularity. Pro Spring MVC


  3. In fact, event-based architectures help to enforce the separation of concerns and modularity that MVC advocates. Testable JavaScript


  4. Strategy Pattern A big part of the pluggability and modularity of the framework is achieved thanks to the wide use of the Strategy pattern. Pro Spring Security


  5. This gives you a simple and useful kind of modularity, so that you can work with very large bodies of code without different parts of the code trampling on each other. Programming in Scala 2nd Edition


  6. Because of their modularity, pure functions are easier to test, to reuse, to parallelize, to generalize, and to reason about. Functional Programming in Scala


  7. We still have to embed the implementation code in the class somehow, compromising modularity. Programming Scala


  8. In contrast, OSGi provides strong modularity support but it’s not xv. Spring Dynamic Modules in Action


  9. On the other hand, most scripting languages lack features that are beneficial for programming complex applications, such as strong typing, encapsulation, and modularity. Core Java Volume II Advanced Features 9th Edition


  10. Object-oriented concurrent programming differs from multithreaded systems programming in languages such as C mainly due to the encapsulation, modularity, extensibility, security, and safety features otherwise lacking in C. Concurrent Programming in Java Design Principles and Pattern



555、单词 coprocessors 的匹配文本:


  1. We have set HBase to use the Kerberos authentication, and HBase coprocessors-based authorization. HBase Administration Cookbook


  2. Here you learn about the latest developments in both HDFS (federation) and HBase new file formats, and coprocessors. Professional Hadoop Solutions


  3. Chapter 5 introduces coprocessors, a mechanism for pushing computation out to your HBase cluster. HBase in Action


  4. Coprocessors Earlier we discussed how you can use filters to reduce the amount of data being sent over the network from the servers to the client. HBase:The Definitive Guide



556、单词 jee 的匹配文本:


  1. JEE-specific web componen and static content like images and CSS files. Gradle in Action


  2. First, you can use Spring to build any application in Java (e.g., stand-alone, Web, JEE applications, etc.), unlike many other frameworks such as Apache Struts, which is limited to web applications. Pro Spring 3


  3. The framework combines best practices for Java Enterprise Edition (JEE) development from the industry and integration with the best-of-breed third-party frameworks. Pro Spring MVC


  4. In this section we will look at an example of how to deploy your Java web or JEE application to an application server such as Tomcat, JBoss, or GlassFish. Jenkins The Definitive Guide


  5. In this respect, Spring is like JEE and even its earlier J2EE incarxvii. Spring in Practice


  6. Bnd scans most of the elements that have attributes relative to class or interface (such as bean@class) in most of the Spring namespaces (beans, aop, context, jee, lang, osgi, util, and webflow-config) Spring Dynamic Modules in Action


  7. That’s understandable considering it’s the predominant Java-based API for messaging and sits among the standards of the Java Enterprise Edition (JEE) Spring Integration in Action


  8. Although J2EE (now known as JEE) was able to catch up with Spring, Spring never stopped moving forward. Spring in Action 4th Edition



557、单词 func 的匹配文本:


  1. The IsUseragentBot class extends the abstract class FilterFunc, which allows us to override the exec(Tuple t) method. Hadoop RealWorld Solutions Cookbook


  2. Note that by-name parameters are implemented as scala.Func tion0 objects. Programming Scala


  3. Discover how to use the REGISTER and DEFINE statements to register and define an alias for your LoadFunc, and how to use your LoadFunc in combination with the LOAD statement. Hadoop in Practice


  4. Filter UDFs are all subclasses of FilterFunc, which itself is a subclass of EvalFunc. Hadoop:The Definitive Guide 3rd Edition


  5. Version 0.7.0 of Pig introduced the LoadFunc/StoreFunc classes and functionality, which allows you to load and store data from sources other than the usual HDFS. HBase:The Definitive Guide


  6. For pushing the data into the Kafka cluster, the AvroKafkaStorage class (extends Pig's StoreFunc class) takes the Avro schema as its first argument and connects to the Kafka URI. Apache Kafka


  7. To create an eval UDF you make a Java class that extends the abstract EvalFunc class. Hadoop in Action


  8. The Pig integration code (a LoadFunc implementation) is found in the contrib section of Cassandra’s source download. Cassandra The Definitive Guide


  9. Because the group operator returns a record for each group, with a bag containing all the records in that group, your eval func still takes one record and returns one record. Programming Pig


  10. For instance, suppose that a function named DUMMY_FUNC accepted one parameter and returned a value. Java 7 Recipes A Problem-Solution Approach



558、单词 denoted 的匹配文本:


  1. The units denoted by the value vary according to the metric module. Monitoring with Ganglia


  2. As we’ve seen, design documents are normal JSON documents, denoted by the fact that their DocID is prefixed with _design/ CouchDB The Definitive Guide


  3. Remember that paths are denoted by a colon character (:) Gradle in Action


  4. The root project is denoted by a colon (:) and has no explicit name. Gradle Effective Implementation Guide


  5. This recipe will use the MapReduce API and the distributed cache to mark any lines in the news archive dataset that contain one or more keywords denoted in a list. Hadoop RealWorld Solutions Cookbook


  6. To evaluate the effectiveness of the Contraction phase, we consider the two different levels of memoization in Incoop: (i) the coarse-grained, task-level memoization performed in the implementation, denoted as Task, and (ii) the fine-grained approach that adds the Contraction phase in the implementation, denoted as Contraction. Incoop MapReduce for Incremental Computations


  7. Mahout didn't do a great job of picking initial random cluster locations (denoted with gray crosses) Hadoop in Practice


  8. A region is denoted by the table it belongs to, its first row, inclusive, and last row, exclusive. Hadoop:The Definitive Guide 3rd Edition


  9. Finally the phone attribute has an array value, which is denoted by the surrounding square brackets and the fact that the type attribute is repeated. Cassandra The Definitive Guide


  10. Note that we expect the end of the file to be denoted by the end of the stream (or -1) ActiveMQ in Action



559、单词 se5 的匹配文本:


  1. Many of the Java SE5 language changes were designed to improve the experience of the programmer. Thinking in Java 4th Edition



560、单词 md5 的匹配文本:


  1. If you are a cautious person, go to the backup site and get the PGP checksum or the MD5 checksum of the download file. Pro Hadoop


  2. The revision number is the md5 hash of the transport representation of a document with an N- prefix denoting the number of times a document got updated. CouchDB The Definitive Guide


  3. By generating an MD5 check-sum from the key, we randomize which node the data for that key will be stored on. Cassandra High Performance Cookbook


  4. If the preceding example had used the argument --update-key md5, the generated code would have run like the following: Hadoop RealWorld Solutions Cookbook


  5. MD5 is a good choice because you want twits to be stored in groups by user. HBase in Action


  6. MD5 hash, so that later you can visually compare that your. Hadoop in Practice


  7. The MD5 digests are the same, showing that the file survived its trip to HDFS and is back intact. Hadoop:The Definitive Guide 3rd Edition


  8. The row key is the MD5 hash of the line to generate a random key. HBase:The Definitive Guide


  9. It uses a BigIntegerToken with an MD5 hash applied to it to determine where to place the keys on the node ring. Cassandra The Definitive Guide


  10. After starting the HDFS cluster, we wait for a moment and then use MD5 cryptographic checksums to verify that both locations contain the identical fsimage. Hadoop Beginners Guide



561、单词 centric 的匹配文本:


  1. The vertex-centric approach is reminiscent of MapReduce in that users focus on a local action, processing each item independently, and the system composes these actions to lift computation to a large dataset. Pregel  -  A System for Large-Scale Graph Processing


  2. For example, an admin over 20,000 systems is far more likely to be running a configuration management engine such as Puppet/Chef or CFEngine and will therefore have fewer qualms about host-centric configuration. Monitoring with Ganglia


  3. Yet another benefit is that the shell script can interact with services, systems, and tools that are not Java centric. MapReduce Design Patterns


  4. Because some of Hadoop’s tools (such as Hive and real-time Hadoop queries) provide a low entry barrier to Hadoop for people more familiar with database queries, some people limit their knowledge to only a few database-centric tools in the Hadoop ecosystem. Professional Hadoop Solutions


  5. This recipe does not require a full understanding of the Giraph API, but it does assume some familiarity with Bulk Synchronous Parallel (BSP) and the design goals of vertex-centric APIs including Apache Giraph and Google Pregel. Hadoop RealWorld Solutions Cookbook


  6. Let’s wrap all the user-centric HBase interactions in a single class. HBase in Action


  7. The best_fields type is also field centric and suffers from similar problems. Elasticsearch The Definitive Guide


  8. We focus on practices unique to data-centric programming within Hadoop. Hadoop in Action


  9. It may appear strange to accuse a project fully implemented in Java of being Java-centric, but the consideration is from a client's perspective. Hadoop Beginners Guide


  10. One can take two complementary views of any OO system, object-centric and activity-centric: Concurrent Programming in Java Design Principles and Pattern



562、单词 multiproject 的匹配文本:


  1. Gradle provides powerful support for defining and organizing multiproject builds, as well as modeling dependencies between projects. Gradle in Action


  2. For multiproject setup, the build.scala file is used to define common settings and tasks for multiple projects. Scala in Action


  3. Role-based strategy is relatively new in Jenkins, but it is an excellent way to simplify the task of managing permissions in large, multiteam and multiproject organizations. Jenkins The Definitive Guide


  4. The beforeEvaluate() hook is not particularly useful in this case, since there is no way in a single build file to advise the build to do something before it is evaluated.3 Beforehooks are only useful in the case of a multiproject build. Gradle Beyond The Basics


  5. Multiproject Build Structure A multiproject is generally hierarchical in nature: it typically has a master project with one or more subprojects. Building and Testing with Gradle



563、单词 serializing 的匹配文本:


  1. Since multiple proposers may submit values with proposal number zero, serializing at this replica ensures only one value corresponds with that proposal number for a particular log position. Megastore - Providing Scalable, Highly Available Storage for Interactive Services


  2. By working with the grain and letting CouchDB do this for us, we save ourselves a tremendous amount of CPU cycles that would otherwise have been spent serializing object graphs from SQL, converting them into domain objects, and using those objects to do application-level validation. CouchDB The Definitive Guide


  3. The nested data model backs a platform-neutral, extensible mechanism for serializing structured data at Google. Dremel - Interactive Analysis of WebScale Datasets


  4. Because a BloomFilter is also a Writable object, serializing it is fairly trivial. MapReduce Design Patterns


  5. Recipes include techniques for serializing data, storing large objects, time series, normalized, and de-normalized data. Cassandra High Performance Cookbook


  6. Our primary-copy caching strategy makes a single authoritative MDS responsible for managing cache coherence and serializing updates for any given piece of metadata. Ceph A Scalable, High-Performance Distributed File System


  7. In the preceding example, we use the Writable types as the fields of our custom Writable type and use the readFields() method of the fields for de-serializing the data from the DataInput object. Hadoop MapReduce Cookbook


  8. The DataOutput and DataInput interfaces have a rich set of methods for serializing and deserializing Java primitives, so, in general, you have complete control over the wire format of your Writable object. Hadoop:The Definitive Guide 3rd Edition


  9. This is because the MapReduce framework has a certain defined way of serializing the key/value pairs to move them across the cluster’s network, and only classes that support this kind of serialization can function as keys or values in the framework. Hadoop in Action


  10. As we'll see, Flume makes assumptions about the data format and provides no ways of serializing data outside of these. Hadoop Beginners Guide



564、单词 remoting 的匹配文本:


  1. Under the covers, Akka uses JBoss Netty and Google Protocol Buffers libraries to make the remoting happen seamlessly. Programming Concurrency on the JVM


  2. Akka implements transparent remoting, where the remoteness of the actor is completely configured at deployment time. Scala in Action


  3. Remoting Support Accessing or exposing remote components in Java has never been the simplest of jobs. Pro Spring 3


  4. This handler adapter is mostly used by Spring Remoting to support some of the HTTP remoting options. Pro Spring MVC


  5. Remote scaling is more complex: it requires a remoting technology like Java Messaging Service (JMS) or GridGain, and you must plug in scaling to batch processing using Spring Batch hooks. Spring Batch in Action


  6. As emphasized on the Direct Web Remoting (DWR) website (http://directwebremoting. Spring Dynamic Modules in Action


  7. This allows the application developer to focus on the business logic and not worry about lowlevel transaction and state management details, remoting, concurrency, multithreading, connection pooling, or other complex low-level APIs. Java EE 7 Essentials


  8. With certain environments that have high latency or lower bandwidths, rendering internal frames across the network can be too expensive (for example, remoting using a VPN) Java 7 Recipes A Problem-Solution Approach


  9. Business methods for components are intercepted by the application server in order to apply services such as concurrency, transaction management, security, and remoting. Pro JPA2


  10. Even though Spring integrates with several popular MVC frameworks, its web and remoting module comes with a capable MVC framework that promotes Spring’s loosely coupled techniques in the web layer of an application. Spring in Action 4th Edition



565、单词 har 的匹配文本:


  1. The HTTP Archive (HAR) format is the standard for capturing this information; Testable JavaScript


  2. The disadvantages of HAR files are that they can’t be optimized for local disk access in MapReduce, and they can’t be compressed. Hadoop in Practice


  3. Now we can run the archive command: % hadoop archive -archiveName files.har /my/files /my. Hadoop:The Definitive Guide 3rd Edition


  4. A HAR file is similar to a familiar tar, JAR, or Zip file, but file system operation can address the individual files for the archive, and a HAR file can be used transparently as the input to a MapReduce job. The Hadoop Distributed File System


  5. It can capture the performance data from a web application in an HTML Archive (HAR) format, as well as manipulate the browser behavior and traffic, such as whitelisting and blacklisting content, simulating network traffic and latency, and rewriting HTTP requests and responses. Selenium Testing Tools Cookbook


  6. The ALTER TABLE … ARCHIVE PARTITION statement captures the partition files into a Hadoop archive (HAR) file. Programming Hive


  7. The way that BrowserMob Proxy does this is by capturing the network traffic and pushing it into a format called HTTP Archive, or most commonly known as HAR. Selenium 2 Testing Tools Beginner's Guide



566、单词 watcher 的匹配文本:


  1. Watcher: The watcher watches watchables! In our examples, the watcher is WatchService and it monitors the file system changes (the file system is a FileSystem instance) Pro Java 7 NIO.2


  2. Most of the action is in the modelWatcher object B. Mahout in Action


  3. Getting the watcher data from GitHub requires a web service call to the GitHub API (http://developer.github.com/v3/) Spring in Practice


  4. In this case, once the data is written to HDFS, a data watcher (HDFS watcher) invokes a MapReduce JobTracker, informing it about the availability of a new data. Professional Hadoop Solutions


  5. The Watcher object receives callbacks from ZooKeeper to inform it of various events. Hadoop:The Definitive Guide 3rd Edition


  6. All the master cluster region servers keep a watcher on one another to be notified when one dies (just like the master does) HBase:The Definitive Guide


  7. A producer maintains a pool of broker connections, and constantly updates it using ZooKeeper watcher callbacks. Apache Kafka


  8. It does a few more interesting things: (a) one can register a watcher on a path and get notified when the children of a path or the value of a path has changed; (b) a path can be created as ephemeral (as oppose to persistent), which means that if the creating client is gone, the path is automatically removed by the Zookeeper server; (c) zookeeper replicates its data to multiple servers, which makes the data highly reliable and available. Kafka a Distributed Messaging System for Log Processing


  9. The pool consists of master and worker nodes, plus an overall gatekeeper called the master watcher. Tenzing - A SQL Implementation On The MapReduce Framework


  10. Other HotSpot VM helper threads such as watcher threads and stat sampler are started. Java Performance



567、单词 varargs 的匹配文本:


  1. Note You can use the @SafeVarargs annotation to defeat the restriction against generic array creation, using this method: Core Java Volume I Fundamentals 9th Edition


  2. It provides three Files.copy() methods to accomplish this task and provides a set of options for controlling the copy process—the methods take a varargs argument represented by these options. Pro Java 7 NIO.2


  3. The ACC_VARARGS flag indicates that this method takes a variable number of arguments at the source code level. The Java Virtual Machine Specification Java SE 7 Edition


  4. The second form provides a convenient syntax to create and call methods that can produce an effect similar to C’s variable argument lists (known as “varargs” in C) Thinking in Java 4th Edition


  5. Applying a SafeVarargs annotation to the method declaration prevents generation of these unchecked warnings at the method invocation expressions. The Java Language Specification Java SE 7 Edition


  6. One could pass in an array, iterable, or varargs of any object. Getting Started with Google Guava


  7. A minor advantage of builders over constructors is that builders can have multiple varargs parameters. Effective Java 2nd Edition


  8. The @SafeVarargs annotation has been introduced to flag a method as safe. Java 7 New Features Cookbook


  9. Varargs methods to define and invoke methods that accept an arbitrary number of arguments. Java in a Nutshell 5th Edition


  10. The of method has a varargs parameter, so you can construct a stream from any number of arguments: Java SE 8 for the Really Impatient



568、单词 troubleshoot 的匹配文本:


  1. As a provider of a website, 10 years ago, your application logs were only used to help you troubleshoot your website. Apache Flume Distributed Log Collection for Hadoop


  2. Useful Resources In this section, we will describe helpful online/offline resources to help you troubleshoot issues with Ganglia. Monitoring with Ganglia


  3. In the following section, I’ll show how to troubleshoot version conflict and tweak Gradle’s dependency resolution strategy to your specific use case. Gradle in Action


  4. We will also describe steps to verify and troubleshoot a Hadoop cluster configuration. Hadoop Operations and Cluster Management Cookbook


  5. In addition to that, it covers functionalities that allow us to troubleshoot ElasticSearch, such as describing how segments merging works, how to see what ElasticSearch does beneath its high-level interface, and how to limit the I/O operations. Mastering ElasticSearch


  6. Doing this is helpful when trying to troubleshoot errors that users may be reporting. Cassandra High Performance Cookbook


  7. It likely will not prevent you from having to troubleshoot issues dealing with scale or data validity, but it will eliminate a large majority of the compile time and control flow issues. Hadoop RealWorld Solutions Cookbook


  8. If you’re somewhat new to Linux systems and you want to run Cassandra on Linux (which is recommended), you may want to check out Jonathan Ellis’s blog entry on using a variety of Linux performance monitoring tools to help you understand the performance of your underlying platform so that you can troubleshoot in the right place. Cassandra The Definitive Guide


  9. The interaction between these layers is what makes a system like this so complex and so difficult to troubleshoot. Hadoop Operations


  10. If you were unable to successfully run the Java examples, then you’ll need to troubleshoot the situation. ActiveMQ in Action



569、单词 idioms 的匹配文本:


  1. You may want to change the behavior of an existing task or add your own idioms for describing your business domain. Gradle in Action


  2. In a nutshell, such code, called functions in the functional programming community, can be passed around and combined in a way to produce powerful programming idioms that you’ll see in Java 8 guise throughout this book. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. In contrast, writing this query in the Java MapReduce API is challenging, because implementation of the ORDER BY clause might require knowledge of the specialized programming idioms. Professional Hadoop Solutions


  4. However, using generic classes requires an understanding of the pre-Java 5 idioms for generic programming. Data Structures and Algorithm Analysis in Java 3rd Edition


  5. Chapter 3, Functional Programming with Guava introduces the functional programming idioms provided by Guava. Getting Started with Google Guava


  6. The platform is much bigger now than it was in 2001 and more complex, but once you learn the patterns and idioms for using the new features, they make your programs better and your life easier. Effective Java 2nd Edition


  7. There are only a few common Java idioms for which parentheses are required. Java in a Nutshell 5th Edition


  8. There’s a real opportunity to eliminate reinventing these idioms by letting “higher-level” tools handle them automatically. Programming Hive


  9. The solutions provided by lock utility classes come at the price of more awkward coding idioms and less automatic enforcement of correct usage. Concurrent Programming in Java Design Principles and Pattern


  10. It’s easy to show nesting relationships in XML, but it’s hard to express program flow and data access the way most common programming language idioms express them. Building and Testing with Gradle



570、单词 scalaz 的匹配文本:


  1. The best example of unicode and non-unicode operators comes from the Scalaz library. Scala in Depth


  2. In chapter 6 you’ll learn how to create a simple web application using the SBT and the Scalaz HTTP module. Scala in Action


  3. It’s possible to program in a purely functional way using the excellent Scalaz library,a. Functional Programming Patterns in Scala and Clojure


  4. Scalaz Scalaz is a library that fills in gaps in the standard library. Programming Scala



571、单词 pluggable 的匹配文本:


  1. Centralized configuration was replaced with a simple on-disk configuration file (although the configuration provider is pluggable so that it can be replaced) Apache Flume Distributed Log Collection for Hadoop


  2. In the current version of gmond, there are two types of pluggable modules, C/C++ and Python. Monitoring with Ganglia


  3. The authentication system is pluggable, so you can integrate with existing services to authenticate users to CouchDB using an HTTP layer, using LDAP integration, or through other means. CouchDB The Definitive Guide


  4. Finally, an administrator may configure the NM with a set of pluggable, auxiliary services. Apache Hadoop YARN Yet Another Resource Negotiator


  5. The good news is that Hadoop scheduler is pluggable, and it comes with two other schedulers. Hadoop MapReduce Cookbook


  6. To reduce the probability of data loss when multiple simultaneous nodes fail, we implemented a pluggable block placement policy that constrains the placement of block replicas into smaller, configurable node groups. Apache Hadoop Goes Realtime at Facebook


  7. Fortunately, starting with version 0.19, Hadoop has a pluggable architecture for the scheduler, and two new schedulers have become available for resolving job contention. Hadoop in Action


  8. You can also use your own pluggable comparator for sorting if you wish. Cassandra The Definitive Guide


  9. Linux supports, via Pluggable Authentication Modules (PAM) system, the ability to control resources such as file descriptors and virtual memory at the user level. Hadoop Operations


  10. Pluggable persistence and security—ActiveMQ provides multiple flavors of persistence and you can choose between them. ActiveMQ in Action



572、单词 recommenders 的匹配文本:


  1. Chapter 3 discusses how you can represent the data that recommenders use in an efficient way. Mahout in Action


  2. In this chapter we’ll look at the Mahout MapReduce implementations of recommenders, classifiers, and clusterers. Hadoop in Practice


  3. Mahout provides implementations of such common ML techniques as clustering and recommenders. Hadoop Beginners Guide



573、单词 swf 的匹配文本:


  1. The Flash bytecode format is known as SWF, and SWF files are produced by the Flex compiler. Thinking in Java 4th Edition


  2. In SWF, you model each process with flows (see chapter 5 for more details) Spring in Practice


  3. The dyn-swf sub-Workflow includes the clustering and ranging actions, and e-mail notification in case of failure. Professional Hadoop Solutions


  4. It captures a screen using the VNC protocol and generates a Shockwave Flash (SWF) movie file. Selenium Testing Tools Cookbook



574、单词 whirr 的匹配文本:


  1. Using Apache Whirr to automate the provisioning and deployment of. Storm Blueprints Patterns for Distributed Real-time Computation


  2. If you’re deploying in the cloud, Apache Whirr (http://whirr.apache.org) is a framework that can come to your rescue and make spinning up and configuring instances easy. HBase in Action


  3. We will also use Apache Whirr, a cloud neutral library for deploying services on cloud environments, to provision Apache Hadoop and Apache HBase clusters on cloud environments. Hadoop MapReduce Cookbook


  4. Apache Whirr Amazon Elastic Compute Cloud (EC2) is a computing service that allows customers to rent computers (instances) on which they can run their own applications. Hadoop:The Definitive Guide 3rd Edition


  5. Apache Whirr Recently, we have seen an increase in the number of users who want to run their cluster in dynamic environments, such as the public cloud offerings by Amazon’s EC2, or Rackspace Cloud Servers, as well as in private server farms, using open source tools like Eucalyptus. HBase:The Definitive Guide



575、单词 cardinality 的匹配文本:


  1. The maximum number of dimensions possible is the cardinality of the vector. Mahout in Action


  2. Each data point in these graphs was obtained by averaging the measurements over 30 runs, in each of which a set of columns of a given cardinality was chosen at random. Dremel - Interactive Analysis of WebScale Datasets


  3. Index Cardinality Cardinality refers to how many distinct values there are for a field in a collection. MongoDB The Definitive Guide 2nd Edition


  4. Using this codec for high cardinality fields can speed up queries on such fields. Mastering ElasticSearch


  5. The performance of building an inverted index depends mostly on the computational cost of parsing the content in the mapper, the cardinality of the index keys, and the number of content identifiers per key. MapReduce Design Patterns


  6. An instance template specifies a cardinality and a set of roles that run on each instance of. Hadoop:The Definitive Guide 3rd Edition


  7. The partial key scan mechanism is quite powerful, as you can use it as a lefthand index, with each added field adding to its cardinality. HBase:The Definitive Guide


  8. Clearly, this can consume a lot of memory, especially for high cardinality. Elasticsearch The Definitive Guide


  9. A FetchType of LAZY benefits entities with one-to-many or many-to-many relationships, where the cardinality of the relationship is high, and the attributes are not accessed immediately after the entity is loaded. Java Performance


  10. Cardinality It isn’t very often that a project has only a single employee working on it. Pro JPA2



576、单词 thresholds 的匹配文本:


  1. Monitoring Ganglia Metrics with Nagios Because Nagios has no built-in means of polling data from remote hosts, Nagios users have historically employed various remote execution schemes to collect a litany of metrics with the goal of comparing them against static thresholds. Monitoring with Ganglia


  2. This means that Sonar not only gives you the option to apply specific metric rule sets and thresholds per project, but also allows you to decide whether you want to use the analysis tools provided by Sonar to generate metrics. Gradle in Action


  3. This decider allows us to configure thresholds when a shard can be allocated to a node and when ElasticSearch should try to relocate shard to another node. Mastering ElasticSearch


  4. When thresholds are reached, a Memtable is flushed to disk in a sorted format called an SSTable. Cassandra High Performance Cookbook


  5. Add to these graphs things like thresholds, and you can easily find out if the system isn’t performing in the expected range of operation. HBase in Action


  6. Region servers are responsible for all read and write requests for all regions they serve, and also split regions that have exceeded the configured region size thresholds. HBase:The Definitive Guide


  7. If tasks fail due to software errors, Hadoop will retry them within configurable thresholds. Hadoop Beginners Guide


  8. Alert thresholds and performance data of MapReduce is inherently coupled to that of HDFS when services are stacked in this manner, making it difficult to detect the root cause of a failure across service and host boundaries. Hadoop Operations


  9. When using Threads, granularity thresholds must in general be substantially higher than when using lightweight executable classes (although still substantially lower than those needed in distributed parallel designs) Concurrent Programming in Java Design Principles and Pattern


  10. You may want to create thresholds for components to expand and contract. Java 7 Recipes A Problem-Solution Approach



577、单词 cypher 的匹配文本:


  1. Neo4J also provides the Cypher query language to query the graph. NoSQL Distilled


  2. In the example, I will also introduce the option to exchange password encoders in order to use different algorithms to cypher the passwords, instead of storing them in plain text. Pro Spring Security


  3. In the next chapter, we’ll look at Cypher, which is a pattern-matching language tuned to the way we tend to describe graphs using diagrams. Graph Databases


  4. With the declarative Cypher query language, Neo4j makes it easier to get started for everyone who knows SQL from working with relational databases. Spring Data Modern Data Access for Enterprise Java


  5. Query Declares a property to automatically provide an iterable that’s built by executing a given Cypher query. Spring in Action 4th Edition



578、单词 spam 的匹配文本:


  1. If clicking a link or visiting a web page could install arbitrary code on the user’s computer, criminals would have an easy time stealing confidential information, accessing financial data, or taking over users’ machines to send spam. Core Java Volume I Fundamentals 9th Edition


  2. In addition to extremely large-scale pipelines for Yahoo! Search, scientists optimizing advertising analytics, spam filtering, and content optimization drove many of its early requirements. Apache Hadoop YARN Yet Another Resource Negotiator


  3. Classifiers have widespread applications such as e-mail spam filtering, finding most promising products, selecting customers for closer interactions, and taking decisions in machine learning situations, and so on. Hadoop MapReduce Cookbook


  4. Examples of classification include email spam filtering and detection of fraudulent credit card transactions. Hadoop in Practice


  5. A low clustering coefficient could indicate widely dispersed interest (as it does with @THE_REAL_SHAQ), or it could indicate the kind of inorganic community that a spam account would engender. Hadoop:The Definitive Guide 3rd Edition


  6. As an example, the following query looks for emails that contain "business opportunity" and must either be starred, or both be in the Inbox and not marked as spam: Elasticsearch The Definitive Guide


  7. However, in these days of spam floods, most servers have built-in checks and only accept requests from users or IP address ranges that they trust. Core Java Volume II Advanced Features 9th Edition


  8. For example, you want to build a spam filter   to know the words frequently used in the millions of spam emails you’ve received. Hadoop in Action


  9. Somewhat more subtly, an applet could take advantage of the user’s system to forge email, generate spam, or launch hacking attempts on other systems. Java in a Nutshell 5th Edition


  10. Examples of such use cases include: Responding to customer requests, spam analysis, dealing with alerts in highly critical revenue systems, or monitoring and assessing changes to production systems. PowerDrill - Processing a Trillion Cells per Mouse Click



579、单词 martin 的匹配文本:


  1. To circumvent this problem, Mahout implements techniques to identify groups of words that have an unusually high probability of occurring together, such as Martin Luther King Jr or Coca Cola. Mahout in Action


  2. NoSQL distilled : a brief guide to the emerging world of polyglot persistence / Pramod J Sadalage, Martin Fowler. NoSQL Distilled


  3. Knut Ola Hellan (creator of Pillow) and Martin Brown (from Couchbase) both provided valuable feedback which helped to make this book better. Scaling CouchDB


  4. In Scala, we use a simplified version of a technique introduced in a paper written by Scala’s designer, Martin Odersky. Functional Programming Patterns in Scala and Clojure


  5. Martin Gardner, the mathematics and science writer, once said in an interview: Beyond calculus, I am lost. Hadoop:The Definitive Guide 3rd Edition


  6. The name of this design comes from Martin Fowler’s book Patterns of. SQL Antipatterns


  7. Martin Odersky’s amazing balance between theory and reality make Scala possible, and the people he has attracted into the community are brilliant. Beginning Scala


  8. Martin Porter, and it’s best defined in his own words: Lucene in Action 2nd Edition


  9. The text of the book is set in 10/11 point FF Scala and Scala Sans, designed by Martin Majoor, and distributed by FSI FontShop International. Fundamental Networking in Java


  10. Special thanks also go to Brian Aker, Martin “MC” Brown, and Paul Kinzelman for their reviews and suggestions. Understanding MySQL Internals



580、单词 idempotent 的匹配文本:


  1. The PUT operation is idempotent; that is, the content of the URL specifies the name of the object we are creating through the HTTP request. Getting Started with CouchDB


  2. Combiners also must be idempotent, as they may be run an arbitrary number of times by the Hadoop framework over a given map task’s output. Pro Hadoop


  3. The key feature of infrastructure automation is that deployment scripts are idempotent—that is, running your scripts multiple times will have the same intended effect as running them once, something that becomes critical when a script fails halfway through. CouchDB The Definitive Guide


  4. Applying plugins is an idempotent operation, and therefore is only executed once for a specific plugin. Gradle in Action


  5. We rely on the application writer to make such side-effects atomic and idempotent. MapReduce - Simplied Data Processing on Large Clusters


  6. If the mutations fail, it is safe to submit the entire list again as mutations are idempotent due to the time stamp associated with them. Cassandra High Performance Cookbook


  7. An idempotent operation produces the same result no matter how many times it’s executed. Hadoop in Practice


  8. Another reason for turning off speculative execution is for tasks that are not idempotent. Hadoop:The Definitive Guide 3rd Edition


  9. The records in this application log are idempotent, and can be applied multiple times without any data loss. Apache Hadoop Goes Realtime at Facebook


  10. Your tasks are no longer guaranteed to be idempotent and you’ll need to understand how various failure scenarios can affect your tasks. Hadoop in Action



581、单词 intellij 的匹配文本:


  1. JetBrains IntelliJ Idea continues to forge creative new paths in development tools. Thinking in Java 4th Edition


  2. This chapter explains Gradle’s capabilities for generating project files for popular IDEs like Eclipse, IntelliJ, and NetBeans. Gradle in Action


  3. In the next chapter, we will learn how we can integrate Gradle with Integrated Development Environments (IDEs) Eclipse and JetBrains IntelliJ. Gradle Effective Implementation Guide


  4. Don’t be turned off by these issues though; there’s good news! Most integrated development environments (IDEs) such as NetBeans and IntelliJ support this refactoring and will automatically ensure these gotchas don’t arise. Java 8 in Action Lambdas, Streams and Functional-style Programming


  5. Modern IDEs have great support for many code quality tools—Checkstyle, PMD, and FindBugs all have plugins for Eclipse, NetBeans, and IntelliJ, which provide rapid feedback for developers on code quality issues. Jenkins The Definitive Guide


  6. The application server is easy to use (ZIP installer and NetBeans/ Eclipse/IntelliJ integration), lightweight (downloads starting at 37 MB, small disk/ memory footprint), and modular (OSGi-based, containers start on demand) Java EE 7 Essentials


  7. Once the JAR file is downloaded, add it as an external library to your IDE (IntelliJ, NetBeans, or Eclipse) Getting Started with Google Guava


  8. The other big change in the platform is the widespread adoption of modern Integrated Development Environments (IDEs), such as Eclipse, IntelliJ IDEA, and NetBeans, and of static analysis tools, such as FindBugs. Effective Java 2nd Edition


  9. IDEs like Eclipse and IntelliJ IDEA communicate with source code repositories like. Java Network Programming 4th Edition


  10. Although the steps described here are for NetBeans, you can also develop using other IDEs such as Eclipse, IntelliJ, or vi. Java 7 Recipes A Problem-Solution Approach



582、单词 snippets 的匹配文本:


  1. Many of the code snippets used in the following sections were taken from the mod_example gmond metric module source code. Monitoring with Ganglia


  2. With flexibility comes a lot of duplicated code snippets that are copied from one project to another. Gradle in Action


  3. They typically support only a single tag, whereas in real life, a user can be interested in getting XML snippets for multiple tags. Professional Hadoop Solutions


  4. Those code snippets evolve and grow over the course of a section or chapter. HBase in Action


  5. Previous chapters showed you some MapReduce snippets in action when working with data serialization. Hadoop in Practice


  6. Please note that the provided code snippets have been simplified due to space constraints; for download details for the full code listings, refer to the Preface. Hadoop:The Definitive Guide 3rd Edition


  7. The snippets extracted from Hush show you how the feature is used in context, and since it is part of the publicly available repository accompanying the book, you have the full source available as well. HBase:The Definitive Guide


  8. Many applications like to highlight snippets of text from each search result so that the user can see why the document matched their query. Elasticsearch The Definitive Guide


  9. For other events, you write short snippets of event-handling code. Core Java Volume II Advanced Features 9th Edition


  10. As we walk through the different tuning options for ActiveMQ, we’ll demonstrate them with example snippets of code, finally pulling all the tuning techniques together in an example data feed application. ActiveMQ in Action



583、单词 alpha 的匹配文本:


  1. And although release Version 2.0.x is the most feature-rich Hadoop release, it is still in alpha state requiring further improvements. Hadoop Operations and Cluster Management Cookbook


  2. When used (in order to use it, we need to use the laplace value as its name), a constant value equal to the value of the alpha parameter (which is by default 0.5) will be added to counts to balance the weights of frequent and infrequent n-grams. Mastering ElasticSearch


  3. Note, however, that some processor architectures (specifically, Alpha and DSM architectures) may have more implementation issues for correct handling of accesses to final fields. JSR-133 Java Memory Model and Thread


  4. CouchDB is still in the alpha stage of development, and as a result its security features are incomplete and constantly evolving. Beginning CouchDB


  5. Overlaying a partially transparent rectangle on an image In the Java 2D API, transparency is described by an alpha channel. Core Java Volume II Advanced Features 9th Edition


  6. The alpha value of zero means our window will be completely transparent. Java 7 New Features Cookbook


  7. It includes the major HDFS improvements such as namenode high availability, as well as also a forward port of the battle-tested MRv1 daemons (in addition to the alpha version of YARN) so as to be production-ready. Hadoop Operations


  8. There are several free packages available for parsing class files, including CFParse from the IBM alphaWorks site, http://www.alphaworks.ibm.com/tech/cfparse. Java Performance Tuning 2nd Edition


  9. The t-statistic is compared to a value obtained from a Student’s t-distribution for an a (alpha) and degrees of freedom. Java Performance


  10. This powerful API allows you to do things such as drawing geometric shapes, image processing, alpha compositing (combining images), text font rendering, antialiasing, clipping, creating transformations, stroking, filling, and printing. Java 7 Recipes A Problem-Solution Approach



584、单词 jsps 的匹配文本:


  1. These technologies are suited to mediumto large-scale application development, and include topics such as Enterprise Java Beans (EJBs), Java Server Pages (JSPs), and much more. Java Network Programming and Distributed Computing


  2. The introductory portion ends with the Error Handling with Exceptions chapter, but you may also want to supplement this with an introduction to JDBC, Servlets and JSPs. Thinking in Java 4th Edition


  3. Directory holding dynamic scripting view components in form of JSPs. Gradle in Action


  4. Develop JavaServer Pages (JSPs) to display both static and dynamic content in a web browser. Jenkins Continuous Integration Cookbook


  5. For the web pages, the primary technology used is Java Server Pages (JSPs) Pro Spring MVC


  6. Hadoop provides several JavaServer Pages (JSPs), enabling you to visualize MapReduce execution. Professional Hadoop Solutions


  7. It's similar to JSPs, ASPs, PHPs, and so on, but simpler with a syntax consisting of just a handful of commands. Solr 3 Enterprise Search Server


  8. For example, an application server generating plenty of Java Server Pages (JSPs) on the fly reduces a static compiler to a JIT compiling JVM, only slower and less adaptive. Oracle JRockit The Definitive Guide


  9. For this reason, Java Performance Tuning, Second Edition includes four new chapters: a new chapter on J2EE application tuning in general followed by chapters on tuning JDBC, servlets and JSPs, and EJBs. Java Performance Tuning 2nd Edition


  10. Each application can contain one or more Java Servlets and JSPs. Java Performance



585、单词 fifo 的匹配文本:


  1. If all jobs in the waiting queue have the same priority, the Fair Scheduler can be configured to schedule these jobs with either Fair Scheduler or FIFO Scheduler. Hadoop Operations and Cluster Management Cookbook


  2. Hadoop is by default configured with a First in First out (FIFO) scheduler, which executes jobs in the same order as they arrive. Hadoop MapReduce Cookbook


  3. By default MapReduce uses a FIFO scheduler to determine how tasks should be scheduled if there are multiple jobs running at the same time. Hadoop in Practice


  4. Job Scheduling Early versions of Hadoop had a very simple approach to scheduling users’ jobs: they ran in order of submission, using a FIFO scheduler. Hadoop:The Definitive Guide 3rd Edition


  5. Another storage data structure that is often required at scale is a FIFO queue, like that provided by GFS [7] RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.


  6. Under Hadoop’s default FIFO scheduler , as soon as a job is sent to Hadoop for execution, the JobTracker will assign as many TaskTrackers as necessary to process that job. Hadoop in Action


  7. Each worker constantly monitors a common area for new tasks and picks up new tasks as they arrive on a FIFO basis. Tenzing - A SQL Implementation On The MapReduce Framework


  8. This has hidden the fact that, by default, Hadoop places subsequent job submissions into a First In, First Out (FIFO) queue. Hadoop Beginners Guide


  9. None of the three scheduler plug-ins (including the default FIFO scheduler) provide access control over which jobs are submitted to which. Hadoop Operations


  10. The indexes maintain the FIFO data structure for queues and the durable subscriber pointers to their topic messages. ActiveMQ in Action



586、单词 persisting 的匹配文本:


  1. For instance, persisting Jabber instant messages to CouchDB might use ejabberd and Hovercraft. CouchDB The Definitive Guide


  2. Most of this saving can be attributed to scheduling and launching overheads of multiple MapReduce jobs and avoiding the unnecessary steps of persisting outputs of the intermediate MapReduce jobs to HDFS. Apache Hadoop YARN Yet Another Resource Negotiator


  3. This comes in handy if you are persisting the results of the concatenation and want a very descriptive column header. Hadoop RealWorld Solutions Cookbook


  4. Persisting data into structures that arrange themselves based on data values can result in worst-case data distribution. HBase in Action


  5. Gateway is the component of Elasticsearch responsible for persisting your data to disk, so that you don't lose it when the node goes down. Elasticsearch in Action MEAP V07 cHAPTER 1


  6. Use of a BackupNode provides the option of running the NameNode without persistent storage, delegating responsibility for the namespace state persisting to the BackupNode. The Hadoop Distributed File System


  7. So, after it has opened all the storage files, the HLog is initialized to reflect where persisting ended and where to continue. HBase:The Definitive Guide


  8. In addition to persisting all of these messages, a new threading model also requires messages to be stored for each participating user. Apache Hadoop Goes Realtime at Facebook


  9. Although one of the most important aspects of message persistence is that the messages will survive in long-term storage, there are a number of cases where messages are required to be available for consumers that were disconnected from the broker, but persisting the messages in a database is too slow. ActiveMQ in Action


  10. It works by persisting output to a file which could be stored on HDFS or locally. Programming Hive



587、单词 iterators 的匹配文本:


  1. There is an important conceptual difference between iterators in the Java collections library and iterators in other libraries. Core Java Volume I Fundamentals 9th Edition


  2. How many times do you find yourself reimplementing these operations using iterators? Most databases let you specify such operations declaratively. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. The recipes leverage many of its unique features, including iterators, combiners, scan authorizations, and constraints. Hadoop RealWorld Solutions Cookbook


  4. But since scans are similar to iterators, you do not have a scan() call, but rather a getScanner(), which returns the actual scanner instance you need to iterate over. HBase:The Definitive Guide


  5. Similarly, implementations of the collection interfaces, such as Set and List, typically use nonstatic member classes to implement their iterators: Effective Java 2nd Edition


  6. In addition, the second section will examine the use of empty iterators to avoid null pointer exceptions. Java 7 New Features Cookbook


  7. A third approach to traversal is for a collection class to support fast-fail iterators that throw an exception if the collection is modified in the midst of a traversal. Concurrent Programming in Java Design Principles and Pattern


  8. A HashMap does not guarantee the order of the elements stored in the map, and this extends to its iterators. Java 7 Recipes A Problem-Solution Approach


  9. In fact, Percolator presents the user with a database-like interface: it supports transactions, iterators, and secondary indexes. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications


  10. The MapReduce jobs consist of DAGs of relational operators (such as filter, select (project), join, aggregation) that operate as iterators: each operator forwards a data tuple to the next operator after processing it. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



588、单词 monads 的匹配文本:


  1. The map method is associated with functors, and the flatMap method is associated with monads. Scala in Depth


  2. That’s because Scala is looking for the IOMonad type in the io.monads package, not in another top-level package called monads. Scala in Action


  3. Because for expressions are equivalent to applications of these three methods, they can be seen as syntax for monads. Programming in Scala 2nd Edition


  4. All monads are functors, but not all functors are monads. Functional Programming in Scala


  5. In fact, the sequence comprehensions we went over are both examples of a technique popularized by the highly functional language Haskell that is known as monadic transformations, which rely on a concept from category theory known as monads. Functional Programming Patterns in Scala and Clojure


  6. Monads in Scala Method map (see Section 2.13) has some really interesting properties. Steps in Scala An Introduction to Object-Functional Programming


  7. NOTE: These operations are important in the theory of monads, but you don’t need to know the theory to understand map and flatMap. Java SE 8 for the Really Impatient



589、单词 jaxb 的匹配文本:


  1. Classes for abstraction of XML marshaling and unmarshaling and support for popular tools like Castor, JAXB, XMLBeans, XStream, and so on, are packed into this module. Pro Spring 3


  2. The OXM module provides an abstraction layer that offers simplified and consistent support for popular Object/XML mapping tools such as Castor, the Java Architecture for XML Binding (JAXB), JiBX, XMLBeans, and XStream. Spring in Practice


  3. The simplest way to do this is to use Java Architecture for XML Binding (JAXB) to generate Java binding (based on the Workflow schema), and use these bindings as a Java API to create Oozie Workflows. Professional Hadoop Solutions


  4. To provide the eb services support, the JAX-RPC technology has evolved into the JAXhnology, which makes heavy use of the JAXB technology to bind Java to XML data. Java EE 7 Specification


  5. We use Castor here, but XStream, JAXB 2, or XMLBeans would work as well. Spring Batch in Action


  6. The @XmlRootElement annotation ensures that an automatic mapping from Java to XML occurs following JAXB mapping and an XML representation of the resource is returned. Java EE 7 Essentials


  7. From case to case, this can be achieved in different ways, such as through Java serialization or using XML marshalling through mechanisms such as Java Architecture for XML Binding (JAXB) Spring Integration in Action


  8. For the purpose of discussion, the Jackson serializer for JSON and JAXB for XML were selected. Java Performance


  9. However, in Java 7, you will find that the Java API for XML Processing (JAXP), Java API for XML Binding (JAXB), and even the Java API for XML Web Services (JAXWS) have been included in the core runtime libraries. Java 7 Recipes A Problem-Solution Approach


  10. Registered if JAXB v2 libraries are present on the classpath. Spring in Action 4th Edition



590、单词 columnar 的匹配文本:


  1. By combining multi-level execution trees and columnar data layout, it is capable of running aggregation queries over trillion-row tables in seconds. Dremel - Interactive Analysis of WebScale Datasets


  2. Column families were originally introduced by columnar databases for fast analytical queries. Professional Hadoop Solutions


  3. This book covers unloading/loading to and from HDFS, graph analytics with Giraph, batch data analysis using Hive, Pig, and MapReduce, machine-learning approaches with Mahout, debugging and troubleshooting MapReduce jobs, and columnar storage and retrieval of structured data using Apache Accumulo. Hadoop RealWorld Solutions Cookbook


  4. Although there is some overlap, making a columnar data store like HBase hum involves a different bag of tricks from those you use to tweak, say, MySQL. HBase in Action


  5. Installing HBase HBase is a highly scalable NoSQL data store that supports columnar-style data storage. Hadoop MapReduce Cookbook


  6. Hive provides another binary storage format called RCFile, short for Record Columnar File. Hadoop:The Definitive Guide 3rd Edition


  7. This is also where the majority of similarities end, because although HBase stores data on disk in a column-oriented format, it is distinctly different from traditional columnar databases: whereas columnar databases excel at providing real-time analytical access to data, HBase excels at providing key-based access to a specific cell of data, or a sequential range of cells. HBase:The Definitive Guide


  8. A manager who wants to understand the advantages (and disadvantages) of Cassandra and related columnar databases to help make decisions about technology strategy. Cassandra The Definitive Guide


  9. Tenzing supports a mostly complete SQL implementation (with several extensions) combined with several key characteristics such as heterogeneity, high performance, scalability, reliability, metadata awareness, low latency, support for columnar storage and structured data, and easy extensibility. Tenzing - A SQL Implementation On The MapReduce Framework


  10. It combines the advantages of columnar data layout with other known techniques (such as using composite range partitions) and extensive algorithmic engineering on key data structures. PowerDrill - Processing a Trillion Cells per Mouse Click



591、单词 ttl 的匹配文本:


  1. This is done by commenting out the multicast address and time to live (TTL) settings, and adding a dedicated master Gmond node (master2) in the gmond.conf file. HBase Administration Cookbook


  2. Every time when packet crosses route, the TTL is decreased. Mastering ElasticSearch


  3. A compromise is achieved by implementing a configurable cache time-to-live (TTL) parameter, thus limiting cache presence in each Lucene instance. Professional Hadoop Solutions


  4. Time To Live (TTL) is a setting that makes a column self-delete a specified number of seconds after the insertion time. Cassandra High Performance Cookbook


  5. We talk about Time To Live (TTL) later, as a part of advanced column family configurations. HBase in Action


  6. The time-to-live (or TTL) sets a threshold based on the timestamp of a value and the internal housekeeping is checking automatically if a value exceeds its TTL. HBase:The Definitive Guide


  7. Usually it is straightforward to pick a suitable TTL value, but if prompt replacement of failed services is desired, the TTL can become small enough to overload the DNS servers. Chubby - The lock service for loosely-coupled distributed systems


  8. Cassandra 0.7 introduced an optional time to live (TTL) value, which allows columns to expire a certain amount of time after creation. Cassandra The Definitive Guide


  9. As far as the application itself, you need to pay attention to an additional header field in the datagrams called the Time-To-Live (TTL) value. Java Network Programming 4th Edition


  10. The networkTTL property denotes the maximum number of remote brokers a message can pass through before being discarded. ActiveMQ in Action



592、单词 appends 的匹配文本:


  1. Log appends are acknowledged at the master in parallel with. Megastore - Providing Scalable, Highly Available Storage for Interactive Services


  2. If it finds it, it appends the value to the location of the design document itself to build the URL. CouchDB The Definitive Guide


  3. You may also encounter a project version that appends a SNAPSHOT designator to indicate that the built project artifact is in the state of development. Gradle in Action


  4. The key idea is this: we create a finite state machine (FSM) that reads the field values and levels for each field, and appends the values sequentially to the output records. Dremel - Interactive Analysis of WebScale Datasets


  5. Similarly, the Google File System [7] is optimized for very large files and a workload consisting largely of reads and file appends. Ceph A Scalable, High-Performance Distributed File System


  6. As HFile writer appends a block, an in-memory index of the first key of each block is formed, along with its in-file offset. Hadoop in Action


  7. As Cassandra receives updates, every write value is written immediately to the commit log in the form of raw sequential file appends. Cassandra The Definitive Guide


  8. Sqoop exports by default do a series of appends, adding each record as a new row in the table. Hadoop Beginners Guide


  9. Random and sequential writes perform better than random reads since each tablet server appends all incoming writes to a single commit log and uses group commit to stream these writes efficiently to GFS. Bigtable - A Distributed Storage System for Structured Data


  10. Each succeeding call appends its closure to the end of the list to be executed in order (Example 2-18) Building and Testing with Gradle



593、单词 terabytes 的匹配文本:


  1. This feature allows you to grow storage incrementally, regardless of whether you need terabytes or petabytes of space. Monitoring with Ganglia


  2. Our implementation of MapReduce runs on a large cluster of commodity machines and is highly scalable: a typical MapReduce computation processes many terabytes of data on thousands of machines. MapReduce - Simplied Data Processing on Large Clusters


  3. The uncompressed dataset is tens of terabytes, which is small compared to many NoSQL instances, but was large enough to cause difficulties with sharded MySQL. Spanner - Google’s Globally-Distributed Database


  4. Google has thousands of machines working on hundreds of terabytes of data, spread across the World Wide Web. Beginning CouchDB


  5. Such a configuration might have a hundred terabytes of data to be processed, distributed across some or all of the machines. Interpreting the Data Parallel Analysis with Sawzall


  6. They needed to go through terabytes   and petabytes   of data to figure out which websites were popular, what books were in demand, and what kinds of ads appealed to people. Hadoop in Action


  7. It performs blazingly fast writes, can store hundreds of terabytes of data, and is decentralized and symmetrical so there’s no single point of failure. Cassandra The Definitive Guide


  8. Picture a much larger input file measured in terabytes, and the split model makes more sense. Hadoop Beginners Guide


  9. The Bigtable clusters used by these products span a wide range of configurations, from a handful to thousands of servers, and store up to several hundred terabytes of data. Bigtable - A Distributed Storage System for Structured Data


  10. The search process is challenging because of the large amount of data: The raw documents comprise several tens of terabytes of uncompressed data, and the inverted index resulting from this raw data is itself many terabytes of data. Web search for a planet the google cluster architecture



594、单词 invariant 的匹配文本:


  1. Spanner depends on the following disjointness invariant: for each Paxos group, each Paxos leader’s lease interval is disjoint from every other leader’s. Spanner - Google’s Globally-Distributed Database


  2. All nodes on joining the cluster contact the leader who tells them for what ranges they are replicas for and leader makes a concerted effort to maintain the invariant that no node is responsible for more than N-1 ranges in the ring. Cassandra A Decentralized Structured Storage System


  3. Cuckoo hashing maintains the invariant that an item is always stored in one of these two locations. Data Structures and Algorithm Analysis in Java 3rd Edition


  4. Multiupdate is very useful for building structures in ZooKeeper that maintain some global invariant. Hadoop:The Definitive Guide 3rd Edition


  5. As we know that this job’s correctness is invariant to the ordering, we can ignore the differences. Hadoop in Action


  6. The exception’s detail method should indicate which invariant is violated (Item 63) Effective Java 2nd Edition


  7. A related use of the assert statement is to verify a class invariant. Java in a Nutshell 5th Edition


  8. But it is still surprising to see that in these cases the final size almost seems like an invariant. PowerDrill - Processing a Trillion Cells per Mouse Click


  9. Invariant state constraints, such as the facts that the currentVolume always remains between zero and capacity, and that capacity is nonnegative and never changes after construction. Concurrent Programming in Java Design Principles and Pattern


  10. When the selection result is zero, the set of selected keys is empty, so the following invariant holds: Fundamental Networking in Java



595、单词 substring 的匹配文本:


  1. You can extract a substring from a larger string with the substring method of the String. Core Java Volume I Fundamentals 9th Edition


  2. The String.substring method is used for extracting the actual IP address data from the raw string. Pro Hadoop


  3. Using a String data type works great for simple use cases, but what if you want to know the exact minor version of your project? You’ll have to parse the string value, search for the dot character, and filter out the substring that identifies the minor version. Gradle in Action


  4. You can do exact matches, substring matches, or regular-expression matches and filter out data that doesn’t match. HBase in Action


  5. We convert the Text value containing the line of input into a Java String, then use its substring() method to extract the columns we are interested in. Hadoop:The Definitive Guide 3rd Edition


  6. The second filter does a regular expression match, while the third uses a substring match approach. HBase:The Definitive Guide


  7. The substring method returned a new filename starting with the first character and ending with the character immediately preceding the period. Java 7 New Features Cookbook


  8. Instead, therefore, we have an opportunity to introduce several of Hive's built-in functions, in particular, those to convert a string to lowercase (LOWER), to extract a substring from a string (SUBSTR) and to return the number of characters in a string (LENGTH) Hadoop Beginners Guide


  9. Returns the substring for the index’s match using the regex_pattern. Programming Hive


  10. We observe a reversal of the general rule that Hive adds an overhead cost to hand-coded Hadoop in the “small” (substring) aggregation task (the time taken by Hive is represented by the lower part of the Hadoop bar in Fig. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



596、单词 posix 的匹配文本:


  1. In a regular Portable Operating System Interface (POSIX) style filesystem, if you open a file and write data, it still exists on disk before the file is closed. Apache Flume Distributed Log Collection for Hadoop


  2. Redis is written in ANSI C and works in most POSIX systems, such as Linux, without any external dependencies. MapReduce Design Patterns


  3. Data-Oriented Access Control Other than ACLs and POSIX-based file permissions (read and write) for users and groups on HDFS, Hadoop does not natively keep track of the access control policies for its data. Professional Hadoop Solutions


  4. The Ceph file system has three main components: the client, each instance of which exposes a near-POSIX file system interface to a host or process; a cluster of OSDs, which collectively stores all data and metadata; and a metadata server cluster, which manages the namespace (file names and directories) while coordinating security, consistency and coherence (see Figure 1) Ceph A Scalable, High-Performance Distributed File System


  5. Alternatively, CouchDB can be built from source on virtually any POSIX system. Beginning CouchDB


  6. The client presents a filesystem interface similar to a Portable Operating System Interface (POSIX), so the user code does not need to know about the namenode and datanode to function. Hadoop:The Definitive Guide 3rd Edition


  7. Permission settings for directories also closely follow the POSIX   model. Hadoop in Action


  8. If you’re on Windows, you’ll first have to get the Cygwin POSIX emulator and then install Git. Cassandra The Definitive Guide


  9. It also offers native integration with NFS file systems, which makes processing of existing data much easier; MapR replaced HDFS with a full POSIX-compliant filesystem that can easily be mounted remotely. Hadoop Beginners Guide


  10. These systems are fantastic as the backing store for relational databases, content delivery systems, and similar types of data storage needs because they can support full-featured POSIX semantics, scale to meet the size requirements of these systems, and offer low-latency access to data. Hadoop Operations



597、单词 jtext 的匹配文本:


  1. Each user interface component has a wrapper class (such as JButton or JTextField) that stores the model and the view. Core Java Volume I Fundamentals 9th Edition


  2. But what should the result of pressing that button be? We’d like to see something change on the screen, so a new Swing component will be introduced: the JTextField. Thinking in Java 4th Edition


  3. A DefaultCellEditor can be constructed with a JTextField, a JCheckBox, or a JComboBox. Core Java Volume II Advanced Features 9th Edition


  4. Otherwise, you mostly use the methods it inherits from the JTextField superclass. Java Network Programming 4th Edition


  5. In the inheritance hierarchy, all Swing components such as the JLabel, JTextField and JPanel classes extend from the JComponent class. Java 7 Recipes A Problem-Solution Approach



598、单词 rrd 的匹配文本:


  1. It is usually installed on the same physical hardware as gmetad, because it needs access to the RRD databases created by the poller. Monitoring with Ganglia


  2. Many of these are built on top of RRDTool (http://www.rrdtool.org), which stores time-series data in round-robin database (RRD) files. High Performance MySQL 3rd Edition


  3. Next, the rrdgraph report processor that converts transaction reports into RRD-based graphs. Pro Puppet


  4. Each gmond process relays data to a central gmetad process that records data in a series of RRD, or round-robin database files, which are fixed-size files that efficiently store time series data. Hadoop Operations



599、单词 sstables 的匹配文本:


  1. SSTables are not written to again after they are flushed; if there are changes to the data, a new SSTable is written. NoSQL Distilled


  2. It does this by isolating the disk traffic for Commit Log activity from the traffic used for reads as well as flush Memtables and compact SSTables. Cassandra High Performance Cookbook


  3. It also has scripts for converting SSTables (the datafiles) to JSON and back. Cassandra The Definitive Guide


  4. Of these updates, the recently committed ones are stored in memory in a sorted buffer called a memtable; the older updates are stored in a sequence of SSTables. Bigtable - A Distributed Storage System for Structured Data


  5. SSTables are stored in GFS; Bigtable relies on GFS to preserve data in the event of disk loss. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



600、单词 completable 的匹配文本:


  1. As you’ll see in this chapter, the Future interface and particularly its new CompletableFuture implementation are your best tools in such circumstances. Java 8 in Action Lambdas, Streams and Functional-style Programming


  2. The CompletableFuture class that we will discuss in Chapter 6 has an operation that does just what map should do, but it is called thenApply. Java SE 8 for the Really Impatient



601、单词 jnlp 的匹配文本:


  1. Then, prepare a descriptor file in the Java Network Launch Protocol (JNLP) format. Core Java Volume I Fundamentals 9th Edition


  2. If you are in a situation where you can ensure that users have a JRE installed (such as inside a corporate environment), then applets (or JNLP/Java Web Start, described later in this chapter) might be the perfect way to distribute client programs and automatically update everyone’s machine without the usual cost and effort of distributing and installing new software. Thinking in Java 4th Edition


  3. When you click on the Launch button on either of these sites in Firefox, the browser will ask if you want to open a file called jenkins.jnlp using Java Web Start. Jenkins The Definitive Guide


  4. A future version of this ation may require that Java EE products be able to deploy application clients that allows them to be launched by a JNLP client, and that application ntainers be able to launch application clients deployed using the JNLP. Java EE 7 Specification


  5. The Embedding a JNLP file in an HTML page recipe provides a demonstration of this technique. Java 7 New Features Cookbook


  6. If the URL of a JNLP (Java Network Launching Protocol) is specified on the command line, javaws launches the specified application. Java in a Nutshell 5th Edition


  7. Underneath the covers, Java Web Start provides a network launching protocol called JNLP. Java 7 Recipes A Problem-Solution Approach



602、单词 auth 的匹配文本:


  1. The token lifetime can be configured with the timeout (in seconds) setting in the couch_httpd_auth configuration section. CouchDB The Definitive Guide


  2. Getting ready Install the Twitter plugin (http://wiki.hudson-ci.org/display/HUDSON/ Twitter+Plugin) and download auth.jar from the same wiki page. Jenkins Continuous Integration Cookbook


  3. And if your Jenkins server requires authentication, just pass in the -auth username:password option: Jenkins The Definitive Guide


  4. Hadoop Auth provides HTTP SPNEGO authentication for protected web application resources, and sets a signed HTTP cookie that contains a Kerberos authentication token (which can be used until the cookie expires) Professional Hadoop Solutions


  5. App annotat in whic authent Users”) roles, w environ all auth method. Java EE 7 Specification


  6. To do this, the server uses the setNeedClientAuth( ) method on its server socket as follows: Java Security 2nd Edition


  7. This ensures that the getUserPrincipal, getRemoteUser, and getAuthType methods return valid values. Java EE 7 Essentials


  8. The AuthTest program authenticates a user and runs a simple action that retrieves a system property. Core Java Volume II Advanced Features 9th Edition


  9. If your server desires or requires authentication by its clients, call setWantClientAuth( ) or setNeedClientAuth( ) Java in a Nutshell 5th Edition


  10. Next, we set the needClientAuth parameter in the SSL transport URI, which instructs the broker to check connecting client certificates and allow access only to those that are found in the truststore. ActiveMQ in Action



603、单词 arg 的匹配文本:


  1. Inspect the local variables and check the value of the arg variable: Core Java Volume I Fundamentals 9th Edition


  2. One can validly pop types matching the argument types given in Descriptor and an uninitialized type, UninitializedArg, off the incoming operand stack, yielding OperandStack. The Java Virtual Machine Specification Java SE 7 Edition


  3. That parameter will now be available in the Oozie application execution context, and can be used, for example, as a parameter for java action invocation inside the <arg> element. Professional Hadoop Solutions


  4. Entities A POJO with a no-arg public constructor is used to define the mapping with one or more relational database tables. Java EE 7 Essentials


  5. Implement a class with a method public static void premain(String arg, Instrumentation instr) Core Java Volume II Advanced Features 9th Edition


  6. Do this by using one of the constructors other than the no-arg constructor. Java in a Nutshell 5th Edition


  7. Although the Serializable interface requires serializable objects to have no-arg constructors, deserialized objects do not actually use that (or any) constructor. Java Performance Tuning 2nd Edition


  8. Also, when discussing invocations of the form obj.msg(arg), the recipient (that is, the object bound to variable obj) is called the target object. Concurrent Programming in Java Design Principles and Pattern


  9. Note You will need an empty (no-arg) constructor for classes that implement the Externalizable interface. Java 7 Recipes A Problem-Solution Approach


  10. The standard idiom is to wrap the code in a no-arg lambda: Java SE 8 for the Really Impatient



604、单词 subtypes 的匹配文本:


  1. Note that the last four subtypes are interfaces—the virtual machine instantiates suitable classes that implement these interfaces. Core Java Volume I Fundamentals 9th Edition


  2. If you had a hundred different lambdas for expressing a Comparator, that would mean a hundred different subtypes of Comparator. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. There are actually several subtypes of FileCollection that may be in use in any of these cases. Gradle Beyond The Basics


  4. Finally, all the key and value types   must be subtypes of Writable , which ensures a serialization interface for Hadoop to send the data around in a distributed cluster. Hadoop in Action


  5. The Liskov substitution principle says that any important property of a type should also hold for its subtypes, so that any method written for the type should work equally well on its subtypes [Liskov87] Effective Java 2nd Edition


  6. The other two types were both of the type application, but had different subtypes. Java 7 New Features Cookbook


  7. When defining an abstract type (e.g., Shape) that you expect to have many subtypes (e.g., Circle, Rectangle, Square), you are often faced with a choice between interfaces and abstract classes. Java in a Nutshell 5th Edition


  8. In addition, nonstandard custom types and subtypes can be freely defined as long as they begin with x- Java Network Programming 4th Edition


  9. Therefore, the following would be valid assignments because both Integer and Double are subtypes of Number: Java 7 Recipes A Problem-Solution Approach


  10. In general, reading is covariant (subtypes are okay) and writing is contravariant (supertypes are okay) Java SE 8 for the Really Impatient



605、单词 ceph 的匹配文本:


  1. Being a part of Hadoop core and serving as a storage layer for the Hadoop MapReduce framework, HDFS is also a stand-alone distributed file system like Lustre, GFS, PVFS, Panasas, GPFS, Ceph, and others. HDFS scalability the limits to growth


  2. MooseFS (Moose File System) is a shared file system ; it implements the same rough concepts of shared storage solutions - such as Ceph, Lustre or even GlusterFS. bk-compute-adminguide-grizzly


  3. Rados block device (RBD) Stores images inside of a Ceph storage cluster using Ceph's RBD interface. bk-admin-guide-cloud-latest


  4. Abstract We have developed Ceph, a distributed file system that provides excellent performance, reliability, and scalability. Ceph A Scalable, High-Performance Distributed File System


  5. Ceph [17] has a cluster of namespace servers (MDS) and uses a dynamic subtree partitioning algorithm in order to map the namespace tree to MDSs evenly. The Hadoop Distributed File System


  6. Built as part of the Ceph distributed file system [27], RADOS facilitates an evolving, balanced distribution of data and workload across a dynamic and heterogeneous storage cluster while providing applications with the illusion of a single logical object store with well-defined safety semantics and strong consistency guarantees. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.


  7. Ceph was originally developed by one of the founders of DreamHost and is currently used in production there. OpenStack Operations Guide



606、单词 geospatial 的匹配文本:


  1. On the other hand, only MyISAM supports geospatial search inside MySQL. High Performance MySQL 3rd Edition


  2. It combines the ability to scale out with features such as secondary indexes, range queries, sorting, aggregations, and geospatial indexes. MongoDB The Definitive Guide 2nd Edition


  3. A typical example would be geospatial processing based on the bounding box discussed in the following example. Professional Hadoop Solutions


  4. There are also examples for building an efficient geospatial row key and performing batch analysis using MapReduce. Hadoop RealWorld Solutions Cookbook


  5. Recently, David has been focusing his attention on the intersection of geospatial technologies with Lucene and Solr. Solr 3 Enterprise Search Server


  6. In chapter 8, you get a glimpse at using HBase for geospatial data. HBase in Action


  7. It supports powerful full-text search, hit highlighting, faceted search, dynamic clustering, database integration, rich document handling (for example, Word and PDF), and geospatial search. Hadoop MapReduce Cookbook


  8. In that time, graph databases have helped solve important problems in the areas of social networking, master data management, geospatial, recommendations, and more. Graph Databases


  9. Leveraging Geospatial Indexes One form of indexing worthy of special mention is geospatial indexing. The Definitive Guide to MongoDB


  10. The kinds of indexes supported include all the ones you’d find in an RDMBS; ascending, descending, unique, compound-key, and even geospatial indexes are supported. MongoDB in Action



607、单词 postfix 的匹配文本:


  1. Install the Postfix e-mail server to let Nagios send out e-mails: HBase Administration Cookbook


  2. There are actually two forms of these operators; you’ve just seen the postfix form of the operator that is placed after the operand. Core Java Volume I Fundamentals 9th Edition


  3. There are two versions of each type of operator, often called the prefix and postfix versions. Thinking in Java 4th Edition


  4. You can also use a postfix of other criteria to cover queries with the index. MongoDB The Definitive Guide 2nd Edition


  5. Exec and Notify Subscribing a service to a file is very convenient, but what if we need to do something more explicit when a file resource changes? I’ll use a postfix transport map as an example. Managing Infrastructure with Puppet


  6. A postfix expression followed by a ++ operator is a postfix increment expression. The Java Language Specification Java SE 7 Edition


  7. You’ll discover how to use Puppet to manage Postfix, Apache and MySQL servers, as well as how to load-balance your Puppet Masters. Pro Puppet


  8. Two of our highest-volume log formats are produced by the Postfix mail transfer agent and Microsoft Exchange Server. Hadoop:The Definitive Guide 3rd Edition


  9. The columns form the actual counters, and their name is a combination of the date, plus an optional dimensional postfix—for example, the country code. HBase:The Definitive Guide


  10. These operators, in both prefix and postfix forms, are most commonly used to increment or decrement the counter that controls a loop. Java in a Nutshell 5th Edition



608、单词 scalar 的匹配文本:


  1. Not only can you construct an index with scalar values like strings and integers, you can also use JSON structures as keys for your views. CouchDB The Definitive Guide


  2. Each scalar expression in the SELECT clause emits a value at the same level of nesting as the most-repeated input field used in that expression. Dremel - Interactive Analysis of WebScale Datasets


  3. Removing low scoring data If you can score your data with some sort of scalar value, you can filter out records that don’t meet a certain threshold. MapReduce Design Patterns


  4. Unstructured text works well when you’re working with scalar or tabular data. Hadoop in Practice


  5. Some eval functions are aggregate functions, which means they operate on a bag of data to produce a scalar value; MAX is an example of an aggregate function. Hadoop:The Definitive Guide 3rd Edition


  6. The simplest form of the update request accepts a partial document as the "doc" parameter which just gets merged with the existing document—objects are merged together, existing scalar fields are overwritten. Elasticsearch The Definitive Guide


  7. A scalar function is a function that returns a single value. Core Java Volume II Advanced Features 9th Edition


  8. These include filter functions (eval functions that return a Boolean) and aggregate functions (eval functions that take a bag and return a scalar value) Hadoop in Action


  9. This pattern fuses together two scalar values with a separator to create an aggregate. Cassandra The Definitive Guide


  10. Similarly, array objects holding scalar elements possess locks, but their individual scalar elements do not. Concurrent Programming in Java Design Principles and Pattern



609、单词 pojos 的匹配文本:


  1. In the next section we will look into the various way to serialize Pojos and how Netty allows you to do so by make use of different serialization libraries. Netty in Action MEAP V08


  2. In Java, classes that follow the bean conventions are called plain-old Java objects (POJOs) Gradle in Action


  3. JavaBeans (also known as POJOs, for Plain Old Java Objects) provide a standard mechanism for creating Java resources that are configurable in a number of ways. Pro Spring 3


  4. Indexing POJOs POJOs (Plain Old Java Objects) typically follow the JavaBean naming pattern for properties that each have a getter and setter method. Solr 3 Enterprise Search Server


  5. You can also define listeners for all these events as annotated POJOs. Spring Batch in Action


  6. Thanks to this mechanism, simple POJOs can be exposed as OSGi services, and OSGi services can be injected into regular Spring beans by using the appropriate elements. Spring Dynamic Modules in Action


  7. Transactional annotation brings transactional semantics to POJOs (plain old Java objects), outside of an EJB (Enterprise JavaBean) Java EE 7 Essentials


  8. These are Plain Old Java Objects (POJOs) that act as if they’re message driven. ActiveMQ in Action


  9. This makes it easy to cache the results of method calls in your POJOs without having to explicitly manage the process of checking for the existence of a cache entry, loading new ones, and expiring old cache entries. Spring Data Modern Data Access for Enterprise Java


  10. It empowered plain old Java objects (POJOs) with powers previously only available using EJB and other enterprise Java specifications. Spring in Action 4th Edition



610、单词 deserialization 的匹配文本:


  1. Passing by reference eliminates a serialization and deserialization for the key/value, a potential speed increase. Pro Hadoop


  2. If the versions are different you may run into issues, for example, not being able to connect or problems with response deserialization. Mastering ElasticSearch


  3. Deserialization of this Bloom filter is demonstrated in the setup method of the following Mapper code. MapReduce Design Patterns


  4. No serialization or deserialization of objects (both memory and processing) Professional Hadoop Solutions


  5. Serialization and deserialization take data from an in-memory form and persist it to a back-end data store. Cassandra High Performance Cookbook


  6. You can also review a Google Code project called hive-json-serde,9 which can support both serialization and deserialization. Hadoop in Practice


  7. Deserialization is the reverse process of turning a byte stream back into a series of structured objects. Hadoop:The Definitive Guide 3rd Edition


  8. The constructor without any parameters is only for deserialization purposes and should not be used directly. HBase:The Definitive Guide


  9. However, this proved to be inefficient because of the serialization and deserialization costs associated with translating to and from Sawzall’s native type system. Tenzing - A SQL Implementation On The MapReduce Framework


  10. The main purpose of this interface is to provide mechanisms for the serialization and deserialization of data as it is passed across the network or read and written from the disk. Hadoop Beginners Guide



611、单词 nontrivial 的匹配文本:


  1. It does, however, add a nontrivial amount of load to the Nagios server. Monitoring with Ganglia


  2. To bring everything together, I take you through the step-by-step development of a nontrivial MapReduce application. Pro Hadoop


  3. Building a system for general-purpose, distributed, parallel computation is nontrivial. HBase in Action


  4. The objective of this part of the book is to present techniques to address nontrivial questions asked about your data, and to create new insights into your data. Hadoop in Practice


  5. A natural question to ask is: can you do anything useful or nontrivial with it? The answer is yes. Hadoop:The Definitive Guide 3rd Edition


  6. Selecting one server type over the others is a nontrivial task, as it depends on your use case. HBase:The Definitive Guide


  7. Decomposing a data processing application into mappers and reducers is sometimes nontrivial. Hadoop in Action


  8. Not to mention the administration overhead, which can be nontrivial if things start breaking in the early hours of the morning. Hadoop Beginners Guide


  9. To demonstrate the use of CLUSTER BY, let’s see a nontrivial example: another way to perform the Word Count algorithm that we introduced in Chapter 1 Programming Hive


  10. Yet all of the parallel databases mentioned above have a nontrivial cost, often coming with seven figure price tags for large installations. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



612、单词 datacenter 的匹配文本:


  1. The combined volume of events is written together in HDFS in datacenter 1 Apache Flume Distributed Log Collection for Hadoop


  2. The underlying data is stored in a scalable NoSQL datastore in each datacenter (see Figure 1) Megastore - Providing Scalable, Highly Available Storage for Interactive Services


  3. The official NVML module is a valuable tool for cluster administrators who manage GPUs in an HPC cluster or datacenter environment. Monitoring with Ganglia


  4. Zones are also the unit of physical isolation: there may be one or more zones in a datacenter, for example, if different applications’ data must be partitioned across different sets of servers in the same datacenter. Spanner - Google’s Globally-Distributed Database


  5. Chapter 8, Multiple Datacenter Deployments: Cassandra is designed to work both when nodes are deployed in a local area network and when nodes are separated by larger geographical distances such as a wide area network. Cassandra High Performance Cookbook


  6. All messages that users write or read are stored in HBase.16 The system supporting Facebook messages needs to deliver high write throughput, extremely large tables, and strong consistency within a datacenter. HBase in Action


  7. Cluster mirroring in Kafka The Kafka mirroring feature is used for creating the replica of an existing cluster, for example, for the replication of an active datacenter into a passive datacenter. Apache Kafka


  8. Each datacenter has multiple racks (R), and each rack has multiple machines. Hadoop in Action


  9. Figure Kafka cluster co-located with each datacenter where our userfacing services run. Kafka a Distributed Messaging System for Log Processing


  10. Also, the “peaky” nature of the MapReduce workload made it hard to fully utilize the resources of a datacenter compared to Percolator’s much smoother resource usage. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



613、单词 hudson 的匹配文本:


  1. Hudson started out as an open source project in 2004 at Sun Microsystems. Gradle in Action


  2. The second script iterates through instances of slave objects (http://javadoc.jenkins-ci.org/hudson/slaves/SlaveComputer.htm) Jenkins Continuous Integration Cookbook


  3. For a CI (Continuous Integration) system, we advise you to check out Jenkins4 (which was called Hudson before they changed the name for legal reasons) Pro Spring MVC


  4. Seven years ago, I wrote the first line of code that started this whole project that is now known as Jenkins, and was originally called Hudson. Jenkins The Definitive Guide


  5. The sole purpose of this module is to output test results, in JUnit XML format, to the console upon test completion (YUI supports other output formats that you can use instead; use whatever your build tool understands—for example, Hudson/Jenkins understands JUnit XML) Testable JavaScript


  6. In most cases, the platform was sitting next to a Hudson/Jenkins build server in a continuous integration setup. Sonar Code Quality Testing Essentials


  7. This approach is ideal when a large number of developers are sharing a project, or with continuous integration tools such as Hudson that build and test code in a completely automated and unattended manner. Cassandra High Performance Cookbook


  8. If you want to download the most cutting-edge builds, you can get the source from Hudson, which the Cassandra project uses as its Continuous Integration tool. Cassandra The Definitive Guide


  9. His current topics of research center around project automation, including: build tools (Gradle, Leiningen, Maven, Ant), distributed version control (Git, Mercurial), testing frameworks (Geb, Spock, JUnit, TestNG, Mockito), continuous integration (Jenkins, Hudson, Bamboo) and code quality metrics (Sonar, CodeNarc, PMD) Building and Testing with Gradle


  10. The first book to include detailed screenshots and recipes for using Jenkins continuous integration server (formerly known as Hudson) Selenium 2 Testing Tools Beginner's Guide



614、单词 fibonacci 的匹配文本:


  1. Programming tasks such as calculating factorial, Fibonacci numbers, anagrams, and Sierpinski carpet are just a few of the well-known tasks that can be accomplished through the recursive programming technique. Pro Java 7 NIO.2


  2. Here’s a second implementation of Generator, this time to produce Fibonacci numbers: Thinking in Java 4th Edition


  3. The Fibonacci series is famous as a classic programming exercise. Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. Another set of problems that are not applicable for MapReduce are recursive problems (for example, a Fibonacci problem) Professional Hadoop Solutions


  5. We chose to calculate a Fibonacci number in our test program because we used a. Java Threads 3rd Edition


  6. The second measures function invocation using a recursive function to calculate the first 35 Fibonacci numbers. Interpreting the Data Parallel Analysis with Sawzall


  7. The running time is analyzed in much the same way as for the program that computes the Fibonacci numbers. Data Structures and Algorithm Analysis in Java 3rd Edition


  8. Let’s start with a very simple example: calculating Fibonacci numbers: Beginning Scala


  9. Fibonacci, also known as Leonardo di Pisa, in his thirteenth century book Liber abaci posed the following question: Two young rabbits, one of each sex, are placed on an island. Java Performance


  10. We'll illustrate the basic steps with a very boring and unrealistic, but very simple classic example: recursively computing fib, the Fibonacci function. Concurrent Programming in Java Design Principles and Pattern



615、单词 ints 的匹配文本:


  1. Finally, you see the use of the += operator to append a string to s, and the use of parentheses to control the order of evaluation of the expression so that the ints are actually summed before they are displayed. Thinking in Java 4th Edition


  2. Mark the channel finish • Read all ints out of the outbound output of the EmbeddedChannel and check if it only. Netty in Action MEAP V08


  3. For example, you can convert an array of primitive ints into an IntStream as follows: Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. These particular tables are sum tables; they add up the values emitted to them, ints or floats as appropriate. Interpreting the Data Parallel Analysis with Sawzall


  5. But the most serious problem with this technique is that when you access an array that is indexed by an enum’s ordinal, it is your responsibility to use the correct int value; ints do not provide the type safety of enums. Effective Java 2nd Edition


  6. Therefore, if you want to do anything with the bytes returned by getAddress(), you need to promote the bytes to ints and make appropriate adjustments. Java Network Programming 4th Edition


  7. Any data type manipulation other than with ints or booleans produced highly varying and misleading times. Java Performance Tuning 2nd Edition


  8. A TermFreqVector instance has several methods for retrieving the vector information, primarily as matching arrays of Strings and ints (the term value and frequency in the field, respectively) Lucene in Action 2nd Edition


  9. By defining these constants as ints, it is possible to assign an invalid value to a variable that is supposed to only be allowed to hold one of the constant values: Java 7 Recipes A Problem-Solution Approach


  10. NOTE: The Random class has methods ints, longs, and doubles that return primitive type streams of random numbers. Java SE 8 for the Really Impatient



616、单词 abort 的匹配文本:


  1. If a test fails, the project will abort, but if all tests pass, the project continues. Gradle Effective Implementation Guide


  2. The coordinator leader then logs a commit record through Paxos (or an abort if it timed out while waiting on the other participants) Spanner - Google’s Globally-Distributed Database


  3. The do attribute value of abort tells Tsung to abort the session if the match condition is true. Scaling CouchDB


  4. You don’t want to abort processing the file if a line is malformed, so you update a counter and. Hadoop in Practice


  5. Use the timeout because it is important to your SLA, not because you want to abort the execution of long running queries. Elasticsearch The Definitive Guide


  6. This is particularly useful in very long running jobs where the errors may cause you to abort the job. Hadoop Beginners Guide


  7. If the shared edits path is not writable or becomes unavailable for any reason, the namenode process will abort. Hadoop Operations


  8. After you’re finished with the transaction, you can either commit it or abort it by sending the appropriate frame (COMMIT or ABORT), of course with the transaction ID passed as the transaction header. ActiveMQ in Action


  9. Since cleanup is synchronized on the primary lock, it is safe to clean up locks held by live clients; however, this incurs a performance penalty since rollback forces the transaction to abort. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications


  10. This approach is different from most parallel databases which abort unfinished queries upon a node failure and restart the entire query processing (using a replica node instead of the failed node) HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



617、单词 logn 的匹配文本:


  1. There is a recursive and relatively complicated O(N logN) solution to this problem, which we now describe. Data Structures and Algorithm Analysis in Java 3rd Edition



618、单词 pagination 的匹配文本:


  1. As we’ll see in Part III, once you have a working list, adding pagination is trivial. CouchDB The Definitive Guide


  2. Repeat this 11 times, and verify that pagination is displayed. Gradle in Action


  3. Run the script ant pipe the output to more command to control pagination: Cassandra High Performance Cookbook


  4. It allows you to create, modify, and delete databases and documents as you please, and it has advanced pagination and sorting functionality on every screen. Beginning CouchDB


  5. A filter that uses this functionality is the PageFilter, checking if the number of rows to be returned for one iteration in the pagination process is reached, returning true afterward. HBase:The Definitive Guide


  6. And you can use the from and size parameters for pagination: Elasticsearch The Definitive Guide


  7. Always be careful when working with textual data such as capitalization, punctuation, hyphenation, pagination, and other aspects, as they can skew how the data is perceived. Hadoop Beginners Guide


  8. Use pagination to restrict the number of entities retrieved from the database. Java Performance


  9. Java code is presented in various formats as dictated by space and pagination considerations. Fundamental Networking in Java


  10. Each increment of results displayed is called a page, and the process of navigating through the results is called pagination. Pro JPA2



619、单词 bmi 的匹配文本:


  1. Here is an example of a BMI Calculator application page and HTML code written to render this page in a browser as displayed in the following screenshots: Selenium Testing Tools Cookbook



620、单词 functionalities 的匹配文本:


  1. The current mailing-lists are hosted at SourceForge and the search functionalities are subpar. Monitoring with Ganglia


  2. For this purpose, we discussed two useful functionalities: deploying a WAR file to a CloudBees web container and retrieving runtime information about this application. Gradle in Action


  3. A plugin basically adds extra functionalities such as tasks and properties to our project. Gradle Effective Implementation Guide


  4. In addition to that, it covers functionalities that allow us to troubleshoot ElasticSearch, such as describing how segments merging works, how to see what ElasticSearch does beneath its high-level interface, and how to limit the I/O operations. Mastering ElasticSearch


  5. In addition, similar new functionalities ought to be straightforward to implement and maintainable in the long term. Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. We are going to demonstrate the basic functionalities provided by Guava and how it can help with some of the common everyday tasks encountered in programming. Getting Started with Google Guava


  7. To make it work across a cluster of distributed machines, we find that we need to add a number of functionalities: Hadoop in Action


  8. The failover transport connector plays an important role in achieving advanced functionalities such as high availability and load balancing as will be explained in chapter 12 ActiveMQ in Action


  9. With each version, Java increases the functionalities offered to programmers to facilitate the development of concurrent programs. Java 7 Concurrency Cookbook


  10. Via the use of the Calendar add() method, each of these two functionalities can be easily performed. Java 7 Recipes A Problem-Solution Approach



621、单词 etl 的匹配文本:


  1. Chapter 6, Interceptors, ETL, and Routing, explains how to transform data in flight as well as extract information from the payload to use with channel selectors to make routing decisions. Apache Flume Distributed Log Collection for Hadoop


  2. Chukwa: A Monitoring Service Chukwa’s goal is to provide extract, transform, and load (ETL) services for cluster logging data, thereby providing end users with a simple and efficient way to find the logging events that are actually important. Pro Hadoop


  3. They might use a combination of Pig and MapReduce for extract, transform, load (ETL) implementation; MapReduce for the actual data processing; and Hive for analytic queries. Professional Hadoop Solutions


  4. The next recipe, Setting up a "Shadow" data center for running only MapReduce Jobs shows how to use Cassandra's built-in replication to partition a cluster with nodes dedicated for ETL-type workloads and others dedicated for serving low-latency requests. Cassandra High Performance Cookbook


  5. Chapter 3, Extracting and Transforming Data, includes recipes that show basic Hadoop ETL over several different types of data sources. Hadoop RealWorld Solutions Cookbook


  6. Introduction Hadoop MapReduce together with the supportive set of projects makes for a good framework choice to process large text datasets and to perform ETL-type operations. Hadoop MapReduce Cookbook


  7. DataBee An in-house Extract, Transform, Load (ETL) workflow software that is used to provide a common framework for reliable batch processing across all data processing jobs. Hadoop:The Definitive Guide 3rd Edition


  8. For example, we often use MapReduce   in the ETL-like process of taking humongous log files and computing a much smaller and more manageable set of statistics for analysts to look at. Hadoop in Action


  9. There are many ways of building workflows; a common approach is with Extract Transform and Load (ETL) tools such as Pentaho Kettle (http://kettle.pentaho.com) and Spring Batch (http://static.springsource.org/spring-batch) Hadoop Beginners Guide


  10. Those that primarily run ETL-style or other high input to output data ratio MapReduce jobs may prefer the additional bandwidth of a 10 Gb network. Hadoop Operations



622、单词 summarizes 的匹配文本:


  1. It knows what hosts exist, and what metrics are available for those hosts, but it doesn’t make you click through hierarchal lists of metrics to see graphs; rather, it graphically summarizes the entire grid using graphs that combine metrics by cluster and provides sane click-throughs for increased specificity. Monitoring with Ganglia


  2. Figure 10 summarizes the results graphically, considering the impact of scaling ttask as an additional dimension. Omega - flexible, scalable schedulers for large compute clusters


  3. Table 2 summarizes the name-node throughput with respect to the two internal operations. HDFS scalability the limits to growth


  4. For reference, see Figure 3 which summarizes the repetition and definition levels for all atomic fields in our sample records. Dremel - Interactive Analysis of WebScale Datasets


  5. As a result, Spanner requires a scope expression for every read-only transaction, which is an expression that summarizes the keys that will be read by the entire transaction. Spanner - Google’s Globally-Distributed Database


  6. Table 6-5 summarizes the main elements and attributes of the XML Coordinator language. Professional Hadoop Solutions


  7. One of the most fundamental Hadoop jobs at Last.fm takes the incoming listening data and summarizes it into a format that can be used for display purposes on the Last.fm website as well as for input to other Hadoop programs. Hadoop:The Definitive Guide 3rd Edition


  8. Figure 9-2 summarizes the effects of using the KeyValue fields. HBase:The Definitive Guide


  9. Table 10.2 summarizes the read and write operators in Pig Latin. Hadoop in Action


  10. Google Analytics summarizes this data and makes it available to webmasters. Bigtable - A Distributed Storage System for Structured Data



623、单词 vmware 的匹配文本:


  1. The libvirt project has created a common set of tools for managing virtualization resources on different virtualization platforms, currently including: Xen, QEMU, KVM, LXC, OpenVZ, User Mode Linux, VirtualBox, and VMware ESX and GSX. Monitoring with Ganglia


  2. Configuration Files for the Sample Cluster The examples provided in this section were run using the VMware images provided by Cloudera as part of its boot camp (http://www.cloudera.com/hadoop-training-basic) Pro Hadoop


  3. VMware, the company behind Spring and Grails, made significant investments in choosing Gradle. Gradle in Action


  4. Another class of related technologies comes from the world of cloud infrastructures such as EC2, Azure, Eucalyptus and VMWare offerings. Apache Hadoop YARN Yet Another Resource Negotiator


  5. It also includes Nectar-only functionality such as automatic scaling to VMWare virtual machines. Jenkins The Definitive Guide


  6. Cloudera makes the distribution available in a number of different formats: source and binary tar files, RPMs, Debian packages, VMware images, and scripts for running CDH in the cloud. HBase:The Definitive Guide


  7. For the purpose of producing JRockit examples, the author has used the hosted hypervisor VMware Fusion to run a Linux version of JRockit on his home computer. Oracle JRockit The Definitive Guide


  8. In March of 2010, VMWare took over as project sponsor of Redis. Cassandra The Definitive Guide


  9. For performance or scalability testing, you would use real hardware in a cluster configuration.) You run the VM in VMWare, KVM, or VirtualBox, start the Impala service through the Cloudera Manager web interface, and then interact with Impala through the impalashell interpreter or the ODBC and JDBC interfaces. Cloudera Impala


  10. Most of the preconfigured virtual machines (VMs) available are only designed for VMWare, but if you prefer VirtualBox you may find instructions on the Web that explain how to import a particular VM into VirtualBox. Programming Hive



624、单词 liveness 的匹配文本:


  1. Specifically, a per-cluster ResourceManager (RM) tracks resource usage and node liveness, enforces allocation invariants, and arbitrates contention among tenants. Apache Hadoop YARN Yet Another Resource Negotiator


  2. Concurrent programming involves a fundamental tradeoff between safety (avoiding errors such as update conflicts) and liveness (responding quickly to clients) NoSQL Distilled


  3. In most cases, existing replication traffic serves as a passive confirmation of liveness, with no additional communication overhead. Ceph A Scalable, High-Performance Distributed File System


  4. Cascading aims to help developers build powerful applications quickly and simply, through a well-reasoned API, without needing to think in MapReduce, and while leaving the heavy lifting of data distribution, replication, distributed process management, and liveness to Hadoop. Hadoop:The Definitive Guide 3rd Edition


  5. Though it is not important to understand what the code generator has done here in detail, the main idea is that several program points in the assembly code are annotated with liveness information. Oracle JRockit The Definitive Guide


  6. The result is a liveness failure: the program fails to make progress. Effective Java 2nd Edition


  7. In particular, multithreaded servers (and other multithreaded programs) require developers to address concerns that aren’t issues for single-threaded programs, particularly issues of safety and liveness. Java Network Programming 4th Edition


  8. The HotSpot VM’s JIT compilers use a bytecode analysis called Method Liveness that computes for every Java local field whether there’s a bytecode later in the method that might use its value. Java Performance


  9. Liveness failures lead to no behavior — things just stop running. Concurrent Programming in Java Design Principles and Pattern


  10. Percolator uses simple mechanisms to determine the liveness of another transaction. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



625、单词 derby 的匹配文本:


  1. Start the Oozie web application (with an internal Tomcat web server and Derby database) Professional Hadoop Solutions


  2. By default Hive uses Derby to store the metastore, which is an embedded Java relational database. Hadoop in Practice


  3. By default, the metastore service runs in the same JVM as the Hive service and contains an embedded Derby database instance backed by the local disk. Hadoop:The Definitive Guide 3rd Edition


  4. If this is your first experience with databases, we recommend that you use the Apache Derby database that is a part of most versions of JDK 7 Core Java Volume II Advanced Features 9th Edition


  5. Out-of-the-box Hive comes with an open source, lightweight, embedded SQL database called Derby, 4 which is installed and run on the client machine along with Hive. Hadoop in Action


  6. The Derby database engine will be used for the database examples. Java 7 New Features Cookbook


  7. Similarly, the JDBC channel uses an embedded Derby database to store events in a recoverable fashion. Hadoop Beginners Guide


  8. When using the JDBC message store, the default JDBC driver used in ActiveMQ is Apache Derby. ActiveMQ in Action


  9. By default, Hive uses a built-in Derby SQL server, which provides limited, singleprocess storage. Programming Hive


  10. Solution Use an embedded database such as the Derby database. Java 7 Recipes A Problem-Solution Approach



626、单词 encapsulation 的匹配文本:


  1. Encapsulation (sometimes called information hiding) is a key concept in working with objects. Core Java Volume I Fundamentals 9th Edition


  2. Code sources An encapsulation of the location from which certain Java classes were obtained. Java Security 2nd Edition


  3. JavaServer Faces • Faces Flow provides an encapsulation of related views/pages with applicationdefined entry and exit points. Java EE 7 Essentials


  4. On the other hand, most scripting languages lack features that are beneficial for programming complex applications, such as strong typing, encapsulation, and modularity. Core Java Volume II Advanced Features 9th Edition


  5. This concept, known as information hiding or encapsulation, is one of the fundamental tenets of software design [Parnas72] Effective Java 2nd Edition


  6. When applied to fields, this ability to hide members enables an object-oriented design technique known as data encapsulation. Java in a Nutshell 5th Edition


  7. It’s a picture that makes some NoSQL solutions seem perhaps less radical and less scary than we may have thought at first, and more like a natural expression and encapsulation of some of the work that was already being done to manage very large databases. Cassandra The Definitive Guide


  8. These specifications enable encoding of XML content as MIME body parts and encapsulation of those parts within SOAP 1.2 envelopes. Java Performance


  9. Object-oriented concurrent programming differs from multithreaded systems programming in languages such as C mainly due to the encapsulation, modularity, extensibility, security, and safety features otherwise lacking in C. Concurrent Programming in Java Design Principles and Pattern


  10. This encapsulation can help to make code more readable and reusable. Java 7 Recipes A Problem-Solution Approach



627、单词 subsets 的匹配文本:


  1. A common pattern in most languages, frameworks, and databases is using types to distinguish between subsets of your data. CouchDB The Definitive Guide


  2. Filtering is the way to pull subsets back out and deliver them to analysis shops that are interested in just that subset. MapReduce Design Patterns


  3. These subsets (or partitions) are the inputs to the reduce tasks. Professional Hadoop Solutions


  4. Instead of passing the whole dataset, similar to how the EvalFunc class works, the Accumulator interface allows for subsets of the data to be passed to the UDF. Hadoop RealWorld Solutions Cookbook


  5. They don’t need to have all the tuples in a group at one time to perform their operations, and they can work on subsets of the data and produce intermediate values that can be aggregated in the reducer. Hadoop in Practice


  6. Views may also be used to restrict users’ access to particular subsets of tables that they are authorized to see. Hadoop:The Definitive Guide 3rd Edition


  7. If you only need subsets of the data, narrowing the scan’s scope is playing into the strengths of HBase, since data is stored in column families and omitting entire families from the scan results in those storage files not being read at all. HBase:The Definitive Guide


  8. Furthermore, the equivalent transformation property must hold when the combiner is applied to arbitrary subsets of the intermediate data. Hadoop in Action


  9. Through the use of multiple partition columns, it is possible to create a rich hierarchical structure and for large tables with queries that require only small subsets of data it is worthwhile spending some time deciding on the optimal partitioning strategy. Hadoop Beginners Guide


  10. Also, whether you move old data to an “archive” location or delete it outright, the risk of tampering with newer data is reduced since the data subsets are in separate directories. Programming Hive



628、单词 validly 的匹配文本:


  1. An aaload instruction is type safe iff one can validly replace types matching int and an array type with component type ComponentType where ComponentType is a subtype of Object, with ComponentType yielding the outgoing type state. The Java Virtual Machine Specification Java SE 7 Edition


  2. If a client holds a proxy to an object in the server, it is important that the server does not garbage-collect that object until the client releases the proxy (and it can be validly garbage-collected) Java Performance Tuning 2nd Edition



629、单词 ejbs 的匹配文本:


  1. These technologies are suited to mediumto large-scale application development, and include topics such as Enterprise Java Beans (EJBs), Java Server Pages (JSPs), and much more. Java Network Programming and Distributed Computing


  2. Much of the extra work in Enterprise JavaBeans (EJBs), for example, is eliminated through the use of annotations in EJB3.0 Thinking in Java 4th Edition


  3. On the reverse side, Spring also provides simple annotation for injecting Spring beans into EJBs. Pro Spring 3


  4. All applica base na names r server i conflict new un differen a default application name of "bigapp", and defines four modules with names "ejbs/inventory", "ejbs/accounts", "ui/store", and "ui/admin" Java EE 7 Specification


  5. You can use managed beans to capture the data, session scope variables to pass information between pages, button clicks to invoke the business logic in backing EJBs, and (conditional) navigation rules to go from one page to another. Java EE 7 Essentials


  6. For this reason, Java Performance Tuning, Second Edition includes four new chapters: a new chapter on J2EE application tuning in general followed by chapters on tuning JDBC, servlets and JSPs, and EJBs. Java Performance Tuning 2nd Edition


  7. Just as with other APIs such as JDBC, JNDI, EJBs, and so on, it’s common to abstract the use of JMS APIs so as to not intermingle the JMS code with the business logic. ActiveMQ in Action


  8. One general tuning guideline is to set the steady state pool size to the number of hardware threads and maximum size to be equal to the maximum size of the HTTP worker thread pool (plus ORB thread pool size if remote EJBs or MDBs are invoked) Java Performance


  9. As a result, many web applications today sidestep EJBs entirely, going directly from servlets to the database. Pro JPA2


  10. But even though early EJBs were such an easy target, invasive programming could easily be found in earlier versions of Struts, WebWork, Tapestry, and countless other Java specifications and frameworks. Spring in Action 4th Edition



630、单词 supertype 的匹配文本:


  1. In a nutshell, the compiler autoboxed the parameters into a Double and two Integer objects, and then it tried to find a common supertype of these classes. Core Java Volume I Fundamentals 9th Edition


  2. That is, v is a subtype of X if the direct supertype of v is a subtype of X. The Java Virtual Machine Specification Java SE 7 Edition


  3. It’s also possible to go the other way, and use supertype wildcards. Thinking in Java 4th Edition


  4. The behavior of these supertypes may be important in some cases, but we’ll confine our attention to the common supertype here. Gradle Beyond The Basics


  5. Here, the referent can be inserted into any queue whose element type is a supertype of the type T of the referent; T is the lower bound for the wildcard. The Java Language Specification Java SE 7 Edition


  6. In object-oriented polymorphism, two subtypes can be referenced similarly because they implicitly share a common supertype. SQL Antipatterns


  7. Clients of an anonymous class can’t invoke any members except those it inherits from its supertype. Effective Java 2nd Edition


  8. Specifically, we’ll examine the Comparable interface and the Enum class (the supertype of enumerated types, described later in this chapter) and will learn about an important but infrequently used feature of generics known as lowerbounded wildcards. Java in a Nutshell 5th Edition


  9. In this example, ? super Integer means any type that is either an Integer or any supertype of Integer. Java 7 Recipes A Problem-Solution Approach


  10. If the supertype is abstract and has only one abstract method, you don’t even have to give the method name. Java SE 8 for the Really Impatient



631、单词 xmpp 的匹配文本:


  1. Finally, we describe interfacing directly with CouchDB from Erlang, which can be a useful technique if you want to integrate CouchDB storage with a server for non-HTTP protocols, like SMTP (email) or XMPP (chat) CouchDB The Definitive Guide


  2. By 2005, Extensible Messaging and Presence Protocol (XMPP) had become a respected standard for open instant messaging, and one of the foremost implementations was the Erlang-based ejabberd server package by Alexey Shchepin. RabbitMQ in Action


  3. Most did not stick, and those that did, like SOAP and XMPP, are on the complex side of things. ZeroMQ


  4. Using the XMPP protocol with Storm to send alerts and notifications Use case. Storm Blueprints Patterns for Distributed Real-time Computation


  5. Tip  Other ideas for Puppet report processors include RSS feeds for new reports, IRC, XMPP or instant messaging, or SMS notifications of new reports. Pro Puppet


  6. The chapter begins with the XMPP adapters that enable plugging into instant messaging systems. Spring Integration in Action


  7. As you can see from the output in the following listing, a number of different adapter options are available, from ftp, jdbc, and jms to some new adapters that were added in recent releases of Roo, such as twitter and xmpp. Spring Roo in Action


  8. There is also coverage of command-line tools, the command agent, use of XMPP, JConsole, and the web console. ActiveMQ in Action



632、单词 getters 的匹配文本:


  1. Basic Getters and Setters The methods in this section get and set basic types: Pro Hadoop


  2. You have to manually define the constructor that initializes all fields, two getters, and two setters. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. This object has two private member variables and getters and setters for each variable. MapReduce Design Patterns


  4. This is another data container class (getters/setters methods are omitted for brevity) Professional Hadoop Solutions


  5. The first part of the implementation is straightforward: there are two Text instance variables, first and second, and associated constructors, getters, and setters. Hadoop:The Definitive Guide 3rd Edition


  6. Note that the getters listed in Table 3-1 for the Put class only retrieve what you have set beforehand. HBase:The Definitive Guide


  7. Add getters/setters by right-clicking on the editor pane and selecting Insert Code (use the Control + I shortcut on Mac) Java EE 7 Essentials


  8. This tells the encoder to call the getName, getSalary, and getHireDay property getters and write the resulting values into the object expression. Core Java Volume II Advanced Features 9th Edition


  9. Hard-line object-oriented programmers feel that such classes are anathema and should always be replaced by classes with private fields and public accessor methods (getters) and, for mutable classes, mutators (setters): Effective Java 2nd Edition


  10. Encapsulate the private fields by making getters and setters to access them. Java 7 Recipes A Problem-Solution Approach



633、单词 jframe 的匹配文本:


  1. The Swing version of this class is called JFrame and extends the Frame class. Core Java Volume I Fundamentals 9th Edition


  2. Swing basics Most Swing applications will be built inside a basic JFrame, which creates the window in whatever operating system you’re using. Thinking in Java 4th Edition


  3. Suppose you want to save a JFrame object to a file so that you can retrieve it later. Core Java Volume II Advanced Features 9th Edition


  4. All the recipes of this chapter use a JFrame-based application. Java 7 New Features Cookbook


  5. After expanding the references, you will eventually see that they are being held by an Icon, which in turn is held by a JFrame. Java 7 Recipes A Problem-Solution Approach



634、单词 threadsafe 的匹配文本:


  1. AtomicLong provides threadsafe methods to modify and retrieve the values of a simple long variable. Programming Concurrency on the JVM


  2. This receives the message and stuffs it into a threadsafe SharedQueue instance inside of the consumer object. RabbitMQ in Action


  3. A set of classes that provide threadsafe operations without synchronization. Java Threads 3rd Edition


  4. As a result, you do have to worry about whether message objects are threadsafe. Programming in Scala 2nd Edition


  5. An entity manager and persistence context are not required to be threadsafe. Java EE 7 Essentials


  6. When writing code that must be threadsafe, you must obtain locks (using a synchronized method or statement) when required. Java in a Nutshell 5th Edition


  7. As long as the containing class accesses the unsafe class only in a threadsafe fashion and as long as it never lets a reference to the private field leak out into another object, the class is safe. Java Network Programming 4th Edition


  8. If you are accessing the values of the map from different threads, you should make sure that the values are threadsafe. Java 7 Recipes A Problem-Solution Approach


  9. However, the object is mutated, and that is not threadsafe. Java SE 8 for the Really Impatient


  10. If the appropriate threadsafe counterpart is not detected, the protective mutex is enabled as the last resort. Understanding MySQL Internals



635、单词 serde 的匹配文本:


  1. It allows you to use a custom serializer and deserializer (known as SerDe) for different file formats. Professional Hadoop Solutions


  2. We explicitly tell the SerDe that a tab character separates each field and a newline character separates each record. Hadoop RealWorld Solutions Cookbook


  3. As we will describe in the later sections, this can be achieved by providing a jar that implements the SerDe java interface to Hive. Hive A Petabyte Scale Data Warehouse Using Hadoop


  4. You can also review a Google Code project called hive-json-serde,9 which can support both serialization and deserialization. Hadoop in Practice


  5. When acting as a deserializer, which is the case when querying a table, a SerDe will deserialize a row of data from the bytes in the file to objects used internally by Hive to operate on that row of data. Hadoop:The Definitive Guide 3rd Edition


  6. Hive uses an input format to split input streams into records, an output format to format records into output streams (i.e., the output of queries), and a SerDe to parse records into columns, when reading, and encodes columns into records, when writing. Programming Hive



636、单词 rsa 的匹配文本:


  1. For example, suppose that you need to factor a large integer—a computation that is required for breaking the RSA cipher. Core Java Volume I Fundamentals 9th Edition


  2. The NOW team had clustered together Sun workstations using Myrinet switches and specialized software to win RSA key-cracking challenges and break a number of sort benchmark records. Monitoring with Ganglia


  3. In addition, the rsa public key generated in step 2 of the previous recipe must be distributed and installed on every node in the cluster using the ssh-copy-id command. Hadoop RealWorld Solutions Cookbook


  4. Pick the default file in which to save the key, likely ~/.ssh/id_rsa. Scaling CouchDB


  5. First, generate an RSA key pair by typing the following in the hadoop user account: Hadoop:The Definitive Guide 3rd Edition


  6. For example, the RSA algorithm (the encryption algorithm invented by Rivest, Shamir, and Adleman) depends on the difficulty of factoring large numbers. Core Java Volume II Advanced Features 9th Edition


  7. Having verified that SSH is correctly installed on all nodes of the cluster, we use sshkeygen on the master node to generate an RSA key pair. Hadoop in Action


  8. This is accomplished from the command prompt by executing the following command: keytool -genkey -keystore mySrvKeystore -keyalg RSA. Java 7 New Features Cookbook


  9. If the key is an RSA key, the default signature algorithm is “MD5withRSAJava in a Nutshell 5th Edition


  10. Warning: Permanently added 'localhost' (RSA) to the list of known hosts. Hadoop Beginners Guide



637、单词 grams 的匹配文本:


  1. This could simply be the measured weight in grams or kilograms. Mahout in Action


  2. Whenever a collection of data is sent by TCP using data grams, a timer is started. Java Network Programming and Distributed Computing


  3. The n-gram approach divides terms in the index into grams: word fragments are built of one or more letters. Mastering ElasticSearch


  4. This recipe will demonstrate how to use the Java MapReduce API to calculate n-grams over news archives. Hadoop RealWorld Solutions Cookbook


  5. The size of the n-grams (the number of contiguous words used to create features) Hadoop in Practice


  6. Query time search-as-you-type Index time optimizations Ngrams for partial matching Index time search-as-you-type Preparing the index Querying the field Edge n-grams and postcodes Ngrams for compound words 16 Elasticsearch The Definitive Guide


  7. For example, a workflow consisting of careful extraction of a person’s name from the title followed by name-specific variant generation is likely to yield much higher-quality answers than a workflow that only generates all possible n-grams of the title of a page. Hadoop in Action


  8. Tokenizers that create shingles (n-grams from multiple tokens) from another TokenStream. Lucene in Action 2nd Edition


  9. Like ngrams, but looks for n-grams that begin with the second array of words in each outer array. Programming Hive


  10. Please remember that using n-grams will make your index a bit larger. Apache Solr 4 Cookbook



638、单词 hadoopdb 的匹配文本:


  1. Recently, several hybrid approaches (e.g., HadoopDB and Hive) between parallel databases and Hadoop have been introduced to the database community. Tajo A Distributed Data Warehouse System on Large Clusters


  2. HadoopDB [3] is a research system in this hybrid category. Dremel - Interactive Analysis of WebScale Datasets


  3. HadoopDB: an architectural hybrid of MapReduce and DBMS technologies for analytical workloads” Spanner - Google’s Globally-Distributed Database


  4. HadoopDB[15] reuses most of Hive’s system, except, it uses traditional database instances in each of the nodes to store data instead of using a distributed file system. Hive A Petabyte Scale Data Warehouse Using Hadoop


  5. HadoopDB: an architectural hybrid of MapReduce and DBMS technologies for analytical workloads. Tenzing - A SQL Implementation On The MapReduce Framework


  6. In this paper, we describe our implementation of and experience with HadoopDB, whose goal is to serve as exactly such a hybrid system. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



639、单词 factorial 的匹配文本:


  1. Listing 11.1 prints the stack trace of a recursive factorial function. Core Java Volume I Fundamentals 9th Edition


  2. Programming tasks such as calculating factorial, Fibonacci numbers, anagrams, and Sierpinski carpet are just a few of the well-known tasks that can be accomplished through the recursive programming technique. Pro Java 7 NIO.2


  3. Unfortunately, a join over n tables will have n-factorial combinations of join orders to examine. High Performance MySQL 3rd Edition


  4. But if you’ve read the earlier chapters of this book, then you know that Java 8 streams provide an even simpler declarative way of defining factorial, as the next listing shows. Java 8 in Action Lambdas, Streams and Functional-style Programming


  5. Suppose you have a Java program to compute the factorial of. Java Threads 3rd Edition


  6. Here is the definition of a method using that type, which calculates the factorial of a passed integer value:5 Programming in Scala 2nd Edition


  7. But to start, suppose we wanted to adapt our program to print out both the absolute value of a number  the factorial of another number. Functional Programming in Scala


  8. Here is an implementation of a factorial calculator, where we use a conventional technique of calling a second, nested method to do the work: Programming Scala


  9. The factorial of an integer is the product of the number and all positive integers less than the number. Java in a Nutshell 5th Edition


  10. I will take the factorial example used in the text. Java Performance Tuning 2nd Edition



640、单词 virtualized 的匹配文本:


  1. In the cloud, virtualized GPUs will provide thin clients such as smartphones and tablets and access to a high-performance graphics experience. Monitoring with Ganglia


  2. Virtualized and shared resources can be harder to troubleshoot, especially because you don’t have access to the underlying physical hardware to inspect and measure what’s happening. High Performance MySQL 3rd Edition


  3. Handling Network Disk IO Issues One of the biggest problems with using virtualized hardware is that you are generally sharing a disk with other tenants, which exacerbates the disk slowness mentioned previous because everyone is competing for disk IO. MongoDB The Definitive Guide 2nd Edition


  4. Volumes are persistent virtualized block devices independent of any particular instance. bk-admin-guide-cloud-latest


  5. One example, although very uncommon, is based on virtualized servers. HBase:The Definitive Guide


  6. Removing the OS layer from a virtualized Java setup is less problematic than one might think. Oracle JRockit The Definitive Guide


  7. Now along comes Hadoop and everything you read says commodity, scale-out, share-nothing hardware, but what about the existing investment in blades, shared storage systems, and virtualized infrastructure? Hadoop, generally speaking, does not benefit from virtualization. Hadoop Operations


  8. How It Works Java Swing’s JDesktopPane is a container component similar to a JPanel except that it manages mini internal frames (JInternalFrame) similar to a virtualized desktop. Java 7 Recipes A Problem-Solution Approach


  9. If you’re running on virtualized hardware (such as Amazon’s EC2), then you may find that a sufficiently large instance isn’t available. MongoDB in Action


  10. Many enterprises are shifting away from deploying their analytical databases on high-end proprietary machines, and moving towards cheaper, lower-end, commodity hardware, typically arranged in a shared-nothing MPP architecture, often in a virtualized environment inside public or private “clouds” HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



641、单词 dag 的匹配文本:


  1. A DAG is a data structure from computer science and contains the following two elements: Gradle in Action


  2. Gradle builds up a Directed Acyclic Graph (DAG) with all the tasks before any task is executed. Gradle Effective Implementation Guide


  3. Efforts to combat these artifacts achieved mixed results; while spreading TaskTrackers across racks made intra-rack reads of shared datasets more likely, the shuffle of records between map and reduce tasks would necessarily cross racks, and subsequent jobs in the DAG would have fewer opportunities to account for skew in their ancestors. Apache Hadoop YARN Yet Another Resource Negotiator


  4. Compile to Dryad data flow plan (DAG), and executed by the runtime job manager. MapReduce and Parallel DBMSs Friends or Foes


  5. In mathematics and computer science, a Directed Acyclic Graph (DAG) is a directed graph with no cycles. Professional Hadoop Solutions


  6. If it is a multi-project build, there is also a DAG of project objects, one for each project. Gradle Beyond The Basics


  7. We will also be discussing other advanced Hadoop features such as using DistributedCache for distribute data, using Hadoop Streaming for quick prototyping of Hadoop computations, and using Hadoop counters to report custom metrics for your computation as well as adding job dependencies to manage simple DAG-based workflows of Hadoop MapReduce computations. Hadoop MapReduce Cookbook


  8. JobControl When there is more than one job in a MapReduce workflow, the question arises: how do you manage the jobs so they are executed in order? There are several approaches, and the main consideration is whether you have a linear chain of jobs or a more complex directed acyclic graph (DAG) of jobs. Hadoop:The Definitive Guide 3rd Edition


  9. Configuration is the phase in which those task objects are assembled into an internal object model, usually called the DAG (for directed acyclic graph) Building and Testing with Gradle


  10. The logical plan generator then creates a DAG of relational operators, the query plan. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



642、单词 utils 的匹配文本:


  1. When the fillCup() method finds there’s not enough coffee, rather than returning an error code, it invokes StmUtils’s retry() method. Programming Concurrency on the JVM


  2. Depending on your platform and installation type, your browser may have already been opened with the correct link; if not, you can access Futon, the built-in administration interface to CouchDB by going to the URL: http://127.0.0.1:5984/_utils/index.html Futon is a web-based interface to the main functionality in CouchDB and provides support for editing the configuration information, creating databases, documents, design documents (and therefore views, shows and lists) and starting and requesting replication. Getting Started with CouchDB


  3. Visit http://127.0.0.1:5984/_utils/database.html?blog/_all_docs and you should see a document with an ID corresponding to the one you just saved. CouchDB The Definitive Guide


  4. The perfect match is the class CharUtils from the Apache Commons Lang library. Gradle in Action


  5. Nonetheless, the user could modify the method Utils.paint in his game to use the method setRelativeSize because the paint method expects a list of Resizable objects as argument. Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. Open your favorite web browser, and navigate to the URL http://127.0.0.1:5984/_utils. Beginning CouchDB


  7. We have an implementation available for you in the provided code under the utils package. HBase in Action


  8. You’ll make frequent use of the StringUtils class for tokenization. Hadoop in Practice


  9. This is evident in MapTempera tureReducer, where we have to convert the input value into an integer (using a convenience method in HadoopUtils) and then the maximum value back into a string before it’s written out. Hadoop:The Definitive Guide 3rd Edition


  10. Raise a DTrace USDT probe from BTrace action method • DTraceProbe method in BTraceUtils class. BTrace Java Platform Observability by Bytecode Instrumentation



643、单词 verifier 的匹配文本:


  1. It must either reject class files that do not verify via type checking, or else consistently failover to the type inferencing verifier whenever type checking fails. The Java Virtual Machine Specification Java SE 7 Edition


  2. Hence any program that passes the verifier must have defined semantics. JSR-133 Java Memory Model and Thread


  3. Chapter 3 This chapter discusses the memory protections built into the Java language, how those protections provide a measure of security, and how they are enforced by the bytecode verifier. Java Security 2nd Edition


  4. The reason it all works is that the Java bytecode verifier does not check the declarations, anyway! The Java compiler checks, but not the verifier. Programming in Scala 2nd Edition


  5. The verifier objects because the result of new Super() cannot be passed as an argument in place of a formal parameter of type Hyper, because Super is not a subclass of Hyper. The Java Language Specification Java SE 7 Edition


  6. If the verifier reports the content of the component to be invalid, the component immediately regains focus. Core Java Volume II Advanced Features 9th Edition


  7. For example, the casting operation in Java compiles down to a bytecode that checks that the class can actually be cast to the right thing and the verifier ensures that there’s no code path that could put an unchecked value into a variable. Beginning Scala


  8. In this situation, the verify( ) method of the HostnameVerifier is called to determine whether the connection should proceed or not. Java in a Nutshell 5th Edition



644、单词 decoupling 的匹配文本:


  1. Standardizing the metrics simplifies monitoring by decoupling agents from performance monitoring applications, allowing measurements to be made once and shared among different monitoring applications. Monitoring with Ganglia


  2. The main motivation for decoupling the namespace from the data is the scalability of the system. HDFS scalability the limits to growth


  3. Complete decoupling Whenever a method works with a class instead of an interface, you are limited to using that class or its subclasses. Thinking in Java 4th Edition


  4. Such an abstraction provides decoupling between how data is stored (HDFS files, HBase tables) from how it is seen by an application (table format) Professional Hadoop Solutions


  5. A service provider framework is a system in which multiple service providers implement a service, and the system makes the implementations available to its clients, decoupling them from the implementations. Effective Java 2nd Edition


  6. The first general idea is that failure detection should be flexible, which is achieved by decoupling it from the application being monitored. Cassandra The Definitive Guide


  7. Many enterprise filesystems support advanced features such as snapshots to minimize the window of time required to get a consistent capture of the data on disk and decoupling it from the time required to copy said data elsewhere. Hadoop Operations


  8. Decoupling the application processes from the I/O operations means that, ideally, your application does not spend time waiting for I/O. Java Performance Tuning 2nd Edition


  9. Without enterprise messaging, developers wouldn’t have an option beyond synchronous calls for application development, and the concept of decoupling an application design wouldn’t exist in nearly the same form. ActiveMQ in Action


  10. It may seem strange at first, but decoupling the transaction logic from the operation logic makes this class more portable to the Java EE environment. Pro JPA2



645、单词 lambdas 的匹配文本:


  1. JRuby allows us to fluently pass lambdas where closures are expected, so we took advantage of that here. Programming Concurrency on the JVM


  2. Scala also provides placeholder notation when defining anonymous functions (aka, lambdas) Scala in Depth


  3. Lambdas and closures are different concepts, but they’re closely related. Scala in Action


  4. Linear interpolation Linear interpolation is the last smoothing model that takes the values of the lambdas provided in the configuration and uses them to calculate weights of trigrams, bigrams and unigrams. Mastering ElasticSearch


  5. It introduces a new notation (anonymous functions, or lambdas) that enables you to write just. Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. Ruby has a collection of overlapping features that allow passing blocks, Procs, and lambdas as parameters to methods. Beginning Scala


  7. Clearly, you can repeat that process if you have more methods or lambdas that yield Optional values. Java SE 8 for the Really Impatient



646、单词 inlining 的匹配文本:


  1. A more sophisticated optimization is the elimination (or “inlining”) of function calls. Core Java Volume I Fundamentals 9th Edition


  2. Of course, if a method is big, then your code begins to bloat, and you probably wouldn’t see any performance gains from inlining, since any improvements will be dwarfed by the amount of time spent inside the method. Thinking in Java 4th Edition


  3. Inlining requires all attribute values to be stored in the index many times, once for each time a document ID is stored. High Performance MySQL 3rd Edition


  4. Better performance could be achieved by generating new code to represent the appropriate composition of the user’s functions, and then applying traditional optimizations such as inlining to the resulting code. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  5. The inlining process must preserve the semantics of the method invocation. The Java Language Specification Java SE 7 Edition


  6. A method may even contain parts of other methods due to inlining. Oracle JRockit The Definitive Guide


  7. These methods are also candidates for inlining at runtime by a just-in-time compiler ( JIT) or similar optimization tool. Java in a Nutshell 5th Edition


  8. Compiler inlining is another frequently used technique that can significantly improve compiled code. Java Performance Tuning 2nd Edition


  9. The most basic classes of optimizations are simple identity transformations, constant folding, common subexpression elimination, and inlining of functions. Java Performance


  10. Support for inlining the name of the schema with the table name is nonstandard. Pro JPA2



647、单词 incrementing 的匹配文本:


  1. Metrics submitted using a “positive” slope generate RRDs that are created as COUNTERs; however, this mechanism is not ideal for situations involving incrementing values that submit on each iteration (i.e., Apache httpd page serving counts without log-scraping) Monitoring with Ganglia


  2. Figure 14.12 Setting a dynamic, incrementing version number at the initial phase of the build pipeline. Gradle in Action


  3. Other options are incrementing the previous value or use an auto-increment value from another source. Cassandra High Performance Cookbook


  4. The distinct IP count is calculated by incrementing a counter whenever we see an IP that does not equal a previously seen IP. Hadoop RealWorld Solutions Cookbook


  5. First, CouchDB looks at the incrementing part of the revision number (the part before the "-“) and the document with the highest number wins. Scaling CouchDB


  6. Sqoop supports two types, append, which works for numerical data that’s incrementing over time, such as auto-increment keys; and lastmodified, which works on timestamped data. Hadoop in Practice


  7. Job, Task, and Task Attempt IDs The format of a job ID is composed of the time that the jobtracker (not the job) started and an incrementing counter maintained by the jobtracker to uniquely identify the job to that instance of the jobtracker. Hadoop:The Definitive Guide 3rd Edition


  8. Periodically the leader will initiate a map update by incrementing the map epoch and using the Paxos update protocol to distribute the update proposal to other monitors, simultaneously revoking leases. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.


  9. On subsequent runs the document already exists so the scriptupdate is applied instead, incrementing the views counter. Elasticsearch The Definitive Guide


  10. In reality, the primary key would much more likely be an auto-incrementing, numeric employee ID. Hadoop Beginners Guide



648、单词 hostnames 的匹配文本:


  1. Note that we use IP addresses, and not hostnames in the topology. HBase Administration Cookbook


  2. Such a poller needs only a list of hostnames that specifies at least one host per cluster. Monitoring with Ganglia


  3. I’ve seen DNS resolution failures transiently appear, and as a general rule, I now use IP addresses instead of hostnames in the configuration files. Pro Hadoop


  4. The dfs-exclude.txt file contains the DataNode hostnames, one per line, that are to be decommissioned from the cluster. Hadoop Operations and Cluster Management Cookbook


  5. Add the hostnames of the nodes that are to be decommissioned to the exclude file. Hadoop MapReduce Cookbook


  6. A web server log is a good example of a set of records that is not normalized (for example, the client hostnames are specified in full each time, even though the same client may appear many times), and this is one reason that logfiles of all kinds are particularly well-suited to analysis with MapReduce. Hadoop:The Definitive Guide 3rd Edition


  7. After you have started the cluster, you should verify that all the region servers have registered themselves with the master and appear in the appropriate table with the expected hostnames (that a client can connect to) HBase:The Definitive Guide


  8. Client List The most straightforward way to connect to a cluster is to maintain a list of the addresses or hostnames of the servers in the cluster and cycle through them on the client side. Cassandra The Definitive Guide


  9. With the block IDs and datanode hostnames, the client can now contact the most appropriate datanode directly and read the block data it needs. Hadoop Operations


  10. The simplest way to get up and running is through the Cloudera Manager application, where you can bootstrap the whole process of setting up a Hadoop cluster with Impala just by specifying a list of hostnames for the cluster. Cloudera Impala



649、单词 mike 的匹配文本:


  1. The blog post http://bit.ly/flumePerfPt1 from Flume committer Mike Percy should give you some good starting points. Apache Flume Distributed Log Collection for Hadoop


  2. O’Reilly, including, but not limited to, Mike Loukides, Julie Steele, and Melanie Yarbrough, who gave me the opportunity and helped me turn the raw text into a good looking book. Getting Started with CouchDB


  3. After you show it to your coworker, Mike, he says he wants to join forces and bring the application to the next level by adding more advanced features. Gradle in Action


  4. More information about this structure can be found in a great post by Mike McCandless at http://blog.mikemccandless. Mastering ElasticSearch


  5. A sincere thanks to the many people who read the early drafts of these chapters, and provided comments, edits, insights, and ideas — specifically Mike Daconta, Ralph Perko, Praveena Raavichara, Frank Tyler, and Brian Uri. Professional Hadoop Solutions


  6. Mike Loukides, this book’s editor, and the rest of the team at O’Reilly Media were very responsive and helpful. Scaling CouchDB


  7. I am grateful to my editor, Mike Loukides, and his colleagues at O’Reilly for their help in the preparation of this book. Hadoop:The Definitive Guide 3rd Edition


  8. Thanks to my editor, Mike Loukides, for being a charming conversationalist at dinner in San Francisco. Cassandra The Definitive Guide


  9. There’s No Place Like 127.0.0.1 Mike (not his real name) was tasked with setting up a new Hadoop cluster. Hadoop Operations


  10. Thanks to Mike Loukides for his confidence in Gradle as a technology and his help in publishing this book under O’Reilly’s name. Building and Testing with Gradle



650、单词 preprocessing 的匹配文本:


  1. Some analyses join data from multiple input sources, often after a Sawzall preprocessing step or two. Interpreting the Data Parallel Analysis with Sawzall


  2. Chapter 9, Mass Text Data Processing, explains how to use Hadoop and Mahout to process large text datasets, and how to perform data preprocessing and loading operations using Hadoop. Hadoop MapReduce Cookbook


  3. If your source data is multiline XML or JSON form, for example, you may want to consider a preprocessing step. Hadoop in Practice


  4. Parameter substitution occurs as a preprocessing step before the script is run. Hadoop:The Definitive Guide 3rd Edition


  5. A lot of data processing tasks involve record-oriented preprocessing and postprocessing. Hadoop in Action


  6. In such a situation, it is preferable to either use a splitable format such as SequenceFile, or, if you cannot avoid receiving the file in the other format, do a preprocessing step that converts it into a splitable format. Hadoop Beginners Guide


  7. The preprocessing pipeline uses one table to store raw imagery. Bigtable - A Distributed Storage System for Structured Data


  8. The answer is that our encodings are ready to use without any preprocessing and are even designed to allow random access; both to the elements describing the columns and the dictionaries. PowerDrill - Processing a Trillion Cells per Mouse Click


  9. In this more complex example of Example 3-9, we first establish a configuration for myPmd which is a preprocessing step prior to task executions. Building and Testing with Gradle


  10. While grep data is randomly generated and requires no preprocessing, UserVisits needs to be repartitioned by destinationURL and indexed by visitDate for all databases during the load in order to achieve better performance on analytical queries (Hadoop would not benefit from such repartitioning) HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



651、单词 hexadecimal 的匹配文本:


  1. The body is shown in hexadecimal along with a String representation (for us humans to read, in this case the Hello World message) Apache Flume Distributed Log Collection for Hadoop


  2. In hexadecimal notation, you use a p, not an e, to denote the exponent. Core Java Volume I Fundamentals 9th Edition


  3. If all IP addresses are encoded as a zero-padded, fixedlength hexadecimal string, the primary lexical ordering issue is addressed. Pro Hadoop


  4. We need the hexadecimal representation of the public key, the path to the secret key ring file with our private key, and the passphrase used to protect the private key. Gradle Effective Implementation Guide


  5. If you are using binary keys or values and need to enter them in the shell, use double-quote'd hexadecimal representation. HBase in Action


  6. Accessing the counter directly gives you the byte array representation, with the shell printing the separate bytes as hexadecimal values. HBase:The Definitive Guide


  7. We use hexadecimal numbers throughout this section to denote bytes.) Then, it contains a sequence of objects, in the order in which they were saved. Core Java Volume II Advanced Features 9th Edition


  8. Instead of using a hexadecimal literal, for example, the literal bit pattern can be used. Java 7 New Features Cookbook


  9. Integer literals can also be expressed in hexadecimal or octal notation. Java in a Nutshell 5th Edition


  10. Also, there are functions for converting integers to strings in different bases (e.g., hexadecimal) Programming Hive



652、单词 extensibility 的匹配文本:


  1. For specialized environments, gmond’s extensibility and extensive library of modules are likely to be a better option. Monitoring with Ganglia


  2. Our solution is a new parallel scheduler architecture built around shared state, using lock-free optimistic concurrency control, to achieve both implementation extensibility and performance scalability. Omega - flexible, scalable schedulers for large compute clusters


  3. Either you choose full flexibility and extensibility but get weak project standardization, tons of boilerplate code, and no support for dependency management by picking Ant; or you go with Maven, which offers a convention over configuration approach and a seamlessly. Gradle in Action


  4. In the future, we plan to cover in more depth such areas as formal algebraic specification, joins, extensibility mechanisms, etc. Dremel - Interactive Analysis of WebScale Datasets


  5. Although many publications emphasize the fact that Hadoop hides infrastructure complexity from business developers, you should understand that Hadoop extensibility is not publicized enough. Professional Hadoop Solutions


  6. There are some components that are designed for user extensibility such as custom types and practitioners. Cassandra High Performance Cookbook


  7. In terms of extensibility, Java Serialization has some support for evolving a type, but it is brittle and hard to use effectively (Writables have no support; the programmer has to manage them himself) Hadoop:The Definitive Guide 3rd Edition


  8. Fundamental to Pig Latin’s design philosophy is its extensibility through user-defined functions (UDFs ), and there’s a well-defined set of APIs   for writing UDFs. Hadoop in Action


  9. Tenzing supports a mostly complete SQL implementation (with several extensions) combined with several key characteristics such as heterogeneity, high performance, scalability, reliability, metadata awareness, low latency, support for columnar storage and structured data, and easy extensibility. Tenzing - A SQL Implementation On The MapReduce Framework


  10. Gradle DSL, not through lots of literal Groovy code—is core to Gradle’s strategy of provding high extensibility with low complexity. Building and Testing with Gradle



653、单词 resize 的匹配文本:


  1. As you can see in the figure, the title bar and the surrounding decorations, such as resize corners, are drawn by the operating system and not the Swing library. Core Java Volume I Fundamentals 9th Edition


  2. When sending a smaller amount of data, you can adjust the length to fit—you do not need to resize the data buffer. Java Network Programming and Distributed Computing


  3. For example, it would be nice if the interface had a setRelativeSize method that takes as argument a growth factor to resize a shape. Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. This is a good time to resize your data file sizes. MapReduce Design Patterns


  5. The only problem with this implementation is that an estimate of the maximum heap size is required in advance, but typically this is not a problem (and we can resize if necessary) Data Structures and Algorithm Analysis in Java 3rd Edition


  6. Resize the table vertically until the scroll bar shows up. Core Java Volume II Advanced Features 9th Edition


  7. If the setShape method's argument is null, the window will resize to the default for the given system, typically a rectangle. Java 7 New Features Cookbook


  8. These tasks to resize running job flows are not currently available from the AWS Console and need to be performed through the API or command line tools. Hadoop Beginners Guide


  9. The capacity is the number of elements the collection can hold before that collection needs to resize its internal memory to be larger. Java Performance Tuning 2nd Edition


  10. Because the paintComponent() method will be called during a resizing of the window, the clearRect() method will dynamically fill the background to gray as we resize the window. Java 7 Recipes A Problem-Solution Approach



654、单词 histogram 的匹配文本:


  1. The master also maintains statistics about the progress of computation and the state of the graph, such as the total size of the graph, a histogram of its distribution of out-degrees, the number of active vertices, the timing and message traffic of recent supersteps, and the values of all user-defined aggregators. Pregel  -  A System for Large-Scale Graph Processing


  2. The count must the textual representation of an object that the aggregator service expects: a number for DoubleValueSum, a whole number for the LongValue series, an arbitrary string for the StringValue series, and a whole number for UniqueValueCount and ValueHistogram. Pro Hadoop


  3. During query execution, the query dispatcher computes a histogram of tablet processing times. Dremel - Interactive Analysis of WebScale Datasets


  4. We've created the filter facet as an example, but as you may have guessed the API provides multiple possibilities of using faceting, just like the REST API does from the terms facet, through query, range, geo, statistical to histogram faceting. Mastering ElasticSearch


  5. If you group logins by the hour of the day and perform a count of the number of records in each group, you can plot these counts on a histogram and recognize times when your website is more active. MapReduce Design Patterns


  6. Hadoop aggregate package provides reducer and combiner implementations for simple aggregate operations such as sum, max, unique value count, and histogram. Hadoop MapReduce Cookbook


  7. Dapper user interface presents a simple frequency histogram over that metric space. Dapper a Large-Scale Distributed Systems Tracing Infrastructure


  8. You’re using the Linux graphing utility gnuplot4 to plot your data in a stacked histogram form. Hadoop in Practice


  9. Familiarity with basic statistical concepts (e.g., histogram, correlation) will help the reader appreciate the more advanced data processing examples. Hadoop in Action


  10. The tenuring distribution is a histogram showing the ages of objects in the young generation’s survivor spaces. Java Performance



655、单词 parallelized 的匹配文本:


  1. Programs written in this functional style are automatically parallelized and executed on a large cluster of commodity machines. MapReduce - Simplied Data Processing on Large Clusters


  2. The second motivator is that such operations can often be parallelized. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. Distributed grep Grep, a very powerful tool that uses regular expressions for finding lines of text of interest, is easily parallelized by applying a regular expression match against each line of input and only outputting lines that match. MapReduce Design Patterns


  4. Pig offers a high-level language (Pig Latin) to specify highly parallelized data processing on Hadoop clusters, thus leveraging the MapReduce framework. Professional Hadoop Solutions


  5. That means this input file can be parallelized by any number of lines, processed independently, and aggregated to produce exactly the same result. HBase in Action


  6. Doing so would give constant-time lookups in the worst case, and like cuckoo hashing, the lookup could be parallelized to simultaneously check the bounded set of possible locations. Data Structures and Algorithm Analysis in Java 3rd Edition


  7. MapReduce decomposes work submitted by a client into small parallelized map and reduce workers, as shown in figure 1.4 Hadoop in Practice


  8. This was the slowest part of the recovery process and because there are many HLogs per server, it could be parallelized. Apache Hadoop Goes Realtime at Facebook


  9. Not all algorithms can be parallelized There are entire classes of problems that cannot easily be parallelized. Hadoop Operations


  10. Ideally, the data analysis system should also have a robust mechanism for allowing the user to write user defined functions (UDFs) and queries that utilize UDFs should automatically be parallelized across the processing nodes in the shared-nothing cluster. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



656、单词 doug 的匹配文本:


  1. Hadoop was created by Doug Cutting, who now works as an architect at Cloudera and serves as chair of the Apache Software Foundation. Monitoring with Ganglia


  2. Hadoop rides on the back, sweat, and love of Doug Cutting, and many people of Yahoo! Inc. Pro Hadoop


  3. Shortly after the release of the paper, a free and open source software pioneer by the name of Doug Cutting started working on a MapReduce implementation to solve scalability in another project he was working on called Nutch, an effort to build an open source search engine. MapReduce Design Patterns


  4. In 2002, while developing a project called Nutch (a search engine project focused on crawling, indexing, and searching Internet web pages), Doug Cutting and Mike Cafarella were struggling with a solution for processing a vast amount of information. Professional Hadoop Solutions


  5. Okay, maybe you wouldn’t, and we surely didn’t; but Doug Cutting and Mike Cafarella did. HBase in Action


  6. My team was making discoveries similar to those that Doug Cutting and others at Nutch had made several years earlier regarding how to efficiently store and manage terabytes of crawled and analyzed data. Hadoop in Practice


  7. The project’s creator, Doug Cutting, explains how the name came about: Hadoop:The Definitive Guide 3rd Edition


  8. Doug Cutting got it all started, and Yahoo had the foresight to support it early on. Hadoop in Action


  9. Avro was created by Doug Cutting, most famous perhaps for creating Apache Hadoop, the implementation of Google’s MapReduce algorithm. Cassandra The Definitive Guide


  10. Thanks, Doug At the same time, Doug Cutting was working on the Nutch open source web search engine. Hadoop Beginners Guide



657、单词 unsynchronized 的匹配文本:


  1. You have to carefully study the source code and hope that future versions do not introduce unsynchronized mutators. Core Java Volume I Fundamentals 9th Edition


  2. That way, there’s no chance of accidentally exposing the unsynchronized version. Thinking in Java 4th Edition


  3. How does a synchronized method behave in conjunction with an unsynchronized. Java Threads 3rd Edition


  4. Unsynchronized Persistence Contexts mean a persistence context does not have to be enlisted in a transaction. Java EE 7 Essentials


  5. A reader/writer lock is a lock that allows unsynchronized reads from the data it protects, but enforces exclusiveness for writes to the data. Oracle JRockit The Definitive Guide


  6. The StringBuilder class, added in release 1.5, is an unsynchronized replacement for StringBuffer, which is now obsolete.) Effective Java 2nd Edition


  7. An example of this technique might be a web server that uses an unsynchronized LogFile class but gives each separate thread its own separate log so no resources are shared between the individual threads. Java Network Programming 4th Edition


  8. A non-static increment( ) method is synchronized separately on each this object, so the updates remain unsynchronized across the two threads. Java Performance Tuning 2nd Edition


  9. A synchronized method typically requires greater call overhead than an unsynchronized method. Concurrent Programming in Java Design Principles and Pattern


  10. Methods can be completely unsynchronized for performance, or automatically locked and managed by the container. Pro JPA2



658、单词 notifies 的匹配文本:


  1. Each time a window needs to be redrawn, no matter what the reason, the event handler notifies the component. Core Java Volume I Fundamentals 9th Edition


  2. TestListener implementation that notifies user about test suite execution time. Gradle in Action


  3. Each participant then notifies the coordinator of its prepare timestamp. Spanner - Google’s Globally-Distributed Database


  4. If the feature evaluates to be true, it emits the feature name as the key and notifies whether the product is within the first 10,000 products as the value. Hadoop MapReduce Cookbook


  5. When each DataNode has completed writing the block locally, the blocks are moved from temporary storage into permanent storage, and each DataNode asynchronously notifies the NameNode of their block storage (steps A, B, and C) Hadoop in Practice


  6. The flag is checked in a separate thread every three seconds, and if set, it notifies the tasktracker of the current task status. Hadoop:The Definitive Guide 3rd Edition


  7. If not, the client notifies the NameNode of the corrupt replica and then fetches a different replica of the block from another DataNode. The Hadoop Distributed File System


  8. The model object then notifies the list of the changes, and the list repaints itself. Core Java Volume II Advanced Features 9th Edition


  9. This notifies the phaser that this thread has finished the actual phase, but it won't participate in the future phases, so the phaser won't have to wait for it to continue. Java 7 Concurrency Cookbook


  10. Ensure that every method causing state changes that affect the truth value of any waited-for condition notifies threads waiting for state changes, causing them to wake up and recheck their guard conditions. Concurrent Programming in Java Design Principles and Pattern



659、单词 predef 的匹配文本:


  1. The scala.Predef object is automatically imported into scope by Scala. Scala in Depth


  2. Scala Predef (part of the standard library) maps println to Console.println for you so you don’t have to prefix it with Console when using it. Scala in Action


  3. Note Scala implicitly imports members of packages java.lang and scala, as well as the members of a singleton object named Predef, into every Scala source file. Programming in Scala 2nd Edition


  4. In addition, by default Scala imports two packages, the scala.Predef. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


  5. In the next chapter, we’ll learn about the Scala type hierarchy—in particular, the Predef object that includes many useful definitions. Programming Scala


  6. These could equally well have been placed into the scala package object, but Predef was introduced before Scala had package objects.) Scala for the Impatient


  7. Because println is used so frequently, it’s part of Scala’s Predef, the predefined stuff that’s automatically part of every program. Beginning Scala



660、单词 parallelize 的匹配文本:


  1. The issues of how to parallelize the computation, distribute the data, and handle failures conspire to obscure the original simple computation with large amounts of complex code to deal with these issues. MapReduce - Simplied Data Processing on Large Clusters


  2. We’d like to parallelize the regular expression search across a larger body of text. MapReduce Design Patterns


  3. If all the pictures are stored in Hadoop in the form of a sequence file, then you can use a simple map-only job to parallelize execution. Professional Hadoop Solutions


  4. In return, there is the possibility to parallelize the processing within a given record without. Interpreting the Data Parallel Analysis with Sawzall


  5. It’s a distributed system made up of a distributed filesystem and it offers a way to parallelize and execute programs on a cluster of machines (see figure 1.1) Hadoop in Practice


  6. A critical advantage of declustered replication is the ability to parallelize failure recovery. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.


  7. The Tenzing scheduler can intelligently parallelize operations to make hash joins run faster. Tenzing - A SQL Implementation On The MapReduce Framework


  8. To effectively parallelize the query across all the mappers, you need a strategy to partition the table into segments each mapper will retrieve. Hadoop Beginners Guide


  9. Tuning the Number of Mappers and Reducers Hive is able to parallelize queries by breaking the query into one or more MapReduce jobs. Programming Hive


  10. Furthermore, data analysis workloads tend to consist of many large scan operations, multidimensional aggregations, and star schema joins, all of which are fairly easy to parallelize across nodes in a shared-nothing network. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



661、单词 emulator 的匹配文本:


  1. A disk format supported by VirtualBox virtual machine monitor and the QEMU emulator. bk-compute-adminguide-grizzly


  2. However, if you want to play with Android apps in a sandbox on your PC, consider downloading the Android SDK (http://developer.android.com/sdk/index.html), and use an emulator and a tool such as adb (http://developer.android.com/guide/developing/ tools/adb.html) to upload and install apps. Jenkins Continuous Integration Cookbook


  3. In the example, the emulator gradually forms a more and more complex expression on the stack, and when it is time to pop it and return it, the expression in its entirety can be used to form code. Oracle JRockit The Definitive Guide


  4. We can run automated tests on a simulator/emulator or on a real device using iOS and Android drivers. Selenium Testing Tools Cookbook


  5. If you’re on Windows, you’ll first have to get the Cygwin POSIX emulator and then install Git. Cassandra The Definitive Guide


  6. Replacing the external entity with an emulator that is deployed within benchmark setup is often required to address this issue. Java Performance


  7. Use the Eclipse IDE to build and compile your Android project, and then deploy the application to the emulator. Java 7 Recipes A Problem-Solution Approach


  8. TPC-E traditionally has three components – a customer emulator, a market emulator, and a DBMS running stored SQL procedures. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications


  9. Quick EMUlator (QEMU) One of the hypervisors supported by OpenStack, generally used for development purposes. OpenStack Operations Guide


  10. Important preliminary points While you can use the Android emulator for the Android parts of the chapter, it is highly recommended that you have a real device that you can use. Selenium 2 Testing Tools Beginner's Guide



662、单词 cgi 的匹配文本:


  1. Get the latest, stable, HBase-supported Hadoop release from Hadoop's official site, http://www.apache.org/dyn/closer.cgi/hadoop/common/ HBase Administration Cookbook


  2. The Nagios UI also supports custom CGI headers and footers, which make it possible to accomplish rollover popups of the action_url icon containing graphs from the Ganglia graph.php. Monitoring with Ganglia


  3. The arrival of dynamically generated Web pages changed completely what could be done with a Web site, through Common Gateway Interface (CGI) scripts written in languages like PERL. Java Network Programming and Distributed Computing


  4. To get started, grab the latest binary release by pointing your browser to http://jmeter.apache.org/download_jmeter.cgi. Performance Testing With JMeter 2.9


  5. This submission passes through the Common Gateway Interface (CGI) provided on all Web servers. Thinking in Java 4th Edition


  6. Visit the link http://www.apache.org/dyn/closer.cgi/ hbase/, and select the nearest mirror (the suggested mirror on the top is the optimal choice) Hadoop Operations and Cluster Management Cookbook


  7. When form data are sent to a web server, it does not matter whether the data are interpreted by a servlet, a CGI script, or some other server-side technology. Core Java Volume II Advanced Features 9th Edition


  8. The Open Directory interface is a simple form with one input field named search; input typed in this field is sent to a program at http://search.dmoz.org/cgi-bin/search, which does the actual search. Java Network Programming 4th Edition


  9. For example, Common Gateway Interface (CGI) scripts for HTTP servers typically need to be started for every message sent to the server. Java Performance Tuning 2nd Edition


  10. Ant is available from the Apache Ant website at the following URL: http://ant.apache.org/ bindownload.cgi. ActiveMQ in Action



663、单词 functor 的匹配文本:


  1. The functor would be something that converts cats into dogs. Scala in Depth


  2. Individual bytecode instructions are represented in Prolog as terms whose functor is the name of the instruction and whose arguments are its parsed operands. The Java Virtual Machine Specification Java SE 7 Edition


  3. So we just wrote a generic unzip that works not just for lists, but for any functor! Functional Programming in Scala


  4. A functor is away to go fromone category to another that preserves the categorical structure of its domain. Steps in Scala An Introduction to Object-Functional Programming



664、单词 kdc 的匹配文本:


  1. The installation includes setting up a Kerberos admin server and a Key Distribution Center (KDC) HBase Administration Cookbook


  2. The Kerberos KDC also has copies of everyone’s secret key, and facilitates all communications. Professional Hadoop Solutions


  3. We can get one by authenticating to the KDC, using kinit: Hadoop:The Definitive Guide 3rd Edition


  4. Each realm can have its own settings including the location of the KDC on the network and supported encryption algorithms. Hadoop Operations



665、单词 renderer 的匹配文本:


  1. Add to this the fact that we still cannot change the renderer easily; doing so means changing the class that launches the application. Pro Spring 3


  2. The basic mechanism for display is contained in the rendererComponent method of class Table. Programming in Scala 2nd Edition


  3. This is a perfect job for a Copy task with a filter attached to it, but that filter has a lot of work to do! It has to be a full-featured Markdown parser and HTML renderer. Gradle Beyond The Basics


  4. The code below declares a class that has a constructor with a single argument, viewRenderer, which sets an immutable field of the same name. Functional Programming Patterns in Scala and Clojure


  5. The set of available attributes supported by a JSF component is determined by the combination of the UIComponent and Renderer for that tag. Java EE 7 Essentials


  6. Although the JList class can display strings and icons automatically, you need to install a list cell renderer into the JList object for all custom drawing. Core Java Volume II Advanced Features 9th Edition


  7. To set this up, suppose there is a generic Pic interface for images, and a Renderer interface describing services that accept a URL pointing to image data and ultimately return a Pic. Concurrent Programming in Java Design Principles and Pattern


  8. This time the Jackson renderer complains about the Address class exposing a copy property, which in turn causes a recursion. Spring Data Modern Data Access for Enterprise Java



666、单词 decoupled 的匹配文本:


  1. As with most contemporary distributed file systems, HDFS is based on an architecture with the namespace decoupled from the data. HDFS scalability the limits to growth


  2. The beauty of systems that use the changes API is that they are decoupled. CouchDB The Definitive Guide


  3. By using a plugin, functionality is decoupled from the core Gradle build logic. Gradle Effective Implementation Guide


  4. Ceph directly addresses the issue of scalability while simultaneously achieving high performance, reliability and availability through three fundamental design features: decoupled data and metadata, dynamic distributed metadata management, and reliable autonomic distributed object storage. Ceph A Scalable, High-Performance Distributed File System


  5. That means your client code is entirely decoupled from your cluster deployment. HBase in Action


  6. In effect, the objects no longer know how to compare themselves; instead, this information is completely decoupled from the objects in the array. Data Structures and Algorithm Analysis in Java 3rd Edition


  7. The collection mechanism for metrics is decoupled from the component that receives the updates, and there are various pluggable outputs, including local files, Ganglia, and JMX. Hadoop:The Definitive Guide 3rd Edition


  8. Because each row is served by exactly one server, HBase is strongly consistent, and using its multiversioning can help you to avoid edit conflicts caused by concurrent decoupled processes or retain a history of changes. HBase:The Definitive Guide


  9. Accrual failure detection is based on two primary ideas: that failure detection should be flexible by being decoupled from the application being monitored, and outputting a continuous level of “suspicion” regarding how confident the monitor is that a node has failed. Cassandra The Definitive Guide


  10. As the backbone of an event-driven architecture—The decoupled, asynchronous style of architecture described in the previous point allows the broker itself to scale much further and handle considerably more clients via tuning, additional memory allocation, and so on (known as vertical scalability) instead of only relying upon the ability of the number of broker nodes to be increased to handle many more clients (known as horizontal scalability) ActiveMQ in Action



667、单词 nonstandard 的匹配文本:


  1. Eclipse is written in Java, but since it uses a nonstandard windowing library, it is not quite as portable as Java itself. Core Java Volume I Fundamentals 9th Edition


  2. The following settings, in a separate configuration file, configure the second gmond instance to listen on the nonstandard port: Monitoring with Ganglia


  3. The build tool’s response is to add scripting functionality through nonstandard extension mechanisms. Gradle in Action


  4. Relational database vendors often look to nonstandard solutions for this problem, such as storing the time-series data as an opaque blob and providing proprietary query extensions for its introspection. HBase in Action


  5. We can extend binomial queues to support some of the nonstandard operations that. Data Structures and Algorithm Analysis in Java 3rd Edition


  6. As they are implemented, MapWritable and SortedMapWritable use positive byte values for custom types, so a maximum of 127 distinct nonstandard Writable classes can be used in any particular MapWritable or SortedMapWritable instance. Hadoop:The Definitive Guide 3rd Edition


  7. Next, set the ensemble locations and client port, if nonstandard, in hbase-site.xml, or add a suitably configured zoo.cfg to HBase’s CLASSPATH. HBase:The Definitive Guide


  8. JAX-WS also facilitates, using a nonstandard programming model, the publishing and invoking of a web service that uses WS-* specifications such as WS-Security, WS-Secure Conversation, and WS-Reliable Messaging. Java EE 7 Essentials


  9. If a field does not implement Comparable, or you need to use a nonstandard ordering, you can use an explicit Comparator instead. Effective Java 2nd Edition


  10. This relieves much of the frustration developers have faced in lacking control flow in Ant or being forced into plug-in development in Maven to accomplish nonstandard tasks. Building and Testing with Gradle



668、单词 robustness 的匹配文本:


  1. The AM scalability benchmark measures single-job robustness by saturating the AM with container bookkeeping duties. Apache Hadoop YARN Yet Another Resource Negotiator


  2. The tradeoff of being confined to the MapReduce framework is the ability to process your data with distributed computing, without having to deal with concurrency, robustness, scale, and other common challenges. MapReduce Design Patterns


  3. Chapter 3: Application Programmer Interface Introduction Connecting to a Cassandra server Creating a keyspace and column family from the client Using MultiGet to limit round trips and overhead Writing unit tests with an embedded Cassandra server Cleaning up data directories before unit tests Generating Thrift bindings for other languages (C++, PHP, and others) Using the Cassandra Storage Proxy "Fat Client" Using range scans to find and remove old data Iterating all the columns of a large key Slicing columns in reverse Batch mutations to improve insert performance and code robustness Using TTL to create columns with self-deletion times Working with secondary indexes. Cassandra High Performance Cookbook


  4. The handling of undefined values in Sawzall adds a similar level of robustness. Interpreting the Data Parallel Analysis with Sawzall


  5. Apache Nutch offers features such as politeness, robustness, and scalability. Hadoop MapReduce Cookbook


  6. There are, however, several notable exceptions to this progress such as disk seek time and operating system robustness. The anatomy of a large-scale hypertextual Web search engine


  7. Though the sync() operation is designed to not unduly tax HDFS, it does have some overhead, so there is a trade-off between data robustness and throughput. Hadoop:The Definitive Guide 3rd Edition


  8. On the other hand, its robustness and scalability make it suitable for even the most demanding jobs at Yahoo and Facebook. Hadoop in Action


  9. This means far more robustness for your applications by simply utilizing a feature of ActiveMQ. ActiveMQ in Action


  10. While simple applications of monitor methods are indeed simple, the chances for error (for example slipped conditions) can increase dramatically when additional factors are addressed, especially performance and robustness in the face of thread cancellation. Concurrent Programming in Java Design Principles and Pattern



669、单词 speedup 的匹配文本:


  1. You’ve run it several times on a single core, but you’re eager to see the speedup on the new machine. Programming Concurrency on the JVM


  2. The disadvantages are that the speedup isn’t nearly as large as it sounds, and your learning chain will require more maintenance. Mahout in Action


  3. Our comparison point, however, is a single monolithic scheduler, so even a single-digit speedup is helpful. Omega - flexible, scalable schedulers for large compute clusters


  4. We refer to the ratio of the Hadoop run to the incremental run (Incoop dynamic update) as speedup (in work and in time) Incoop MapReduce for Incremental Computations


  5. No reduce step means an enormous speedup! To leave only edges where both source and destination are neighbors of the seed node, repeat the join: Hadoop:The Definitive Guide 3rd Edition


  6. The speedup graph shows that for the early part of the curve, we get linear scaling; the benefits of adding more nodes decreases after this point. Hadoop in Action


  7. At worst, buffering has no impact on performance, while at best it can give you an order of magnitude speedup or more. Java Network Programming 4th Edition


  8. I have seen all of these yield huge improvements to applications, sometimes a 20-fold speedup. Java Performance Tuning 2nd Edition


  9. Only when you blow past the data volume that a single server could reasonably handle or saturate the I/O channels of your storage array can you fully appreciate the performance speedup of Impala over competing solutions and the effects of the various tuning techniques. Cloudera Impala


  10. Because individual shards don’t need to communicate with each other, the resulting speedup is nearly linear. Web search for a planet the google cluster architecture



670、单词 fsck 的匹配文本:


  1. The name hbck comes from the HDFS fsck command, which is the tool to check HDFS for inconsistencies. HBase Administration Cookbook


  2. Use the following steps to check the status of an HDFS cluster with hadoop fsck: Hadoop Operations and Cluster Management Cookbook


  3. File systems come with a file-system check utility like fsck that checks for the consistency of a file system. HBase in Action


  4. You can use the fsck command to find the block size and block locations of a particular file path in the HDFS. Hadoop MapReduce Cookbook


  5. There are a few other operations that can be performed via the HTTP interface, such as fsck for retrieving any issues with the filesystem, and contentSummary, which returns statistical information about a directory, such as quota limits, size, and more: Hadoop in Practice


  6. However, there are tools to perform filesystem maintenance, such as df and fsck, that operate on the filesystem block level. Hadoop:The Definitive Guide 3rd Edition


  7. But that was not the case: the append in Hadoop 0.19.0 was so badly suited that a hadoop fsck / would report the HDFS as being corrupt because of the open logfiles HBase kept. HBase:The Definitive Guide


  8. By default fsck will ignore files still open for writing by a client. Hadoop in Action


  9. The tool is hadoop fsck, which can be used to examine and fix filesystem problems. Hadoop Beginners Guide


  10. Checking Filesystem Integrity with fsck There are a few pathological conditions that can occur in HDFS. Hadoop Operations



671、单词 vals 的匹配文本:


  1. Make value classes final, and mark all their fields final (vals in Scala) Programming Concurrency on the JVM


  2. This can sometimes boil down to using objects and vals instead of classes and defs. Scala in Depth


  3. Yes, you can share the settings and vals from the build.scala file to build.sbt files. Scala in Action


  4. Scala encourages you to lean towards vals, but ultimately reach for the best tool given the job at hand. Programming in Scala 2nd Edition


  5. We can assign the elements of a tuple into multiple vars or vals in parallel, as shown in this example: Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


  6. All we need to do is define a class that defines some vals as constructor arguments, which will cause the passed-in values to be assigned to public vals. Functional Programming Patterns in Scala and Clojure


  7. There are a few exceptions to the rule that you must initialize vals and vars when they are declared. Programming Scala


  8. Because sumExpr, prodExpr, and factor reference each other and, thus, are recursive, we must define the type of at least one of the three vals so the type inferencer can do its work. Beginning Scala



672、单词 subtasks 的匹配文本:


  1. Suppose you have a processing task that naturally decomposes into subtasks, like this: Core Java Volume I Fundamentals 9th Edition


  2. Subtasks generated in tasks run by a given worker thread are pushed onto that workers own deque. A Java ForkJoin Framework


  3. It’s an implementation of the ExecutorService interface, which distributes those subtasks to worker threads in a thread pool, called ForkJoinPool. Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. We propose techniques for controlling the granularity of tasks by dividing large tasks into smaller subtasks, which can be reused even when the large tasks cannot. Incoop MapReduce for Incremental Computations


  5. As you get more comfortable writing MapReduce programs and take on more ambitious data processing tasks, you’ll find that many complex tasks need to be broken down into simpler subtasks, each accomplished by an individual MapReduce job. Hadoop in Action


  6. The ForkJoinPool class differs from other executors, in that its threads attempt to find and execute subtasks created by other currently running tasks. Java 7 New Features Cookbook


  7. Another key underlying concept is that of "divide and conquer", where a single problem is broken into multiple individual subtasks. Hadoop Beginners Guide


  8. Unlike the Executor framework, when a task is waiting for the finalization of the subtasks it has created using the join operation, the thread that is executing that task (called worker thread) looks for other tasks that have not been executed yet and begins its execution. Java 7 Concurrency Cookbook


  9. The main object that commences processing normally waits for all subtasks to finish before proceeding. Concurrent Programming in Java Design Principles and Pattern


  10. If you need to apply a lambda many times, you often have a chance to split up the work into subtasks that execute concurrently. Java SE 8 for the Really Impatient



673、单词 sla 的匹配文本:


  1. The service level agreement (SLA) for jobs is long and can sustain recovery from machine failure. Pro Hadoop


  2. Configuring service-level authentication The purpose of service-level authentication (SLA) is to ensure that Hadoop users have the proper permission to access certain services. Hadoop Operations and Cluster Management Cookbook


  3. We phrase our SLA as the time to reach 99.9% completeness at each tier below the producer. Building LinkedIn’s Real-time Activity Data1


  4. If you take your performance metrics seriously, then the build should fail if the required SLA is not met. Jenkins The Definitive Guide


  5. Oozie Service Level Agreement (SLA) — This provides support for tracking the execution of Workflow applications. Professional Hadoop Solutions


  6. Other configuration parameters are generally used to optimize the cluster’s performance; you’ll probably tackle them while tuning the system based on your use case and SLA definitions. HBase in Action


  7. The response times of these requests should stay within specific limits to guarantee a positive user experience—also commonly referred to as a service-level agreement (SLA) HBase:The Definitive Guide


  8. Use the timeout because it is important to your SLA, not because you want to abort the execution of long running queries. Elasticsearch The Definitive Guide


  9. Primarily, these problems center on the issues of resource starvation and (lack of) SLA guarantees, as described earlier. Hadoop Operations


  10. In 2009, we started to investigate systems that would allow us to scale out, as the amount of data continued to grow and still meet our SLA with the business users. Programming Hive



674、单词 tion 的匹配文本:


  1. You can write various complicated queries against the INFORMA TION_SCHEMA tables, but there are two easier techniques. High Performance MySQL 3rd Edition


  2. If your program is using a connection object called Mongo or Connec tion or something else, you are using the old, default-unsafe API. MongoDB The Definitive Guide 2nd Edition


  3. This includes (i) developing applications intended to run on an tation of the Specification, provided that such applications do not themselves implement any of the Specification, and (ii) discussing the Specification with any third party; and (iii) g brief portions of the Specification in oral or written communications which discuss the tion provided that such excerpts do not in the aggregate constitute a significant portion of the tion. Java EE 7 Specification


  4. Here is an example of a filter function that would cause only documents with a collec tion value of author to be replicated: Scaling CouchDB


  5. It turns out that files() returns a FileCollec tion, which is a foundational interface for file programming in Gradle. Gradle Beyond The Basics


  6. The Configura tion instance points these classes at the cluster the code is to work against. Hadoop:The Definitive Guide 3rd Edition


  7. The region servers, and more precisely, each region, keeps a list of transactions, which are initiated with a beginTransac tion() call, and are finalized with the matching commit() call. HBase:The Definitive Guide


  8. Errors in transmission are wrapped in the Execu tionException thrown when the Future object is queried. Java EE 7 Essentials


  9. For example, to get the value of the Content-type and Content-encoding header fields of a URLConnec tion object uc, you could write: Java Network Programming 4th Edition


  10. If you have a lot of partitions and you want to see if partitions have been defined for particular partition keys, you can further restrict the command with an optional PARTI TION clause that specifies one or more of the partitions with specific values: Programming Hive



675、单词 felix 的匹配文本:


  1. Spring DM is tested on three of these, which appear to be the most popular because they’re feature-rich, reliable, and open source: Eclipse Equinox, Apache Felix, and Knopflerfish. Spring Dynamic Modules in Action


  2. All valid Felix command activities are valid here as well. Spring Roo in Action



676、单词 aggregators 的匹配文本:


  1. Pregel aggregators are a mechanism for global communication, monitoring, and data. Pregel  -  A System for Large-Scale Graph Processing


  2. This can help online aggregators, like news websites, to automatically add articles to a cluster as and when they arrive. Mahout in Action


  3. The deaf and mute parameters exist to allow some gmond nodes to act as special-purpose aggregators and relays for other gmond nodes. Monitoring with Ganglia


  4. Chapter 8, Advanced and Alternate MapReduce Techniques: This chapter demonstrates how to use several advanced features of Hadoop Core: map-side joins, chain mapping, streaming, pipes, and aggregators. Pro Hadoop


  5. This type of grouping is useful for implementation of stateful bolts, such as counters, aggregators, joins, and so on. Professional Hadoop Solutions


  6. Solid arcs represent data flowing from the analysis machines to the aggregators; dashed arcs represent the aggregated data being merged, first into one file per aggregation machine and then to a single final, collated output file. Interpreting the Data Parallel Analysis with Sawzall


  7. The flat file item writer can use a custom LineAggregator to delegate aggregation to dedicated LineAggregators (one for each product subclass) Spring Batch in Action


  8. For the second issue, Cascading departs from map and reduce operations directly by introducing higher-level abstractions as alternatives: Functions, Filters, Aggregators, and Buffers. Hadoop:The Definitive Guide 3rd Edition


  9. Our system incorporates ideas from existing log aggregators and messaging systems, and is suitable for both offline and online message consumption. Kafka a Distributed Messaging System for Log Processing


  10. These first level aggregators then send the events to one of the series of agents that access the Hadoop cluster. Hadoop Beginners Guide



677、单词 ios 的匹配文本:


  1. Instead of relying on one massive database you can access over the Internet, you can have a copy of the data you need on your laptop, iOS, or Android mobile phone, and then synchronize the information back to your big database. Getting Started with CouchDB


  2. If it is not in RAM, there is a read IO before the write IO, a total of two IOs for one write. Monitoring with Ganglia


  3. In addition to being an expert in Java, he also develops for the iOS platform, and when the weather's nice, he goes flying. Jenkins Continuous Integration Cookbook


  4. The iOS Selenium driver runs either in the iPhone simulator or on an iPhone device itself. Testable JavaScript


  5. Chapter 7, Testing on Mobile Browsers, introduces you to testing mobile web applications with the Apple iOS and Android platform. Selenium Testing Tools Cookbook


  6. Mark is currently an independent software consultant focusing on developing mobile web and native applications on Android and iOS. Java 7 Recipes A Problem-Solution Approach


  7. A real iOS device is not needed as that simulates a device and therefore is significantly faster. Selenium 2 Testing Tools Beginner's Guide



678、单词 irc 的匹配文本:


  1. If not, or if the folks on IRC cannot answer your questions, you can post them to the mailing lists described next. Monitoring with Ganglia


  2. Notifications can include emails, IMs, IRC messages, SMS, and many more. Gradle in Action


  3. If you are planning to use a development release in production, ask about it first on the mailing list or IRC to get the developers’ advice. MongoDB The Definitive Guide 2nd Edition


  4. Juven wrote the section on IRC notifications in Chapter 8, Notification. Jenkins The Definitive Guide


  5. Communicating with the Cassandra developers and users through IRC and e-mail. Cassandra High Performance Cookbook


  6. I joined the mailing lists and the IRC channel and started asking questions. HBase in Action


  7. Not long after, Lars, the author of the book you are now reading, showed up on the #hbase IRC channel. HBase:The Definitive Guide


  8. Sinks In addition to the logger and file roll sinks we used previously, Flume also supports sinks for HDFS, HBase (two types), Avro (for agent chaining), null (for testing), and IRC (for an Internet Relay Chat service) Hadoop Beginners Guide


  9. It’s easy to understand the logical path if you think about an IRC chat session. Java Network Programming 4th Edition


  10. He is a contributor to the Apache Hive project and is active helping others on the Hive IRC channel. Programming Hive



679、单词 iptables 的匹配文本:


  1. In addition, network traffic monitoring using iptables/ULOG is supported on Linux platforms. Monitoring with Ganglia


  2. It accepts networking tasks from the queue and then performs tasks to manipulate the network (such as setting up bridging interfaces or changing iptables rules) bk-compute-adminguide-grizzly


  3. Configuration of a passwordless login failure can be caused by many reasons, for example, the configuration of the firewall (or iptables, to be more specific), SELinux, and even the SSHD server itself. Hadoop Operations and Cluster Management Cookbook


  4. In addition, it demands an understanding of Linux systems administration, such as installing servers, networking with iptables, and basic virtualization technologies. Deploying OpenStack


  5. Similar to nova-compute, it accepts networking tasks from the queue and performs tasks to manipulate the network, such as setting up bridging interfaces or changing iptables rules. bk-admin-guide-cloud-latest


  6. Using IPTables to simulate complex network scenarios in a local environment. Cassandra High Performance Cookbook


  7. Agents exist for all sorts of behaviors, such as managing running services; running Puppet; managing packages, processes, and files; and even banning IP addresses with iptables. Managing Infrastructure with Puppet


  8. We’re going to use the iptables firewall to block traffic to the primary Puppet CA worker, effectively simulating a failure of the service. Pro Puppet


  9. He decided to temporarily disable iptables while working on the new configuration: Hadoop Operations


  10. You should be familiar with concepts such as DHCP, Linux bridges, VLANs, and iptables. OpenStack Operations Guide



680、单词 centroids 的匹配文本:


  1. The algorithm does multiple rounds of processing and refines the centroid locations until the iteration max-limit criterion is reached or until the centroids converge to a fixed point from which they don’t move very much. Mahout in Action


  2. Then, the map task compares the information about the customer against each of the cluster's centroids, and assigns each customer to the cluster that is closest to that customer. Hadoop MapReduce Cookbook


  3. The K-means process starts with the initial placement of the K cluster centroids. Hadoop in Practice



681、单词 decouple 的匹配文本:


  1. Tip We strongly suggest that you decouple try/catch and try/finally blocks. Core Java Volume I Fundamentals 9th Edition


  2. To avoid that, actor libraries in general decouple actors from threads. Programming Concurrency on the JVM


  3. An object-oriented program contains some upcasting somewhere, because that’s how you decouple yourself from knowing about the exact type you’re working with. Thinking in Java 4th Edition


  4. We will see how we can decouple the definition and usage of a custom task and plugin into separate source files. Gradle Effective Implementation Guide


  5. Java is a core part of the Hadoop stack’s DNA, and you can’t decouple the two easily. HBase in Action


  6. Wouldn't it make sense to decouple the Java source code from the bytecode format so that one might write Java compilers for other languages that in turn can run on Java Virtual Machines? Of course it would, and it was probably argued that this would further help the spread and adoption of Java early in its design stage. Oracle JRockit The Definitive Guide


  7. In practice, it can be difficult to completely decouple the I/O, but usually some reads can be anticipated and some writes can be run asynchronously without the program requiring immediate confirmation of success. Java Performance Tuning 2nd Edition


  8. In addition to the cross-language capabilities provided by ActiveMQ, the ability to integrate such applications without the use of RPC is definitely a big benefit because messaging truly helps to decouple the applications. ActiveMQ in Action


  9. By not coding directly against members of another class, you also decouple the code, which helps to ensure that if one object changes, others that depend upon it are not adversely affected. Java 7 Recipes A Problem-Solution Approach


  10. Perhaps it suits the development process to even have a file for each entity, either to decouple them from each other or to reduce conflicts resulting from the version control and configuration management system. Pro JPA2



682、单词 msg 的匹配文本:


  1. Write a protocol message both to the network socket and to // the screen protected void writeMsg(String msg) throws Exception; Java Network Programming and Distributed Computing


  2. Suppose your summary table is called msg_per_hr and is defined as follows: High Performance MySQL 3rd Edition


  3. Rule msg: If we see a PASSWORD we should flag. Jenkins Continuous Integration Cookbook


  4. Finally, you may want to let the IRC plugin use the /notice command instead of the default /msg command. Jenkins The Definitive Guide


  5. You have several logging levels, like error, info, and warning, and at the same time your application is separated into modules like user-profile, image-gallery, msg-inbox, and so forth. RabbitMQ in Action


  6. To do this, we define a member instance msg just for messaging. Hadoop RealWorld Solutions Cookbook


  7. As shown in the figure, mapper task will emit all message sizes under the key msgSize, and they are all sent to a one-reducer job. Hadoop MapReduce Cookbook


  8. Member has encountered a Fatal Error; the errMsg field in the members array for this server should show more details about the problem. The Definitive Guide to MongoDB


  9. Also, when discussing invocations of the form obj.msg(arg), the recipient (that is, the object bound to variable obj) is called the target object. Concurrent Programming in Java Design Principles and Pattern


  10. Do something, in this case the IN parameter value is assigned to the OUT parameter msg :=text; end; Java 7 Recipes A Problem-Solution Approach



683、单词 compacting 的匹配文本:


  1. We will start by manually flushing and compacting regions, and then split the regions manually. HBase Administration Cookbook


  2. Less flushing and therefore less compacting should make the VFS Cache (Virtual File System Cache) more effective. Cassandra High Performance Cookbook


  3. The main area of the CouchDB interface is where you will spend most of your time interacting with CouchDB databases—creating databases and documents, uploading attachments, modifying documents, compacting databases, and deleting databases. Beginning CouchDB


  4. The way to get good write performance is by not flushing, compacting, or splitting too often because the I/O load goes up during that time, slowing the system. HBase in Action


  5. Compaction metrics When the region server has to perform the asynchronous (or manually invoked) housekeeping task of compacting the storage files, it reports its status in a different metric. HBase:The Definitive Guide


  6. The solution was to stop unconditionally compacting files above a certain size and skip compactions if enough candidate files could not be found. Apache Hadoop Goes Realtime at Facebook


  7. Compacting them prevents the database from having to perform a seek to pull the data from each SSTable. Cassandra The Definitive Guide


  8. If it weren’t for invocation chaining, these six methods could have been replaced by one method in the common Buffer superclass.) Compacting shifts any remaining data in the buffer to the start of the buffer, freeing up more space for elements. Java Network Programming 4th Edition


  9. Instead, there is usually a series of attempts to free up space by reclaiming objects, compacting objects, defragmenting the heap, and so on. Java Performance Tuning 2nd Edition


  10. Each concrete buffer implementation for a primitive type 0 exports a method for compacting buffers: Fundamental Networking in Java



684、单词 unapply 的匹配文本:


  1. The compiler adds a method called unapply, which allows the class name to be used as an extractor for pattern matching (more on this later) Scala in Action


  2. An extractor in Scala is an object that has a method called unapply as one of its members. Programming in Scala 2nd Edition


  3. The extractor has one method named unapply( ) that accepts the value. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


  4. In fact, the information returned by unapply might be a transformation of the actual information in the type. Programming Scala


  5. Here method unapply implicitly introduces case classes since Some and None are a case class and a case object, respectively. Steps in Scala An Introduction to Object-Functional Programming



685、单词 applicative 的匹配文本:


  1. Instead of relying on a flatMap operation, a function can curried and values fed into it in an applicative style. Scala in Depth


  2. Since weall monads are applicative functors have already implemented  instances for a great many data types, we don'tMonad have to write  instances for them. Functional Programming in Scala



686、单词 rabbitmqctl 的匹配文本:


  1. You can check to make sure this is running with the rabbitmqctl: Deploying OpenStack


  2. If you installed from an RPM or Ubuntu/Debian package, you may need to run rabbitmqctl as root. RabbitMQ in Action


  3. The operator uses the rabbitmqctl command to add the mcollective account with a password. Pro Puppet


  4. RabbitMQ Web Management Interface or rabbitmqctl Aside from connection failures, RabbitMQ log files are generally not useful for debugging OpenStack related issues. OpenStack Operations Guide



687、单词 finalization 的匹配文本:


  1. This appendix details changes to Section 12.6 of the Java language specification, which deals with finalization. JSR-133 Java Memory Model and Thread


  2. Direct buffers Can sometimes achieve zero-copy transfer But have setup and finalization overhead Best for applications with long-lived connections. Scalable IO in Java


  3. The package java.lang.ref describes weak references, which interact with garbage collection and finalization. The Java Language Specification Java SE 7 Edition


  4. Phantom references Phantom references are the preferred way of implementing finalization. Oracle JRockit The Definitive Guide


  5. Unfortunately, the finalizer thread was running at a lower priority than another application thread, so objects weren’t getting finalized at the rate they became eligible for finalization. Effective Java 2nd Edition


  6. While a constructor method performs initialization for an object, a finalizer method can be used to perform cleanup or “finalization” for the object. Java in a Nutshell 5th Edition


  7. There is no way to avoid this overhead apart from minimizing the use of finalization methods in the application. Java Performance Tuning 2nd Edition


  8. One peculiarity of this mechanism is that Thread has to check if it has been interrupted or not, and it can decide if it responds to the finalization request or not. Java 7 Concurrency Cookbook


  9. When you have a choice between them, it is almost always preferable to perform cleanup in finally clauses rather than relying on finalization (i.e., overriding Object.finalize) Concurrent Programming in Java Design Principles and Pattern


  10. Finalization of a servlet can be very important, especially if the servlet is using some resources that may lead to a memory leak, making use of a reusable resource such as a database connection, or in order to persist some values for another session. Java 7 Recipes A Problem-Solution Approach



688、单词 semaphores 的匹配文本:


  1. Semaphores were invented by Edsger Dijkstra in 1968, for use as a synchronization primitive. Core Java Volume I Fundamentals 9th Edition


  2. Internal concurrency issues Contention for resources such as semaphores, access to pages in the InnoDB buffer pool, and so on. High Performance MySQL 3rd Edition


  3. Generally, counting semaphores are used to limit the amount of resources that can be used at one time. Redis in Action


  4. Threading encourages shared state concurrency, and it’s hard to make programs run in parallel because of locks, semaphores, and dependencies between threads. Scala in Action


  5. Class exposes synchronization and semaphores in its public interface The Findbugs explanation on this rule is pretty clear: Sonar Code Quality Testing Essentials


  6. The sleeping barber problem is usually solved with semaphores and mutexes, but we’ve got better tools at our disposal. Programming Scala


  7. Not only does it have explicit constructs that can be used for threads, locks, and semaphores but it was also designed so that every object in a Java program can conveniently be used as the limiting resource, or monitor object, constraining access to code in a critical section. Oracle JRockit The Definitive Guide


  8. Semaphore The Semaphore class models semaphores, a traditional concurrent programming construct. Java in a Nutshell 5th Edition


  9. Semaphores are a generic synchronization mechanism that you can use to protect any critical section in any problem. Java 7 Concurrency Cookbook


  10. There are other ways to describe semaphores as well, including those based on their original motivating metaphor: the signaling flags used to prevent railroad collisions. Concurrent Programming in Java Design Principles and Pattern



689、单词 bayes 的匹配文本:


  1. Mahout classification algorithms include naive Bayes, complementary naive Bayes, stochastic gradient descent (SGD), and random forests. Mahout in Action


  2. In this recipe, we will use a naive Bayes classifier from Apache Mahout to determine if a set of terms found in a movie review mean the movie had a negative or positive reception. Hadoop RealWorld Solutions Cookbook


  3. Classification using Naive Bayes Classifier A classifier assigns inputs into one of the N classes based on some properties (features) of inputs. Hadoop MapReduce Cookbook


  4. Bayes theorem comes into play once each word has had a spam and ham probability calculated, and combines them together to form the overall email probability of ham or spam. Hadoop in Practice



690、单词 synchronously 的匹配文本:


  1. In a traditional SQL database hosting thousands or millions of users, using a synchronously replicated log would risk interruptions of widespread impact [11] Megastore - Providing Scalable, Highly Available Storage for Interactive Services


  2. Journaled file systems are not needed for the NameNode, as the critical data is written synchronously. Pro Hadoop


  3. Activity tasks participating in SWF can be executed synchronously or asynchronously. Professional Hadoop Solutions


  4. This should be quick: writes should be visible as soon as possible, particularly when multiple writers or mixed readers and writers force clients to operate synchronously. Ceph A Scalable, High-Performance Distributed File System


  5. Using this code will result in the index file being created synchronously: Hadoop in Practice


  6. For each binding, there is a choice between performing operations synchronously or asynchronously. Hadoop:The Definitive Guide 3rd Edition


  7. Another problem is that the NameNode synchronously updates the BackupNode on every transaction, thus the reliability of the entire system could now be lower than the reliability of the standalone NameNode. Apache Hadoop Goes Realtime at Facebook


  8. To achieve a strict consistency, all update operations will be performed synchronously, meaning that they must block, locking all replicas until the operation is complete, and forcing competing clients to wait. Cassandra The Definitive Guide


  9. Client applications written against the Hadoop APIs can submit jobs either synchronously and block for the result, or asynchronously and poll the master for job status. Hadoop Operations


  10. The MessageConsumer can consume messages either synchronously by using one of the receive() methods or asynchronously by providing a MessageListener implementation to the consumer. ActiveMQ in Action



691、单词 unidirectional 的匹配文本:


  1. Ganglia’s lightweight protocol, which functions reliably as unidirectional UDP traffic, has proven itself to be ready for business at this level, too, as demonstrated by its presence as an embedded agent in the Lumicall app for Android. Monitoring with Ganglia


  2. Channel adapters and gateways are alike in that they’re both interfaces to external systems, but not alike in that channel adapters are unidirectional (fire-and-forget) while gateways support request/reply communications. Spring in Practice


  3. In the graph, however, it is implemented using a unidirectional relationship. Graph Databases


  4. A unidirectional relationship requires the owning side to specify the annotation. Java EE 7 Essentials


  5. In this case, you must break it into two or more runs of unidirectional text. Java in a Nutshell 5th Edition


  6. The master acts as the authoritative source of the data, and operates in a unidirectional relationship with the slave nodes, which must synchronize their copies. Cassandra The Definitive Guide


  7. Depending on the type of graph, the edges may be bidirectional or unidirectional and may have weights associated with them. Hadoop Beginners Guide


  8. By default, a network only operates in a unidirectional manner and logically pushes messages across its network connection, as shown in figure 10.4 ActiveMQ in Action


  9. But the listed constraints serve to eliminate large classes of safety and liveness problems while also satisfying common reusability and performance goals: unidirectional flow avoids deadlock, connectivity management avoids unwanted interleavings across different flows, transfer protocols avoid safety problems due to inadvertent sharing without the need for extensive dynamic synchronization, and interface conformance assures type safety while still permitting interoperability among components. Concurrent Programming in Java Design Principles and Pattern


  10. If only one entity has a pointer to the other, the relationship is said to be unidirectional. Pro JPA2



692、单词 jcr 的匹配文本:


  1. In it, we continue our exploration of NoSQL data stores, this time involving the Java Content Repository (JCR) and MongoDB/Spring Data MongoDB. Spring in Practice


  2. We’ll start by briefly describing the key features of Apache Jackrabbit and the Content Repository for Java technology (JCR) API (http://www.jcp.org/en/jsr/ detail?id=170) that it implements. Tika in Action



693、单词 joe 的匹配文本:


  1. Joe, you have a bright future Bob, you have a bright future Bob and Fred are keeping their fingers crossed Fred, you have a bright future Bob and Fred are happy campers. Programming Concurrency on the JVM


  2. Joe’s quote is the one that we find to be the most accurate description of scaling. CouchDB The Definitive Guide


  3. Tom and Joe work as software developers for Acme Enterprises, a startup company that offers a free online service for finding the best deals in your area. Gradle in Action


  4. It returns the documents that have the joe value in the name field and the 1981 value in the year field. Mastering ElasticSearch


  5. I am grateful to my company, Novetta Solutions, and I would especially like to thank Joe Pantella and the rest of the Novetta executive team for being supportive of me in writing this book. Professional Hadoop Solutions


  6. Joe Lennon is a web applications and database developer from Cork, Ireland. Beginning CouchDB


  7. Your goal is to find the shortest path between Dee and Joe. Hadoop in Practice


  8. That variable has a type Employee.class, a name "joe", and a value—the value of the object reference joe. Core Java Volume II Advanced Features 9th Edition


  9. The cluster administrator pointed out that he could perform an HDFS transfer with the command hadoop -put some_file.log /user/joe and with some luck, hit the issue. Hadoop Operations


  10. That is, when I buy a book from Amazon using its secure server, it has to prove to my browser’s satisfaction that it is indeed Amazon and not Joe Random Hacker. Java Network Programming 4th Edition



694、单词 cloneable 的匹配文本:


  1. For example, the Java programming language has an important interface built into it, called Cloneable. Core Java Volume I Fundamentals 9th Edition


  2. Instead of creating a new bootstrap for each of these channels, Netty has made the AbstractBootstrap cloneable. Netty in Action MEAP V08


  3. If a digest implementation does not override this method and does not implement the Cloneable interface, the getDigestLength( ) method will not operate correctly. Java Security 2nd Edition


  4. In this regard, it is similar to the Cloneable interface that we discussed in Volume I, Chapter 6 Core Java Volume II Advanced Features 9th Edition


  5. You cannot, without resorting to reflection (Item 53), invoke the clone method on an object merely because it implements Cloneable. Effective Java 2nd Edition


  6. Since arrays extend Object and implement the Cloneable and Serializable interfaces, any array type can be widened to any of these three types. Java in a Nutshell 5th Edition


  7. You can create new instances of classes that implement the Cloneable interface using the clone( ) method. Java Performance Tuning 2nd Edition


  8. Implement the Cloneable interface within the class that you want to clone; then call that object’s clone method to make a copy of it. Java 7 Recipes A Problem-Solution Approach



695、单词 vmstat 的匹配文本:


  1. Run the vmstat command to show the virtual memory statistics: HBase Administration Cookbook


  2. The output of vmstat confirmed what we saw in iostat and showed that the CPUs were basically idle except for some I/O wait during the spike of writes (ranging up to 9% wait) High Performance MySQL 3rd Edition


  3. Meanwhile, you can monitor what is happening on the server side using your favorite statistics generator (vmstat, iostat, uptime, ps, etc.), using nodeload to graph and persist the values. Testable JavaScript


  4. Solution Use the Linux tool vmstat to observe the CPU context switches. Hadoop in Practice


  5. The complete battery usually includes OS utilities such as top, vmstat, sar, iostat, and netstat, but also Hadoop-specific tools such as hadoop dfsadmin, and hadoop fsck. Hadoop Operations


  6. System performance measuring utilities (vmstat, iostat, sar, top on Unix; the task manager and performance monitor on Windows) Java Performance Tuning 2nd Edition


  7. Linux and Solaris have vmstat, which shows combined CPU utilization across all virtual processors. Java Performance


  8. You can monitor your operating system by yourself by using different operating system commands such as vmstat, dstat, and iostat. Apache Solr 4 Cookbook



696、单词 tdd 的匹配文本:


  1. There has been a big push for developers to embrace test-driven development (TDD) Scala in Depth


  2. Using TDD, you write tests that fail first, and then build the functionality needed to pass the tests. Jenkins Continuous Integration Cookbook


  3. Your first steps will be getting started with practices like test-driven development (TDD) and continuous integration for your Scala project. Scala in Action


  4. One of the most efficient ways to write high quality tests is to write them first, using techniques such as Test-Driven Development (TDD) or Behavior-Driven Development (BDD) Jenkins The Definitive Guide


  5. That’s why code testing is becoming an integral part of code development, and programmers are moving more and more toward testdriven development (TDD) Professional Hadoop Solutions


  6. These days, the goals of Design by Contract are largely met by Test-Driven Development (TDD) Programming Scala


  7. When it comes to writing Java code, I’m a big proponent of test-driven development (TDD),1 and with MapReduce things are no different. Hadoop in Practice


  8. Introduction Behavior-driven Development (BDD) is an agile software development practice that enhances the paradigm of Test Driven Development (TDD) and acceptance tests, and encourages the collaboration between developers, quality assurance, domain experts, and stakeholders. Selenium Testing Tools Cookbook


  9. For developers who use test-driven development (TDD), in which tests are written before code and the full unit test suite is executed after every development iteration (which can be as small as a change to a single method), any kind of interaction with the application server is a problem. Pro JPA2


  10. Take a test-driven design (TDD) approach to software development utilizing the Yii testing framework. Selenium 2 Testing Tools Beginner's Guide



697、单词 iterated 的匹配文本:


  1. Internal iteration— In contrast to collections, which are iterated explicitly using an iterator, stream operations do the iteration behind the scenes for you. Java 8 in Action Lambdas, Streams and Functional-style Programming


  2. The purpose of this sort is to group equivalent keys together so that their values can be iterated over easily in the reduce task. MapReduce Design Patterns


  3. This content is returned by HBase in the form of a navigable map, which can be iterated to get the values of the individual columns with their names. Professional Hadoop Solutions


  4. Since the views are themselves Collections, the views can be iterated. Data Structures and Algorithm Analysis in Java 3rd Edition


  5. Iterative process where all the unvisited nodes are iterated, and the distance from the start node is. Hadoop in Practice


  6. Now it becomes clear why we had to preserve all URLs in SelectorEntry records, because now we can extract them from the iterated values. Hadoop:The Definitive Guide 3rd Edition


  7. During the same time frame, we have iterated rapidly on the core software (HBase/HDFS) as well as the application logic running against HBase. Apache Hadoop Goes Realtime at Facebook


  8. In Java 5.0 and later, arrays can also be iterated with the for/in loop. Java in a Nutshell 5th Edition


  9. This technique works because the termination test iterated many times can have a higher cost than producing and catching an Exception once. Java Performance Tuning 2nd Edition


  10. In the second example, the length() method is used to find the number of characters in the String so that they can be iterated over using the charAt() method. Java 7 Recipes A Problem-Solution Approach



698、单词 fsimage 的匹配文本:


  1. Web encryption — To secure all communications using HTTP (Hadoop web user interfaces, MapReduce Shuffle, and FSImage operations), the Hadoop web server must be configured to use SSL, setting up the proper keystores. Professional Hadoop Solutions


  2. The fsimage file is a persistent checkpoint of the filesystem metadata. Hadoop:The Definitive Guide 3rd Edition


  3. At startup time, the HDFS NameNode reads filesystem metadata from a file called the fsimage file. Apache Hadoop Goes Realtime at Facebook


  4. The single most important piece of data in the cluster – fsimage The NameNode process stores two data structures to disk, the fsimage file and the edits log of changes to it. Hadoop Beginners Guide


  5. Managing Filesystem Metadata The namenode stores its filesystem metadata on local filesystem disks in a few different files, the two most important of which are fsimage and edits. Hadoop Operations



699、单词 committer 的匹配文本:


  1. The blog post http://bit.ly/flumePerfPt1 from Flume committer Mike Percy should give you some good starting points. Apache Flume Distributed Log Collection for Hadoop


  2. In addition to being a committer on the Apache HTTPD and APR projects, Brad is also a developer as well as one of the administrators of the Ganglia project. Monitoring with Ganglia


  3. As of Hadoop 0.19.0, this directory is a function of the OutputCommitter the job is using. Pro Hadoop


  4. If this is unacceptable, consider using a custom OutputCommitter to write temporary output to the file system. MapReduce Design Patterns


  5. Edward Capriolo is a member of the Apache Software Foundation and a committer for the Hadoop-Hive project. Cassandra High Performance Cookbook


  6. Srinath is also a committer of Apache open source projects Axis, Axis2, and Geronimo. Hadoop MapReduce Cookbook


  7. Tasks and jobs can fail, they can be restarted, and they can also be speculatively executed.45 To allow OutputFormats to correctly handle these scenarios, MapReduce has the notion of an OutputCommitter, which is a mechanism by which MapReduce invokes a callback when an individual task as well as the overall job have completed. Hadoop in Practice


  8. In short order, Tom earned the role of Hadoop committer and soon thereafter became a member of the Hadoop Project Management Committee. Hadoop:The Definitive Guide 3rd Edition


  9. This term was coined by Cassandra committer Eric Evans of Rackspace, but he has since distanced himself from the term in preference of the term “Big Data” to highlight the fact that this family of nonrelational databases is defined not by what they’re not (implementations of SQL), but rather by what they do (handle huge data loads) Cassandra The Definitive Guide


  10. Bruce Snyder is a co-founder of Apache Geronimo, a committer for ActiveMQ, Camel, and ServiceMix, and a member of various JCP expert groups. ActiveMQ in Action



700、单词 wsdl 的匹配文本:


  1. To explore the more formal SOAP-based web service API that’s available, access http://localhost:8080/RecommenderService.jws?wsdl to see the WSDL (Web Services Definition Language) file that defines the input and output of this web service. Mahout in Action


  2. Due to a bug in vSphere ESX 4.1 default wsdl. bk-compute-adminguide-grizzly


  3. The tool can read Web Service Definition Language (WSDL) files publicized by web services, using the information to generate the skeleton for functional tests. Jenkins Continuous Integration Cookbook


  4. A plug-in that creates WSDL files from an annotated Java web service implementation should not include its own code for scanning for annotations and generating content in a specialized XML vocabulary, but should instead declare a dependency on an existing library to do that work, and provide a mechanism for that library to be fetched from an online repository if it is not already present on the build system. Gradle Beyond The Basics


  5. Spring WS’s contract-first approach The contract-first approach used by Spring WS consists of first implementing web service contracts using the Web Services Description Language (WSDL) independent of the classes used to implement the services. Spring Dynamic Modules in Action


  6. The JAX-WS runtime publishes the web service and its capabilities using Web Services Description Language (WSDL) Java EE 7 Essentials


  7. These descriptions are formatted in a special language, called Interface Definition Language (IDL) for CORBA and Web Services Description Language (WSDL) for web services. Core Java Volume II Advanced Features 9th Edition


  8. As with all distributed computing, caching is especially important and should be applied to data and metadata such as WSDL (Web Services Description Language) files. Java Performance Tuning 2nd Edition


  9. It is a platform and programming language neutral system that exposes standardized interfaces accessible over a set of standard Internet communication protocols; typically described using Web Services Description Language (WSDL) Java Performance


  10. Unlike other XML-based remoting technologies (such as SOAP and XML-RPC), Burlap’s message structure is as simple as possible and doesn’t require an external definition language (such as WSDL or IDL) Spring in Action 4th Edition



701、单词 uncompressed 的匹配文本:


  1. Data stream If you do not want to output a SequenceFile because your data doesn't have a natural key, you can use a DataStream to output only the value, uncompressed. Apache Flume Distributed Log Collection for Hadoop


  2. The uncompressed archive file will contain the following files and folders: Hadoop Operations and Cluster Management Cookbook


  3. In uncompressed, nonreplicated form the datasets occupy about a petabyte of space. Dremel - Interactive Analysis of WebScale Datasets


  4. The uncompressed dataset is tens of terabytes, which is small compared to many NoSQL instances, but was large enough to cause difficulties with sharded MySQL. Spanner - Google’s Globally-Distributed Database


  5. This file format is shown, along with uncompressed SequenceFiles, in figure 3.9 Hadoop in Practice


  6. Consider an uncompressed file stored in HDFS whose size is 1 GB. Hadoop:The Definitive Guide 3rd Edition


  7. All the input files we’ve seen so far are uncompressed text files where each record is a line. Hadoop in Action


  8. What just happened? After downloading the latest stable Hive release, we copied it to the desired location and uncompressed the archive file. Hadoop Beginners Guide


  9. Interestingly, the memory usage of the uncompressed, basic data-structures is about the same as the memory usage of Dremel’s compressed format. PowerDrill - Processing a Trillion Cells per Mouse Click


  10. The search process is challenging because of the large amount of data: The raw documents comprise several tens of terabytes of uncompressed data, and the inverted index resulting from this raw data is itself many terabytes of data. Web search for a planet the google cluster architecture



702、单词 centos 的匹配文本:


  1. You'd be hard pressed to find such a company using the bleeding-edge Linux kernel rather than something like Red Hat Enterprise Linux (RHEL), CentOS, Ubuntu LTS, or any of the other distributions that aim for is stability and compatibility. Apache Flume Distributed Log Collection for Hadoop


  2. If you are using a Linux distribution other than CentOS, such as Debian, please refer to corresponding documentation. Hadoop Operations and Cluster Management Cookbook


  3. There are also excellent native packages for Mac OS X and most of the major Linux distributions, including Ubuntu, RedHat (including CentOS and Fedora) and OpenSolaris. Jenkins The Definitive Guide


  4. Binary installers are available for Ubuntu, Fedora, CentOS, FreeBSD, and Mac OS X systems through each system’s individual package manager. Beginning CouchDB


  5. There have been successful deployments on both Red Hat-based (Red Hat Enterprise Linux [RHEL], CentOS) and Debian-based (Ubuntu and so on) flavors of Linux. HBase in Action


  6. Let’s look at the instructions for installation on a RedHat-based Linux system (in this case you’ll use CentOS) Hadoop in Practice


  7. Here is a short list of operating systems that are commonly found as a basis for HBase clusters: CentOS. HBase:The Definitive Guide


  8. Coming back to installing Kafka, as a first step, we need to download the available stable/beta release (all the commands are tested on CentOS 5.5 OS and may differ on other kernel-based OS) Apache Kafka


  9. A significant number of production clusters run on RedHat Enterprise Linux or its freely available sister, CentOS. Hadoop Operations


  10. If you happen to be running Debian, Ubuntu, CentOS, or Fedora, you’ll always have access to the latest versions. MongoDB in Action



703、单词 telnet 的匹配文本:


  1. We'll use the nc command (you can use telnet or something similar) to send the String "Hello World" and click on  to mark the end of the event: Apache Flume Distributed Log Collection for Hadoop


  2. On top of IP, we have other common protocols, such as TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) (this chapter’s applications exploit these protocols), and on top of these we have even more, including HTTP, TELNET, DNS, and so on. Pro Java 7 NIO.2


  3. To test whether gmond is operational on a given host, telnet to gmond’s TCP port: Monitoring with Ganglia


  4. Telnet is a service that allows users to open a remote-terminal session to a specific machine. Java Network Programming and Distributed Computing


  5. Install telnet with the following command: sudo yum install telnet. Hadoop Operations and Cluster Management Cookbook


  6. The tsd process exposes a simple telnet-like protocol for receiving observations. HBase in Action


  7. Before writing our first network program, let’s discuss a great debugging tool for network programming that you already have —namely, telnet. Core Java Volume II Advanced Features 9th Edition


  8. In another window, we open a telnet connection to port 3000 on the local machine using the curl utility. Hadoop Beginners Guide


  9. For instance, FTP packets that seem to contain Telnet data can be rejected. Java Network Programming 4th Edition


  10. It’s even possible to communicate with the broker through the telnet session using STOMP, as we’ll see in a moment. ActiveMQ in Action



704、单词 eden 的匹配文本:


  1. Usually, objects are allocated in the Eden space of the young generation. HBase Administration Cookbook


  2. Eden space: It is the part of the heap memory where the JVM initially allocates most of the object types. Mastering ElasticSearch


  3. Older objects still have some reference, and have therefore survived a few garbage collections, so the Survivor Ratio is the ratio of eden space to survivor space in the young object part of the heap. Cassandra The Definitive Guide


  4. The "new" space (also called "Eden" or "the young generation") is the heap space where new objects are created. Java Performance Tuning 2nd Edition


  5. The eden is almost always empty after a minor garbage collection. Java Performance



705、单词 authenticating 的匹配文本:


  1. We can be sure that the user is who he says he is because he has been authenticated against one of the authenticating schemes in CouchDB. CouchDB The Definitive Guide


  2. It achieves this by authenticating on the underlying Remote Procedure Calls (RPC) Hadoop Operations and Cluster Management Cookbook


  3. As the central arbiter of the compute cluster, the JT was also responsible for admission control, tracking the liveness of TTs (to re-execute running tasks or tasks whose output becomes unavailable), launching tasks speculatively to route around slow nodes, reporting job status to users through a web server, recording audit logs and aggregate statistics, authenticating users and many other functions; each of these limited its scalability. Apache Hadoop YARN Yet Another Resource Negotiator


  4. Tasks of the job also use the Delegation token when authenticating to NameNode, and they utilize Block Access tokens to enable them to perform the necessary operations on the data block. Professional Hadoop Solutions


  5. The container may authenticate the user e application is started, or it may use lazy authentication, authenticating when a protected resource is accessed. Java EE 7 Specification


  6. We can get one by authenticating to the KDC, using kinit: Hadoop:The Definitive Guide 3rd Edition


  7. Providing Your Own Authentication You can provide your own method of authenticating to Cassandra if you want to make special requirements, such as a Kerberos ticket or encryption, or if you want to store passwords in a different location, such as an LDAP directory. Cassandra The Definitive Guide


  8. It never makes sense for a system to support authorization without first authenticating users; a person could simply lie about who they are to gain privileges they wouldn’t otherwise have. Hadoop Operations


  9. Earlier in this chapter, we described ActiveMQ plug-ins used to secure the broker by authenticating the clients and authorizing the access to destinations. ActiveMQ in Action


  10. Unless you have enabled a non-authenticating cipher suite,8 the server will authenticate itself to the client during the handshake. Fundamental Networking in Java



706、单词 gnu 的匹配文本:


  1. Debian GNU/Linux You can install the CouchDB package by running: CouchDB The Definitive Guide


  2. Generate GNU Privacy Guard (GPG) signatures for all artifacts you wish to publish (shown in figure 14.7 with the file extension .asc) Gradle in Action


  3. Note that you will need to have a GNU C/C++ compiler collection installed to compile the protocol buffer source. Hadoop RealWorld Solutions Cookbook


  4. Soon after IBM got involved, CouchDB’s license was changed to use the Apache License rather than the restrictive and cumbersome GNU General Public License (GPL) Beginning CouchDB


  5. Plotting the Hadoop results using GNU Plot Although Hadoop jobs can generate interesting analytics, making sense of those results and getting a detailed understanding about the data often require us to see the overall trends in the data. Hadoop MapReduce Cookbook


  6. The comparison order is defined by a specification that is like the one used for GNU sort. Hadoop:The Definitive Guide 3rd Edition


  7. For example, with the Gnu C compiler on Linux, use these commands: Core Java Volume II Advanced Features 9th Edition


  8. If you use a Windows system, you might use Notepad or WordPad, if you don’t have a more specialized programmer’s editor (versions of GNU Emacs, for example, are available for Windows) Java in a Nutshell 5th Edition


  9. First we’ll use GNU Wget (http://mng.bz/DMf6), a popular tool for retrieving files using HTTP, to subscribe to the desired destination: ActiveMQ in Action


  10. Solution 2 Analyze your program’s memory consumption by using VisualVM (an external GNU Open Source Java profiler and visualization tool).To use and install VisualVM, go to http://visualvm.java.net/, download and follow the steps for installation (usually uncompressing in the folder of your choice and then clicking the provided executable) Java 7 Recipes A Problem-Solution Approach



707、单词 tasktrackers 的匹配文本:


  1. There are two types of nodes that control the job execution process: a jobtracker and a number of tasktrackers. Hadoop:The Definitive Guide 3rd Edition


  2. The jobtracker accepts new jobs, breaks them into map and reduce tasks, and assigns those tasks to tasktrackers in the cluster. Cassandra The Definitive Guide


  3. Just like the relationship between datanodes and the namenode in HDFS, tasktrackers inform the jobtracker as to their current health and status by way of regular heartbeats. Hadoop Operations



708、单词 concatenated 的匹配文本:


  1. Each entity is mapped into a single Bigtable row; the primary key values are concatenated to form the Bigtable row key, and each remaining property occupies its own Bigtable column. Megastore - Providing Scalable, Highly Available Storage for Interactive Services


  2. The toString method is ubiquitous for an important reason: Whenever an object is concatenated with a string by the “+” operator, the Java compiler automatically invokes the toString method to obtain a string representation of the object. Core Java Volume I Fundamentals 9th Edition


  3. The following listing shows how to print out the full, concatenated path of all dependencies assigned to the configuration cargo. Gradle in Action


  4. The identifiers can either be concatenated by some unique delimiter, leading to the output of one key/value pair per group, or each input value can be written with the input key, known as the identity reducer. MapReduce Design Patterns


  5. Alias your concatenated field Like most Hive UDFs, you can alias the output of concat_ws() Hadoop RealWorld Solutions Cookbook


  6. In this technique it was assumed that you were working with a file format (such as image files) that couldn’t be concatenated together. Hadoop in Practice


  7. The part files contain the contents of a number of the original files concatenated together, and the indexes make it possible to look up the part file that an archived file is contained in, as well as its offset and length. Hadoop:The Definitive Guide 3rd Edition


  8. The row key, placed as the first field in the tuple, is the concatenated representation created during the initial copying of the data from the file into HBase. HBase:The Definitive Guide


  9. In our reduce() method, we have concatenated the list of values for each key in the order Hadoop has given them to us. Hadoop in Action


  10. This parser is executed on each node in parallel, parsing the concatenated documents file and writing the found URLs into a file on the local disk. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



709、单词 bootstrapping 的匹配文本:


  1. Because I was very busy bootstrapping Percona, Vadim’s and my consulting company, and because English is not my first language, we all had different roles. High Performance MySQL 3rd Edition


  2. Having discussed the core business logic implemented by the EchoServerHandler, all that remains is to examine the bootstrapping of the server itself. Netty in Action MEAP V08


  3. Bootstrapping your test environment in your build is very diverse, product-specific, and tailored to the requirements of your project. Gradle in Action


  4. When we discussed public and private key pairs, we talked about the bootstrapping issue involved with key distribution: the problem of obtaining the public key of a trusted certificate authority. Java Security 2nd Edition


  5. You can see an example of how to do that at http://projects.puppetlabs.com/projects/1/wiki/Bootstrapping_With_Puppet. Pro Puppet


  6. The HBase master is responsible for bootstrapping a virgin install, for assigning regions to registered regionservers, and for recovering regionserver failures. Hadoop:The Definitive Guide 3rd Edition


  7. A great advantage of XFS during bootstrapping a server is the fact that it formats the entire drive in virtually no time. HBase:The Definitive Guide


  8. The client uses the bootstrapping API from the javax.ejb package to start the container and identify the set of enterprise bean components for execution. Java EE 7 Essentials


  9. Bootstrapping The "brain" of the JRockit JVM is the runtime system itself. Oracle JRockit The Definitive Guide


  10. Again, the second node sleeps for 30 seconds and then starts bootstrapping. Cassandra The Definitive Guide



710、单词 aggregations 的匹配文本:


  1. Many Dremel queries are one-pass aggregations; therefore, we focus on explaining those and use them for experiments in the next section. Dremel - Interactive Analysis of WebScale Datasets


  2. The Shuffle and Reduce phases support cross-element computations, such as aggregations and grouping. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  3. The set of aggregations is limited but the query phase can involve more general computations, which we express in a new interpreted, procedural programming language called Sawzall.1 (An interpreted language is fast enough: most of the programs are small and on large data sets the calculation tends to be I/O bound, as is discussed in the section on performance.) Interpreting the Data Parallel Analysis with Sawzall


  4. Data aggregations based on user demographics (such as differences in user habits between teenagers and users in their 30s) Hadoop in Practice


  5. The aggregations that we get back are a bit more complicated, but still fairly. Elasticsearch The Definitive Guide


  6. To support the existing insights functionality, time and demographic-based aggregations would be necessary. Apache Hadoop Goes Realtime at Facebook


  7. The majority of queries in our workload are analytic queries that have aggregations and/or joins. Tenzing - A SQL Implementation On The MapReduce Framework


  8. If you are working primarily on large aggregations where you care mostly about trends, individual records likely don't matter. Hadoop Beginners Guide


  9. For this to work, we need to execute the aggregations on multiple levels. PowerDrill - Processing a Trillion Cells per Mouse Click


  10. Furthermore, data analysis workloads tend to consist of many large scan operations, multidimensional aggregations, and star schema joins, all of which are fairly easy to parallelize across nodes in a shared-nothing network. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



711、单词 journaling 的匹配文本:


  1. Such a large difference in performance is attributed to get block locations (read workload) being a memory-only operation, while creates (write workload) require journaling, which is bounded by the local hard drive performance. HDFS scalability the limits to growth


  2. However, in some cases it can improve performance because the journaling lets the filesystem delay the writes to the data’s final location. High Performance MySQL 3rd Edition


  3. Thus, they must be set up first and the data they hold is extremely important: make sure that they are running with journaling enabled and that their data is stored on non-ephemeral drives. MongoDB The Definitive Guide 2nd Edition


  4. Synchronous writes or journaling provide the desired safety, but only with a heavy latency and performance penalty. Ceph A Scalable, High-Performance Distributed File System


  5. We turn off logging or journaling, which frequently is not a desirable (or, depending on your situation, legal) option. Cassandra The Definitive Guide


  6. The most notable feature of ext3 is support for journaling, which records changes in a journal or log prior to modifying the actual data structures that make up the filesystem. Hadoop Operations


  7. If this potentially locks parts of the application for too long, an alternative, such as journaling, might be specified. Java Performance Tuning 2nd Edition


  8. Creating Snapshots with a Journaling Filesystem Many modern volume managers have the ability to create snapshots of the state of the drive at any particular point-in-time. The Definitive Guide to MongoDB


  9. In MongoDB’s case, users control the speed and durability trade-off by choosing write semantics and deciding whether to enable journaling. MongoDB in Action



712、单词 john 的匹配文本:


  1. The template library we’re using in the example blog is by John Resig and was chosen for simplicity. CouchDB The Definitive Guide


  2. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book. Professional Hadoop Solutions


  3. Now let’s update this document with John Smith’s actual contact details. Beginning CouchDB


  4. A diffi  cult topic lucidly explained.”—John Griffi  n, coauthor of Hibernate Search in Action. HBase in Action


  5. And the response will be John Smith’s original JSON document: Elasticsearch The Definitive Guide


  6. John Drum is a bicoastal software engineer with over 20 years of experience in industries ranging from e-commerce to financial services. Getting Started with Google Guava


  7. It has been said, though it is hard to verify, that the 17th-century English poet John Milton had actually read every published book on the face of the earth. Cassandra The Definitive Guide


  8. About the Author John Russell is a software developer and technical writer, and he’s currently the documentation lead for the Cloudera Impala project. Cloudera Impala


  9. John was also instrumental in driving through some of the newer features in Hive like StorageHandlers and Indexing Support. Programming Hive


  10. John O'Conner is a husband, father, and sleep-deprived technology enthusiast. Java 7 Recipes A Problem-Solution Approach



713、单词 spittr 的匹配文本:


  1. Before we dive into the details of listing 5.1, you may wonder what the word spittr has to do with anything. Spring in Action 4th Edition



714、单词 distcp 的匹配文本:


  1. A full shutdown backup has to stop HBase (or disable all tables) at first, then use Hadoop's distcp command to copy the contents of an HBase directory to either another directory on the same HDFS, or to a different HDFS. HBase Administration Cookbook


  2. For writes we consider a different distcp-like job load, which produces a lot of writes. HDFS scalability the limits to growth


  3. Distcp This runs a distributed copy job (as a MapReduce job) Professional Hadoop Solutions


  4. Hadoop Distributed Copy (distcp) is a tool for efficiently copying large amounts of data within or in between clusters. Hadoop RealWorld Solutions Cookbook


  5. But copying over this directory (using distcp) doesn’t make for a great backup solution, especially in a running system. HBase in Action


  6. Parallel Copying with distcp The HDFS access patterns that we have seen so far focus on single-threaded access. Hadoop:The Definitive Guide 3rd Edition


  7. You can now, for example, use the hadoop distcp command to move the directory from one cluster to another, and perform the import there. HBase:The Definitive Guide


  8. The first is the distributed copy tool, or distcp for short, which copies HDFS data in parallel either to another location within the same cluster, or between clusters. Hadoop Operations


  9. For example, a user may want to have a process in which step one is a custom MapReduce job, step two uses the output of step one and processes it using Hive, and finally step three uses distcp to copy the output from step 2 to a remote cluster. Programming Hive


  10. The distcp utility is used for copying large amounts of files within a single Hadoop cluster or between Hadoop clusters, and leverages Hadoop itself to execute the copy in a distributed manner. Spring Data Modern Data Access for Enterprise Java



715、单词 ddl 的匹配文本:


  1. The group for managing tables is called Data Definition Language (DDL) HBase Administration Cookbook


  2. A new Apache project (HCatalog) extends the reach of Hive’s metastore while preserving components from the Hive DDL for table definition. Professional Hadoop Solutions


  3. Note that the onus of ensuring that the bucket files are properly created and named are a responsibility of the application and HiveQL DDL statements do not currently try to bucket the data in a way that it becomes compatible to the table properties. Hive A Petabyte Scale Data Warehouse Using Hadoop


  4. Protocol buffers are described by a data description language (DDL) that defines the content of the messages. Interpreting the Data Parallel Analysis with Sawzall


  5. MasterObserver—For hooking into DDL events, such as table creation or schema modifications, HBase provides the MasterObserver. HBase in Action


  6. MasterObserver This can be used to react to administrative or DDL-type operations. HBase:The Definitive Guide


  7. Returns the number of rows affected, or 0 for DDL statements such as CREATE TABLE. Core Java Volume II Advanced Features 9th Edition


  8. Starting with version 0.7 of Cassandra, you can use API operations to make changes to your schemas, much like you would in SQL by issuing Data Definition Language (DDL) statements, such as CREATE TABLE or ALTER TABLE. Cassandra The Definitive Guide


  9. When you come to Impala from a background with a traditional relational database product, you find the same familiar SQL query language and DDL statements. Cloudera Impala


  10. In any case, a side benefit of using a file to store Hive queries for initialization is that you can track the changes to your DDL via version control. Programming Hive



716、单词 dtd 的匹配文本:


  1. Executing the last Maven command is a fantastic first step for creating our example because it creates a simple, functional Struts 2 web application with the components we need to create our test, including Spring integration (although it uses an old DTD version of the configuration XML file) Pro Spring Security


  2. The appropriate or DTD is chosen by analyzing the deployment descriptor to determine ersion it claims to conform to. Java EE 7 Specification


  3. The DTD bean and property mechanism can’t hide complex bean creation, which is a shortcoming in configuring advanced features like aspect-oriented programming (AOP) and security. Spring Batch in Action


  4. In this code, an XML prologue is followed by a document type declaration (DTD) Java EE 7 Essentials


  5. The header can be followed by a document type definition (DTD), such as Click here to view code imageClick here to view code image. Core Java Volume II Advanced Features 9th Edition


  6. It searches for attributes whose XML type (as declared in the document’s DTD) is ID. Java in a Nutshell 5th Edition


  7. Processing and validating against a DTD is normally cheaper than processing and validating against a W3C Schema. Java Performance


  8. XmlQueryParser parses such XML and produces a Query object for you, and the sandbox includes a full DTD to formally specify the out-of-the-box tags, as well as full HTML documentation, including examples, for all tags. Lucene in Action 2nd Edition



717、单词 javax 的匹配文本:


  1. All standard Java packages are inside the java and javax package hierarchies. Core Java Volume I Fundamentals 9th Edition


  2. Note that the URLName is a new class introduced as part of the javax.mail class, and differs only from a URL object in that it does not support methods to open a connection to the resource. Java Network Programming and Distributed Computing


  3. For the purposes of this Agreement:  "Independent Implementation" shall mean an tation of the Specification that neither derives from any of Specification Lead's  source code or de materials nor, except with an appropriate and separate license from Specification Lead, ny of Specification Lead's  source code or binary code materials; "Licensor Name Space" shall public class or interface declarations whose names begin with "java", "javax", "com.sun" and le”  or their equivalents in any subsequent naming convention adopted by Oracle America, Inc. Java EE 7 Specification


  4. Standard javax.json.* APIs are used to generate the JSON representation from a string: Java EE 7 Essentials


  5. The DataSource interface is defined in the javax.sql standard extension package. Core Java Volume II Advanced Features 9th Edition


  6. The standard libraries and optional packages, whose names begin with java and javax, are exceptions to this rule. Effective Java 2nd Edition


  7. Using the ExtendedSSLSession interface The javax.net.ssl package provides a series of classes used to effect secure socket communication. Java 7 New Features Cookbook


  8. The documentation of the javax.crypto package and its subpackages was also reviewed by Jon Eaves. Java in a Nutshell 5th Edition


  9. This technique is used extensively in the java.awt and javax.swing packages, which define interfaces and abstract classes associated with different kinds of event-handling methods. Concurrent Programming in Java Design Principles and Pattern


  10. They are represented in the javax.mail API by the MimeMessage class. Java 7 Recipes A Problem-Solution Approach



718、单词 libvirt 的匹配文本:


  1. Hypervisor Metrics The standard set of sFlow hypervisor and virtual machine metrics (Table 8-2) are based on metrics defined by the open source libvirt project. Monitoring with Ganglia


  2. The nova-compute process is primarily a worker daemon that creates and terminates virtual machine instances via hypervisor's APIs (XenAPI for XenServer/XCP, libvirt for KVM or QEMU, VMwareAPI for VMware, etc.) bk-compute-adminguide-grizzly


  3. An example of this would be nova-compute accepting a message from the queue to create a new instance and then using the libvirt library to start a new KVM instance. Deploying OpenStack


  4. Flavor customization can be limited by the hypervisor in use, for example the libvirt driver enables quotas on CPUs available to a VM, disk tuning, bandwidth I/O, and instance VIF traffic control. bk-admin-guide-cloud-latest


  5. Data can be collected by notifications sent by existing OpenStack components (for example, usage events emitted from Compute) or by polling the infrastructure (for example, libvirt) admin-user-guide-trunk


  6. The valid model values depend on the libvirt_type setting, as shown in the following tables: user-guide


  7. Compute nodes are where the computing resources are held, and in our example architecture they run the hypervisor (KVM), libvirt (the driver for the hypervisor, which enables live migration node to node), nova-compute, nova-api-metadata (generally only used when running in multi-host mode, it retrieves instance-specific metadata), nova-vncproxy, and nova-network. OpenStack Operations Guide



719、单词 memtable 的匹配文本:


  1. When a write is received by Cassandra, the data is first recorded in a commit log, then written to an in-memory structure known as memtable. NoSQL Distilled


  2. Using a dedicated Commit Log disk Write operations are done sequentially to a commit log on disk and modify a sorted structure in memory called a Memtable. Cassandra High Performance Cookbook


  3. For example, a merging compaction also includes a memtable flush. HBase:The Definitive Guide


  4. A write will not count as successful until it’s written to the commit log, to ensure that if a write operation does not make it to the in-memory store (the memtable, discussed in a moment), it will still be possible to recover the data. Cassandra The Definitive Guide


  5. Of these updates, the recently committed ones are stored in memory in a sorted buffer called a memtable; the older updates are stored in a sequence of SSTables. Bigtable - A Distributed Storage System for Structured Data



720、单词 instantiates 的匹配文本:


  1. This method also instantiates a local instance of the key and value classes, Pro Hadoop


  2. The TaskTracker loads the token in memory and instantiates tasks, which should be run as the user that initiated the MapReduce process (you will need to configure that) Professional Hadoop Solutions


  3. The class SecurityScanMain reads the required arguments to connect to Accumulo and instantiates a BatchWriter instance to write out test data to the acled table. Hadoop RealWorld Solutions Cookbook


  4. The nested var element actually instantiates the variable, using the variable name defined in the name attribute. Scaling CouchDB


  5. This is particularly useful because it handles importing the necessary libraries and instantiates all the classes you’ll need. HBase in Action


  6. This method instantiates a new ZooKeeper object, which is the central class of the client API and the one that maintains the connection between the client and the ZooKeeper service. Hadoop:The Definitive Guide 3rd Edition


  7. Also note that a bigger buffer takes more memory—on both the client and server side since the server instantiates the passed write buffer to process it. HBase:The Definitive Guide


  8. The driver instantiates, configures, and passes a JobConf   object named job to JobClient. Hadoop in Action


  9. The second daemon, the tasktracker, accepts task assignments from the jobtracker, instantiates the user code, executes those tasks locally, and reports progress back to the jobtracker periodically. Hadoop Operations


  10. As you can see, listing 7.2 instantiates the BrokerService and configures the brokerName and dataDirectory properties. ActiveMQ in Action



721、单词 webapp 的匹配文本:


  1. This approach requires you to install patched versions of whisper and the Graphite webapp on your gweb server. Monitoring with Ganglia


  2. The default convention for web application sources is the directory src/main/webapp. Gradle in Action


  3. The generated .war file is pointed to by the webapp tag, and Jetty runs the application. Jenkins Continuous Integration Cookbook


  4. We set the root of the WAR file contents to the directory src/main/webapp. Gradle Effective Implementation Guide


  5. If you are running Jenkins in a Java EE container such as Tomcat or JBoss, you can configure the webapp to expose its own environments variables. Jenkins The Definitive Guide


  6. These enterprise beans are referenced by se beans in ejb3.jar and by the servlets packaged in webapp.war. Java EE 7 Specification


  7. Finally, there are service accounts, e.g., the apache and mysql users and groups required by multiple Puppet classes, such as the apache, mysql, and webapp classes. Pro Puppet


  8. These are available in the example source code and are named jms-webapp-local and jms-webapp-global. ActiveMQ in Action


  9. The following command shows how to get a few interesting request processing statistics for a servlet in the Web application named TestWebapp. Java Performance


  10. When you cannot use Luke, because the index is on a remote server and not accessible to your local computer, LIMO is a good fallback since it runs as a webapp on the server. Lucene in Action 2nd Edition



722、单词 invoker 的匹配文本:


  1. When it returns, its int return value is pushed onto the operand stack of the frame of the invoker, the add12and13 method. The Java Virtual Machine Specification Java SE 7 Edition


  2. In addition to these remoting protocols, Spring also provides its own HTTP-based invoker that is based on standard Java serialization. Pro Spring 3


  3. With the properties file in place, a simple JobInvoker class such as the one shown in Listing 11-17 can start the required cluster and optionally wait for its completion. Professional Hadoop Solutions


  4. If this were not considered an error, an invoker of the method move on a reference of type Point could find the contract between it and Point broken if this exception were thrown. The Java Language Specification Java SE 7 Edition


  5. In addition to the Command interface and its implementations, there’s a client, which is responsible for creating the Command; an invoker, which is responsible for running it; and a receiver, on which the Command performs its action. Functional Programming Patterns in Scala and Clojure


  6. The InvokeForString invoker is used because the return type of the method is a String. Hadoop:The Definitive Guide 3rd Edition


  7. If an incoming request needs to be serviced by multiple threads but the invoker needs to remain unaware of the messaging system, an inbound gateway provides the solution. Spring Integration in Action


  8. Starting in version 0.8, Pig offers invoker methods that allow you to treat certain static Java functions as if they were Pig UDFs. Programming Pig


  9. Stack trace shows from the most specific place where the exception happened (the line where the exception occurred) to the top-level invoker of the offending code (and everything in-between) Java 7 Recipes A Problem-Solution Approach


  10. Let’s look at Spring’s HTTP invoker, which offers RPC over HTTP (like Hessian/Burlap) while at the same time using Java serialization of objects (like RMI) Spring in Action 4th Edition



723、单词 xmx 的匹配文本:


  1. Remember if you increase this value you may also have to increase your Java heap space using the -Xmx and optionally the -Xms parameters. Apache Flume Distributed Log Collection for Hadoop


  2. In addition, there may be a danger here of running out of memory if your byte buffer grows too large, so you must be mindful of memory consumption (perhaps adjust Java heap parameters such as Xms and Xmx) Pro Java 7 NIO.2


  3. Xmx This selects the maximum size that Java will allow the heap to grow to. Mahout in Action


  4. A Java process will never use more heap memory than we've specified with the Xmx parameter (or the ES_MAX_MEM property) Mastering ElasticSearch


  5. Heap memory controlled with the Xmx JVM option should only be a portion of your total system memory. Cassandra High Performance Cookbook


  6. For example, the option for setting the maximum heap size, -Xmx, is the same on most JVMs, JRockit included. Oracle JRockit The Definitive Guide


  7. Try setting the -Xmx and -Xms options to the same value to keep Java from having to manage heap growth. Cassandra The Definitive Guide


  8. This method simply gives the -Xmx value, and is of no use to monitor heap usage. Java Performance Tuning 2nd Edition


  9. Note, -XX:MaxHeapSize is the same as the command line option -Xmx. Java Performance


  10. The option -Xms size sets the starting size of the heap and the option -Xmx size sets the maximum allowed size of the heap. Lucene in Action 2nd Edition



724、单词 kanban 的匹配文本:


  1. Shantonu Sarker is a proactive software test engineer with seven years of experience in test automation, development (C# and Java), and project management with Agile (Scrum and Kanban) Performance Testing With JMeter 2.9


  2. But the application you set out to build in chapter 6 won’t be complete by chapter’s end because to build a functional Kanban application, your application needs to store information such as stories and its status information into persistent storage. Scala in Action


  3. This approach is comparable to the philosophy of continual improvement promoted by lean processes such as Kanban. Jenkins The Definitive Guide



725、单词 denormalized 的匹配文本:


  1. Our schema language lets applications control the placement of hierarchical data, storing data that is accessed together in nearby rows or denormalized into the same row. Megastore - Providing Scalable, Highly Available Storage for Interactive Services


  2. Therefore, creating the denormalized records for MapReduce has to be done in a batch fashion periodically. MapReduce Design Patterns


  3. As a result, most HBase-based implementations are using highly denormalized data. Professional Hadoop Solutions


  4. It primarily retrieves events by looking up all logs containing a keyword from a range of time.To make this efficient, the event timeline is denormalized to produce one timeline per keyword. Cassandra High Performance Cookbook


  5. Any form of slave replication or external caching introduces weak consistency into your now denormalized data. Hadoop:The Definitive Guide 3rd Edition


  6. The denormalized requirement would further increase the number of writes to the system as each message could be written several times. Apache Hadoop Goes Realtime at Facebook


  7. If you have designed a data model and find that you need something like a join, you’ll have to either do the work on the client side, or create a denormalized second column family that represents the join results for you. Cassandra The Definitive Guide


  8. That is why data warehouses (and also Impala) are more tolerant of denormalized data, with values that are duplicated and possibly stored in raw string form rather than condensed to numeric IDs. Cloudera Impala


  9. Obviously, in denormalized datasets with often several thousands of columns this can make a huge difference compared to the the row-wise storage used by most database systems. PowerDrill - Processing a Trillion Cells per Mouse Click


  10. Joins should be avoided in favor of denormalized data, when feasible. Programming Hive



726、单词 newline 的匹配文本:


  1. Usually, text files on a computer make assumptions like a newline character terminates each record. Apache Flume Distributed Log Collection for Hadoop


  2. If you add another query parameter, heartbeat=N, where N is a number, CouchDB will send you a newline character each N milliseconds. CouchDB The Definitive Guide


  3. These could have non-printable characters inside them such as a tab or newline that would affect the CLI output. Cassandra High Performance Cookbook


  4. We explicitly tell the SerDe that a tab character separates each field and a newline character separates each record. Hadoop RealWorld Solutions Cookbook


  5. Note that we had to split this command across two lines, so you use the “\” character to escape the newline. Hadoop in Practice


  6. The value is the contents of the line, excluding any line terminators (e.g., newline or carriage return), and is packaged as a Text object. Hadoop:The Definitive Guide 3rd Edition


  7. This format is like a stream of valid one-line JSON documents joined together by newline"\n" characters. Elasticsearch The Definitive Guide


  8. The newline character (\n) can trivially be thought of as the sync marker pointing out to both splittable boundaries and record boundaries. Hadoop in Action


  9. Redis Redis is not a “plain” key-value store, as it supports a variety of values in different data structures such as binary-safe strings (strings that don’t contain a space or newline character), lists and sets of binary-safe strings, and sorted sets, which contain a floatingnumber score. Cassandra The Definitive Guide


  10. The format of the file specified by dfs.hosts is a newline separated list of hostnames or IP addresses, depending on how machines identify themselves to the cluster. Hadoop Operations



727、单词 sparc 的匹配文本:


  1. The storage format is platformneutral, meaning you can copy the data and index files from an Intel-based server to a PowerPC or Sun SPARC without any trouble. High Performance MySQL 3rd Edition


  2. On SPARC systems running Solaris, the maximum size of a process is 4 GB, leaving us. Java Threads 3rd Edition


  3. We can't readily move the program, optimizations and all, to SPARC. Oracle JRockit The Definitive Guide


  4. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. Java Performance


  5. This usually isn’t difficult to comply with, but users running SPARC, PowerPC, PA-RISC, and other big-endian architectures will have to hold off.1 Most of the drivers support both little- and bigendian byte orderings, so clients of MongoDB can usually run on either architecture. MongoDB in Action



728、单词 parameterization 的匹配文本:


  1. To understand and benefit from Scala collections, you need to know two concepts: type parameterization and higher-order functions. Scala in Action


  2. It gives you a new concise way to express behavior parameterization. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. We will take a closer look at the parameterization of each method and ways to run it. Sonar Code Quality Testing Essentials


  4. But this form demonstrates that while the type parameterization portion (the type names in square brackets) forms part of the type of the instance, the value parameterization part (the values in parentheses) does not. Programming in Scala 2nd Edition


  5. Oozie uses the JSP expression language to perform parameterization, as you’ll see in the following code. Hadoop in Practice


  6. We can create data-driven Selenium WebDriver tests using the JUnit 4 parameterization feature. Selenium Testing Tools Cookbook


  7. If you choose to implement your own matchers, you should expect to invest some of your time in fine-tuning parameterization. Spring Integration in Action


  8. Because generics are implemented by erasure (Item 25), you can use a single object for all required type parameterizations, but you need to write a static factory method to repeatedly dole out the object for each requested type parameterization. Effective Java 2nd Edition


  9. The same is not generally true for generic methods: the compiler can almost always figure out the correct parameterization of a generic method based on the arguments you pass to the method. Java in a Nutshell 5th Edition


  10. The first point to take into consideration is that the type of data used for the parameterization of the Future interface in the declaration of the list that stores the result objects must be compatible with the one used to parameterized the Callable objects. Java 7 Concurrency Cookbook



729、单词 grep 的匹配文本:


  1. In the namenode_status() function, we use the jps command to show all running Java processes owned by the hadoop user, and the grep name of the NameNode daemon to see whether it has started: HBase Administration Cookbook


  2. Here are some common netcat/grep commands against gmetad port 8651 Monitoring with Ganglia


  3. Distributed Grep: The map function emits a line if it matches a supplied pattern. MapReduce - Simplied Data Processing on Large Clusters


  4. Distributed grep Grep, a very powerful tool that uses regular expressions for finding lines of text of interest, is easily parallelized by applying a regular expression match against each line of input and only outputting lines that match. MapReduce Design Patterns


  5. Od and strings can be combined with other command-line tools such as pipelines or grep. Cassandra High Performance Cookbook


  6. Verify the installation by listing the processes through the ps | grep java command (if you are using Linux) or via Task Manager (if you are in Windows), in the master node and slave nodes. Hadoop MapReduce Cookbook


  7. Google, in its MapReduce paper, indicated that it used its version of MapReduce to create its web index from crawl data.10 Google also highlights applications of MapReduce to include activities such as a distributed grep, URL access frequency (from log data), and a term-vector algorithm, which determines popular keywords for a host. Hadoop in Practice


  8. Also use a different string to grep; we use a portion of the IP address we know isn't shared with any other host in the cluster. Hadoop Beginners Guide


  9. The text file format is convenient for sharing data with other tools, such as Pig, Unix text tools like grep, sed, and awk, etc. Programming Hive


  10. We report load times for two data sets, Grep and UserVisits in. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



730、单词 petabytes 的匹配文本:


  1. If the spikes are in your network graphs and are in the range of petabytes/sec, consider rebuilding Ganglia using the following flag: Monitoring with Ganglia


  2. Basic arithmetic shows us that by applying the same process to create a cluster with three layers of proxies, we can manage 262 petabytes on thousands of machines. CouchDB The Definitive Guide


  3. The system scales to thousands of CPUs and petabytes of data, and has thousands of users at Google. Dremel - Interactive Analysis of WebScale Datasets


  4. Our system is in active use by many developers, and has processed petabytes of data. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  5. The primary goals of the architecture are scalability (to hundreds of petabytes and beyond), performance, and reliability. Ceph A Scalable, High-Performance Distributed File System


  6. A note from the trenches: "You know you have a large storage system when you get paged at 1 AM because you only have a few petabytes of storage left." Storage Architecture and Challenges


  7. As systems grow to petabytes and beyond, however, it becomes increasingly doubtful that a global snapshot schedule or policy will be appropriate for all data. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.


  8. Thanks to MapReduce, Tenzing scales to thousands of cores and petabytes of data on cheap, unreliable hardware. Tenzing - A SQL Implementation On The MapReduce Framework


  9. Bigtable is designed to reliably scale to petabytes of data and thousands of machines. Bigtable - A Distributed Storage System for Structured Data


  10. Databases do not meet the storage or throughput requirements of these tasks: Google’s indexing system stores tens of petabytes of data and processes billions of updates per day on thousands of machines. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



731、单词 gweb 的匹配文本:


  1. As depicted in Figure 1-1, Ganglia is architecturally composed of three daemons: gmond, gmetad, and gweb. Monitoring with Ganglia



732、单词 opcode 的匹配文本:


  1. Chapter 6 specifies the instruction set of the Java Virtual Machine, presenting the instructions in alphabetical order of opcode mnemonics. The Java Virtual Machine Specification Java SE 7 Edition


  2. An Opcode tells Memcached which operations you wish to perform. Netty in Action MEAP V08


  3. Operations are always encoded with one byte for the opcode, followed by an optional number of operands of variable length. Oracle JRockit The Definitive Guide


  4. An opcode is an enumerated type whose elements represent operations on some machine, such as the Operation type in Item 30, which represents the functions on a simple calculator. Effective Java 2nd Edition


  5. The Opcode enumerated type defines an abstract method perform(), which is then implemented by the class body of each value of the type. Java in a Nutshell 5th Edition


  6. Returning to the oplog entry, the second field, op, specifies the opcode. MongoDB in Action



733、单词 encodes 的匹配文本:


  1. This is rather clever, because you can immediately tell whether a code unit encodes a single character or it is the first or second part of a supplementary character. Core Java Volume I Fundamentals 9th Edition


  2. The setToRaw method, in Listing 9-4, is used to create and store a value in a key object that correctly encodes either a search request or a search space. Pro Hadoop


  3. Data compression in Hadoop is done by a compression codec, which is a program that encodes and decodes data streams. Hadoop Operations and Cluster Management Cookbook


  4. After building a model of its requirements, the AM encodes its preferences and constraints in a heartbeat message to. Apache Hadoop YARN Yet Another Resource Negotiator


  5. Note that you don’t need to supply schema information, because Avro encodes that in. Hadoop in Practice


  6. ByteBuffer encode(String str) encodes the given string into a sequence of bytes. Core Java Volume II Advanced Features 9th Edition


  7. First of all, the citation data encodes a graph   in the same vein that web links and social networks   are also graphs. Hadoop in Action


  8. Protocol independence Thrift encodes and decodes the data types for use across protocols. Cassandra The Definitive Guide


  9. Hive uses an input format to split input streams into records, an output format to format records into output streams (i.e., the output of queries), and a SerDe to parse records into columns, when reading, and encodes columns into records, when writing. Programming Hive


  10. The other dependency is an API that encodes arbitrary strings first with the Metaphone algorithm, then the Base64 format. Building and Testing with Gradle



734、单词 specifier 的匹配文本:


  1. The conversion character that ends a format specifier indicates the type of the value to be formatted: f is a floating-point number, s a string, and d a decimal integer. Core Java Volume I Fundamentals 9th Edition


  2. To resolve an unresolved symbolic reference to a call site specifier involves three steps: The Java Virtual Machine Specification Java SE 7 Edition


  3. Each access specifier only controls the access for that particular definition. Thinking in Java 4th Edition


  4. Both "title" and "content" are still returned, even though they weren’t explicitly included in the key specifier. MongoDB The Definitive Guide 2nd Edition


  5. When a FlatSpec is executed, it will run each specifier clause as a ScalaTest test. Programming in Scala 2nd Edition


  6. Here is an example of where a type declaration specifier is distinct from a type name: The Java Language Specification Java SE 7 Edition


  7. Otherwise, the visibility of class members is the same as private without a scope specifier. Programming Scala


  8. The %d format specifier is for formatting integers in decimal format: Java in a Nutshell 5th Edition


  9. Thus, all calls to remove take an optional query specifier for selecting exactly which documents to delete. MongoDB in Action


  10. A data field consists of a length specifier sequence followed by the actual data value. Understanding MySQL Internals



735、单词 outputting 的匹配文本:


  1. For example, what if you wanted to support accessing recipe information by using the ingredients from the recipe? The emit() function we used in the original view can be called multiple times within your map function, each time outputting a row. Getting Started with CouchDB


  2. A debug_level greater than zero will result in gmond running in the foreground and outputting debugging information. Monitoring with Ganglia


  3. Popular uses of show functions are for outputting HTML page, CSV files, or XML needed for compatibility with a particular interface. CouchDB The Definitive Guide


  4. For instance, outputting HI THERE to a numeric field will insert NULL for the field value for that row. Hadoop RealWorld Solutions Cookbook


  5. You are not restricted to just outputting the values in the object; you can also manipulate them and perform calculations on them where relevant. Beginning CouchDB


  6. We used the text outputting invert indexing MapReduce program in step 6 for the clarity of understanding the algorithm. Hadoop MapReduce Cookbook


  7. Your MapReduce job is outputting a different Avro object (StockAvg) from the job input. Hadoop in Practice


  8. You can at least check if the mapper is outputting the proper data and if the proper data is being sent to the reducer. Hadoop in Action


  9. There are similar classes for outputting data to Cassandra in the Hadoop package, but at the time of this writing, those classes are still being finalized. Cassandra The Definitive Guide


  10. The reduce function then operates on the intermediate key-value pairs, processing all values that have the same key together and outputting the result. Hadoop Operations



736、单词 ufo 的匹配文本:


  1. Getting the UFO sighting dataset We will use a public domain dataset of over 60,000 UFO sightings. Hadoop Beginners Guide


  2. Gluster UFO uses a customizes version of Swift that uses Gluster as the back-end. OpenStack Operations Guide



737、单词 initializers 的匹配文本:


  1. All field initializers and initialization blocks are executed, in the order in which they occur in the class declaration. Core Java Volume I Fundamentals 9th Edition


  2. As Dog.class is loaded (creating a Class object, which you’ll learn about later), all of its static initializers are run. Thinking in Java 4th Edition


  3. In this version of Rational, we added a private field, g, and modified the initializers for numer and denom. Programming in Scala 2nd Edition


  4. Declaration order is significant only for local variables, local classes, and the order of initializers of fields in a class or interface. The Java Language Specification Java SE 7 Edition


  5. For example, invocations might come from background threads or static initializers. Effective Java 2nd Edition


  6. Variable names and optional initializers are separated from each other with commas: Java in a Nutshell 5th Edition


  7. These are also the actual names for constructors and static initializers in the class file.) FloatingDecimal is private to the java.lang package, which handles most of the logic involved in converting floating-point numbers. Java Performance Tuning 2nd Edition


  8. Next, class initialization runs the class static initializers, and initializers for static fields. Java Performance



738、单词 geronimo 的匹配文本:


  1. The Spring Project One of the most endearing things about the Spring project is the level of activity currently present in the community and the amount of cross-pollination between other projects such as CGLIB, Apache Geronimo, and AspectJ. Pro Spring 3


  2. Srinath is also a committer of Apache open source projects Axis, Axis2, and Geronimo. Hadoop MapReduce Cookbook


  3. He contributes to open source projects—Apache OpenEJB and Apache Geronimo. Java 7 New Features Cookbook


  4. Jeff Bleiel, our development editor, for his work liaising with Manning—without Jeff’s input, the book would not be what it is today; Gary Tully for his tireless technical reviews of the entire book; the Manning staff for their arduous work on the book; Filip Hanik for his assistance with Tomcat; Jan Bartel and Greg Wilkins for their assistance with Jetty; David Jencks and Kevan Miller for their assistance with Geronimo; and Jaikiran Pai for his assistance with JBoss. ActiveMQ in Action



739、单词 daos 的匹配文本:


  1. Two Different Service Layers Implementation Traditionally, in the data access layer, developers will implement data access objects (DAOs) to separate the data access logic from the business logic. Pro Spring 3


  2. However, references to objects that hold no state (e.g., services, facades, DAOs, and so on) should be declared as transient. Pro Spring MVC


  3. Another potential problem is that it’s likely that many DAOs may need to share this connection information. Spring in Practice


  4. Most of the time, you secure the business services; some other times, you might need to secure the DAOs. Pro Spring Security


  5. Spring Batch bases this class on a set of Data Access Objects (DAOs) used for dedicated interactions and data management. Spring Batch in Action


  6. If DAOs and business services follow the same development and deployment cycles, there is no point in splitting them into different bundles. Spring Dynamic Modules in Action


  7. Rather than relying on repositories or DAOs to wrap access to your entities, you use the static finder methods to locate them, and methods such as persist() and merge() to manipulate them. Spring Roo in Action


  8. DAOs instead of inheriting from the DAO class, then you can design. SQL Antipatterns


  9. Spring’s ORM support builds on the DAO support, providing a convenient way to build DAOs for several ORM solutions. Spring in Action 4th Edition



740、单词 keypair 的匹配文本:


  1. We can now connect to the box using our keypair file and retrieve the results file. Performance Testing With JMeter 2.9


  2. Create a keypair so you can ssh to the instance: bk-compute-adminguide-grizzly


  3. But before we start spinning up instances, we need to make a keypair so that we will be able to log in to the new instance via ssh. Deploying OpenStack


  4. If this feature is enabled, a user can ssh to an instance without an ssh keypair. bk-admin-guide-cloud-latest


  5. For example, to connect as the "ubuntu" user using the my-keypair.pem private key file: Storm Blueprints Patterns for Distributed Real-time Computation


  6. However, if you do this you must generate the initial keypair with a special value in the CN field; Thawte will tell you what that value is when you follow the links to request the certificate. Java Security 2nd Edition


  7. Whirr uses SSH to communicate with machines running in the cloud, so it’s a good idea to generate an SSH keypair for exclusive use with Whirr. Hadoop:The Definitive Guide 3rd Edition


  8. When configured, you create a new public/private keypair using the gpg command: Spring Roo in Action


  9. The following command generates an SSH   public/private key pai r and registers the public key to Amazon EC2 under the key name gsg-keypair. Hadoop in Action


  10. If you have generated a keypair with an external tool, you can import it into OpenStack. user-guide



741、单词 vars 的匹配文本:


  1. Vars that we will not cover here; please refer to Clojure documentation or books for more details. Programming Concurrency on the JVM


  2. OpenStack can be used by corporations, service providers, VARS, SMBs, researchers, and global data centers looking to deploy large-scale cloud deployments for private or public clouds. bk-compute-adminguide-grizzly


  3. EnvVars even has a method to get the environment variables from remote Jenkins nodes. Jenkins Continuous Integration Cookbook


  4. One telltale sign is that if code contains any vars, it is probably in an imperative style. Programming in Scala 2nd Edition


  5. We can assign the elements of a tuple into multiple vars or vals in parallel, as shown in this example: Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


  6. The Puppet master process running inside Passenger will check the environment variables set by the SSLOptions +StdEnvVars configuration in order to authorize the Puppet agent. Pro Puppet


  7. If expr is Var, we extract the name and return the lookup of the name in the vars Map. Beginning Scala


  8. The valid keywords are: source, which specifies sourcefile information; lines, which specifies line number information; and vars, which specifies local variable debugging information. Java in a Nutshell 5th Edition


  9. In the following example, the Java class EnvVars accepts an environment variable name and prints out its value. Java 7 Recipes A Problem-Solution Approach


  10. Rather than waste the CPU by initializing them all the time, this macro exists to initialize them when the use of one of those tools is detected, or when FORCE_INIT_OF_VARS is defined. Understanding MySQL Internals



742、单词 hbck 的匹配文本:


  1. Chapter 3, Using Administration Tools: In this chapter, we describe the usage of various administration tools such as HBase web UI, HBase Shell, HBase hbck, and others. HBase Administration Cookbook


  2. We’ll cover the hbck, hlog, and hfile commands in future sections. HBase in Action


  3. The hbase hbck tool uses this to generate missing meta table entries, for example. HBase:The Definitive Guide



743、单词 datafiles 的匹配文本:


  1. Once you start the database and it accesses the datafiles for the first time, you cannot delete any of the data files. MongoDB The Definitive Guide 2nd Edition


  2. Avro datafiles support compression and are splittable, which is crucial for a MapReduce data input format. Hadoop:The Definitive Guide 3rd Edition


  3. It does this by keeping the old datafiles around, so that it can preserve its “view” on what the index looked like at the time it started. Elasticsearch The Definitive Guide


  4. It also has scripts for converting SSTables (the datafiles) to JSON and back. Cassandra The Definitive Guide


  5. What just happened? Firstly, we created the datafiles to be used in this example. Hadoop Beginners Guide


  6. So, if you had a directory input with two datafiles today and yesterday under it, and you specified input as your file to load, Pig will read both today and yesterday as input. Programming Pig


  7. By default, MongoDB places all of its datafiles in a single directory. The Definitive Guide to MongoDB


  8. MyISAM index files are much more complex than the datafiles. Understanding MySQL Internals



744、单词 dbms 的匹配文本:


  1. Conceptually, such user defined functions (UDFs) can be combined with SQL queries, but the experience reported in the comparison paper indicates that UDF support is either buggy (in DBMS-X) or missing (in Vertica) MapReduce a flexible data processing tool


  2. It has DBMS-like features, is very fast, supports distributed searching, and scales well. High Performance MySQL 3rd Edition


  3. Limited by the page-level data manipulation inside a traditional DBMS engine, PAX uses a fixed page as the basic unit of data record organization. RCFile A Fast and Space-efficient Data Placement Structure in MapReduce-based Warehouse Systems


  4. It allows accessing the data without a time-consuming loading phase, which is a major impedance to database usage in analytical data processing [13], where it is often possible to run dozens of MR analyses before a DBMS is able to load the data and execute a single query. Dremel - Interactive Analysis of WebScale Datasets


  5. HadoopDB: an architectural hybrid of MapReduce and DBMS technologies for analytical workloads” Spanner - Google’s Globally-Distributed Database


  6. Hadoop and HBase make up an open source DBMS inspired by. SQL Antipatterns


  7. At the same time, distributed DBMS vendors have integrated the MapReduce execution model in their engines [13] to provide. Tenzing - A SQL Implementation On The MapReduce Framework


  8. PreparedStatements send a precompiled SQL statement to the DBMS rather than a String. Java 7 Recipes A Problem-Solution Approach


  9. The indexing system could store the repository in a DBMS and update individual documents while using transactions to maintain invariants. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications


  10. Given the exploding data problem, all but three of the above mentioned analytical database start-ups deploy their DBMS on a shared-nothing architecture (a collection of independent, possibly virtual, machines, each with local disk and local main memory, connected together on a high-speed network) HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



745、单词 poller 的匹配文本:


  1. The problem is that even using roll-up schemes, a central poller can poll an individual agent only so fast, and there’s only so much polling you can do before the network traffic becomes burdensome. Monitoring with Ganglia


  2. If your provider doesn’t support IMAP IDLE, then you can use a standard IMAP inbound channel adapter with a poller: Spring in Practice


  3. For example, imagine you have a method called poll in a custom FilePoller class. Spring Integration in Action


  4. A poller for each cluster can now run asynchronously, scanning only its directory for new files to upload. Hadoop Operations


  5. The adapter uses a poller to check the directory since the filesystem is not an event-driven source. Spring Data Modern Data Access for Enterprise Java



746、单词 isbn 的匹配文本:


  1. Its items are books, of course, and it might naturally define a book by its ISBN number (a unique product identifier) Mahout in Action


  2. The exception to this rule, of course, is if you have a separate identifier (such as a product code, ISBN, or other information) that you want to use in addition to your main document ID because it provides reference or connectivity information. Getting Started with CouchDB


  3. You can also search for the book at www.wrox.com by ISBN (the ISBN for this book is 978-1-11861193-7) to find the code. Professional Hadoop Solutions


  4. Right now, this data isn’t exactly very useful; it merely tells you the ISBN of some book. Beginning CouchDB


  5. For example, the book with ISBN 0-201-96426-0 has two authors with codes DATE and DARW. Core Java Volume II Advanced Features 9th Edition


  6. Consider a Book class having four fields: title, author, publisher, and isbn. Getting Started with Google Guava


  7. An attribution usually includes the title, author, publisher, and ISBN. Cassandra The Definitive Guide


  8. For instance, ISBN numbers may be URIs even if the book cannot be retrieved over the Internet. Java Network Programming 4th Edition


  9. For example, given our book test data, the following code retrieves the single document matching the ISBN provided: Lucene in Action 2nd Edition


  10. The function will return three properties and ISBN as an integer, a title as a string, and authors as an array of strings. Programming Hive



747、单词 cdh 的匹配文本:


  1. Oozie code was tested on the latest version of Oozie (available, for example, as part of Cloudera CDH 4.1 distribution) Professional Hadoop Solutions


  2. Put this recipe into a file that you can pass as a configuration to the Whirr script, such as my_cdh_recipe. HBase in Action


  3. If you’re running on a CDH distribution, the scripts will run configuration-free. Hadoop in Practice


  4. Alternatively, Cloudera’s Distribution Including Apache Hadoop (CDH) contains an installation package for Sqoop alongside compatible editions of Hadoop and other tools such as Hive. Hadoop:The Definitive Guide 3rd Edition


  5. Cloudera makes the distribution available in a number of different formats: source and binary tar files, RPMs, Debian packages, VMware images, and scripts for running CDH in the cloud. HBase:The Definitive Guide


  6. The Enterprise Edition is actually quite different from the Basic Edition; it is more of a layer atop Hadoop, and in fact, can be used with other distributions such as CDH or HDP. Hadoop Beginners Guide


  7. Both Apache Hadoop and CDH come with support for FUSE HDFS which, as you may have guessed, allows you to mount the Hadoop distributed filesystem as you would any other device. Hadoop Operations



748、单词 dih 的匹配文本:


  1. Data Import Handler (DIH)  provides a mechanism for integrating different data sources with Apache Solr for indexing. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr


  2. Another way to ask Solr to pull data is to use the DataImportHandler (DIH) which can pull data from a database and other sources. Solr 3 Enterprise Search Server


  3. We cover Solr’s data import handler (DIH) in chapter 12 Solr in action


  4. One more thing before the indexing – you should copy an appropriate JDBC driver to the lib directory of your Solr installation or the dih directory we created before. Apache Solr 4 Cookbook



749、单词 dsa 的匹配文本:


  1. The following command generates a dsa key with an empty password in the file ~/.ssh/id_dsa: Pro Hadoop


  2. If we need to generate a DSA key, the security provider returns to us a class associated with the Sun provider class since the Sun provider, at position 1, is the first class that says that it can perform DSA key generation. Java Security 2nd Edition


  3. The rsa and dsa keys from both the mail host and the web host are now being exported and stored in the configuration database. Pro Puppet


  4. For example, here is a matching pair of public and private Digital Signature Algorithm (DSA) keys. Core Java Volume II Advanced Features 9th Edition


  5. In the default Java implementation shipped from Sun, the only supported algorithm is “DSA”; this is the default if this option is omitted. Java in a Nutshell 5th Edition



750、单词 david 的匹配文本:


  1. Of course, the real story lies in the people behind the projects—people such as Berkeley Professor David Culler, who had the vision of building powerful clusters out of commodity hardware long before it was common industry practice. Monitoring with Ganglia


  2. The first person I showed the draft to was David James, the organizer of the Washington DC–area Groovy user group. Gradle in Action


  3. For example, a security policy file might contain a statement like the following to allow permission to read the private KerberosKey credentials of a KerberosPrincipal named “davidJava in a Nutshell 5th Edition


  4. David Gruzman is a Hadoop and big data architect with more than 18 years of hands-on experience, specializing in the design and implementation of scalable high-performance distributed systems. Hadoop Beginners Guide


  5. Jeff Bleiel, our development editor, for his work liaising with Manning—without Jeff’s input, the book would not be what it is today; Gary Tully for his tireless technical reviews of the entire book; the Manning staff for their arduous work on the book; Filip Hanik for his assistance with Tomcat; Jan Bartel and Greg Wilkins for their assistance with Jetty; David Jencks and Kevan Miller for their assistance with Geronimo; and Jaikiran Pai for his assistance with JBoss. ActiveMQ in Action


  6. We thank the anonymous reviewers, David Nagle, and our shepherd Brad Calder, for their feedback on this paper. Bigtable - A Distributed Storage System for Structured Data


  7. David Ha and Rumit Patel, at M6D, contributed the case study and code on the Rank function. Programming Hive


  8. Very special thanks also go to David Holmes for, among many contributions, helping to develop and extend material for tutorials that in turn became included in the second edition. Concurrent Programming in Java Design Principles and Pattern


  9. For more than 30 years, David's expertise has been in multiplatform network integration and systems programming. Java 7 Recipes A Problem-Solution Approach


  10. The continued growth in software engineering maturity today can be seen in the DevOps movement, climaxing with the publication last year of Jez Humble and David Farley’s book Continuous Delivery (AddisonWesley) Building and Testing with Gradle



751、单词 deserialized 的匹配文本:


  1. We discuss serialization in Chapter 1 of Volume II.) To display the applet, the object is deserialized from the file to return it to its previous state. Core Java Volume I Fundamentals 9th Edition


  2. Values that are objects are serialized and then deserialized by each MapReduce task when tasks start. Pro Hadoop


  3. Actually, according to lazy decompression, a column will not be decompressed until one of its field is being deserialized. RCFile A Fast and Space-efficient Data Placement Structure in MapReduce-based Warehouse Systems


  4. This Bloom filter can later be deserialized from HDFS just as easily as it was written. MapReduce Design Patterns


  5. The tables created in the manner describe above are serialized and deserialized using default serializers and deserializers already present in Hive. Hive A Petabyte Scale Data Warehouse Using Hadoop


  6. What’s more, the deserialization procedure creates a new instance for each object deserialized from the stream. Hadoop:The Definitive Guide 3rd Edition


  7. If the readResolve method is defined, it is called after the object is deserialized. Core Java Volume II Advanced Features 9th Edition


  8. Otherwise, each time a serialized instance is deserialized, a new instance will be created, leading, in the case of our example, to spurious Elvis sightings. Effective Java 2nd Edition


  9. One of the most important features of the java.io package is the ability to serialize objects: to convert an object into a stream of bytes that can later be deserialized back into a copy of the original object. Java in a Nutshell 5th Edition


  10. A class that has been saved with a prior SUID cannot be deserialized on the new SUID. Java 7 Recipes A Problem-Solution Approach



752、单词 linearly 的匹配文本:


  1. The results are not surprising: in the single-path baseline case, the scheduler busyness is low as long as scheduling is quick, but scales linearly with increased tjob (Figure 6a) Omega - flexible, scalable schedulers for large compute clusters


  2. The way the B-tree storage works means that if you don’t actually reduce your data in the reduce function, you end up having CouchDB copy huge amounts of data around that grow linearly, if not faster with the number of rows in your view. CouchDB The Definitive Guide


  3. Retrieval time for columnar nested data grows linearly with the number of fields. Dremel - Interactive Analysis of WebScale Datasets


  4. Snapshot reads can execute at any up-to-date replicas, so their throughput increases almost linearly with the number of replicas. Spanner - Google’s Globally-Distributed Database


  5. Ceph’s data performance scales nearly linearly in the number of OSDs. Ceph A Scalable, High-Performance Distributed File System


  6. The most important aspect of our review is to determine whether use of any of Chubby’s resources (RPC rate, disc space, number of files) grows linearly (or worse) with number of users or amount of data processed by the project. Chubby - The lock service for loosely-coupled distributed systems


  7. Scalable—Hadoop scales linearly to handle larger data by adding more nodes to the cluster. Hadoop in Action


  8. It’s fault-tolerant and scales linearly, and it’s intended for use in web applications. Cassandra The Definitive Guide


  9. This can be strange at first because when we think about processing a file, we tend to think of it occurring linearly from byte zero through to the end of the file. Hadoop Operations


  10. We chose an architecture that scales linearly over many orders of magnitude on commodity machines, but we’ve seen that this costs a significant 30fold overhead compared to traditional database architectures. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



753、单词 lvm 的匹配文本:


  1. This in turn can increase the time it takes to run FLUSH TABLES WITH READ LOCK for a logical volume manager (LVM) snapshot or other backup operation. High Performance MySQL 3rd Edition


  2. As of Grizzly, the following block storage drivers are compatible: iSCSI-based, LVM, and Ceph. bk-compute-adminguide-grizzly


  3. This is a twostep process: creating the volume group with Linux Volume Manager (LVM) and starting iSCSI services. Deploying OpenStack


  4. From the SAN to the cloud controller, we have an active iscsi session (used for the "cindervolumes" LVM's VG) bk-admin-guide-cloud-latest


  5. Normally, this would be an LVM Logical Volume specifically set aside for this purpose. high-availability-guide


  6. As an aside, the Linux Logical Volume Manager (LVM) should never be used for Hadoop data disks. Hadoop Operations


  7. Users typically manage a RAID cluster using Linux’s logical volume manager, LVM, with a RAID level of 10 MongoDB in Action


  8. You can partition this large array with the boot, root, swap, and LVM areas. OpenStack Operations Guide



754、单词 mds 的匹配文本:


  1. Ceph [9] has a cluster of namespace servers (MDS) and uses a dynamic subtree partitioning algorithm in order to map the namespace tree to MDSes evenly. HDFS scalability the limits to growth


  2. A metadata server (MDS), also called master server, which manages the file repartition, their access and the namespace. bk-compute-adminguide-grizzly


  3. Clients typically interact with a metadata server (MDS) to perform metadata operations (open, rename), while communicating directly with OSDs to perform file I/O (reads and writes), significantly improving overall scalability. Ceph A Scalable, High-Performance Distributed File System


  4. Ceph [17] has a cluster of namespace servers (MDS) and uses a dynamic subtree partitioning algorithm in order to map the namespace tree to MDSs evenly. The Hadoop Distributed File System


  5. Each lease grants active monitors permission to distribute copies of the cluster map to OSDs or clients who request 1This is implemented as a generic service and used to manage a variety of other global data structures in Ceph, including the MDS cluster map and state for coordinating client access to the system. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.



755、单词 serializer 的匹配文本:


  1. Event serializers An event serializer is the mechanism by which a Flume event is converted into another format for output. Apache Flume Distributed Log Collection for Hadoop


  2. The SGD models share a helper class called ModelSerializer that handles the serialization and deserialization of all SGD models. Mahout in Action


  3. If you just call toXML( ) you’ll get everything run together, so the Serializer is a convenient tool. Thinking in Java 4th Edition


  4. It allows you to use a custom serializer and deserializer (known as SerDe) for different file formats. Professional Hadoop Solutions


  5. The role of a Serializer is to take the encoding burden away from the user. Cassandra High Performance Cookbook


  6. Hadoop comes with four serializers: Avro, Java, Tether (for binary data contained within a TetherData class), and Writable10 (the default serializer) Hadoop in Practice


  7. A Serialization defines a mapping from types to Serializer instances (for turning an object into a byte stream) and Deserializer instances (for turning a byte stream into an object) Hadoop:The Definitive Guide 3rd Edition


  8. ProducerConfig: The ProducerConfig class encapsulates the values required for establishing the connection with brokers such as the broker list, message partition class, serializer class for the message, and partition key. Apache Kafka


  9. The choice of the serializer depends on several factors including ease of use, extensibility, and, of course, performance. Java Performance


  10. You can check this assumption using the Ruby driver’s BSON serializer: MongoDB in Action



756、单词 rdd 的匹配文本:


  1. This allows them to efficiently provide fault tolerance by logging the transformations used to build a dataset (its lineage) rather than the actual data.1 If a partition of an RDD is lost, the RDD has enough information about how it was derived from other RDDs to recompute. Resilient Distributed Datasets - A Fault-Tolerant Abstraction for In-Memory Cluster Computing


  2. The central idea of resilient distributed datasets (RDD) is leveraged to achieve significant performance improvements over classic MapReduce for this class of applications. Apache Hadoop YARN Yet Another Resource Negotiator



757、单词 sms 的匹配文本:


  1. Find a particular metric, which is especially useful if a metric is rare, such as out going_sms_queue. Monitoring with Ganglia


  2. Notifications can include emails, IMs, IRC messages, SMS, and many more. Gradle in Action


  3. Other alerting methods such as SMS messages and paging, are also available. Hadoop Operations and Cluster Management Cookbook


  4. Facebook Messaging —  This is a unified system that combines all communication capabilities (including Facebook messages, e-mail, chat, and SMS) Professional Hadoop Solutions


  5. With the click of a button on a web page or browser plug-in, ShareThis allows users to seamlessly access their contacts and networks from anywhere online and share the content through email, IM, Facebook, Digg, mobile SMS, etc., without ever leaving the current page. Hadoop:The Definitive Guide 3rd Edition


  6. Obviously, this is much shorter, and easier to copy into an email or send through a restricted medium, like Twitter or SMS. HBase:The Definitive Guide


  7. Facebook Messages gives every Facebook user a facebook.com email address, integrates the display of all e-mail, SMS and chat messages between a pair or group of users, has strong controls over who users receive messages from, and is the foundation of a Social Inbox. Apache Hadoop Goes Realtime at Facebook


  8. A branch company of China Mobile can have more than 20 million subscribers, leading to more than SMS every day. Hadoop in Action


  9. If a Short Message Service (SMS) message is received, it will be displayed within the top menu bar while the application is running. Java 7 Recipes A Problem-Solution Approach


  10. Figure 2: (a) MapReduce job generated by Hive (b) MapReduce job generated by SMS assuming sales is partitioned by YEAR(saleDate) HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



758、单词 spdy 的匹配文本:


  1. In turn, Netty has benefited from interaction with these projects, enhancing both its scope and flexibility through implementations of protocols such as FTP, SMTP, HTTP, WebSocket and SPDY as well as others, both binary and text-based. Netty in Action MEAP V08


  2. Though modern technologies like WebSockets and SPDY can offer incremental data production, or even server-side push messages, the protocols involved are still in the process of being finalized, and client-side support in many programming languages is incomplete. Redis in Action



759、单词 autowiring 的匹配文本:


  1. Autowiring Your Bean In all the examples so far, we have had to define explicitly, via the configuration file, how the individual beans are wired together. Pro Spring 3


  2. This allows you to inject dependencies directly in the test using, for, example autowiring. Pro Spring MVC


  3. We use autowiring and component scanning often in this book because they’re much more compact (although less explicit).3 Spring in Practice


  4. In Example 6-30, we access the Converter instances by enabling component scanning and autowiring them into the configuration class to eventually wrap them into the CustomConversions instance. Spring Data Modern Data Access for Enterprise Java


  5. Working together, component scanning and autowiring are a powerful force and can help keep explicit configuration to a minimum. Spring in Action 4th Edition



760、单词 quicksort 的匹配文本:


  1. We then recursively call the Quicksort method on each partition. Scala in Depth


  2. The sorting algorithm that’s used in the Java standard library is designed to be optimal for the particular type you’re sorting—a Quicksort for primitives, and a stable merge sort for objects. Thinking in Java 4th Edition


  3. If the values to be sorted will fit into the sort buffer, MySQL can perform the sort entirely in memory with a quicksort. High Performance MySQL 3rd Edition


  4. As its name implies, quicksort is a fast sorting algorithm in practice and is especially useful in C++, or for sorting primitive types in Java. Data Structures and Algorithm Analysis in Java 3rd Edition


  5. The  function sorts a list by turning it into a mutable array, sortingquicksort the array in place using the well-known Quicksort algorithm, and then turning the array back into a list. Functional Programming in Scala


  6. Imagine a SortStrategy interface with a single sort operation and different implementations for Quicksort, Mergesort, and so on. Cassandra The Definitive Guide


  7. For this, I use a standard quicksort algorithm (the quicksort implementation can be found in Section 11.9) Java Performance Tuning 2nd Edition


  8. For example, the following function implements the quicksort sorting algorithm of Tony Hoare. Steps in Scala An Introduction to Object-Functional Programming


  9. Familiar sequential examples include quicksort, mergesort, and many data structure, matrix, and image processing algorithms. Concurrent Programming in Java Design Principles and Pattern



761、单词 rsync 的匹配文本:


  1. It reads every region server's hostname from the file, and then invokes the rsync command to sync the HBase installation directory from master node to that region server. HBase Administration Cookbook


  2. The prospect of firing up rsync or kludging together some Perl is altogether different when 20,000 hosts are involved. Monitoring with Ganglia


  3. All of the core configuration files can be identical, which allows the use of the Unix rsync command to distribute the configuration files. Pro Hadoop


  4. Much like rsync synchronizes two directories locally or over a network, replication synchronizes two databases locally or remotely. CouchDB The Definitive Guide


  5. Several recipes in this chapter will use password-less access to the OpenSSL tools such as ssh, scp, and rsync. Cassandra High Performance Cookbook


  6. It was a .NET shop, and we had no operational help, so we learned to combine bash with rsync and managed the cluster ourselves. HBase in Action


  7. You can use rsync to copy the Hadoop configuration from another node. Hadoop MapReduce Cookbook


  8. You need a mechanism to automate the process of copying files of any format into HDFS, similar to the Linux tool rsync. Hadoop in Practice


  9. If you are familiar with rsync, you can think of the -overwrite or -update options as adding an implicit trailing slash to the source.) If you are unsure of the effect of a distcp operation, it is a good idea to try it out on a small test directory tree first. Hadoop:The Definitive Guide 3rd Edition


  10. Next, using a secure copy utility like scp or rsync tunnelled over ssh, copy the keytabs to the proper machines and place them in the Hadoop configuration directory. Hadoop Operations



762、单词 bitwise 的匹配文本:


  1. Note that on primitives, the identity comparison does bitwise comparison but on objects it does reference equality. Java 8 in Action Lambdas, Streams and Functional-style Programming


  2. Because M is a power of 2, we can use bitwise operators. Data Structures and Algorithm Analysis in Java 3rd Edition


  3. The unions are performed with the bitwise or method exposed by the BloomFilter class. Hadoop in Practice


  4. The key’s hash code is turned into a nonnegative integer by bitwise ANDing it with the largest integer value. Hadoop:The Definitive Guide 3rd Edition


  5. BitComparator Performs a bitwise comparison, providing a BitwiseOp class with AND, OR, and XOR operators. HBase:The Definitive Guide


  6. This representation lets you use the bitwise OR operation to combine several constants into a set, known as a bit field: Effective Java 2nd Edition


  7. In a bitwise AND operation, each bit of the operands are Anded with each other. Java 7 New Features Cookbook


  8. The arithmetic, increment and decrement, bitwise, and shift operators return a double if at least one of the operands is a double. Java in a Nutshell 5th Edition


  9. Therefore, if a channel needs to register for multiple operations in the same selector (e.g., for both reading and writing on a socket), combine the constants with the bitwise or operator (|) when registering: Java Network Programming 4th Edition


  10. StrictMath provides bitwise consistency across platforms; earlier versions of Math used platform-specific native functions that were not identical across all platforms. Java Performance Tuning 2nd Edition



763、单词 sstable 的匹配文本:


  1. Writes are batched in memory and periodically written out to structures known as SSTable. NoSQL Distilled


  2. When thresholds are reached, a Memtable is flushed to disk in a sorted format called an SSTable. Cassandra High Performance Cookbook


  3. They are based on Hadoop’s TFile class,‖ and mimic the SSTable format used in Google’s Bigtable architecture. HBase:The Definitive Guide


  4. It might be fixed in a future release, but the change is pending an update to the underlying storage file (the SSTable) Cassandra The Definitive Guide


  5. This is useful for Bigtable, ColumnIO, RecordIO and SSTable files in protocol buffer format. Tenzing - A SQL Implementation On The MapReduce Framework


  6. The Google SSTable file format is used internally to store Bigtable data. Bigtable - A Distributed Storage System for Structured Data


  7. In either case, Bigtable must read the entire SSTable block from the file system and decompress it. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



764、单词 ndb 的匹配文本:


  1. MySQL AB acquired the NDB database from Sony Ericsson in 2003 and built the NDB Cluster storage engine as an interface between the SQL used in MySQL and the native NDB protocol. High Performance MySQL 3rd Edition


  2. Note that the MEMORY storage engine used to be called HEAP, and some of the file and directory names in the source tree still reflect the earlier name.) However, the list grew rapidly with the addition of BerkeleyDB, MERGE, InnoDB, and more recently, NDB for the MySQL Cluster. Understanding MySQL Internals



765、单词 mockito 的匹配文本:


  1. To help mock the behavior of the service layer, we will use Mockito (http://code.google.com/p/mockito), which is a popular mocking framework. Pro Spring 3


  2. Throughout this section we will make you more familiar how you can use Mockito for all your mocking needs. Pro Spring MVC


  3. At C you create the mock object using the Mockito framework. Spring in Practice


  4. It uses the object-mocking library, Mockito, to mock most of the essential Hadoop objects so the user only needs to focus on the map and reduce logic. Hadoop RealWorld Solutions Cookbook


  5. In this section, we introduce how to write basic unit tests with JUnit, and then we look at the Mockito mock framework. Spring Batch in Action


  6. In addition to Hamcrest matchers, Spring Integration tests can make use of Mockito extensions. Spring Integration in Action


  7. We cover unit testing and Mockito, mocking the persistence tier, integration testing in-container against entities, repositories and services, and how to write functional, black box tests with Selenium, both using Roo’s support for HTML table-based tests as well as using the JUnit API. Spring Roo in Action


  8. Here you use a mock object framework known as Mockito to create a mock implementation of the Quest interface. Spring in Action 4th Edition


  9. His current topics of research center around project automation, including: build tools (Gradle, Leiningen, Maven, Ant), distributed version control (Git, Mercurial), testing frameworks (Geb, Spock, JUnit, TestNG, Mockito), continuous integration (Jenkins, Hudson, Bamboo) and code quality metrics (Sonar, CodeNarc, PMD) Building and Testing with Gradle



766、单词 preconfigured 的匹配文本:


  1. An AMI is a preconfigured operating system and software, which is used to create a virtual machine within EC2 HBase Administration Cookbook


  2. It is preconfigured to serve the correct MIME type for JNLP files. Core Java Volume I Fundamentals 9th Edition


  3. Applying the plugin to your project added preconfigured tasks and a standardized project structure wrapped by an opinionated framework. Gradle in Action


  4. When a slave node was assigned a task by the JobTracker, its TaskTracker will fork a JVM for that task, allocating a preconfigured amount of computing resources. Hadoop Operations and Cluster Management Cookbook


  5. Gradle provides some preconfigured repositories, but it is also very easy to use a custom Maven or Ivy repository. Gradle Effective Implementation Guide


  6. To make this install even simpler, you can use plenty of preconfigured public Amazon Machine Image (AMI) images containing a preinstalled instance of Hadoop. Professional Hadoop Solutions


  7. You can download the latest Whirr release from the aforementioned site and find preconfigured configuration files in the recipes directory. HBase:The Definitive Guide


  8. More demanding users can create their own images, but most users are well served by one of the many preconfigured ones. Hadoop in Action


  9. Also, JNDI is widely used for the storage of preconfigured JMS administrative objects. ActiveMQ in Action


  10. Most of the preconfigured virtual machines (VMs) available are only designed for VMWare, but if you prefer VirtualBox you may find instructions on the Web that explain how to import a particular VM into VirtualBox. Programming Hive



767、单词 mrunit 的匹配文本:


  1. He’s contributed to several projects in the open source community and is a committer and PMC member on Sqoop, Flume, and MRUnit. Apache Sqoop Cookbook


  2. MRUnit is a unit testing framework designed specifically for Hadoop. Professional Hadoop Solutions


  3. There are examples that use MRUnit and local mode for ease of testing. Hadoop RealWorld Solutions Cookbook


  4. MRUnit is a test framework you can use to unit test MapReduce code. Hadoop in Practice


  5. For running unit tests we use junit, as well as a couple of helper libraries: hamcrest-all provides useful matchers for writing test assertions, and mrunit is used for writing MapReduce tests. Hadoop:The Definitive Guide 3rd Edition


  6. MRUnit The final Apache Hadoop project we will mention also highlights the wide range of what is available. Hadoop Beginners Guide



768、单词 syntactically 的匹配文本:


  1. Suppose, for example, that a user asks to connect to a URL that is syntactically wrong. Core Java Volume I Fundamentals 9th Edition


  2. Pig Ordering in Pig is syntactically pretty easy, but it’s a very expensive operation. MapReduce Design Patterns


  3. When a saw job request is received by the system, a Sawzall processor is invoked to verify that the program is syntactically valid. Interpreting the Data Parallel Analysis with Sawzall


  4. When the Pig Latin interpreter sees the first line containing the LOAD statement, it confirms that it is syntactically and semantically correct, and adds it to the logical plan, but it does not load the data from the file (or even check whether the file exists) Hadoop:The Definitive Guide 3rd Edition


  5. Update model values Reaching this phase means that the request values are syntactically valid. Java EE 7 Essentials


  6. Syntactically, in the FROM clause you add the JOIN keyword between the tables and then specify the join columns after the ON keyword. Hadoop in Action


  7. Syntactically, the only difference between static and nonstatic member classes is that static member classes have the modifier static in their declarations. Effective Java 2nd Edition


  8. Syntactically, annotations are used like modifiers and can be applied to the declarations of packages, types, constructors, methods, fields, parameters, and local variables. Java in a Nutshell 5th Edition


  9. As long as the URI is syntactically correct, Java does not need to understand its protocol in order to create a representative URI object. Java Network Programming 4th Edition


  10. Some concurrent OO programming languages (see Further Readings) syntactically require separation between non-public methods defining functionality and public methods defining concurrency control policies; that is, they mandate the kind of separation seen in the template method version of class ReadWrite. Concurrent Programming in Java Design Principles and Pattern



769、单词 parameterize 的匹配文本:


  1. We can leverage this column to parameterize all requests containing account numbers to pick the right accounts for each user that is logged in. Performance Testing With JMeter 2.9


  2. We will learn how to work with files and directories, apply logging to our build scripts, and use properties to parameterize our build scripts. Gradle Effective Implementation Guide


  3. What you could do is add a parameter to your method to parameterize the color and be more flexible to such changes: Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. First, you parameterize the input and output types of the mapper, and the input and output types of the reducer. Professional Hadoop Solutions


  5. It’s easy enough to parameterize imperative task activity with a System property, an environment variable, or even a variable in the build script itself, but those solutions also founder on complexity considerations. Gradle Beyond The Basics


  6. The example lists all the different calls you can use to parameterize the delete() operation. HBase:The Definitive Guide


  7. It is generally not too difficult to parameterize your collection declarations and make use of the generic types and methods provided by the JDK. Effective Java 2nd Edition


  8. As we saw earlier, Flume's ability to parameterize the location to which it writes on HDFS is a great tool to aid this problem. Hadoop Beginners Guide


  9. In this example, as your task is a Runnable object that is not parameterized, you have to parameterize them with the ? symbol as a parameter. Java 7 Concurrency Cookbook


  10. All the type information that you specify when you parameterize a generic type gets “erased” by the compiler when the code is compiled down to byte code. Java 7 Recipes A Problem-Solution Approach



770、单词 jpanel 的匹配文本:


  1. Note Instead of extending JComponent, some programmers prefer to extend the JPanel class. Core Java Volume I Fundamentals 9th Edition


  2. This is seen in makeBPanel( ), which creates a button group in a JPanel. Thinking in Java 4th Edition


  3. To add multiple components into the same tab, first pack them up in a container, such as a JPanel. Core Java Volume II Advanced Features 9th Edition


  4. Within the JPanel, we overrode the paintComponent method and created a new GradientPaint object. Java 7 New Features Cookbook


  5. In Swing, a common container that is often used is the JPanel class, which is not only a container but also a component (JComponent) Java 7 Recipes A Problem-Solution Approach



771、单词 keytool 的匹配文本:


  1. As the user that Tomcat will run under, create a self-signed certificate via: keytool -genkey -alias tomcat -keyalg RSA. Jenkins Continuous Integration Cookbook


  2. To generate a self-signed certificate we can use a Java tool called keytool. Pro Spring MVC


  3. Creating a client certificate key pair The self-signed client certificate is created in the same way as the self-signed server certificate is created, by generating a key pair using the keytool command. Spring Security 3.1


  4. If you now execute mvn keytool:genkey followed by mvn jetty:deploy-war from the directory where you have this new pom.xml file, the default demo application of the CAS server will execute. Pro Spring Security


  5. Administration of the keystore is handled by the keytool utility (see Chapter 10) Java Security 2nd Edition


  6. The JDK comes with the keytool program, which is a command-line tool to generate and manage a set of certificates. Core Java Volume II Advanced Features 9th Edition


  7. This is accomplished from the command prompt by executing the following command: keytool -genkey -keystore mySrvKeystore -keyalg RSA. Java 7 New Features Cookbook


  8. Assuming that a keystore exists on your system (see the keytool documentation in Chapter 8), you can get one with code like the following: Java in a Nutshell 5th Edition


  9. It was built with the keytool program that’s bundled with the JDK like this: Java Network Programming 4th Edition


  10. For that purpose the keytool will be used—the command-line tool for managing keystores that’s distributed with Java. ActiveMQ in Action



772、单词 jra 的匹配文本:


  1. The next four blocks of text define protection domains: code that is loaded from O'Reilly's web site has permission to read files in /tmp and to start a print job; code that is signed by sdo and loaded from Sun's web site has permission to do anything it wants to; code that is signed by jra is able to operate on any nonprivileged socket; and all code is allowed to read the java.vendor system property. Java Security 2nd Edition


  2. The recorded profile can later be analyzed offline, using the JRA Mission Control plugin. Oracle JRockit The Definitive Guide



773、单词 reuters 的匹配文本:


  1. The data was originally collected and labeled by Carnegie Group and Reuters in the course of developing the CONSTRUE text categorization system. Mahout in Action


  2. Applying AJAX Solr on Reuters' data Reuters is actually a dataset on which we are going to apply the AJAX Solr mechanism. Web Crawling and Data Mining with Apache Nutch


  3. Reuters Financial Software Thomson Reuters is a well-known provider of real-time financial data, news reporting, business data, and related software products to help customers make best use of Reuters data. Monitoring with Ganglia


  4. He is a lead developer at Thomson Reuters where he’s responsible for a number of activities, some of which are directly related to Maven, Groovy, and build tools such as Artifactory and Jenkins. Jenkins The Definitive Guide


  5. That’s why mega news outfit Reuters purchased Teknekron in 1994 RabbitMQ in Action


  6. The AJAX Solr project homepage is at http://evolvingweb.github.com/ajaxsolr/ and provides a great demo of searching Reuters business news wire results: Solr 3 Enterprise Search Server


  7. Because K-means works with vectorized data, if you want to use K-means with text data (such as clustering on the Reuters news collection) you need to vectorize that data prior to using it with Mahout. Hadoop in Practice


  8. In the benchmark framework there are several built-in document sources we could choose from, including the Reuter's corpus (ReutersDocMaker), Wikipedia articles (EnwikiDocMaker) and a simple document source that recursively finds all *.txt files under a directory (DirDocMaker) Lucene in Action 2nd Edition



774、单词 github 的匹配文本:


  1. If it is not available, you can get it from the github repository. Monitoring with Ganglia


  2. If you prefer, a TAR file is available as well: http://github.com/couchapp/couchapp/tarball/master. CouchDB The Definitive Guide


  3. Testing frameworks like Jasmine (http://pivotal.github.io/jasmine/) let you write test code in JavaScript. Gradle in Action


  4. You can find a majority of his contributions via http://github.com/davisp or on his web site at http://www.davispj.com. Beginning CouchDB


  5. As of this writing, there are at least two projects up on github that add secondary indices to HBase. Hadoop:The Definitive Guide 3rd Edition


  6. Building the Examples The examples you will see throughout this book can be found in full detail in the publicly available GitHub repository at http://github.com/larsgeorge/hbase-book. HBase:The Definitive Guide


  7. Quick Start If you’re looking to set up a cluster to play around with as fast as possible, you can set one up in a minute or two using the mongo-snippets repository on Github. Scaling MongoDB


  8. There’s a good help section on how to get set up at http://help.github .com, and the site http://gitref.org offers a really good reference for beginners. Cassandra The Definitive Guide


  9. To download the driver, go to the github website (http://github.com) The Definitive Guide to MongoDB


  10. MacPorts (http://www.macports.org) and Homebrew (http://mxcl.github.com/ homebrew/) are two package managers for Mac OS X known to maintain up-to-date versions of MongoDB. MongoDB in Action



775、单词 nonstatic 的匹配文本:


  1. The Ganglia chart in Figure 9-7 trends overall request rates and types to a web server cluster serving nonstatic content for the Tagged.com site. Monitoring with Ganglia


  2. There are two types of data in the real world: static and nonstatic data. Hadoop Operations and Cluster Management Cookbook


  3. From the joinpoint perspective, Spring AOP only supports pointcuts matching on the execution of public nonstatic methods. Pro Spring 3


  4. For complex synchronization that involves both static and nonstatic methods, Java Threads 3rd Edition


  5. This method saves the class of the object, the signature of the class, and the values of any nonstatic, nontransient fields of the class and its superclasses. Core Java Volume II Advanced Features 9th Edition


  6. There are four kinds of nested classes: static member classes, nonstatic member classes, anonymous classes, and local classes. Effective Java 2nd Edition


  7. Nonstatic member classes may be defined within other classes or enumerated types and are analogous to instance methods or fields. Java in a Nutshell 5th Edition


  8. Although nonstatic, these methods do set and get a static field that determines the default behavior for all instances of the URLConnection class created after the change. Java Network Programming 4th Edition


  9. In some VMs, synchronizing static methods takes significantly longer than synchronizing nonstatic methods, suggesting that code is global in these VMs for the static synchronizations. Java Performance Tuning 2nd Edition


  10. Only one execution thread will access one of the static methods declared with the synchronized keyword, but another thread can access other nonstatic methods of an object of that class. Java 7 Concurrency Cookbook



776、单词 classifiers 的匹配文本:


  1. Stepby-step examples give you experience with each step to help you build classifiers and fine-tune them for best performance. Mahout in Action


  2. Not all classes in the hierarchy should be instantiated; in this case Filter and Belt are just classifiers so you do not create an instance of either one, but only of their subclasses. Thinking in Java 4th Edition


  3. Version of a dependency, usually consisting of classifiers like minor and major version. Gradle in Action


  4. In a Maven repository, we can use classifiers for a dependency. Gradle Effective Implementation Guide


  5. There are a number of ways in which classifiers can be trained and validated. Hadoop RealWorld Solutions Cookbook


  6. Classifiers have widespread applications such as e-mail spam filtering, finding most promising products, selecting customers for closer interactions, and taking decisions in machine learning situations, and so on. Hadoop MapReduce Cookbook


  7. Tip  External node classifiers are also one of the means by which tools like the Puppet Dashboard and Foreman can be integrated into Puppet and provide node information, as you will see in Chapter 7 Pro Puppet


  8. In this chapter we’ll look at the Mahout MapReduce implementations of recommenders, classifiers, and clusterers. Hadoop in Practice



777、单词 workaround 的匹配文本:


  1. In this case you are still on the hook to come up with a workaround or to dive into the code, fix it, and hopefully submit that patch back to the open source community (where at some future point it'll make it into an update of your distribution or the next version) Apache Flume Distributed Log Collection for Hadoop


  2. This is a very unusual workaround that you should not emulate in your programs. Core Java Volume I Fundamentals 9th Edition


  3. Again, even though you can make this happen with a workaround, you can’t shake off the feeling that your build process will need to adapt to the tool, not the tool to your build process. Gradle in Action


  4. A workaround would be to create an SSL proxy using nginx or Apache and mod_proxy. Beginning CouchDB


  5. The Java code for this method contains additional complexity due to error handling and a workaround for a feature not yet implemented in the client API. HBase in Action


  6. The workaround to this is to have the ad hoc Node forward to a local Flume Agent Node, which can have these reliability and failover properties. Hadoop in Practice


  7. For earlier releases, the combiner had to be written in Java, so as a workaround it was common to do manual combining in the mapper without having to resort to Java. Hadoop:The Definitive Guide 3rd Edition


  8. Fortunately, there is a simple workaround for cases like these, called. Elasticsearch The Definitive Guide


  9. So if performance is a concern, you’re best to stick to the TCP transport and find some other workaround for the firewall issues. ActiveMQ in Action


  10. Another workaround is to define a “temporary” table with the storage configured to match the desired output format (e.g., tab-delimited fields) Programming Hive



778、单词 delimiters 的匹配文本:


  1. This is a common Hadoop wrapper that consists of a key and value field separated by binary field and record delimiters. Apache Flume Distributed Log Collection for Hadoop


  2. Careful with those delimiters! With so many Nagios plug-ins, written by so many different authors, it’s important to carefully choose your delimiter and avoid using the same one returned by a plug-in. Monitoring with Ganglia


  3. Be considerate of follow on data parsing to ensure proper field delimiters. MapReduce Design Patterns


  4. This type removes the pipe characters used as delimiters for a display that is easier to read. Cassandra High Performance Cookbook


  5. We can omit the fields delimited by ',' and rows delimited by '\n' since they are the default field and row delimiters assumed by ROW FORMAT, and the ACLED Nigeria data is in that format. Hadoop RealWorld Solutions Cookbook


  6. In addition, delimiters can be specified to delimit the serialized keys and values of maps and different delimiters can also be specified to delimit the various elements of a list (collection) Hive A Petabyte Scale Data Warehouse Using Hadoop


  7. Variable lengths mean you need delimiters and escaping logic in your client code to figure out the composite attributes that form the key. HBase in Action


  8. Problem How do you write data to relational databases, and at the same time ensure that writes are idempotent? Solution This technique covers how Sqoop can be used to export text files to a relational database, and also looks at how it can be configured to work with files with custom field and record delimiters. Hadoop in Practice


  9. The line has been split into multiple lines to show each field; in the real file, fields are packed into one line with no delimiters. Hadoop:The Definitive Guide 3rd Edition


  10. The task addressing scheme is similar to directory paths in the file system, except it uses colons instead of slashes as delimiters. Building and Testing with Gradle



779、单词 datafile 的匹配文本:


  1. Observant readers would have noticed that our input datafile also contains an account_id column. Performance Testing With JMeter 2.9


  2. Alternatively, we can use the command hadoop fs -put /data/datafile / user/hduser/data. Hadoop Operations and Cluster Management Cookbook


  3. Use the following command to generate an HBase bulkload datafile: Hadoop MapReduce Cookbook


  4. An Avro datafile has a metadata section where the schema is stored, which makes the file self-describing. Hadoop:The Definitive Guide 3rd Edition


  5. Finally, datafile.jude is a string that is passed to that main( ) method as the single element of an array of String objects. Java in a Nutshell 5th Edition


  6. Once the key is found in the Bloom filter, it is used to consult the corresponding datafile and find the column values. Cassandra The Definitive Guide


  7. While developing these scripts the author noticed that the last set of records in his UFO datafile had data in a better structured manner than those at the start of the file. Hadoop Beginners Guide


  8. The binary formats used are primarily intended for exchanging data between two different Java programs through a network connection, a datafile, a pipe, or some other intermediary. Java Network Programming 4th Edition


  9. The option will tell you if there are any problems with either the datafile or the indexes. The Definitive Guide to MongoDB


  10. DATAFILE-BASED BACKUPS Most users opt for a file-based backup, where the raw data files are copied to a new location. MongoDB in Action



780、单词 splittable 的匹配文本:


  1. SequenceFiles are also splittable which makes for better locality and parallelism when running MapReduce jobs on your data, especially on large files. Apache Flume Distributed Log Collection for Hadoop


  2. We will use the hadoop-lzo library, which brings splittable LZO compression to Hadoop. HBase Administration Cookbook


  3. With that in mind, a Cartesian product does not fit into the MapReduce paradigm very well because the operation is not intuitively splittable, cannot be parallelized very well, and thus requires a lot of computation time and a lot of network traffic. MapReduce Design Patterns


  4. Using SequenceFiles is often a best option, because they are both compressable and splittable. Professional Hadoop Solutions


  5. In addition, thanks to the hard work of the Hadoop community, LZO compressed files are splittable. Hadoop RealWorld Solutions Cookbook


  6. SequenceFiles are a splittable binary file format that stores data in the form of key/value pairs. Hadoop in Practice


  7. Split the file into chunks in the application, and compress each chunk separately using any supported compression format (it doesn’t matter whether it is splittable) Hadoop:The Definitive Guide 3rd Edition


  8. This compression format is unique in that it’s splittable for Hadoop, even when used outside the sequence file format. Hadoop in Action


  9. The most efficient format is SequenceFile, a binary splittable container that supports compression. Hadoop Beginners Guide


  10. Since map output need not be splittable, it is not important to select a compression codec that exhibits such a property. Hadoop Operations



781、单词 nulls 的匹配文本:


  1. You could have avoided the wildcard type by turning hasNulls into a generic method: Core Java Volume I Fundamentals 9th Edition


  2. NULLs are not stored explicitly as they are determined by the definition levels: any definition level smaller than the number of repeated and optional fields in a field’s path denotes a NULL. Dremel - Interactive Analysis of WebScale Datasets


  3. The reducer groups the nulls together by key, so we’ll have one null per key. MapReduce Design Patterns


  4. Any unexpected variable’s values (for example, nulls) should be logged during execution. Professional Hadoop Solutions


  5. The SELECT statement uses the Hive TRANSFORM operator to separate each column by tabs and to cast all columns as String with nulls as '\n' Hadoop RealWorld Solutions Cookbook


  6. Every document can have as many fields as required, and these can be of any valid JSON type, such as strings, numbers, booleans, nulls, objects, or arrays. Beginning CouchDB


  7. The column-oriented architecture allows for huge, wide, sparse tables as storing NULLs is free. HBase:The Definitive Guide


  8. We see that there’s a row with nulls , indicating that a record violated the schema. Hadoop in Action


  9. That would mean you might have to supply empty placeholder values (nulls) in order to keep the uniform size in case you didn’t have a value for an optional attribute (such as a fax number or apartment number) Cassandra The Definitive Guide


  10. If some fields are numbers and Hive encounters nonnumeric strings, it will return nulls for those fields. Programming Hive



782、单词 pregel 的匹配文本:


  1. The synchronicity of this model makes it easier to reason about program semantics when implementing algorithms, and ensures that Pregel programs are inherently free of deadlocks and data races common in asynchronous systems. Pregel  -  A System for Large-Scale Graph Processing


  2. However, we show that RDDs are expressive enough to capture a wide class of computations, including recent specialized programming models for iterative jobs, such as Pregel, and new applications that these models do not capture. Resilient Distributed Datasets - A Fault-Tolerant Abstraction for In-Memory Cluster Computing


  3. One of Apache’s projects, Giraph (which is discussed later in this section), is the open source counterpart to Pregel that uses Hadoop. Professional Hadoop Solutions


  4. PageRank with Apache Giraph This recipe is primarily aimed at building and testing the default Apache Giraph PageRank example, modeled after the Google Pregel implementation. Hadoop RealWorld Solutions Cookbook


  5. There is also a Google project called Pregel, which they’ve been using internally for a couple of years and which they might open source. Cassandra The Definitive Guide



783、单词 ack 的匹配文本:


  1. Nonetheless, if the use of UDP is called for, one solution is for the party receiving packets to send an acknowledgment packet (also referred to as an ACK) back to the sender. Java Network Programming and Distributed Computing


  2. Either the consumer must explicitly send an acknowledgement to RabbitMQ using the basic.ack AMQP command, or it can set the auto_ack parameter to true when it subscribes to the queue. RabbitMQ in Action


  3. Storm's ISpout interface defines three methods involved in the reliability API: nextTuple,ack, and fail. Storm Blueprints Patterns for Distributed Real-time Computation


  4. Figure 4: RADOS responds with an ack after the write has been applied to the buffer caches on all OSDs replicating the object. Ceph A Scalable, High-Performance Distributed File System


  5. The bolt then sends ack, fail, emit, or log messages back via STDOUT. Storm Real-Time Processing Cookbook


  6. After each tuple is processed, the collector’s ack() method is called to indicate that processing has completed successfully. Getting Started with Storm


  7. DFSOutputStream also maintains an internal queue of packets that are waiting to be acknowledged by datanodes, called the ack queue. Hadoop:The Definitive Guide 3rd Edition


  8. During writes, HDFS sets up a pipeline connection to each replica and all replicas must ACK any data sent to them. Apache Hadoop Goes Realtime at Facebook


  9. Parallel writes to write-quorum Bookies and wait for ack-quorum (see BOOKKEEPER-208) Namenode High Availability


  10. In this example, note that we’ve passed the additional ack header, which defines the way messages are acknowledged. ActiveMQ in Action



784、单词 upcast 的匹配文本:


  1. But, since the container held only Objects, when you added an object reference into the container it was upcast to Object, thus losing its character. Thinking in Java 4th Edition



785、单词 cglib 的匹配文本:


  1. The Spring Project One of the most endearing things about the Spring project is the level of activity currently present in the community and the amount of cross-pollination between other projects such as CGLIB, Apache Geronimo, and AspectJ. Pro Spring 3


  2. Note  Spring can also apply AOP on class-based proxies; however, this requires the cglib library (http://cglib.sourceforge.net) on the classpath. Pro Spring MVC


  3. This will instruct Spring to create a class-based proxy using cglib instead of using an interface-based proxy. Spring Security 3.1


  4. In general, Spring favors standard interface-based proxies instead of CGLIB, and that is what I will use in this book. Pro Spring Security


  5. Adding this proxy is supported for both interface-based and concrete classes, but for the latter you’ll need to use CGLib. Spring Dynamic Modules in Action


  6. Instead, it must use CGLib to generate a class-based proxy. Spring in Action 4th Edition



786、单词 hypervisors 的匹配文本:


  1. In many ways, hypervisors have more in common with switches than they do with a general-purpose server. Monitoring with Ganglia


  2. Hypervisors OpenStack Compute requires a hypervisor and Compute controls the hypervisors through an API server. bk-compute-adminguide-grizzly


  3. However, the majority of OpenStack development is done on systems using KVM and Xen-based hypervisors. bk-admin-guide-cloud-latest


  4. Some hypervisors even allow the guests to overcommit memory within their limited allocation space. Oracle JRockit The Definitive Guide


  5. Many virtualization vendors are aware of this and are working toward more intelligent hypervisors, but ultimately, it’s still slower than being directly on bare metal. Hadoop Operations


  6. The following hypervisors support the configuration drive: libvirt, xenserver, hyper-v, and vmware. user-guide


  7. It is also possible to run multiple hypervisors in a single deployment using Host Aggregates or Cells. OpenStack Operations Guide



787、单词 facilitates 的匹配文本:


  1. The serialized data is coupled with the data schema, which facilitates its processing with different programming languages. Hadoop Operations and Cluster Management Cookbook


  2. The Kerberos KDC also has copies of everyone’s secret key, and facilitates all communications. Professional Hadoop Solutions


  3. The actual sampling probability used is recorded along with the trace itself; this facilitates accurate accounting of trace frequencies in analytical tools built around Dapper data. Dapper a Large-Scale Distributed Systems Tracing Infrastructure


  4. Writing unit tests prior to writing your code forces your code to be structured in a way that easily facilitates testing. Hadoop in Practice


  5. ZooKeeper facilitates loosely coupled interactions ZooKeeper interactions support participants that do not need to know about one another. Hadoop:The Definitive Guide 3rd Edition


  6. Built as part of the Ceph distributed file system [27], RADOS facilitates an evolving, balanced distribution of data and workload across a dynamic and heterogeneous storage cluster while providing applications with the illusion of a single logical object store with well-defined safety semantics and strong consistency guarantees. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.


  7. We said before that the input to the reducer is a key and a corresponding list of values, and there is some magic that happens between the map and reduce methods to collect together the values for each key that facilitates this, which we'll not describe right now. Hadoop Beginners Guide


  8. Sqoop is a tool that facilitates bidirectional exchange of data between HDFS and relational databases. Hadoop Operations


  9. By providing a MOM that utilizes the JMS spec, ActiveMQ facilitates application architectures that support such reliability and scalability. ActiveMQ in Action


  10. This facilitates compiled tests being able to reference JUnit or TestNG annotations or base classes. Building and Testing with Gradle



788、单词 iostat 的匹配文本:


  1. Divide the IOPS count by the value of $PERIOD to find the actual IOPS rate for a system running in real time (the simulation runs faster than real time, so the rate reported by iostat is meaningless) Monitoring with Ganglia


  2. We captured iostat output for 30 seconds, one sample per second. High Performance MySQL 3rd Edition


  3. After a while, by using the iostat operating system command (we were working on Linux based nodes), we confirmed that something strongly uses I/O operations: both reads and writes. Mastering ElasticSearch


  4. The iostat command uses counter information from the /proc file system to calculate system utilization. Cassandra High Performance Cookbook


  5. System- and network-level information can be seen from Ganglia (figure 10.3) and from several Linux tools such as lsof, top, iostat, netstat, and so on. HBase in Action


  6. Solution The Linux tool iostat can be used to look at drive request queues and IO wait times. Hadoop in Practice


  7. The complete battery usually includes OS utilities such as top, vmstat, sar, iostat, and netstat, but also Hadoop-specific tools such as hadoop dfsadmin, and hadoop fsck. Hadoop Operations


  8. System performance measuring utilities (vmstat, iostat, sar, top on Unix; the task manager and performance monitor on Windows) Java Performance Tuning 2nd Edition


  9. Disk I/O utilization along with system or kernel CPU utilization can be monitored using iostat on Linux and Solaris. Java Performance


  10. Modeled after iostat and other similar tools, mongostat polls the server at a fixed interval and displays an array of statistics, from the number of inserts per second to the amount of resident memory, to the frequency of B-tree page misses. MongoDB in Action



789、单词 reentrant 的匹配文本:


  1. The Java language provides a synchronized keyword for this purpose, and Java SE 5.0 introduced the ReentrantLock class. Core Java Volume I Fundamentals 9th Edition


  2. Java 5 introduced the ReentrantLock class and the ability to create a condition. Getting Started with Google Guava


  3. Because locks in the Java programming language are reentrant, such calls won’t deadlock. Effective Java 2nd Edition


  4. This package defines Lock and associated Condition interfaces as well as concrete implementations (such as ReentrantLock) that provide an alternative to locking with synchronized blocks and methods and to waiting with the wait( ), notify( ), and notifyAll( ) methods of Object. Java in a Nutshell 5th Edition


  5. In particular, most of the well-known algorithms often execute in an incremental or reentrant fashion, building up structures representing processed and pending nodes, and working through the latter while reducing the former. Hadoop Beginners Guide


  6. Remember that Connection objects are not reentrant: only one client of the pool can use the Connection object at a time. Java Performance Tuning 2nd Edition


  7. It's based on the Lock interface and classes that implement it (as ReentrantLock) Java 7 Concurrency Cookbook


  8. This reentrant or recursive locking differs from the default policy used for example in POSIX threads.) Among other effects, this allows one synchronized method to make a self-call to another synchronized method on the same object without freezing up. Concurrent Programming in Java Design Principles and Pattern


  9. Using a reentrant lock, you can prevent multiple threads accessing the same critical area of the code. Java 7 Recipes A Problem-Solution Approach


  10. When you use a ReentrantLock, you are required to lock and unlock with the idiom. Java SE 8 for the Really Impatient



790、单词 giraph 的匹配文本:


  1. The port to YARN of Giraph is very natural, the execution coordinator role is taken by the ApplicationMaster, and resources are requested dynamically. Apache Hadoop YARN Yet Another Resource Negotiator


  2. One of Apache’s projects, Giraph (which is discussed later in this section), is the open source counterpart to Pregel that uses Hadoop. Professional Hadoop Solutions


  3. This book covers unloading/loading to and from HDFS, graph analytics with Giraph, batch data analysis using Hive, Pig, and MapReduce, machine-learning approaches with Mahout, debugging and troubleshooting MapReduce jobs, and columnar storage and retrieval of structured data using Apache Accumulo. Hadoop RealWorld Solutions Cookbook


  4. Most notably there are inmemory/single machine graph compute engines like Cassovary, and distributed graph compute engines like Pegasus or Giraph. Graph Databases


  5. You crafted your own MapReduce code in the techniques—if you wanted to leverage a framework you could have used Giraph (http://incubator.apache.org/giraph/), which provides a vertex message-passing mechanism. Hadoop in Practice



791、单词 geohash 的匹配文本:


  1. In practice, it is convenient to use several geotile systems in parallel with different tile sizes (geohash levels) Professional Hadoop Solutions


  2. In the area of geospatial search, David open sourced his geohash prefix/ grid based work to the Solr community tracked as SOLR-2155 Solr 3 Enterprise Search Server


  3. We’ll spend a major portion of this chapter explaining an algorithm called the geohash, which is a solution to this problem. HBase in Action


  4. See http://en.wikipedia.org/wiki/Geohash for a good description of what a geohash is. Lucene in Action 2nd Edition



792、单词 stdout 的匹配文本:


  1. In this example, we want to record the system load via the Linux uptime command, which prints out some system information to stdout and exits: Apache Flume Distributed Log Collection for Hadoop


  2. The script is invoked with the additional arguments of the paths to the stdout, stderr, and syslog output files for the task. Pro Hadoop


  3. For example, the current implementation includes a log aggregation service that will upload data written by the application to stdout and stderr to HDFS once the application completes. Apache Hadoop YARN Yet Another Resource Negotiator


  4. These counter values are also output when the job completes, so writing to stdout may be redundant if you are obtaining these values by scraping log files. MapReduce Design Patterns


  5. Both mappers and reducers receive their input on stdin and emit output (key/value pairs) to stdout. Professional Hadoop Solutions


  6. Script to be run as the map function; records passed via STDIN/STDOUT. Hadoop RealWorld Solutions Cookbook


  7. Depending on the problem, you may find additional useful information in the logs, or in the standard out (stdout) or standard error (stderr) of the task process. Hadoop in Practice


  8. MapReduce task logs Users Each tasktracker child process produces a logfile using log4j (called syslog), a file for data sent to standard out (stdout), and a file for standard error (stderr) Hadoop:The Definitive Guide 3rd Edition


  9. Inputs come in through STDIN and outputs go to STDOUT. Hadoop in Action


  10. So the only action to take is to print the message to standard output (stdout) ActiveMQ in Action



793、单词 comprehensions 的匹配文本:


  1. Loops in Scala have all the usual suspects like the while loop and do-while, but the most interesting looping construct is for or for-comprehensions. Scala in Action


  2. There are many features such as pattern matching, for comprehensions and implicits supported in Scala but not in Java, that we won’t discuss. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. Notice we've added IO and  functions so  can be used in for-comprehensions. Functional Programming in Scala


  4. Replacing Iterator gives us a way to access items in a collection sequentially—here we’ll see how we can solve many of the problems we’d solve with Iterator using higher-order functions and sequence comprehensions, which give us solutions that are more declarative. Functional Programming Patterns in Scala and Clojure


  5. Scala for Comprehensions Another familiar control structure that’s particularly feature-rich in Scala is the for loop, referred to in the Scala community as a for comprehension or for expression. Programming Scala


  6. You don’t have multiple for comprehensions nested in order to have nested expressions, thus there’s an entire iteration of the inner variable, j, for each value of the outer variable, i. Beginning Scala


  7. Examples of monads List comprehensions, that is,for comprehensions that create lists, can be expressed in terms of the monad presented above: Steps in Scala An Introduction to Object-Functional Programming



794、单词 hardcoded 的匹配文本:


  1. On a small scale, you can use simplistic approaches such as hardcoded hostnames or round-robin DNS (which points a single hostname to multiple IP addresses) High Performance MySQL 3rd Edition


  2. As a result, we highly recommend you use the all setting for x-ha-policy whenever possible so that your mirrored queue declarations aren’t hardcoded to specific node names that may change. RabbitMQ in Action


  3. Also, this job is hardcoded to find the top ten records, but could easily be configured to find the top K records using a variable captured in the setup method. MapReduce Design Patterns


  4. For code comprehensibility you hardcoded the BloomFilter parameters; in reality you’ll want to either calculate them dynamically or move them into a configuration file. Hadoop in Practice


  5. The last line in the preceding excerpt has a hardcoded server name and port. HBase:The Definitive Guide


  6. For example, our joining program in chapter 5 is hardcoded to take the. Hadoop in Action


  7. Hardcoded filenames A portable program contains no hardcoded file or directory names. Java in a Nutshell 5th Edition


  8. The implementation of the topology script is entirely up to the administrator and may be as simple as a shell script that has a hardcoded list of machines and rack names, or as sophisticated as a C executable that reads data from a relational database. Hadoop Operations


  9. My editor Mike Loukides points out that a variation on hardcoded values, used by state-of-the-art high-performance mathematical functions, is a partial table of values together with an interpolation method to calculate intermediate values. Java Performance Tuning 2nd Edition


  10. Looking at our previous example, we see that we are selecting data from a hardcoded day FROM BCO WHERE dt=20120426 Programming Hive



795、单词 usernames 的匹配文本:


  1. The usernames you use must be the ones provided by whatever authentication system you are using in Apache. Monitoring with Ganglia


  2. Caution Usernames may be overwritten with a different username by any user. Pro Hadoop


  3. In this step, some services such as Hive and Nagios may ask you to enter administrative usernames and passwords, which are required for service installation. Hadoop Operations and Cluster Management Cookbook


  4. This data set also contains human-generated natural language text as well as “structured” elements like usernames and dates. MapReduce Design Patterns


  5. You may have users coming in from multiple domains, which means that you may want to do some inventive mapping of Kerberos principals to usernames. Professional Hadoop Solutions


  6. Alternatively, you can configure default usernames in your users’ SSH configuration files. Scaling CouchDB


  7. The format for an ACL is a comma-separated list of usernames, followed by whitespace, followed by a comma-separated list of group names. Hadoop:The Definitive Guide 3rd Edition


  8. Your output should be similar to the following, except the PC and usernames should be different. Java 7 New Features Cookbook


  9. This indicates that there are three users allowed to access Keyspace1, and spaces are allowed in the usernames. Cassandra The Definitive Guide


  10. In Linux, we use usernames, whereas the relational database MySQL, for instance, has its own notion of a user. Hadoop Operations



796、单词 berkeley 的匹配文本:


  1. In 1999, I packed everything I owned into my car for a cross-country trip to begin my new job as Staff Researcher at the University of California, Berkeley Computer Science Department. Monitoring with Ganglia


  2. We would like to thank the Mesos team at UC Berkeley for many fruitful and interesting discussions about Mesos, and Joseph Hellerstein for his early work on modeling scheduler interference in Omega. Omega - flexible, scalable schedulers for large compute clusters


  3. Spark is an open-source research project from UC Berkeley [32], that targets machine learning and interactive querying workloads. Apache Hadoop YARN Yet Another Resource Negotiator


  4. The standard Lucene distribution contains several Directory implementations, including filesystembased and memory-based, Berkeley DB-based (in the Lucene contrib module), and several others. Professional Hadoop Solutions


  5. You could either use one of the free databases, such as MySQL or PostgreSQL, or a pure key/value store like Berkeley DB. HBase in Action


  6. Systems like Berkeley DB, Coherence, GT.M, and object-oriented database systems have been around for years, with some dating back to the early 1980s, and they fall into the NoSQL group by definition as well. HBase:The Definitive Guide


  7. The first version of Chubby used the replicated version of Berkeley DB [20] as its database. Chubby - The lock service for loosely-coupled distributed systems


  8. Oracle Berkeley XML DB Berkeley XML DB is an open source database written in Java that started as a research project at Harvard and is now supported by Oracle. Cassandra The Definitive Guide


  9. Ganglia was built by a group at the University of California, Berkeley, specifically to collect, aggregate, and plot a large number of metrics from large clusters of machines. Hadoop Operations


  10. There is also a project to port Hive to Spark, called Shark (http://shark.cs.berkeley.edu/) Programming Hive



797、单词 idl 的匹配文本:


  1. The interface is defined in Thrift IDL as shown here: Mahout in Action


  2. Such schemas are expressed using the Interface Definition Language (IDL) Java Network Programming and Distributed Computing


  3. In addition to pure serialization Avro also supports Avro RPCs, allowing you to define Avro Interactive Data Language (IDL), which is based on the Avro schema definitions. Professional Hadoop Solutions


  4. Java EE applications may use L to act as clients of CORBA services, but only Java EE application clients ired to be allowed to use Java IDL directly to present CORBA services ves. Java EE 7 Specification


  5. Thrift has an Interface Definition Language (IDL) for describing services and objects. HBase in Action


  6. There are a number of other serialization frameworks that approach the problem in a different way: rather than defining types through code, you define them in a languageneutral, declarative fashion, using an interface description language (IDL) Hadoop:The Definitive Guide 3rd Edition


  7. Protocol Buffers Similar to Avro, you can use the Protocol Buffer’s IDL to define an external schema, which is then used to serialize complex data structures into HBase columns. HBase:The Definitive Guide


  8. These descriptions are formatted in a special language, called Interface Definition Language (IDL) for CORBA and Web Services Description Language (WSDL) for web services. Core Java Volume II Advanced Features 9th Edition


  9. Notable omissions are the RMI and IDL tools that are specific to enterprise programming and which are documented in Java Enterprise in a Nutshell (O’Reilly) Java in a Nutshell 5th Edition


  10. Just add one method, which sets all three instance variables in one call in the following IDL definition: Java Performance Tuning 2nd Edition



798、单词 cartesian 的匹配文本:


  1. It is incredible what a wide range of problems can be solved with such a straightforward paradigm, from simple numerical aggregations to complex join operations and Cartesian products. MapReduce Design Patterns


  2. The first-level search is based on a Cartesian Grid search. Professional Hadoop Solutions


  3. Traditional SQL features like from clause subqueries, various types of joins – inner, left outer, right outer and outer joins, cartesian products, group bys and aggregations, union all, create table as select and many useful functions on primitive and complex types make the language very SQL like. Hive A Petabyte Scale Data Warehouse Using Hadoop


  4. After the reducer has read all of the input records for the join value and partitioned them in memory, it performs a Cartesian product across all partitions and emits the results of each join. Hadoop in Practice


  5. Pig Latin includes the cross-product operator (also known as the cartesian product), which joins every tuple in a relation with every tuple in a second relation (and with every tuple in further relations if supplied) Hadoop:The Definitive Guide 3rd Edition


  6. For example, you might define a class named Point to represent a data point in the two-dimensional Cartesian coordinate system. Java in a Nutshell 5th Edition


  7. Lexicographic Ordering Lexicographic ordering is the natural (alphabetic) ordering of the product of two ordered Cartesian sets. Cassandra The Definitive Guide


  8. Cartesian Product JOINs A Cartesian product is a join where all the tuples in the left side of the join are paired with all the tuples of the right table. Programming Hive


  9. Problem You want to create points that are similar to points on a Cartesian coordinate system. Java 7 Recipes A Problem-Solution Approach


  10. In the absence of join conditions between two entities, queries will produce a Cartesian product. Pro JPA2



799、单词 subclassing 的匹配文本:


  1. Writing a Pregel program involves subclassing the predefined Vertex class (see Figure 3) Pregel  -  A System for Large-Scale Graph Processing


  2. For example, let us suppose we want to prevent others from subclassing the Executive class. Core Java Volume I Fundamentals 9th Edition


  3. In the FJTask framework, these tasks subclass FJTask rather than subclassing Thread, both of which implement Runnable. A Java ForkJoin Framework


  4. Different branches can now provide different implementations of the method makeCustomerHappy by subclassing the OnlineBanking class. Java 8 in Action Lambdas, Streams and Functional-style Programming


  5. All implementations of Tool need to implement Configurable (since Tool extends it), and subclassing Configured is often the easiest way to achieve this. Hadoop:The Definitive Guide 3rd Edition


  6. The Java SE documentation states that the DocumentFilter class was invented to avoid subclassing. Core Java Volume II Advanced Features 9th Edition


  7. Unlike The Java Language Specification, this book uses inheritance as a synonym for subclassing. Effective Java 2nd Edition


  8. Method overriding involves subclassing and is covered in Chapter 3 Java in a Nutshell 5th Edition


  9. A class or object is reusable to the extent that it can be readily employed across different contexts, either as a black-box component or as the basis of white-box extension via subclassing and related techniques. Concurrent Programming in Java Design Principles and Pattern


  10. Lots of functionality is obtained by subclassing the Applet or JApplet class. Java 7 Recipes A Problem-Solution Approach



800、单词 drbd 的匹配文本:


  1. Other installations use a tool such as DRBD (http://www.drbd.org/) to replicate the host file system in near real time to a separate physical machine. Pro Hadoop


  2. A variation on this procedure is to use a reliable way to store the master’s binary log files, such as a SAN or a distributed replicated block device (DRBD) High Performance MySQL 3rd Edition


  3. At the time of writing, however, the Pacemaker/DRBD based approach remains the recommended one for OpenStack environments. high-availability-guide


  4. There have also been applications of specialized Linux software such as DRBD 5 Hadoop in Action



涉及文献数目:164
1、A Java ForkJoin Framework
2、ActiveMQ in Action
3、Apache Flume Distributed Log Collection for Hadoop
4、Apache Hadoop Goes Realtime at Facebook
5、Apache Hadoop YARN Yet Another Resource Negotiator
6、Apache Kafka
7、Apache Solr 4 Cookbook
8、Apache Sqoop Cookbook
9、BTrace Java Platform Observability by Bytecode Instrumentation
10、Beginning CouchDB
11、Beginning Scala
12、Bigtable - A Distributed Storage System for Structured Data
13、Building LinkedIn’s Real-time Activity Data1
14、Building and Testing with Gradle
15、Cassandra A Decentralized Structured Storage System
16、Cassandra High Performance Cookbook
17、Cassandra The Definitive Guide
18、Ceph A Scalable, High-Performance Distributed File System
19、Chubby - The lock service for loosely-coupled distributed systems
20、Cloudera Impala
21、Concurrent Programming in Java Design Principles and Pattern
22、Core Java Volume I Fundamentals 9th Edition
23、Core Java Volume II Advanced Features 9th Edition
24、CouchDB The Definitive Guide
25、Dapper a Large-Scale Distributed Systems Tracing Infrastructure
26、Data Structures and Algorithm Analysis in Java 3rd Edition
27、Deploying OpenStack
28、Dremel - Interactive Analysis of WebScale Datasets
29、Effective Java 2nd Edition
30、Elasticsearch The Definitive Guide
31、Elasticsearch in Action MEAP V07 cHAPTER 1
32、FlumeJava - Easy, Efficient Data-Parallel Pipelines
33、Functional Programming Patterns in Scala and Clojure
34、Functional Programming in Scala
35、Fundamental Networking in Java
36、Getting Started with CouchDB
37、Getting Started with Google Guava
38、Getting Started with Storm
39、Gradle Beyond The Basics
40、Gradle Effective Implementation Guide
41、Gradle in Action
42、Graph Databases
43、HBase Administration Cookbook
44、HBase in Action
45、HBase:The Definitive Guide
46、HDFS scalability the limits to growth
47、Hadoop Beginners Guide
48、Hadoop MapReduce Cookbook
49、Hadoop Operations
50、Hadoop Operations and Cluster Management Cookbook
51、Hadoop RealWorld Solutions Cookbook
52、Hadoop in Action
53、Hadoop in Practice
54、HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
55、Hadoop:The Definitive Guide 3rd Edition
56、High Performance MySQL 3rd Edition
57、Hive A Petabyte Scale Data Warehouse Using Hadoop
58、Incoop MapReduce for Incremental Computations
59、Interpreting the Data Parallel Analysis with Sawzall
60、JSR-133 Java Memory Model and Thread
61、Java 7 Concurrency Cookbook
62、Java 7 New Features Cookbook
63、Java 7 Recipes A Problem-Solution Approach
64、Java 8 in Action Lambdas, Streams and Functional-style Programming
65、Java EE 7 Essentials
66、Java EE 7 Specification
67、Java Network Programming 4th Edition
68、Java Network Programming and Distributed Computing
69、Java Performance
70、Java Performance Tuning 2nd Edition
71、Java SE 8 for the Really Impatient
72、Java Security 2nd Edition
73、Java Threads 3rd Edition
74、Java in a Nutshell 5th Edition
75、Jenkins Continuous Integration Cookbook
76、Jenkins The Definitive Guide
77、Kafka a Distributed Messaging System for Log Processing
78、Lucene in Action 2nd Edition
79、Mahout in Action
80、Managing Infrastructure with Puppet
81、MapReduce - Simplied Data Processing on Large Clusters
82、MapReduce Design Patterns
83、MapReduce a flexible data processing tool
84、MapReduce and Parallel DBMSs Friends or Foes
85、Mastering ElasticSearch
86、Megastore - Providing Scalable, Highly Available Storage for Interactive Services
87、MongoDB The Definitive Guide 2nd Edition
88、MongoDB in Action
89、Monitoring with Ganglia
90、Namenode High Availability
91、Netty in Action MEAP V08
92、NoSQL Distilled
93、Omega - flexible, scalable schedulers for large compute clusters
94、OpenStack Operations Guide
95、Oracle JRockit The Definitive Guide
96、Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications
97、Performance Testing With JMeter 2.9
98、PowerDrill - Processing a Trillion Cells per Mouse Click
99、Pregel  -  A System for Large-Scale Graph Processing
100、Pro Hadoop
101、Pro JPA2
102、Pro Java 7 NIO.2
103、Pro Puppet
104、Pro Spring 3
105、Pro Spring MVC
106、Pro Spring Security
107、Professional Hadoop Solutions
108、Programming Concurrency on the JVM
109、Programming Hive
110、Programming Pig
111、Programming Scala
112、Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine
113、Programming in Scala 2nd Edition
114、RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.
115、RCFile A Fast and Space-efficient Data Placement Structure in MapReduce-based Warehouse Systems
116、RabbitMQ in Action
117、Redis in Action
118、Resilient Distributed Datasets - A Fault-Tolerant Abstraction for In-Memory Cluster Computing
119、SQL Antipatterns
120、Scala for the Impatient
121、Scala in Action
122、Scala in Depth
123、Scalable IO in Java
124、Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr
125、Scaling CouchDB
126、Scaling MongoDB
127、Selenium 2 Testing Tools Beginner's Guide
128、Selenium Testing Tools Cookbook
129、Solr 3 Enterprise Search Server
130、Solr 3.1 Cookbook
131、Solr in action
132、Sonar Code Quality Testing Essentials
133、Spanner - Google’s Globally-Distributed Database
134、Spring Batch in Action
135、Spring Data Modern Data Access for Enterprise Java
136、Spring Dynamic Modules in Action
137、Spring Integration in Action
138、Spring Roo in Action
139、Spring Security 3.1
140、Spring in Action 4th Edition
141、Spring in Practice
142、Steps in Scala An Introduction to Object-Functional Programming
143、Storage Architecture and Challenges
144、Storm Blueprints Patterns for Distributed Real-time Computation
145、Storm Real-Time Processing Cookbook
146、Tajo A Distributed Data Warehouse System on Large Clusters
147、Tenzing - A SQL Implementation On The MapReduce Framework
148、Testable JavaScript
149、The Definitive Guide to MongoDB
150、The Hadoop Distributed File System
151、The Java Language Specification Java SE 7 Edition
152、The Java Virtual Machine Specification Java SE 7 Edition
153、The anatomy of a large-scale hypertextual Web search engine
154、Thinking in Java 4th Edition
155、Tika in Action
156、Understanding MySQL Internals
157、Web Crawling and Data Mining with Apache Nutch
158、Web search for a planet the google cluster architecture
159、ZeroMQ
160、admin-user-guide-trunk
161、bk-admin-guide-cloud-latest
162、bk-compute-adminguide-grizzly
163、high-availability-guide
164、user-guide

© 著作权归作者所有

杨尚川

杨尚川

粉丝 1103
博文 220
码字总数 1624053
作品 12
东城
架构师
私信 提问
Java8全新打造,英语学习supertool

superword是一个Java实现的英文单词分析软件,主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。Clean code、Fluent style、Java8 feature: Lambdas, Streams and...

杨尚川
2015/03/29
427
0
英文单词分析软件--superword

Superword is a Java open source project dedicated in the study of English words analysis and auxiliary reading, including but not limited to, spelling similarity, definition sim......

杨尚川
2015/02/18
2.2K
0
2000个软件开发领域的高频特殊词及精选例句(二)

superword是一个Java实现的英文单词分析软件,主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。 276、单词 tokenizer 的匹配文本: Analysis is done by the anal...

杨尚川
2015/03/19
807
1
动词短语(Phrasal Verb)

动词短语(Phrasal Verb)是英语的重要组成部分,在口语和书面语中都被大量使用。本文对动词短语做一些简单的讨论。 一、什么是动词短语? 动词短语由动词加一个或两个小品词(particle)构成...

阮一峰
2006/09/14
0
0
有道词典 纯净版 - imsoft.cnblogs

软件名称:有道词典 软件版本:5.4 正式版(5.4.46.5554) 软件主页:http://cidian.youdao.com/ 软件定制:飞扬时空 更新日期:2013年8月26日 软件简介: 有道词典是一款免费的全能翻译软件...

imzdx
2014/04/17
0
0

没有更多内容

加载失败,请刷新页面

加载更多

社区投稿 | 线程简介和 MySQL 调试环境搭建

作者:高鹏 文章末尾有他著作的《深入理解MySQL主从原理 32讲》,深入透彻理解MySQL主从,GTID相关技术知识。 本文节选自《深入理解MySQL主从原理》第29节 注意:本文分为正文和附件两部分,...

爱可生
5分钟前
0
0
DDOS攻击可以分为什么类型?怎么样才能解决?

DDoS 是一种多源网络攻击,其目的是针对终端用户扰乱其网络的资源或服务。其不断进化的复杂性能够造成各种各样的伤害,例如欺诈以及勒索等。DDoS 攻击通常透过多重受损的系统或者装置注入殭尸...

云漫网络Ruan
8分钟前
0
0
从零开始入门 K8s| 阿里技术专家详解 K8s 核心概念

作者| 阿里巴巴资深技术专家、CNCF 9个 TCO 之一 李响 一、什么是 Kubernetes Kubernetes,从官方网站上可以看到,它是一个工业级的容器编排平台。Kubernetes 这个单词是希腊语,它的中文翻译...

阿里巴巴云原生
8分钟前
0
0
修改和编译spring源码,构建jar(spring-context-4.0.2.RELEASE)

上周在定位问题时,发现Spring容器实例化Bean的时候抛出异常,为了查看更详细的信息,决定修改spring-context-4.0.2.RELEASE.jar中的CommonAnnotationBeanPostProcessor类的代码,在里面打印...

程序员欣宸
11分钟前
0
0
MongoDB集群配置

MongoDB集群配置 2019年06月30日 13:21:05 2014Team 阅读数 77更多 分类专栏: MongoDB 版权声明:本文为博主原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。 本文...

linjin200
12分钟前
0
0

没有更多内容

加载失败,请刷新页面

加载更多

返回顶部
顶部