文档章节

2000个软件开发领域的高频特殊词及精选例句(四)

杨尚川
 杨尚川
发布于 2015/03/20 23:30
字数 64989
阅读 150
收藏 1

superword是一个Java实现的英文单词分析软件,主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。

801、单词 spellchecker 的匹配文本:


  1. Setting this property to values higher than the size parameter can result in a more accurate document frequency (this is because of the fact that terms are held in different shards for our indices unless we have a single-shard index created) being calculated but will also result in the spellchecker's performance degradation. Mastering ElasticSearch


  2. Within the spellchecker search component, there are one or more XML blocks named spellchecker so that different dictionaries and other options can be configured. Solr 3 Enterprise Search Server


  3. Chapter 9, Using Additional Solr Functionalities: In this chapter, you will find recipes that will show you how to use additional Solr components, like the highlighting mechanism, spellchecker, statistics, or grouping mechanism. Solr 3.1 Cookbook


  4. Lucene has a sandbox component, spellchecker, covered in section 8.XXX, that you can use. Lucene in Action 2nd Edition


  5. If you are used to the way spellchecker worked in the previous Solr versions, you may remember that it required its own index to give you spelling corrections. Apache Solr 4 Cookbook



802、单词 xcode 的匹配文本:


  1. The Jar Bundler utility that is a part of XCode lets you turn a JAR file into a first-class Mac application. Core Java Volume I Fundamentals 9th Edition


  2. Outside of the Web, environments like Apple’s Xcode or Microsoft’s .NET all provide toolkits that simplify the development and functionality of your applications. Getting Started with CouchDB


  3. Xcode is a collection of development tools, and an Integrated Development Environment (IDE) for OS X. Monitoring with Ganglia


  4. Though the installation of Xcode for OS X is a bit more difficult, the fact that the build tools download is 10 times larger makes following along without a long break much more difficult. Redis in Action


  5. Installing the Xcode Developer Tools The Xcode developer tools are a suite of utilities for creating software applications that run on Mac OS X. Beginning CouchDB


  6. In this recipe, we will see how to download and configure the iWebDriver Xcode project from the Selenium code base to run against a simulator. Selenium Testing Tools Cookbook


  7. They all require you to have the XCode developer tools installed, which includes libraries and compilers. Redis Cookbook


  8. You will however need to have a machine with OS X on to start the simulator since it is part of XCode. Selenium 2 Testing Tools Beginner's Guide



803、单词 resizing 的匹配文本:


  1. It doesn’t immediately resize the component but merely marks it for resizing. Core Java Volume I Fundamentals 9th Edition


  2. You can see this by resizing the window when you run the program from the console command line. Thinking in Java 4th Edition


  3. While the server is rebuilding, its status will be displayed as RESIZING. bk-compute-adminguide-grizzly


  4. Resizing the Oplog Your primary’s oplog should be thought of as your maintenance window. MongoDB The Definitive Guide 2nd Edition


  5. The latter provides more control using resizing of thread pools, which helps ensure that your overall computation doesn’t block just because all of your fixed number of threads are waiting for I/O. Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. You can see that resizing a picture, rewarding the user, and notifying friends are three separate tasks. RabbitMQ in Action


  7. This can mean changing GC strategies, automatic heap resizing, getting rid of memory fragmentation at the right intervals, or mainly recognizing when it is most appropriate to "stop the world" Oracle JRockit The Definitive Guide


  8. Resizing columns Users can select rows by clicking anywhere in a row. Core Java Volume II Advanced Features 9th Edition


  9. As elements are added to a StringBuilder or StringBuffer, the underlying char[] data storage, may be subject to resizing. Java Performance


  10. Because the paintComponent() method will be called during a resizing of the window, the clearRect() method will dynamically fill the background to gray as we resize the window. Java 7 Recipes A Problem-Solution Approach



804、单词 uninitialized 的匹配文本:


  1. There must never be an uninitialized class instance on the operand stack or in a local variable when a jsr or jsr_w instruction is executed. The Java Virtual Machine Specification Java SE 7 Edition


  2. Of course, the compiler could have given i a default value, but an uninitialized local variable is probably a programmer error, and a default value would have covered that up. Thinking in Java 4th Edition


  3. If a program were able to read the value of an uninitialized variable, the effect would be the same as if it were able to read random memory locations. Java Security 2nd Edition


  4. And calling the constructor explicitly from your code is also a futile exercise, since it leaves you with an uninitialized instance that most definitely does not behave as expected. HBase:The Definitive Guide


  5. A final instance field in a Java object is assigned its one and only value in a constructor, but as all uninitialized fields, it also has an implicit default value (0 or maybe null) before the constructor is run. Oracle JRockit The Definitive Guide


  6. Accidental errors, such as uninitialized variables, can easily wreak havoc if they are not caught. Core Java Volume II Advanced Features 9th Edition


  7. The idea behind the idiom is to check the value of the field twice (hence the name double-check): once without locking, and then, if the field appears to be uninitialized, a second time with locking. Effective Java 2nd Edition


  8. The new operator creates a new, but uninitialized, instance of the class. Java in a Nutshell 5th Edition


  9. All JIT compilers of Java bytecodes have to deal with the possibility of unloaded or uninitialized classes, and the Server JIT compiler handles this by treating the path as unreached when it contains unresolved constant pool entries. Java Performance


  10. Like all other uninitialized Object reference instance variables, the _grades array instance variable is automatically initialized to null. Java 7 Recipes A Problem-Solution Approach



805、单词 ieee 的匹配文本:


  1. The rounding operations of the Java Virtual Machine always use IEEE 754 round to nearest mode. The Java Virtual Machine Specification Java SE 7 Edition


  2. You might not be able to move files to a system whose floating-point format is different (however, the vast majority of processors use the IEEE floating-point format) High Performance MySQL 3rd Edition


  3. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Building LinkedIn’s Real-time Activity Data1


  4. The primitive types are defined to be the same on all machines and in all implementations, and are various sizes of two's-complement integers, single- and double-precision IEEE 754 standard floating-point numbers, a boolean type, and a Unicode character char type. The Java Language Specification Java SE 7 Edition


  5. In theory, if you understand the details of storing numbers in the IEEE 754 SQL Antipatterns


  6. Both types adhere to the IEEE 754-1985 standard, which specifies both the format of the numbers and the behavior of arithmetic for the numbers. Java in a Nutshell 5th Edition


  7. Floats and doubles are written in IEEE 754 form in four and eight bytes, respectively. Java Network Programming 4th Edition


  8. Rather, it’s a general problem for all systems that use the IEEE standard for encoding floating-point numbers! However, there are two workarounds we can use in Hive. Programming Hive


  9. See also follow-ups, including: "Recent Advances in Memory Consistency Models for Hardware Shared-Memory Systems" Proceedings of the IEEE, special issue on distributed shared memory, 1999 Concurrent Programming in Java Design Principles and Pattern


  10. This means that BSON can encode any IEEE floating-point value and any signed integer up to eight bytes in length. MongoDB in Action



806、单词 printf 的匹配文本:


  1. You have now seen all features of the printf method. Core Java Volume I Fundamentals 9th Edition


  2. Note: ideally, this should be the printf/scanf-style format of the value being passed, but in reality, all are presently passed as string values, and are then converted to their specified types by gmond. Monitoring with Ganglia


  3. Formatting output One of the long-awaited features that has finally appeared in Java SE5 is output formatting in the style of C’s printf( ) statement. Thinking in Java 4th Edition


  4. That is, Predef’s printf( ) routes the call to Console’s printf( ) Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


  5. In this case, each string in the collection is passed as an argument to printf: Programming Scala


  6. There is also a printf function with a C-style format string: Scala for the Impatient


  7. To write to a print writer, use the same print, println, and printf methods that you used with System.out. Core Java Volume II Advanced Features 9th Edition


  8. The toString method is automatically invoked when an object is passed to println, printf, the string concatenation operator, or assert, or printed by a debugger. Effective Java 2nd Edition


  9. This string was used in both of the printf methods. Java 7 New Features Cookbook


  10. This class enables C-style formatted text output with printf( ) and format( ) methods. Java in a Nutshell 5th Edition



807、单词 safepoint 的匹配文本:


  1. Newer versions of JRockit use a more traditional safepoint approach instead. Oracle JRockit The Definitive Guide


  2. The modules for supporting synchronization, stack, memory, and safepoint pages are initialized. Java Performance



808、单词 fsync 的匹配文本:


  1. It has broken InnoDB’s support for group commit (a technique that can commit several transactions with a single I/O operation) since MySQL 5.0, so it causes many more fsync() calls than it should.12 It also causes each transaction to require a binary log sync if binary logs are enabled and requires two InnoDB transaction log flushes per commit instead of one. High Performance MySQL 3rd Edition


  2. When it is set to true (the default), CouchDB allows operations to be run against the disk without an explicit fsync after each operation. CouchDB The Definitive Guide


  3. This command locks the database against any further writes and then flushes all dirty data to disk (fsync), ensuring that the files in the data directory have the latest consistent information and are not changing. MongoDB The Definitive Guide 2nd Edition


  4. For non-bulk writes, requiring an fsync will have a major performance impact. Scaling CouchDB


  5. Another method, hsync(), has also been added that makes a stronger guarantee that the operating system has flushed the data to the datanodes’ disks (like POSIX fsync) Hadoop:The Definitive Guide 3rd Edition


  6. As far as HBase and the log are concerned, you can set the log flush times to be as low as you want, or sync them for every edit—you are still dependent on the underlying filesystem as mentioned earlier; the stream used to store the data is flushed, but is it written to disk yet? We are talking about fsync style issues. HBase:The Definitive Guide


  7. If you want a snapshot of the whole cluster, you would have to turn off the balancer, fsync and lock the slaves in the cluster, take dumps from them, then unlock them and restart the balancer. Scaling MongoDB


  8. However, Lucene relies on the OS and IO system that holds the index to properly implement the “fsync” system call, by flushing any OS or IO write caches to the actual underlying stable storage. Lucene in Action 2nd Edition


  9. The fsync option can be set to TRUE or FALSE; FALSE is the default value for this option as well. The Definitive Guide to MongoDB


  10. So MongoDB forcibly syncs all data files every 60 seconds using the fsync system call. MongoDB in Action



809、单词 crl 的匹配文本:


  1. It is also useful to have a cron script that will periodically redownload the metadata and copy the new Certificate Revocation List (CRL) bk-compute-adminguide-grizzly


  2. One of those commands is called ca and is used to set up a CA and a certificate revocation list (CRL).4 RabbitMQ in Action


  3. As you can see, there is a strong synergy between the methods that are used to operate upon an X509 certificate and those used to operate upon a CRL: Java Security 2nd Edition


  4. The puppet cert command will automatically keep the ca_crl.pem file updated as we issue and revoke new Puppet agent certificates. Pro Puppet


  5. The CertificateFactory class serves as a certificate parser, providing the ability to convert a stream of bytes (or the base64 encoding of those bytes) into a Certificate, a CertPath or a CRL object. Java in a Nutshell 5th Edition



810、单词 nimbus 的匹配文本:


  1. Nimbus uses vector drawings, not bitmaps, and is therefore independent of the screen resolution. Core Java Volume I Fundamentals 9th Edition


  2. Storm’s overall execution is controlled by a master process —  Nimbus. Professional Hadoop Solutions


  3. A Storm cluster consists of one master node (called nimbus) and one or more. Storm Blueprints Patterns for Distributed Real-time Computation


  4. We need at least one nimbus node, two supervisor nodes, and a zookeeper node: Storm Real-Time Processing Cookbook


  5. Master node run a daemon called Nimbus, which is responsible for distributing code around the cluster, assigning tasks to each worker node, and monitoring for failures. Getting Started with Storm


  6. The following code listing builds an application showcasing many of Swing’s standard components with the new Nimbus Look ‘n’ Feel: Java 7 Recipes A Problem-Solution Approach



811、单词 sourceforge 的匹配文本:


  1. Ganglia (http://ganglia.sourceforge.net/) is an open source monitoring tool used to collect metrics, display graphs, and can be tiered to handle very large installations. Apache Flume Distributed Log Collection for Hadoop


  2. Tip The Napkin look-and-feel (http://napkinlaf.sourceforge.net) gives a hand-drawn appearance to all user interface elements. Core Java Volume I Fundamentals 9th Edition


  3. It provides the stable base of Hadoop 0.18.3 with bug fixes and some new features back-ported in and added-in hooks to the support scribe log file aggregation service (http://scribeserver.wiki.sourceforge.net/) Pro Hadoop


  4. Cobertura (http://cobertura.sourceforge.net/) is a Java code coverage tools that needs to instrument the bytecode after it’s compiled. Gradle in Action


  5. Ceph is licensed under the LGPL and is available at http://ceph.sourceforge.net/ Ceph A Scalable, High-Performance Distributed File System


  6. Cluster SSH (http://sourceforge.net/projects/clusterssh) is a useful tool if you’re dealing with a cluster of machines. HBase in Action


  7. For help setting up NFS on Linux, refer to the HOWTO at http://nfs.sourceforge.net/nfs-howto/index.html. Hadoop:The Definitive Guide 3rd Edition


  8. If your database doesn’t, check out iSQL-Viewer (http://isql.sourceforge.net) or SQuirreL (http://squirrel-sql.sourceforge.net) Core Java Volume II Advanced Features 9th Edition


  9. Getting ready Before stating this recipe, you should download FindBugs from the project's web page (http://findbugs.sourceforge.net/) Java 7 Concurrency Cookbook


  10. To do so, go to http://emma.sourceforge.net/ and download the latest Emma code coverage version. Java 7 Recipes A Problem-Solution Approach



812、单词 ent 的匹配文本:


  1. Querying this using the same query values as last time, but using the view by_ingredi ent, we get the following list of recipes: Getting Started with CouchDB


  2. You need not include limitations (a)-(c) from the previous paragraph or any icular "pass through" requirements in any license You grant concerning the use of your ent Implementation or products derived from it. Java EE 7 Specification


  3. The NDITIONS is a Sqoop ro that must be ent in the WHERE se of the query. Hadoop in Practice


  4. Only if all of them fall inside the EJB Lite subset that ent is considered applicable to Web Profile products. Java EE 7 Web Profile Specification



813、单词 dremel 的匹配文本:


  1. In this paper, we describe the architecture and implementation of Dremel, and explain how it complements MapReduce-based computing. Dremel - Interactive Analysis of WebScale Datasets


  2. The need to support a SQLlike query language in Spanner was also clear, given the popularity of Dremel [28] as an interactive dataanalysis tool. Spanner - Google’s Globally-Distributed Database


  3. As Sqoop matures, a renewed focus on SQL-oriented analytics continues to make it relevant: systems like Cloudera Impala and Dremel-style analytic engines offer powerful distributed analytics with SQLbased languages, using the common data substrate offered by HDFS. Apache Sqoop Cookbook


  4. Dremel is a scalable, interactive, ad-hoc query system used to analyze read-only nested data. Professional Hadoop Solutions


  5. The engine itself can only deal with flat relational data, unlike Dremel [17] Tenzing - A SQL Implementation On The MapReduce Framework


  6. Compared to Dremel which supports thousands of different datasets (streaming the data from a distributed file system such as GFS [15]), our column-store relies on having as much data in memory as possible. PowerDrill - Processing a Trillion Cells per Mouse Click



814、单词 marshalling 的匹配文本:


  1. It’s no fault of the database; properly tuned and configured, a modern database is excellent at indexing and retrieving information efficiently, but the overhead of retrieving, marshalling, serializing, transmitting, and deserializing result sets is still much greater than the overhead of reading data from optimized in-memory data structures. Mahout in Action


  2. When a stub passes a request to a remote skeleton, it must package the parameters (either primitive datatypes, objects, or both) for transmission, which is known as data marshalling. Java Network Programming and Distributed Computing


  3. Netty comes with either a compatible implementation that can be used with other peers using JDK Serialization or one that can be used for maximum speed if the other peers also use JBoss Marshalling. Netty in Action MEAP V08


  4. In addition to the actual data persistence component, the system needs to have the following characteristics; scalable and robust solutions for load balancing, membership and failure detection, failure recovery, replica synchronization, overload handling, state transfer, concurrency and job scheduling, request marshalling, request routing, system monitoring and alarming, and configuration management. Cassandra A Decentralized Structured Storage System


  5. These formats work in a straightforward manner in most programming languages, with several tools available to help you with marshalling, unmarshalling, and validating where applicable. Hadoop in Practice


  6. The last thing that the JIT compiler does to the register allocated LIR is to add mov instructions for parameter marshalling (in this case moving values from in-parameters as defined by the calling convention to positions that the register allocator has picked) Oracle JRockit The Definitive Guide


  7. Parameter marshalling This process is obviously complex, but the good news is that it is completely automatic and, to a large extent, transparent for the programmer. Core Java Volume II Advanced Features 9th Edition


  8. For distributed applications , you need to break down measurements into times spent on each component, times spent preparing data for transfer and from transfer (e.g., marshalling and unmarshalling objects and writing to and reading from a buffer), and times spent in network transfer. Java Performance Tuning 2nd Edition


  9. Instead, the focus is on the marshalling and unmarshalling performance. Java Performance


  10. This is useful during the next step of XML processing, which is either unmarshalling or marshalling these bindings. Java 7 Recipes A Problem-Solution Approach



815、单词 openstack 的匹配文本:


  1. These packages are maintained by community members, refer to http://wiki.openstack.org/Packaging for additional links. bk-compute-adminguide-grizzly


  2. Acknowledgments In general, I would like to thank the entire OpenStack community that gathers on the #openstack IRC channel, mail aliases, and forums. Deploying OpenStack


  3. Swift Recon The Swift Recon middleware (see http://swift.openstack.org/admin_guide.html#clustertelemetry-and-monitoring) provides general machine statistics, such as load average, socket statistics, /proc/meminfo contents, and so on, as well as Swift-specific metrics: bk-admin-guide-cloud-latest


  4. To subscribe or view the archives, go to http://lists.openstack.org/cgi-bin/mailman/ listinfo/openstack. admin-user-guide-trunk


  5. When you create images that access configuration drive data and multiple directories are under the openstack directory, always select the highest API version by date that your consumer supports. user-guide


  6. Learn more about how to contribute to the OpenStack docs at Documentation How To (http://wiki.openstack.org/Documentation/HowTo) OpenStack Operations Guide



816、单词 drpc 的匹配文本:


  1. To enable this functionality, Storm uses the combination of an extra service (Storm DRPC) and a specialized spout and bolt that work together to provide a highly scalable Distributed RPC capability. Storm Blueprints Patterns for Distributed Real-time Computation


  2. We will also see how DRPC easily enables such architecture in a later chapter. Storm Real-Time Processing Cookbook


  3. Storm gives you some tools to enable the use of DRPC. Getting Started with Storm



817、单词 expr 的匹配文本:


  1. If booleanExpr evaluates to true, trueExpr is returned; otherwise falseExpr is returned. MongoDB The Definitive Guide 2nd Edition


  2. Given a data type Expr representing such expressions, in Scala you can write the following code to decompose an Expr into its parts and then return another Expr: Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. Erlang will evaluate Expr, and the Body part that gets executed will depend on the result of that expression; you mark the end of the case expression with the word end. RabbitMQ in Action


  4. Instead, it just results in expr, the expression matched upon. Programming in Scala 2nd Edition


  5. Otherwise, if n DimExpr expressions appear, then array creation effectively executes a set of nested loops of depth n-1 to create the implied arrays of arrays. The Java Language Specification Java SE 7 Edition


  6. If expr is an Add, we extract the left and right parameters, which are themselves Exprs. Beginning Scala



818、单词 gmetric 的匹配文本:


  1. Primarily, we discuss two ways in which to extend Ganglia, including the development and deployment of additional metric modules, and the use of a standalone utility called gmetric. Monitoring with Ganglia


  2. The Ganglia gmetric value FilesCreated will give you an idea of the rate of HDFS file creation. Pro Hadoop



819、单词 hessian 的匹配文本:


  1. Spring remoting provides support for a wide variety of different protocols, including Caucho’s Burlap and Hessian. Pro Spring 3


  2. In doing so, you’ll explore various remoting technologies, including RMI, Hessian/ Burlap, and SOAP web services with JAX-WS. Spring in Action 4th Edition



820、单词 phantomjs 的匹配文本:


  1. With the advent of server-side JavaScript via Node.js, PhantomJS and other applications can now be written entirely in JavaScript. Testable JavaScript



821、单词 zab 的匹配文本:


  1. ZooKeeper uses a protocol called Zab that runs in two phases, which may be repeated indefinitely: Phase 1: Leader election. Hadoop:The Definitive Guide 3rd Edition


  2. This is mitigated by ZooKeeper’s distributed design using an assemble of servers and the Zab protocol to keep its state consistent. HBase:The Definitive Guide


  3. The use of epochs and counters will become clear when we discuss Zab, the protocol we use to broadcast state updates to servers. ZooKeeper Distributed Process Coordination


  4. Abstract—Zab is a crash-recovery atomic broadcast algorithm we designed for the ZooKeeper coordination service. Zab High-performance broadcast for primary-backup systems



822、单词 acknowledgments 的匹配文本:


  1. Front cover brief contents contents foreword preface acknowledgments about this book Roadmap Who should read the book? Code conventions and downloads Author Online About the author. Gradle in Action


  2. Consistency level TWO would allow the first two acknowledgments, local or remote, to successfully complete the operation. Cassandra High Performance Cookbook


  3. Acknowledgments This work was performed under the auspices of the U.S. Ceph A Scalable, High-Performance Distributed File System


  4. Acknowledgments I’d first like to thank Damien Katz, creator of CouchDB, and all of CouchDB’s contributors. Scaling CouchDB


  5. Acknowledgments I would like to extend my thanks to my team of excellent tech editors who contributed ably to the quality of this book: Jason Porter, Spencer Allain, Darin Pope, and Rod Hilton. Gradle Beyond The Basics


  6. Front Cover brief contents contents preface acknowledgments about this book Roadmap Code conventions and downloads Author Online About the author About the cover illustration. Hadoop in Action


  7. Acknowledgments There are many wonderful people to whom I am grateful for helping bring this book to life. Cassandra The Definitive Guide


  8. Consider the overhead of persisting messages and the cost of transporting both messages and client acknowledgments over the wire. ActiveMQ in Action


  9. Acknowledgments Over the years, many others have made contributions to Google’s hardware architecture that are at least as significant as ours. Web search for a planet the google cluster architecture


  10. Acknowledgments from Tim Berglund I’m delighted to be a part of this, the first book on Gradle to be available to the marketplace. Building and Testing with Gradle



823、单词 querydsl 的匹配文本:


  1. The main features of the Spring Data JPA project include the concepts of Repository and Specification, support for the Query Domain Specific Language (QueryDSL), and so on. Pro Spring 3


  2. The Querydsl project tries to tackle this problem by providing a fluent API to define these queries. Spring Data Modern Data Access for Enterprise Java



824、单词 dfsadmin 的匹配文本:


  1. This is done by the hadoop dfsadmin command in step 9 HBase Administration Cookbook


  2. Hadoop also provides the dfsadmin -report command-line tool, which will provide a somewhat verbose listing of the DataNodes in a service. Pro Hadoop


  3. Use the following steps to check the status of an HDFS cluster with hadoop dfsadmin: Hadoop Operations and Cluster Management Cookbook


  4. You can remove the nodes from the exclude file and execute the bin/hadoop dfsadmin –refreshNodes command when you want to add the nodes back in to the cluster. Hadoop MapReduce Cookbook


  5. It is possible for an administrator to run this process manually while the namenode is in safe mode, using the hadoop dfsadmin -saveNamespace command. Hadoop:The Definitive Guide 3rd Edition


  6. While fsck reports on each file in HDFS, there is a dfsadmin command for reporting on each DataNode. Hadoop in Action


  7. The dfsadmin command As an alternative tool to constantly viewing the HDFS web UI to determine the cluster status, we will use the dfsadmin command-line tool: Hadoop Beginners Guide


  8. You can verify that Hadoop is using your script by running the command hadoop dfsadmin -report as the HDFS superuser. Hadoop Operations



825、单词 declaratively 的匹配文本:


  1. Later, Ant caught up with Maven by introducing dependency management through the Apache library Ivy, which can be fully integrated with Ant to declaratively specify dependencies needed for your project’s compilation and packaging process. Gradle in Action


  2. Spring’s transaction support provides a simple mechanism to control transactions across one or more resource providers, either programmatically or declaratively. Pro Spring 3


  3. Authorization with Spring Security can be applied programmatically, by means of code, or declaratively. Pro Spring MVC


  4. How many times do you find yourself reimplementing these operations using iterators? Most databases let you specify such operations declaratively. Java 8 in Action Lambdas, Streams and Functional-style Programming


  5. Spring Batch allows you to choose declaratively a skip policy when something goes wrong. Spring Batch in Action


  6. With appropriate container support, dependency injection can also make it easier to declaratively specify the overall shape of a system, as each component has its dependencies injected into it in a configuration file or in a bit of configuration code. Functional Programming Patterns in Scala and Clojure


  7. Access is not done declaratively, but purely imperatively through the client-side API. HBase:The Definitive Guide


  8. Enables a WebSocket client and server endpoint to be defined declaratively via annotations on a POJO, or programmatically via interface implementation. Java EE 7 Essentials


  9. We can place a guard between the pattern and the => that adds further testing that cannot be described declaratively. Beginning Scala


  10. Spring for Apache Hadoop makes it easy to declaratively configure and create a PigServer in a Java application, much like the Grunt shell does under the covers. Spring Data Modern Data Access for Enterprise Java



826、单词 repartition 的匹配文本:


  1. In distributed query execution, data repartition (like shuffle of MapReduce) is very important. Introduction to Tajo


  2. A metadata server (MDS), also called master server, which manages the file repartition, their access and the namespace. bk-compute-adminguide-grizzly


  3. Moving partitions is simpler, which is why it makes sense to use it when possible, running the more resource-intensive repartition process only when partitions get large enough that only one or two can fit on each database server. CouchDB The Definitive Guide


  4. The join and aggregation are performed in this shuffle (repartition) method. Tajo A Distributed Data Warehouse System on Large Clusters


  5. Repartition join—A reduce-side join for situations where you’re joining two or more large datasets together. Hadoop in Practice


  6. Unfortunately, situations where we can naturally apply this are limited, and running extra MapReduce jobs to repartition the data sources to be usable by this package seems to defeat the efficiency gain. Hadoop in Action


  7. In particular, it adds a Repartition operator, also known as a Reduce Sink operator, before Join or GroupBy operators. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



827、单词 jce 的匹配文本:


  1. If you are also using CentOS or other Red Hat-compatible operating systems, we need to install Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files, by downloading it from the following link: Hadoop Operations and Cluster Management Cookbook


  2. Chapter 13 This chapter discusses the encryption available within Java Cryptography Extension (JCE), which allows developers to encrypt and decrypt arbitrary data. Java Security 2nd Edition


  3. The JCE library provides a convenient set of stream classes that automatically encrypt or decrypt stream data. Core Java Volume II Advanced Features 9th Edition


  4. The Java Cryptography Extension, or JCE, consists of the javax.crypto package and its subpackages. Java in a Nutshell 5th Edition


  5. For Java to support AES-256, an additional JCE policy file must be installed on all machines in the cluster as well as any client machines that wish to connect to it. Hadoop Operations


  6. The stock JSSE bundled with the JDK actually does have code for stronger 256-bit encryption, but it’s disabled unless you install the JCE Unlimited Strength Jurisdiction Policy Files. Java Network Programming 4th Edition



828、单词 multicasting 的匹配文本:


  1. As its name suggests, the MulticastChannel interface maps a network channel that supports IP multicasting. Pro Java 7 NIO.2


  2. Class D is used for simultaneously broadcasting data to a large number of machines that are grouped together (a technique known as multicasting) Java Network Programming and Distributed Computing


  3. Here is a modified version that works in a multithreaded environment and uses multicasting for events: Thinking in Java 4th Edition


  4. Multicasting broadcasts content to all subscribed computers rather than to one particular computer. Java Network Programming 4th Edition


  5. Broadcasting and multicasting are also useful when clients need to look for services. Fundamental Networking in Java


  6. Java SE 7 brought forth a few new features, enabling easier multicasting among other things. Java 7 Recipes A Problem-Solution Approach



829、单词 wifi 的匹配文本:


  1. A cutdown version of the WifiSampler class, just extracting the Wi-Fi metric, is presented here: Monitoring with Ganglia


  2. At the time you weren’t using WiFi because you wanted concentrate on your work, so you didn’t read his email until you got home. CouchDB The Definitive Guide


  3. Once advantage of the Nabaztag is that, since it works via WiFi, it is not constrained to be located. Jenkins The Definitive Guide


  4. After trying to upload a large file several times on a slow, flaky network (WiFi, anyone?), you’ll realize that a proper file transfer protocol needs a way to recover from failures. ZeroMQ


  5. If this attribute is enabled, then the tokens become a phrase query, such as "WiFi" and consequently these tokens must be adjacent in the index. Solr 3 Enterprise Search Server


  6. Here’s a sampling of the full dataset—a handful of places to find a wifi connection in Midtown Manhattan. HBase in Action


  7. Some hosts use Ethernet; some use WiFi; some use PPP; some use something else. Java Network Programming 4th Edition


  8. The easiest way to do this is to configure a wifi network and connect your device to it. Selenium 2 Testing Tools Beginner's Guide



830、单词 xmlreader 的匹配文本:


  1. Listing 4-11 (code file:class XMLReader) shows an implementation that is free of these shortcomings. Professional Hadoop Solutions


  2. Here is a part of the parse method of the EmployeeReader class that implements the XMLReader interface: Click here to view code imageClick here to view code image. Core Java Volume II Advanced Features 9th Edition


  3. Instead of using one of the parse( ) methods of this class, you can also call getXMLReader( ) to obtain the underlying XMLReader object and work with it directly to parse the desired document. Java in a Nutshell 5th Edition


  4. In this case, you’d need to convert these channels into streams before passing them to XMLReader’s parse() method: Java Network Programming 4th Edition



831、单词 dirichlet 的匹配文本:


  1. Fuzzy k-means and Dirichlet clustering will be discussed in that context. Mahout in Action


  2. We can use Latent Dirichlet Allocation to cluster a given set of words into topics and a set of documents to combinations of topics. Hadoop MapReduce Cookbook



832、单词 chinese 的匹配文本:


  1. Unicode grew beyond 65,536 characters, primarily due to the addition of a very large set of ideographs used for Chinese, Japanese, and Korean. Core Java Volume I Fundamentals 9th Edition


  2. We want to know how many "chinese" entries we have. CouchDB The Definitive Guide


  3. An active member of the open source community and recognized Maven expert, Juven was responsible for the Chinese translation of Maven: The Definitive Guide as well as an original Chinese reference book on Maven. Jenkins The Definitive Guide


  4. A class that implements this interface represents an RSA private key that uses the Chinese Remainder Theorem to calculate its value. Java Security 2nd Edition


  5. There are some "ICU" Unicode classes for multilingual support, a Chinese stemmer, and a Polish stemmer. Solr 3 Enterprise Search Server


  6. Letters and digits may be drawn from the entire Unicode character set, which supports most writing scripts in use in the world today, including the large sets for Chinese, Japanese, and Korean. The Java Language Specification Java SE 7 Edition


  7. We will close this chapter with a complete example—a retirement calculator with a user interface in English, German, and Chinese. Core Java Volume II Advanced Features 9th Edition


  8. These supplementary characters, which are mostly infrequently used Han (Chinese) ideographs, occupy 21 bits and cannot be represented in a single char value. Java in a Nutshell 5th Edition


  9. For instance, this META tag specifies the Big-5 encoding for Chinese: Java Network Programming 4th Edition


  10. A JFlex-based1 grammar underlies it, tokenizing with cleverness for the following lexical types: alphanumerics, acronyms, company names, e-mail addresses, computer host names, numbers, words with an interior apostrophe, serial numbers, IP addresses, and CJK (Chinese Japanese Korean) characters. Lucene in Action 2nd Edition



833、单词 redirection 的匹配文本:


  1. Note When you launch a program from a command shell, you can use the redirection syntax of your shell and attach any file to System.in and System.out: Core Java Volume I Fundamentals 9th Edition


  2. When a resource moves to a new location or a new server, redirection is occasionally used. Java Network Programming and Distributed Computing


  3. Redirect the contents of a file into this program (the process of redirection will vary depending on your operating system) Thinking in Java 4th Edition


  4. Run the patch command and use the shell's input redirection to feed it the contents of the patch file: Cassandra High Performance Cookbook


  5. Often, browsers follow these redirects transparently to the user; in Java, the programmer has the ability to determine if the redirection should automatically be followed or not. Java Security 2nd Edition


  6. Many sites in IBM’s intranet employ redirection for updating, load balancing, upgrading, and handling internal reorganizations. Hadoop in Action


  7. However, chunked transfer encoding does get in the way of authentication and redirection. Java Network Programming 4th Edition


  8. This includes logging levels and output redirection, as I show briefly in the next section. Java Performance Tuning 2nd Edition


  9. An example is the redirection at the end of a POST request processing that may change the state of the application. Java Performance


  10. The same thing is done when using the STDIN redirection such as shown in the example. OpenStack Operations Guide



834、单词 liquibase 的匹配文本:


  1. Liquibase is an open source tool that can help manage and organize upgrade paths between versions of a database using a high-level approach. Jenkins The Definitive Guide


  2. There are many other tools for such upgrades, including Liquibase [Liquibase], MyBatis. NoSQL Distilled


  3. The Example Plug-In In this chapter, we will create a Gradle plug-in to automate the use of the open-source database refactoring tool, Liquibase. Gradle Beyond The Basics



835、单词 autowired 的匹配文本:


  1. You just need to add an @Autowired annotation to the setter. Pro Spring 3


  2. However, in our case the AccountRepository is autowired (by Spring) in the AccountService. Pro Spring MVC


  3. The @Autowired annotation can be applied to constructors or fields and allows you to wire relationships by type, without having to explicitly set them up in the XML configuration. Spring in Practice


  4. The test uses the Spring TestContext Framework, which creates a Spring application context during the test and lets you inject some Spring beans into the test (with the @Autowired annotation) Spring Batch in Action


  5. You may have noticed that the constructor is annotated with @Autowired. Spring Integration in Action


  6. You can even roll your own Spring Beans to represent each of these component types, and wire them together using Spring’s @Autowired annotation, or even drop down to using XML or even JavaConfig to configure them. Spring Roo in Action


  7. In this case, we want to use constructor injection, so we added an @ Autowired annotation to the constructor for each class. Getting Started with Google Guava


  8. The constructor is annotated with @Autowired, which means that when the repository implementation is configured, the Spring container will inject the DataSource that has been defined in the application context. Spring Data Modern Data Access for Enterprise Java


  9. To prove that, the test has a property of type CompactDisc that is annotated with @Autowired to inject the CompactDisc bean into the test. Spring in Action 4th Edition



836、单词 optimizes 的匹配文本:


  1. The first assumption is that the map tasks will be threaded, and the individual jobs will choose a thread count that optimizes CPU utilization. Pro Hadoop


  2. Despite this noise, and even though YARN’s design optimizes for multi-tenant throughput, its performance for single jobs is competitive with the central coordinator. Apache Hadoop YARN Yet Another Resource Negotiator


  3. When the final results of the parallel operations are eventually needed, FlumeJava first optimizes the execution plan, and then executes the optimized operations on appropriate underlying primitives (e.g., MapReduces) FlumeJava - Easy, Efficient Data-Parallel Pipelines


  4. Although integration with DynamoDB seems like a trivial implementation (just implement a custom InputFormat and reader classes, similar to ones described in Chapter 4), EMR Hive’s implementation optimizes split calculations by leveraging knowledge of Dynamo internals. Professional Hadoop Solutions


  5. The recipes in this chapter show configuration options and how changing them optimizes performance. Cassandra High Performance Cookbook


  6. Instead, Ceph optimizes for the most common metadata access scenarios. Ceph A Scalable, High-Performance Distributed File System


  7. The balancer optimizes the balancing process by minimizing the inter-rack data copying. The Hadoop Distributed File System


  8. On the other hand, Pig optimizes and processes an entire Pig script as a whole. Hadoop in Action


  9. This slight shift in focus optimizes the workload for certain kinds of problems—in particular, data warehouses and analytics applications that require computing aggregate values over very large sets of similar data. Cassandra The Definitive Guide


  10. In contrast our generated native code can store results on the stack (better data locality) or even registers, depending on how the JIT compiler optimizes. Tenzing - A SQL Implementation On The MapReduce Framework



837、单词 subtyping 的匹配文本:


  1. These subtype rules are not necessarily the most obvious formulation of subtyping. The Java Virtual Machine Specification Java SE 7 Edition


  2. Since the only subtyping available for an enum is that of interface implementation, each nested enum implements the surrounding interface Food. Thinking in Java 4th Edition


  3. In the case of covariance, subtyping can go downward, as you saw in the example of List, but in contravariance it’s the opposite: subtypes go upward. Scala in Action


  4. Java supports wildcards as a flexible mechanism to allow subtyping for generics (more generally referred to as use-site variance) Java 8 in Action Lambdas, Streams and Functional-style Programming


  5. Furthermore, the object-oriented tradition of subtyping and a universal root type accepts some programs that would be considered erroneous in classical functional languages. Programming in Scala 2nd Edition


  6. Since array subtyping is covariant, it must be the case that V << U. The Java Language Specification Java SE 7 Edition


  7. There are no interfaces or subtyping here in this example. Functional Programming in Scala


  8. This is especially true for library writers, who will want to understand when to use parameterized types versus abstract types, which type parameters should be covariant, contravariant, or invariant under subtyping, and so forth. Programming Scala


  9. Luckily, object-oriented languages such as Java offer a far better alternative for defining a single data type capable of representing objects of multiple flavors: subtyping. Effective Java 2nd Edition


  10. So you may be wondering whether there is a way to achieve a variant subtyping relationship similar to what we tried to do in the previous line of code. Java 7 Recipes A Problem-Solution Approach



838、单词 trie 的匹配文本:


  1. A trie with a branching factor of thirty-two requires at most four levels to hold up to 1 million elements. Programming Concurrency on the JVM


  2. Vectors are composed as a trie on the index position of elements. Scala in Depth


  3. If the binary representation of the key is the correct sort order, a binary trie (an ordered tree structure; see http://en.wikipedia.org/wiki/Trie) will be constructed and used for searching; otherwise, a binary search based on the output key comparator will be used. Pro Hadoop


  4. For that reason, RabbitMQ implements a trie data structure where the binding keys patterns are stored in a format that allows for fast querying. RabbitMQ in Action


  5. Trie” comes from the word "retrieval" and is pronounced tree or try. Programming in Scala 2nd Edition


  6. So if the original used quadratic space, so does the compressed trie. Data Structures and Algorithm Analysis in Java 3rd Edition


  7. Footnote 13mWe could also represent  as a trie in which shared prefixes of the error stack areParseError not duplicated, at a cost of having more expensive inserts. Functional Programming in Scala


  8. If you are using strings that contain mainly the ASCII character set, consider using a digital search trie for the first couple of characters. Java Performance Tuning 2nd Edition


  9. If you still have performance problems, you may want to switch to TrieRangeQuery, available in Lucene’s sandbox and covered in Section 8.12.5 Lucene in Action 2nd Edition


  10. It can be as different as a trie (prefix tree) or bit compressed representations tuned to storing numerical values, see Section 3 for more details on this. PowerDrill - Processing a Trillion Cells per Mouse Click



839、单词 preconditions 的匹配文本:


  1. To meet the preconditions of a composite join, both the user and comment data sets have been preprocessed by MapReduce and output using the TextOutputFormat. MapReduce Design Patterns


  2. Oozie server components are responsible for the analysis of job dependencies, execution of preconditions, and submission of the asynchronous jobs to the Hadoop cluster. Professional Hadoop Solutions


  3. Typically, the preconditions olve the presence of one or more technologies among those included in the Unconditional requirements must be obeyed unconditionally. Java EE 7 Specification


  4. The only interesting difference is that we can use Clojure’s preconditions to ensure that the discount is in the valid range. Functional Programming Patterns in Scala and Clojure


  5. This allows us to describe and validate the contract by ensuring that the preconditions must be met by the caller before the method or constructor may be invoked. Java EE 7 Essentials


  6. The Preconditions class, which provides methods for asserting certain conditions you expect variables, arguments, or methods to adhere to. Getting Started with Google Guava


  7. The doc comment should enumerate all of the method’s preconditions, which are the things that have to be true in order for a client to invoke it, and its postconditions, which are the things that will be true after the invocation has completed successfully. Effective Java 2nd Edition


  8. Another common use of the assert statement is to test whether the arguments passed to a method all have values that are legal for that method; this is also known as enforcing method preconditions. Java in a Nutshell 5th Edition


  9. You should use this pattern for debug and trace statements and assertion preconditions, postconditions, and invariants. Java Performance Tuning 2nd Edition


  10. Preconditions and postconditions on the effects of operations, such as rules stating that it is impossible to remove water from an empty tank, or to add water to a full tank that is not equipped with an available overflow tank. Concurrent Programming in Java Design Principles and Pattern



840、单词 automating 的匹配文本:


  1. Automating the loading of files is all the resource loading feature does. Core Java Volume I Fundamentals 9th Edition


  2. If you’re a developer, automating your project is part of your day-to-day business. Gradle in Action


  3. Consider automating through a Jenkins job as a part of a project's QA process. Jenkins Continuous Integration Cookbook


  4. This can be useful if you have a large set of options you want to use or are automating the task of starting up MongoDB. MongoDB The Definitive Guide 2nd Edition


  5. And, by automating the deployment process, Continuous Integration helps you get your software into the hands of the testers and the end users faster, more reliably, and with less effort. Jenkins The Definitive Guide


  6. Once you’re ready to rent computing nodes from AWS, you’ll find Hadoop tools for automating the setting up and running of a Hadoop cluster. Hadoop in Action


  7. However, when working with operational workloads, looking to integrate into other workflows, or automating service access, a browser-based tool is not appropriate, regardless of how powerful it is. Hadoop Beginners Guide


  8. Automating Backups For small installations or developer setups, the simple act of running the mongodump utility and saving the results is a perfectly adequate method of performing ad-hoc backups. The Definitive Guide to MongoDB


  9. As we explore the tool’s capabilities, you’ll discover that Gradle is being heralded as more than just a build tool but also as a means of automating the compilation, test, and release process. Building and Testing with Gradle


  10. Parallel databases can achieve especially high performance when administered by a highly skilled DBA who can carefully design, deploy, tune, and maintain the system, but recent advances in automating these tasks and bundling the software into appliance (pre-tuned and pre-configured) offerings have given many parallel databases high performance out of the box. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



841、单词 adjacency 的匹配文本:


  1. If the graph is not dense, in other words, if the graph is sparse, a better solution is an adjacency list representation. Data Structures and Algorithm Analysis in Java 3rd Edition


  2. The processing engine Some definitions require that a graph database use index-free adjacency, meaning that connected nodes physically “point” to each other in the database.2 Here we take a slightly broader view: any database that from the user’s perspective behaves like a graph database (i.e., exposes a graph data model through CRUD operations) qualifies as a graph database. Graph Databases


  3. Two common ways of representing graphs are with adjacency matrices and with adjacency lists. Hadoop in Practice


  4. We call this the adjacency list, and it can be generated in Pig by a simple GROUP BY. Hadoop:The Definitive Guide 3rd Edition


  5. Adjacency List can be an antipattern when it’s the default choice of so. SQL Antipatterns


  6. They created FlockDB to store the adjacency lists for followers on Twitter, so they could readily understand who follows whom and who blocks whom. Cassandra The Definitive Guide


  7. There are several well-known graph representations known as pointer-based, adjacency matrix, and adjacency list. Hadoop Beginners Guide


  8. Two such methods, the adjacency list and the nested set, are presented in this MySQL developer article: http://mng.bz/83w4 MongoDB in Action



842、单词 jps 的匹配文本:


  1. In the namenode_status() function, we use the jps command to show all running Java processes owned by the hadoop user, and the grep name of the NameNode daemon to see whether it has started: HBase Administration Cookbook


  2. Checking the NameNodes On the master machine, run the jps command as follows: Pro Hadoop


  3. With the jps command, we can get a list of all running daemons as follows: Hadoop Operations and Cluster Management Cookbook


  4. In order to check what Java processes are running and what their virtual machines identifiers are, one can just run a jps command which is provided with most JDK distributions. Mastering ElasticSearch


  5. After running the start script, you should use the jps Java utility to check that all the processes are running. Hadoop in Practice


  6. You can also use Java’s jps command to see whether they are running. Hadoop:The Definitive Guide 3rd Edition


  7. The Java jps command will list all daemons to verify the setup was successful. Hadoop in Action


  8. After starting these components, we use the JDK's jps utility to see which Java processes are running, and, as the output looks good, we then use Hadoop's dfs utility to list the root of the HDFS filesystem. Hadoop Beginners Guide


  9. If you have this path, you can run the tools such as JStack and JPS. Java 7 Recipes A Problem-Solution Approach


  10. Displaying the Gradle worker JVMs with the jps utility $ gradle test. Building and Testing with Gradle



843、单词 encodings 的匹配文本:


  1. Moreover, the encodings for languages with large character sets have variable length: Some common characters are encoded as single bytes, others require two or more bytes. Core Java Volume I Fundamentals 9th Edition


  2. More important (but less unusual these days), the language defines a Unicode representation for strings, yet handles a variety of external character encodings. Interpreting the Data Parallel Analysis with Sawzall


  3. It doesn’t have support in MapReduce for its native data serialization format, though it can support different wire-level data representations, including JSON and various binary encodings. Hadoop in Practice


  4. How do you choose between a fixed-length and a variable-length encoding? Fixedlength encodings are good when the distribution of values is fairly uniform across the whole value space, such as a (well-designed) hash function. Hadoop:The Definitive Guide 3rd Edition


  5. Table 1.1 lists the character encodings that every Java implementation is required to have. Core Java Volume II Advanced Features 9th Edition


  6. This package contains classes that represent character sets or encodings, and defines methods that encode characters into bytes and decode bytes into characters. Java in a Nutshell 5th Edition


  7. Used properly, readers and writers can handle a wide variety of character encodings, including multibyte character sets such as SJIS and UTF-8 Java Network Programming 4th Edition


  8. While XML 1.0 is the most commonly used serialization, a variety of other binary encodings can be used for improved performance. Java Performance


  9. Qualitatively speaking, our OptCols and OptDicts encodings exploit similar properties as a generic dictionary based compression algorithm would (which does not use any expensive, entropy based techniques like Huffman codes) PowerDrill - Processing a Trillion Cells per Mouse Click


  10. Convert legacy character encodings from a byte array to a Unicode String using the String class. Java 7 Recipes A Problem-Solution Approach



844、单词 hduser 的匹配文本:


  1. The following command will add new user called hduser, and then adds this user to the hadoop group: Web Crawling and Data Mining with Apache Nutch


  2. We need to type in yes and then provide the password for the user hduser to log in to the host. Hadoop Operations and Cluster Management Cookbook



845、单词 indirection 的匹配文本:


  1. In those cases, you can build in another level of indirection, as shown in figure 9.5 Gradle in Action


  2. Note also that value types are also likely to give better performance, not only for data access (multiple levels of pointer indirection replaced with a single indexed-addressing instruction) but also for hardware cache utilization (due to data contiguity) Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. Rarely is the often-cited performance hit due to indirection a serious consideration. MapReduce Design Patterns


  4. Any problem in computer science can be solved with a level of indirection. HBase in Action


  5. It worked! The disadvantage of using the Thrift server is that it adds another layer of indirection on top of HDFS, which means that your reads and writes won’t be as fast as they could be. Hadoop in Practice


  6. Defining interceptor bindings provides one level of indirection but removes the dependency from the actual interceptor implementation class. Java EE 7 Essentials


  7. The C runtime system has no protection against array bounds errors, indirection through bad pointers, and so on. Core Java Volume II Advanced Features 9th Edition


  8. This means that practically every call to the WeakHashMap has one extra level of indirection it must go through (e.g., WeakHashMap.get( ) calls HashMap.get( )), which can be a significant performance overhead. Java Performance Tuning 2nd Edition


  9. Such possibilities are truly endless when you consider that asynchronous messaging is simply adding a level of indirection between components in a system. ActiveMQ in Action


  10. The second indirection introduced by the chunk-dictionaries has the effect that the elements are comprised of values from a small range of consecutive integers. PowerDrill - Processing a Trillion Cells per Mouse Click



846、单词 icmp 的匹配文本:


  1. One such mechanism is the Internet Control Message Protocol (ICMP), which is used in conjunction with the Internet Protocol to report errors when and if they occur. Java Network Programming and Distributed Computing


  2. The rules for all other variants of the if_icmp instruction are identical. The Java Virtual Machine Specification Java SE 7 Edition


  3. Every security group rule is a policy which allows you to specify inbound connections that are allowed to access the instance, by source address, destination port and IP protocol, (TCP, UDP or ICMP) bk-compute-adminguide-grizzly


  4. In this example, we will permit SSH (TCP port 22) and ICMP traffic to our instance from any IP address. Deploying OpenStack


  5. If you cannot reach your instances through the floating IP address, make sure the default security group allows ICMP (ping) and SSH (port 22), so that you can reach the instances: bk-admin-guide-cloud-latest


  6. It utilizes the IP protocol's time to live (TTL) field and attempts to elicit an ICMP TIME_EXCEEDED response from each gateway along the path to the host. Cassandra High Performance Cookbook


  7. Sure enough, the standard set of rules allowing only established and related connections, ICMP, loopback device, and SSH traffic were permitted. Hadoop Operations


  8. The most commonly requested is ICMP, the Internet Control Message Protocol, which uses raw IP datagrams to relay error messages between hosts. Java Network Programming 4th Edition


  9. The first column is the IP protocol (one of icmp, tcp, or udp) the second and third columns specify the affected port range. admin-user-guide-trunk


  10. This command allows access to all codes and all types of ICMP traffic, respectively: user-guide



847、单词 params 的匹配文本:


  1. There are convenience methods for tracing execution flow: void entering(String className, String methodName) void entering(String className, String methodName, Object param) void entering(String className, String methodName, Object[] params) void exiting(String className, String methodName) void exiting(String className, String methodName, Object result) Core Java Volume I Fundamentals 9th Edition


  2. The value of this element is determined by the configuration params (plural) directive within a module block. Monitoring with Ganglia


  3. Because paramList is initialized from the static defaultParams array, you can change the paramList for all tests by reassigning defaultParams, or you can change the paramList for one test by passing in a custom paramList for that test: Thinking in Java 4th Edition


  4. After that we set the script that will be used by ElasticSearch by using the setScript method, we set the script parameters by using the setScriptParams method and we run the update request waiting for it to finish and return the UpdateResponse object. Mastering ElasticSearch


  5. The P, Q, and G parameters are set from the values passed in params. Java Security 2nd Edition


  6. For example, req.query is a JSON object of query parameters (query_params from the replication request) Scaling CouchDB


  7. We usually call that class module::params, so in our current case it would be named ssh::params. Pro Puppet


  8. NOTE: In a Scala constructor, you can never call super(params), as you would in Java, to call the superclass constructor. Scala for the Impatient


  9. Initialization parameters, also known as init params, may be defined on a servlet to store startup and configuration information. Java EE 7 Essentials


  10. QueryParams are type-safe in that they can only contain fields defined in the Table that we’re passing them to. Beginning Scala



848、单词 xslt 的匹配文本:


  1. For that purpose, you’ll create a reusable custom task in the buildSrc directory of your project that uses the Ant XSLT task, as show in the next listing. Gradle in Action


  2. In addition to standard support for JSP, which is greatly bolstered by the Spring tag libraries, you can take advantage of fully integrated support for Apache Velocity, FreeMarker, Apache Tiles, and XSLT. Pro Spring 3


  3. To work with this view resolver and views we need an XSLT template for transforming our model to a view. Pro Spring MVC


  4. You can use various forms of XML schema definitions (DTDs, XML Schema, RelaxNG) to check document formats, run queries with XPath and XQuery, and perform transformations with XSLT. NoSQL Distilled


  5. Other XML (Solr 3.4): Any arbitrary XML can be given to Solr along with an XSLT file  that Solr will use to translate the XML to the Update-XML format for further processing. Solr 3 Enterprise Search Server


  6. As a readable alternative to XSLT, Scala’s XML library makes reading and parsing XML a breeze. Programming Scala


  7. This chapter introduces transformers, splitters, and routers that take advantage of XPath, XSLT, and Spring’s own XML marshalling (OXM) libraries. Spring Integration in Action


  8. As with the DOM/XSLT approach, you don’t have to worry about escaping characters in attribute values and character data. Core Java Volume II Advanced Features 9th Edition


  9. A Transformer can transform a document from its Source representation into a new Result representation and optionally apply an XSLT transformation to the document content in the process. Java in a Nutshell 5th Edition


  10. XsltViewResolver Resolves views to be rendered as the result of an XSLT transformation. Spring in Action 4th Edition



849、单词 screenshots 的匹配文本:


  1. Paste in your command output or stack traces, link to screenshots, and so on. bk-compute-adminguide-grizzly


  2. This section includes screenshots of just a few sites and applications that use a standalone CouchDB architecture. CouchDB The Definitive Guide


  3. Indeed, to illustrate this point, many screenshots in this book refer to Hudson rather than Jenkins. Jenkins The Definitive Guide


  4. Figure 6.2 Ganglia screenshots showing CPU utilization for multiple hosts. Hadoop in Practice


  5. Downloading the color images of this book We also provide you with a PDF file that has color images of the screenshots used in  this book. Apache Kafka


  6. Here is an example of a BMI Calculator application page and HTML code written to render this page in a browser as displayed in the following screenshots: Selenium Testing Tools Cookbook


  7. On Windows, the windows appear as shown in the following screenshots. Java 7 New Features Cookbook


  8. The screenshots and examples that follow use a cluster of one host for the JobTracker and NameNode and four slave nodes for running the DataNode and TaskTracker processes. Hadoop Beginners Guide


  9. Earlier versions may have slightly different screenshots and menus than those illustrated in this chapter. Java Performance


  10. Capturing screenshots A lot of the time our Selenium remote control browsers will be running on different machines than the machine that starts the tests. Selenium 2 Testing Tools Beginner's Guide



850、单词 optimally 的匹配文本:


  1. This chapter will cover how to recognize that your job is having a problem and how to tune the scaling parameters so that your job performs optimally. Pro Hadoop


  2. If we get the number of shards right, we’ll end up with a cluster that can grow optimally. CouchDB The Definitive Guide


  3. Optimally, the automated tasks should be executable from the command line, which allows you to run the build from any machine you want, whenever you want. Gradle in Action


  4. The nodes in which the map tasks run are optimally on the nodes in which the data rests. MapReduce Design Patterns


  5. It also requires understanding the inner workings of Cassandra to know when things are working non-optimally. Cassandra High Performance Cookbook


  6. If you have user code that’s not performing optimally, these throughput numbers will be low. Hadoop in Practice


  7. For the cross_fields query type to work optimally, all fields should have the same analyzer. Elasticsearch The Definitive Guide


  8. However, if your network is not performing optimally or you have other reasons to suspect that Cassandra could get a false read on this, you can increase this setting to allow more leniency in determining whether a node is actually down. Cassandra The Definitive Guide


  9. Many agree that with its myriad parameters, it can be incredibly difficult to configure optimally. Hadoop Operations


  10. ActiveMQ uses a prefetch limit to determine the number of messages it will pre-send to consumers, so that network is used optimally. ActiveMQ in Action



851、单词 templating 的匹配文本:


  1. When we’re building new applications and query templating isn’t an issue, we like to use a single database per shard, with the shard number in both the database and the table name. High Performance MySQL 3rd Edition


  2. When producing web pages dynamically, it’s common to use a templating language to simplify page generation. Redis in Action


  3. Because CouchDB is designed to run on client computers, where the environment is out of the control of application developers, having some built-in templating capabilities greatly expands the potential uses of these applications. CouchDB The Definitive Guide


  4. In addition, for customizing the message body, Spring integrates with templating engines, such as Apache Velocity, which allows the mail content to be externalized from the Java code. Pro Spring 3


  5. They are text-based templating engines and both are widely used in applications for all kind of templating solutions. Pro Spring MVC


  6. Now it is simple to use your favorite templating system to generate an empty unit test for each of these files. Testable JavaScript


  7. You can learn more about how to use templates further at http://docs.puppetlabs.com/guides/templating.html. Pro Puppet


  8. This feature makes templating and configuration a breeze, and lets us test our use of XML without so much as opening a file. Programming Scala


  9. In addition, Facelets provides a powerful templating system that allows you to provide a consistent look and feel across multiple pages in a web application. Java EE 7 Essentials


  10. Velocity is an open source templating engine written in Java2 Solr in action



852、单词 emma 的匹配文本:


  1. Among the free tools, JaCoCo is the most active, whereas Emma and Cobertura haven’t been updated in years. Gradle in Action


  2. An alternative open source tool to Cobertura is emma: http://emma.sourceforge. Jenkins Continuous Integration Cookbook


  3. Java developers can pick between Cobertura and Emma, two popular open source code coverage tools, or Clover, a powerful commercial code coverage tool from Atlassian. Jenkins The Definitive Guide


  4. As this is my seventh book project, I would like to especially thank my wonderful wife, Gwen, and my sweet children, Isabella, Emma, and Henry, for putting up with the long days, nights, and weekends where I was camped out in front of my computer. Professional Hadoop Solutions


  5. Emma Colby designed the cover of this book, based on a series design by Edie. Java Threads 3rd Edition


  6. To my daughter, Emma, born during the writing of this book. Hadoop RealWorld Solutions Cookbook


  7. Emma Colby designed the cover of this book, based on a series design by Edie Freedman. Java Performance Tuning 2nd Edition


  8. Solution Use the Emma code coverage tool to create code coverage reports. Java 7 Recipes A Problem-Solution Approach


  9. Lastly, I thank my kids, Cierra, Ariana, Jeremy and Emma, some of whom had to wait for a paragraph to be done before getting help with their homework, and Darleen, who always did her best to take up the slack when her slacker couldn’t keep up. Pro JPA2


  10. Emma Richards of Rackspace Guest Relations took excellent care of our lunch orders and even set aside a pile of sticky notes that had fallen off the walls. OpenStack Operations Guide



853、单词 superstep 的匹配文本:


  1. Within each superstep the vertices compute in parallel, each executing the same user-defined function that expresses the logic of a given algorithm. Pregel  -  A System for Large-Scale Graph Processing


  2. In Pregel, a program runs as a series of coordinated “supersteps.” On each superstep, each vertex in the graph runs a user function that can update state associated with the vertex, change the graph topology, and send messages to other vertices for use in the next superstep. Resilient Distributed Datasets - A Fault-Tolerant Abstraction for In-Memory Cluster Computing


  3. This will control the number of messages that are output during each superstep to any neighboring vertices, where a neighbor is defined as a vertex connected to another vertex by one or more edges. Hadoop RealWorld Solutions Cookbook



854、单词 minimizes 的匹配文本:


  1. Removing state from the switches minimizes the memory footprint and eliminates the need to dynamically allocate memory—both useful properties when embedding the agent in switch firmware. Monitoring with Ganglia


  2. Sending tasks to a slot that is hosted on the machine that has a local copy of the input split data minimizes network I/O. Pro Hadoop


  3. It also minimizes work needed to set up the cluster, thanks to discovery mechanisms. Mastering ElasticSearch


  4. Although, technically, it is possible to use different tables for different vectors using vector indexes as row keys, the proposed layout makes reading/writing vectors significantly faster (single-row reads/writes) and minimizes the amount of HBase connections opened at the same time. Professional Hadoop Solutions


  5. Unlike the hash and linear strategies, CRUSH also minimizes data migration under cluster expansion while maintaining a balanced distribution. Ceph A Scalable, High-Performance Distributed File System


  6. Since the master automatically reassigns regions on a RegionServer stop, this minimizes the amount of downtime that our users experience. Apache Hadoop Goes Realtime at Facebook


  7. Amazon provides for many services a group of command-line tools that provide a useful way of automating access to AWS services that minimizes the amount of required development. Hadoop Beginners Guide


  8. The upside to HttpFS is that it minimizes the footprint required to communicate with the cluster, but at the cost of total scale and capacity because all data between clients and HDFS must now travel through a single node. Hadoop Operations


  9. The JMS API minimizes the amount of enterprise messaging knowledge a Java programmer is required to possess in order to develop complex messaging applications, while still maintaining a certain amount of portability across JMS provider implementations. ActiveMQ in Action


  10. The load-balancing system minimizes round-trip time for the user’s request, while also considering the available capacity at the various clusters. Web search for a planet the google cluster architecture



855、单词 tokenization 的匹配文本:


  1. One big challenge you’ll encounter while vectorizing this data set is the lack of good tokenization of the Stack Overflow questions. Mahout in Action


  2. The process of extracting words from documents is known as parsing and tokenization; we are producing a set of tokens (or words) that identify the document. Redis in Action


  3. You'll learn how to do this including telling Solr how to analyze the text for tokenization, synonyms, stemming, and more. Solr 3 Enterprise Search Server


  4. The result is a sequence of line terminators and input characters, which are the terminal symbols for the third step in the tokenization process. The Java Language Specification Java SE 7 Edition


  5. You’ll make frequent use of the StringUtils class for tokenization. Hadoop in Practice


  6. This process of tokenization and normalization is called analysis, which we discuss in the next section. Elasticsearch The Definitive Guide


  7. For each document, the words are extracted one by one using a tokenization process. Hadoop in Action


  8. Note that better tokenization could be provided by use of regular expressions or the StringTokenizer class, but for our purposes this simple approach will suffice. Hadoop Beginners Guide


  9. This process is also called tokenization, and the chunks of text pulled from a stream of text are called tokens. Lucene in Action 2nd Edition


  10. The row format does not need to be configured because the streaming script will do all the tokenization of the fields: Programming Hive



856、单词 tenuring 的匹配文本:


  1. In this case, the JRE must stop the Java process and free the space by forcefully removing discarded objects, or tenuring those that are old enough. HBase:The Definitive Guide


  2. The tenuring distribution is a histogram showing the ages of objects in the young generation’s survivor spaces. Java Performance



857、单词 tsv 的匹配文本:


  1. We will then describe how to use the importtsv and bulk load tools to load TSV data files into HBase. HBase Administration Cookbook


  2. MapReduce is an excellent tool for transforming data into tab-separated values (TSV) Hadoop RealWorld Solutions Cookbook


  3. The details of parsing a tab-separated values (TSV) file aren’t terribly interesting. HBase in Action


  4. The following steps show you how to clean and extract data from the 20news dataset and store the data as a tab-separated value (TSV) file: Hadoop MapReduce Cookbook


  5. HBase ships with a command-line tool called importtsv which, when given files containing data in tab-separated value (TSV) format, can prepare this data for bulk import into HBase. HBase:The Definitive Guide


  6. The output is a tab-separated value (TSV) file with seven columns. Hadoop in Action


  7. Jar up the class files and submit the job to Hadoop: $ Hadoop jar ufo.jar UFOLocation ufo.tsv output. Hadoop Beginners Guide


  8. TSV: This file format is similar to CSV; however, it uses a tab character as the delimiter. The Definitive Guide to MongoDB


  9. This example does not properly handle the general case of files in CSV (comma-separated values) and TSV (tab-separated values) formats. Programming Hive


  10. You can use mongoimport to import JSON, CSV, and TSV files. MongoDB in Action



858、单词 transformers 的匹配文本:


  1. This time around you have some transformers (more on that in a minute), so you scan for them at D. Spring in Practice


  2. We call such methods transformers because they take at least one collection as their receiver object and produce another collection in their result. Programming in Scala 2nd Edition


  3. Writing a DIH configuration file The key pieces of a DIH configuration file include a data source, an entity, some transformers, and a list of fields. Solr 3 Enterprise Search Server


  4. See the chapter notes for more information about monad transformers. Functional Programming in Scala


  5. For example, the core enterprise integration patterns can be used to construct a pipeline of filters, transformers, and routers that all run within a single process. Spring Integration in Action


  6. In this section, we'll cover query response writers and document transformers. Solr in action


  7. This recipe will show you how to use document transformers with the elevation component. Apache Solr 4 Cookbook



859、单词 finalizers 的匹配文本:


  1. Finalizers can be used to minimize the amount of data that needs to be transferred from the database to the user, which is important because the group command’s output needs to fit in a single database response. MongoDB The Definitive Guide 2nd Edition


  2. Finalizers provide a chance to free up resources that cannot be freed automatically by an automatic storage manager. JSR-133 Java Memory Model and Thread


  3. Finalizers may be called in any order, or even concurrently. The Java Language Specification Java SE 7 Edition


  4. Finalizers In Java, since Java 1.0, every object contains a method called finalize that may be freely overridden by any implementer. Oracle JRockit The Definitive Guide


  5. Finalizers have a few valid uses, which we’ll cover later in this item, but as a rule of thumb, you should avoid finalizers. Effective Java 2nd Edition


  6. Therefore, Java can make no guarantees about when (or even whether) a finalizer will be invoked, in what order finalizers will be invoked, or what thread will execute finalizers. Java in a Nutshell 5th Edition


  7. Finalizers force objects to be promoted to old space and degrade the performance of the garbage collector. Java Performance Tuning 2nd Edition


  8. This option does not enable many threads to run method finalizers. Java Performance


  9. In contrast, finalizers generally trigger asynchronously as a result of garbage collection, if ever. Concurrent Programming in Java Design Principles and Pattern



860、单词 authoring 的匹配文本:


  1. Also to the authoring team, including Chris, Manuel and Brent, in providing me extraordinary support in writing this book. Pro Spring 3


  2. One might remark that this technique is like “updating” a file on a CD-R, which allows a file to be written only once by burning with a laser; multiple versions of the file are all stored on the CD (smart CD authoring software might even share common parts of multiple versions), and you pass the appropriate block address of the start of file (or a filename encoding the version within its name) to select which version you want to use. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. Writing for Packt We welcome all inquiries from people who are interested in authoring. Cassandra High Performance Cookbook


  4. You can define a composite component using JSF 1.2 as well, but it requires a much deeper understanding of the JSF life cycle and also authoring multiple files. Java EE 7 Essentials


  5. Some of these projects make authoring MapReduce jobs easier and more accessible, while others focus on getting data in and out of HDFS, simplify operations, enable deployment in cloud environments, and so on. Hadoop Operations


  6. As is always the case, authoring a book about software is a game of chase; as the software evolves, so must the book that is still being written. ActiveMQ in Action


  7. There is support in the Eclipse-based Spring Tool Suite (STS) to support the visual authoring of Spring Batch jobs. Spring Data Modern Data Access for Enterprise Java


  8. Although these tag libraries bring dynamic rendering power to JSP in a succinct form, they break any hope of authoring a well-formed document. Spring in Action 4th Edition


  9. Tim Berglund for his sharing of the effort on authoring this book. Building and Testing with Gradle


  10. He creates both tools and faith in collaborative authoring at http://www.booksprints.net/ OpenStack Operations Guide



861、单词 jspx 的匹配文本:


  1. As mentioned earlier, we will use JSPX to implement the view. Pro Spring 3


  2. These files are known as JSPX files, and are written and saved with the .jspx extension. Spring Roo in Action



862、单词 j2ee 的匹配文本:


  1. Dmitri Nevedrov has been working in software research and development for many years, primarily focusing on Java, J2EE technology, and performance optimization techniques. Performance Testing With JMeter 2.9


  2. This is where you drop WAR classes according to the J2EE specification. Thinking in Java 4th Edition


  3. In applets, servlets, and other J2EE programs, execution still begins with the. Java Threads 3rd Edition


  4. A plication deployment descriptor contains a name and description for the ion and the URI of a UI icon for the application, as well as a list of the J2EE s that comprise the application. Java EE 7 Specification


  5. The idea behind this benchmark is to exercise as much of the underlying infrastructure, hardware, and software, as possible, while running a typical J2EE application. Oracle JRockit The Definitive Guide


  6. Deepak is a Sun Certified Java Programmer and Web Component Developer and has worked in the fields of XML and Java programming and J2EE for over five years. Java 7 New Features Cookbook


  7. For this reason, Java Performance Tuning, Second Edition includes four new chapters: a new chapter on J2EE application tuning in general followed by chapters on tuning JDBC, servlets and JSPs, and EJBs. Java Performance Tuning 2nd Edition


  8. It comes pre-integrated with a number of services usually only found in J2EE application servers, or which you would otherwise have to craft together yourself: JNDI, an XA transaction service, a JMS message fabric, and a JDBC accessible database. ActiveMQ in Action


  9. On the Attach Wizard you specify the target type: Application, Applet, or J2EE/ Web Application along with attach method, local or remote, and attach invocation, direct or dynamic. Java Performance


  10. Note If you are using the J2EE JDK, the JavaMail API is included as part of the EE download. Java 7 Recipes A Problem-Solution Approach



863、单词 weblog 的匹配文本:


  1. My weblog on Bill Venners’ www.Artima.com has been a source of assistance when I’ve needed to bounce ideas around. Thinking in Java 4th Edition


  2. Finally, thanks to all my weblog readers for encouraging me to write informally about MySQL and other technical topics on a daily basis. High Performance MySQL 3rd Edition


  3. Weblog data from several servers is collected and pushed into HDFS. Hadoop RealWorld Solutions Cookbook


  4. You can now run your project using the following command from the root of your weblog project: Storm Real-Time Processing Cookbook


  5. In this recipe, we will use Hadoop to calculate the minimum, maximum, and average size of a file downloaded from the NASA servers, by processing the NASA weblog dataset. Hadoop MapReduce Cookbook


  6. Example 4-10 is a program called Weblog that reads a web server logfile and prints each line with IP addresses converted to hostnames. Java Network Programming 4th Edition


  7. Instead, if we bucket the weblog table and use user_id as the bucketing column, the value of this column will be hashed by a user-defined number into buckets. Programming Hive


  8. In the previous MapReduce and Apache weblog examples, we used JobRunners, HiveRunners, and PigRunners to execute HDFS operations and MapReduce, Hive, or Pig jobs, but that is not a completely satisfactory solution. Spring Data Modern Data Access for Enterprise Java



864、单词 emp 的匹配文本:


  1. If we didn’t get anything because the shard w empty, or we have just made the shard emp. Redis in Action


  2. To use the alias emp_shortest_path your custom JAR file must use the Hadoop Driver class for its main class. Hadoop RealWorld Solutions Cookbook


  3. Consider the table Employee with fields emp id, ldap user, name, dept id, and salary. Tenzing - A SQL Implementation On The MapReduce Framework


  4. Salary information is considered commercially sensitive, so it may be unwise to place the salary value directly in the EMP table, which may be used for a number of purposes. Pro JPA2



865、单词 stakeholders 的匹配文本:


  1. Gathering estimated performance characteristics of application and system resources prior to the launch helps to address issues early and provides valuable feedback to stakeholders, helping them make key and strategic decisions. Performance Testing With JMeter 2.9


  2. Remote repositories are extremely helpful for making artifacts available to other teams or stakeholders within your organization. Gradle in Action


  3. WHAT’S A USER STORY? A good way to think about a user story is as a reminder to have a conversation with your customer (in Agile, project stakeholders are called customers), which is another way to say it’s a reminder to do some just-in-time analysis. Scala in Action


  4. Jenkins can also be used, in conjunction with techniques like Behavior-Driven Development and Acceptance Test Driven Development, as a communications tool aimed at both developers and other project stakeholders. Jenkins The Definitive Guide


  5. You will have to come up with something to base your thinking on, so be sure to make it explicit and to communicate it with all the stakeholders. NoSQL Distilled


  6. As with any other open source project, the release cycle depends on the stakeholders (that is, the companies that hire the developers who work on the project) and what features they want to put into a particular release. HBase in Action


  7. Cypher Philosophy Cypher is designed to be easily read and understood by developers, database professionals, and business stakeholders. Graph Databases


  8. A well-designed DSL minimizes the translation effort between requirements and code, thereby improving communications with stakeholders about requirements. Programming Scala


  9. Introduction Behavior-driven Development (BDD) is an agile software development practice that enhances the paradigm of Test Driven Development (TDD) and acceptance tests, and encourages the collaboration between developers, quality assurance, domain experts, and stakeholders. Selenium Testing Tools Cookbook


  10. Chapter 7 presents a step-bystep approach to tuning the HotSpot VM covering choices such as which JIT compiler to use, which garbage collector to use, and how to size Java heaps, and also provides an indication when the Java application itself may require some rework to meet the performance goals set forth by application stakeholders. Java Performance



866、单词 rrdtool 的匹配文本:


  1. These metrics are then subsequently polled to Ganglia Meta Daemon (Gmetad) servers, where the metrics are computed and saved in round-robin, time-series databases using round-robin database tool (RRDtool) HBase Administration Cookbook


  2. Of course, the poller will probably want to store the data it gleans from the cluster nodes, and RRDtool is a popular solution for this sort of data storage. Monitoring with Ganglia


  3. Many of these are built on top of RRDTool (http://www.rrdtool.org), which stores time-series data in round-robin database (RRD) files. High Performance MySQL 3rd Edition


  4. The gmetad daemon stores data into a database maintained by rrdtool. Hadoop Operations and Cluster Management Cookbook


  5. There are also suitable rrdtool-ruby RPMs that should work on most RPM-based distributions like Red Hat, CentOS, and Mandriva versions available at Dag Wieer’s repository at http://dag.wieers.com/rpm/packages/rrdtool/ Pro Puppet


  6. It uses RRDtool to render the stored timeseries data in graphs. HBase:The Definitive Guide



867、单词 instrumented 的匹配文本:


  1. With sFlow-instrumented Java, finegrained detail of heap utilization can be tracked. Monitoring with Ganglia


  2. The following figure shows data from a single instrumented run capturing task rates. A Java ForkJoin Framework


  3. It is important to ensure that the test environment is instrumented for resource monitoring to help analyze results more efficiently. Performance Testing With JMeter 2.9


  4. To measure usage, we instrumented the FlumeJava library to log a usage record every time a FlumeJava program is run. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  5. We have instrumented that framework to define spans around all RPCs. Dapper a Large-Scale Distributed Systems Tracing Infrastructure


  6. The design of the InstrumentedSet class is enabled by the existence of the Set interface, which captures the functionality of the HashSet class. Effective Java 2nd Edition


  7. Second, JMX allows you to work with specific aspects of your application that you have instrumented. Cassandra The Definitive Guide


  8. Although all of Hadoop is instrumented to capture this information, it’s not available to external systems by default. Hadoop Operations


  9. Instrumented When doing memory profiling, the number of classes with profiler instrumentation; when doing CPU performance profiling, the number of methods with profiler instrumentation. Java Performance


  10. These properties tell the instrumented classes that information related to code coverage should be written to a file named coverage.emma, and that it should be done in aggregate (don’t overwrite the file for each unit test being executed) Java 7 Recipes A Problem-Solution Approach



868、单词 pid 的匹配文本:


  1. If you go down this route, be sure to periodically scan the process tables for tail -F whose parent PID is 1 Apache Flume Distributed Log Collection for Hadoop


  2. The most basic information we need, the process ID (PID) and name of each Java process, is contained in the output of the jps command. HBase Administration Cookbook


  3. So, you should check the location of the JVM and make sure that HADOOP_PID_DIR can be written. Pro Hadoop


  4. This command will try to find the PID files of the HDFS daemons, and kill the processes with the PID files. Hadoop Operations and Cluster Management Cookbook


  5. You can see details on the particular version you're running, along with the PID of the Java process that started. Elasticsearch in Action MEAP V07 cHAPTER 1


  6. You also set options for HBase configuration, log directories, niceness, SSH options, where to locate process pid files, and so on. HBase:The Definitive Guide


  7. Hadoop pid directory This is a directory used by all daemons to store pid files. Hadoop Operations


  8. If you are running the server in the background on a Unix system, stop it by finding the server’s process ID and killing it with the kill command (kill pid ) Java Network Programming 4th Edition


  9. The “PID” column is the process id of the process performing the disk access. Java Performance


  10. The most well-known is JMap, which will get a memory dump from the application specified by the process ID (PID) Java 7 Recipes A Problem-Solution Approach



869、单词 toolbar 的匹配文本:


  1. When an action is attached to a menu or toolbar and the action is disabled, the option is grayed out. Core Java Volume I Fundamentals 9th Edition


  2. In this recipe, you will use the DropDown toolbar plugin. Jenkins Continuous Integration Cookbook


  3. A quick way to open the view is to click the Dashboard icon in the toolbar, as shown in Figure A-25 Pro Spring 3


  4. Here is how I ran the whole thing against some tests for a sample Toolbar module in the JUTE repository (more on that later) on my Mac: Testable JavaScript


  5. OpenSearch was originally developed by A9, a subsidiary of Amazon, and has seen some adoption in the market, especially by the browsers to power their toolbar search boxes. Solr 3 Enterprise Search Server


  6. The Paint application is a Swing application that allows you to choose shapes from a toolbar and lay them on a painting area. Spring Dynamic Modules in Action


  7. To the left in the Management Console (in the editor area) is the tab group toolbar that selects tabs that are currently visible in the tab container at the bottom of the editor. Oracle JRockit The Definitive Guide


  8. Figure 2.10 The Solr administration console; explore each page using the toolbar on the left. Solr in action


  9. See Table 5-1 for an explanation of the shortcuts available on the Analyzer’s toolbar. Java Performance


  10. AbstractAction class, which is also an ActionListener instance but can do much more (toolbar, property change support, and so on) Java 7 Recipes A Problem-Solution Approach



870、单词 checksums 的匹配文本:


  1. A slight overhead is added, since HDFS also stores a second, smaller metadata file for each block replica, which contains the checksums for the block data. HDFS scalability the limits to growth


  2. Sequence files support compression, encapsulate the key and value types, and provide validity checksums. Pro Hadoop


  3. The data blocks are replicated on several computing nodes and their checksums are computed. Hadoop Operations and Cluster Management Cookbook


  4. The chunkservers in aggregate store tens of GBs of metadata, mostly the checksums for 64 KB blocks of user data. GFS - The Google File System


  5. A number of other EBOFS enhancements are planned, including improved allocation logic, data scouring, and checksums or other bit-error detection mechanisms to improve data safety. Ceph A Scalable, High-Performance Distributed File System


  6. The DFSInputStream also verifies checksums for the data transferred to it from the datanode. Hadoop:The Definitive Guide 3rd Edition


  7. We take full backups multiple times per day, and via checksums of the database state, we compare replicas with one another every few hours. Chubby - The lock service for loosely-coupled distributed systems


  8. This is an internal file for HDFS to keep checksums   for the file part-00000 Hadoop in Action


  9. This performs a checksum against the database and compares checksums of peers; if the checksums differ, then the data is exchanged. Cassandra The Definitive Guide


  10. When a block is first stored, there is also a hidden file written to the same HDFS directory containing cryptographic checksums for the block. Hadoop Beginners Guide



871、单词 printable 的匹配文本:


  1. So what do you do if your data contains a newline character, like some XML? Using a sequence file can solve this problem because it uses non-printable characters for delimiters. Apache Flume Distributed Log Collection for Hadoop


  2. These could have non-printable characters inside them such as a tab or newline that would affect the CLI output. Cassandra High Performance Cookbook


  3. Again, that’s the longest printable geohash you can construct and still fit in a Java long: HBase in Action


  4. The name of the column family must be composed of printable characters, a notable difference from all other names or values. HBase:The Definitive Guide


  5. Supply an object that implements the Printable interface • Start a print job. Core Java Volume II Advanced Features 9th Edition


  6. BaseEncoding When dealing with binary data, we sometimes have a need to convert the bytes representing the data into printable ASCII characters. Getting Started with Google Guava


  7. There is no easy way to translate int enum constants into printable strings. Effective Java 2nd Edition


  8. A certificate factory for X.509 certificates can parse certificates encoded in binary or printable hexadecimal form. Java in a Nutshell 5th Edition


  9. Column family names must be printable, but qualifiers may be arbitrary strings. Bigtable - A Distributed Storage System for Structured Data


  10. After computing the grade statistics for the three sets of grades data, the remainder of the GradeAnalyzer main() method demonstrates various methods that can be used to determine array type information and to convert an array to a printable string. Java 7 Recipes A Problem-Solution Approach



872、单词 vnc 的匹配文本:


  1. The nova-novncproxy (daemon) provides a proxy for accessing running instances through a VNC connection. bk-compute-adminguide-grizzly


  2. Provides a proxy for accessing running instances through a VNC connection. bk-admin-guide-cloud-latest


  3. It captures a screen using the VNC protocol and generates a Shockwave Flash (SWF) movie file. Selenium Testing Tools Cookbook


  4. No network protocol neatly fits into a GUI (with the arguable exception of the Remote Framebuffer Protocol used by VNC and X11) Java Network Programming 4th Edition


  5. Instances View, launch, create a snapshot from, stop, pause, or reboot instances, or connect to them through VNC. admin-user-guide-trunk


  6. Also, view the log for an instance or access an instance through VNC. user-guide


  7. If this happens, the user can use the Dashboard VNC console to fix this. OpenStack Operations Guide



873、单词 faceted 的匹配文本:


  1. Faceted browsing  is one of the main features of Apache Solr; it helps users reach the right set of information they wanted to get. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr


  2. Apache Solr, built on Apache Lucene, is a wildly popular open source enterprise search server that easily delivers powerful search and faceted navigation features that are elusive with databases. Solr 3 Enterprise Search Server


  3. Enhance your search with faceted navigation, result highlighting, fuzzy queries, ranked scoring, and more. Solr 3.1 Cookbook


  4. It supports powerful full-text search, hit highlighting, faceted search, dynamic clustering, database integration, rich document handling (for example, Word and PDF), and geospatial search. Hadoop MapReduce Cookbook


  5. Configuration management is an extremely complex and multi-faceted problem, however, and as result we cannot expect Puppet alone to address every problem. Pro Puppet


  6. Enhance your search with faceted navigation, result highlighting, relevancy ranked sorting, and more. Apache Kafka


  7. This is known as faceted-search and is one of the main strengths of Solr. Solr in action


  8. For example, Solr, a sister open-source project under the Lucene Apache umbrella, adds a server that exposes an administration interface, scaleout, indexing content from a database, and adds important end-user functionality like faceted navigation, to Lucene. Lucene in Action 2nd Edition


  9. Remember that if you use this method, your filter cache size should have at least the size of the number of unique facet values in all your faceted fields. Apache Solr 4 Cookbook



874、单词 allocator 的匹配文本:


  1. The allocator avoids conflicts by only offering a given resource to one framework at a time, and attempts to achieve dominant resource fairness (DRF) [11] by choosing the order and the sizes of its offers.3 Because only one framework is examining a resource at a time, it effectively holds a lock on that resource for the duration of a scheduling decision. Omega - flexible, scalable schedulers for large compute clusters


  2. If you use a global allocator to generate values, be careful that the single point of contention doesn’t create a bottleneck for your application. High Performance MySQL 3rd Edition


  3. To make this possible it provides an abstraction called ByteBufAllocator. Netty in Action MEAP V08


  4. Fungible resources complicate scheduling, but they also empower the allocator to pack the cluster more tightly. Apache Hadoop YARN Yet Another Resource Negotiator


  5. Introducing ShardAllocator ShardAllocator is the main class responsible for making a decision about the shard's placement. Mastering ElasticSearch


  6. Sawzall therefore uses an arena allocator [11], resetting the arena to the initial state after each record is processed. Interpreting the Data Parallel Analysis with Sawzall


  7. The JRockit calling convention demands that integers be returned in the register eax, so the register allocator that is the next step of the code pipeline doesn't really have a choice for a register for the return value. Oracle JRockit The Definitive Guide


  8. A portion of the HotSpot VM global data is initialized such as the event log, OS synchronization primitives, perfMemory (performance statistics memory), and chunkPool (memory allocator) Java Performance


  9. Slab allocator Allocates only large chunks of memory, slicing them up into little chunks for particular classes of items, then maintaining freelists for each class whenever an object is freed. Memcached



875、单词 autoboxing 的匹配文本:


  1. If the caller supplies integers or other primitive type values, autoboxing turns them into objects.) It now faces the unenviable task of scanning the fmt string and matching up the ith format specifier with the value args[i] Core Java Volume I Fundamentals 9th Edition


  2. Autoboxing is an implicit conversion from a primitive type to its boxed type. Scala in Depth


  3. Java SE5 autoboxing will automatically convert from a primitive to a wrapper type: Thinking in Java 4th Edition


  4. Java also has an autoboxing mechanism to facilitate the task for programmers: boxing and unboxing operations are done automatically. Java 8 in Action Lambdas, Streams and Functional-style Programming


  5. Since that time, we at Sun tried to simplify program development by extending the language with piecemeal solutions to particular problems, like the for-each loop, enums, and autoboxing. Programming in Scala 2nd Edition


  6. Generics, annotations, autoboxing and unboxing, enum types, foreach loops, variable arity methods, and static imports are all new to the language as of Autumn 2004 The Java Language Specification Java SE 7 Edition


  7. The most significant set of changes was the addition of generics, enum types, annotations, autoboxing, and the for-each loop in Java 5 Effective Java 2nd Edition


  8. Autoboxing and autounboxing conversions to automatically convert back and forth between primitive values and their corresponding wrapper objects (such as int values and Integer objects) as needed. Java in a Nutshell 5th Edition


  9. Note A technique known as autoboxing is used in this example. Java 7 Recipes A Problem-Solution Approach



876、单词 jsse 的匹配文本:


  1. What's the difference between a key store and a trust store? The Java Secure Socket Extension (JSSE) documentation defines a key store as a storage mechanism for private keys and their corresponding public keys. Spring Security 3.1


  2. Chapter 14 This chapter discusses how the Java Secure Sockets Extension (JSSE) provides SSL encryption, which can be used to encrypt data over TCP sockets. Java Security 2nd Edition


  3. For more information on using keystores, please see the J2SE SDK Documentation, on the Internet, especially the JSSE section on creating keystores. Oracle JRockit The Definitive Guide


  4. If you want to add SSL to your application, see the Java Secure Socket Extension (JSSE) reference at http://java.sun.com/javase/6/docs/technotes/guides/security/jsse/JSSERefGuide.html. Core Java Volume II Advanced Features 9th Edition


  5. Currently, this property is specific to the Oracle JSSE implementation and may not be recognized by other implementations. Java 7 New Features Cookbook


  6. Like all Java security APIs, JSSE is highly configurable and gives low-level control over all details of setting up and communicating over an SSL socket. Java in a Nutshell 5th Edition


  7. The concrete classes that implement the encryption algorithms and protocols in Sun’s reference implementation of the JSSE. Java Network Programming 4th Edition


  8. Since its detailed description is out of the scope of this book, please refer to the online information for JSSE (http://mng.bz/7TYe) before proceeding to the rest of this section. ActiveMQ in Action



877、单词 decrement 的匹配文本:


  1. For example, the AtomicInteger class has methods incrementAndGet and decrementAndGet that atomically increment or decrement an integer. Core Java Volume I Fundamentals 9th Edition


  2. The possible values are zero for a zero slope metric, positive for an increment-only metric, negative for a decrement-only metric, and both for an arbitrarily changing metric. Monitoring with Ganglia


  3. These methods consist of addExact, subtractExact, multiply-Exact, incrementExact, decrementExact, and negateExact with int and long arguments. Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. On some machines, pushes and pops (of integers) can be written in one machine instruction, operating on a register with auto-increment and auto-decrement addressing. Data Structures and Algorithm Analysis in Java 3rd Edition


  5. Every time that we sell a widget, we decrement the stock count in. Elasticsearch The Definitive Guide


  6. By default, a spinner manages an integer, and the buttons increment or decrement it by 1 Core Java Volume II Advanced Features 9th Edition


  7. The arithmetic, increment and decrement, bitwise, and shift operators return a double if at least one of the operands is a double. Java in a Nutshell 5th Edition


  8. When one of these operations finishes, it uses the countDown() method to decrement the internal counter. Java 7 Concurrency Cookbook


  9. Notice that the only transitions that can possibly affect waiting threads are those that step away from states empty and full; that is, increment the size up from zero or decrement it down from the capacity. Concurrent Programming in Java Design Principles and Pattern


  10. As the user clicks the buttons to display the previous and next image, the currentIndex will decrement or increment, respectively. Java 7 Recipes A Problem-Solution Approach



878、单词 oltp 的匹配文本:


  1. At the same time, MySQL can power embedded applications, data warehouses, content indexing and delivery software, highly available redundant systems, online transaction processing (OLTP), and much more. High Performance MySQL 3rd Edition


  2. Online transaction processing (OLTP) systems are used by applications to record transactional information in real time. HBase in Action


  3. They are the equivalent of “normal” online transactional processing (OLTP) databases in the relational world. Graph Databases


  4. This has evolved from traditional use cases, such as combining OLTP and log files, to more sophisticated uses, such as using Hadoop for data warehousing (exemplified by Facebook) and the field of data science, which studies and makes new discoveries about data. Hadoop in Practice


  5. By default, consumers store the state in ZooKeeper, but Kafka also allows storing it within other storage systems used for Online Transaction Processing (OLTP) applications as well. Apache Kafka


  6. Consequently, it underwhelms when attempting to mimic low-latency, random access patterns found in traditional online transaction processing (OLTP) systems. Hadoop Operations


  7. If you have only dealt with smaller OLTP-style databases, the emphasis on large data volumes will expand your horizons. Cloudera Impala


  8. An OLAP or OLTP, i.e., SQL, interface is provided to then mine the data interactively. PowerDrill - Processing a Trillion Cells per Mouse Click


  9. If you need OLTP features for large-scale data, you should consider using a NoSQL database. Programming Hive


  10. This delay would not be acceptable in a DBMS running OLTP tasks, but it is tolerable in an incremental processing system building an index of the web. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



879、单词 jbcp 的匹配文本:


  1. Some tips on getting started are found in the Getting started with the JBCP Calendar sample code section in Appendix, Additional Reference Material. Spring Security 3.1



880、单词 parallelization 的匹配文本:


  1. Here is another place MapReduce can be used; instead of writing a custom loader with its own ad hoc parallelization and fault-tolerance support, a simple MapReduce program can be written to load the data into the parallel DBMS. MapReduce a flexible data processing tool


  2. As a reaction to this complexity, we designed a new abstraction that allows us to express the simple computations we were trying to perform but hides the messy details of parallelization, fault-tolerance, data distribution and load balancing in a library. MapReduce - Simplied Data Processing on Large Clusters


  3. Sqoop leverages database to describe the schema for the imported/ exported data and MapReduce for parallelization operation and fault tolerance. Professional Hadoop Solutions


  4. The MapReduce paradigm offers the ability to process data using a simple programming model, which hides the complexity of the infrastructure required for parallelization, data transfer, scalability, fault tolerance and scheduling. Incoop MapReduce for Incremental Computations


  5. The MapReduce model simplifies parallel processing by abstracting away the complexities involved in working with distributed systems, such as computational parallelization, work distribution, and dealing with unreliable hardware and software. Hadoop in Practice


  6. The nature of Pig Latin, in comparison to HiveQL, appeals to everyone with a procedural programming background, but also lends itself to significant parallelization. HBase:The Definitive Guide


  7. The size of each split should be small enough for a more granular parallelization. Hadoop in Action


  8. The developer focuses on expressing the transformation between source and result data sets, and the Hadoop framework manages all aspects of job execution, parallelization, and coordination. Hadoop Beginners Guide


  9. The following year, another paper, titled "MapReduce: Simplified Data Processing on Large Clusters," was presented, defining a programming model and accompanying framework that provided automatic parallelization, fault tolerance, and the scale to process hundreds of terabytes of data in a single job over thousands of machines. Hadoop Operations


  10. This characteristic makes this class adequate for the parallelization of tasks using the divide and conquer programming technique. Java 7 Concurrency Cookbook



881、单词 r28 的匹配文本:


  1. To get full benefits from this book, a JRockit version of R28 or later is recommended. Oracle JRockit The Definitive Guide



882、单词 mnesia 的匹配文本:


  1. The second folder is for the Mnesia database that RabbitMQ uses to store information about the broker, like queue metadata, virtual hosts, and so on. RabbitMQ in Action



883、单词 spi 的匹配文本:


  1. Starting from version 3, Spring introduced the Type Conversion and Field Formatting SPI, which provide a simpler and well-structured API in performing type conversion and field formatting. Pro Spring 3


  2. HandlerAdapter is therefore more a service provider interface (SPI) that you would implement only if you needed to support a new handler type; you wouldn’t normally make calls against it yourself. Spring in Practice


  3. The JavaMail API has two application-level interface used by the application components to send d a service provider interface used at the Java EE SPI level. Java EE 7 Specification


  4. Hence, if you want to implement a security provider, you extend the SPI of each engine that you want to provide. Java Security 2nd Edition


  5. We focus on these later when we describe the Spring Batch partitioning Service Provider Interface (SPI) in section 13.5.2 Spring Batch in Action


  6. Portable Extensions CDI exposes an Service Provider Interface (SPI) allowing portable extensions to extend the functionality of the container easily. Java EE 7 Essentials


  7. For example, dynamic class loading may be used with an SPI framework, and when it fails to work as expected, a useful start may be to find out if the classes that should have been contributed by the framework were even loaded at all. Oracle JRockit The Definitive Guide


  8. Thus, in addition to defining a security API, this package also defines a service provider interface (SPI) Java in a Nutshell 5th Edition


  9. Providers contain META-INF/services files that indicate their SPI classes to be invoked. Pro JPA2


  10. These commands are then translated to the SPI, which is stateless. Selenium 2 Testing Tools Beginner's Guide



884、单词 recompile 的匹配文本:


  1. The binary package contains the same Maven POM file as the source archive so you can always recompile the code even if you start with the binary distribution. Apache Flume Distributed Log Collection for Hadoop


  2. Moreover, if the timestamp of the version of Employee.java that it finds is newer than that of the existing Employee.class file, the Java compiler will automatically recompile the file. Core Java Volume I Fundamentals 9th Edition


  3. Explicit logging by applications might have provided slightly more accurate data, but it is logistically impossible to recompile and restart thousands of running clients to do so and cumbersome to collect the results from as many machines. GFS - The Google File System


  4. Next, we run the classes task to recompile our changed Java source file: Gradle Effective Implementation Guide


  5. One benefit is that changes to the job flow can be made without having to recompile the code because the master driver is a scripting language instead of Java. MapReduce Design Patterns


  6. The only way currently is to replace the HBase JARs with the newer ones and recompile Hive from source. HBase:The Definitive Guide


  7. After making changes to those three lines, you can recompile the program and execute it again. Hadoop in Action


  8. If you replace the raw type List with the parameterized type Listin the unsafeAdd declaration and try to recompile the program, you’ll find that it no longer compiles. Effective Java 2nd Edition

  9. If we hardcode the abbreviations, we would need to recompile our mapper each time. Hadoop Beginners Guide


  10. However, in some cases, it may make sense to continue using the deployment descriptor for servlet registration (for example, if you do not want to recompile sources when a URL pattern changes) Java 7 Recipes A Problem-Solution Approach



  11. 885、单词 annotating 的匹配文本:


    1. By annotating tail recursive methods, we can guarantee expected runtime performance. Scala in Depth


    2. You can also implement your own exception handler by annotating a controller method with the @ExceptionHandler annotation and passing in the exception type as the attribute. Pro Spring 3


    3. Because annotating methods with throws clauses is a heavy burden, too many developers write code that swallows and drops exceptions, just to get the code to compile without adding all those throws clauses. Programming in Scala 2nd Edition


    4. Annotating your map() and reduce() methods with the @Override annotation will allow the Java compiler to catch these errors. Hadoop:The Definitive Guide 3rd Edition


    5. You can define a mapping between a custom representation and a corresponding Java type by implementing the MessageBodyReader and MessageBodyWriter interfaces and annotating with @Provider. Java EE 7 Essentials


    6. You could make the class truly useful by supplying a method that adds the event handler instead of just constructing it.) However, this example shows the mechanics of annotating a program and of analyzing the annotations. Core Java Volume II Advanced Features 9th Edition


    7. In an abstract class or an interface, however, it is worth annotating all methods that you believe to override superclass or superinterface methods, whether concrete or abstract. Effective Java 2nd Edition


    8. Pig accomplishes this by duplicating records on the map side and annotating each record with its pipeline number. Programming Pig


    9. Annotating the Service Endpoint Interface (SEI) with @MTOM as shown in the following code snippet: Java Performance


    10. Creating an Entity Regular Java classes are easily transformed into entities simply by annotating them. Pro JPA2



    886、单词 ported 的匹配文本:


    1. The Java interpreter can execute Java bytecodes directly on any machine to which the interpreter has been ported. Core Java Volume I Fundamentals 9th Edition


    2. It provides the stable base of Hadoop 0.18.3 with bug fixes and some new features back-ported in and added-in hooks to the support scribe log file aggregation service (http://scribeserver.wiki.sourceforge.net/) Pro Hadoop


    3. We then follow it up with a discussion on few of the popular frameworks that have already been ported to YARN. Apache Hadoop YARN Yet Another Resource Negotiator


    4. An application built against an RDBMS cannot be “ported” to HBase by simply changing a Java Database Connector (JDBC) driver. Professional Hadoop Solutions


    5. Nutch was also the first public proof-of-concept application ported to the framework that would later become Hadoop, and the effort required to port Nutch algorithms and data structures to Hadoop proved to be surprisingly small. Hadoop:The Definitive Guide 3rd Edition


    6. If, for any reason, the JNI libraries fail to load the matching native ones, the server will abort at startup with an IOException stating "Compression codec  not sup ported, aborting RS construction" HBase:The Definitive Guide


    7. Doug Cutting immediately saw the applicability of these technologies to Nutch, and his team implemented the new framework and ported Nutch to it. Hadoop in Action


    8. This provides a more portable way of writing applications that can be ported across operating systems. Java 7 New Features Cookbook


    9. We will be primarily using the new APIs in this book, though we do include a few examples of the older API in later chapters as not of all the existing features have been ported to the new API. Hadoop Beginners Guide


    10. These port numbers are expected to change as newer versions of Hive get ported to Amazon EMR. Programming Hive



    887、单词 provisioned 的匹配文本:


    1. You’ll write two simple tasks in a script plugin: one for retrieving information on a provisioned application in your CloudBees account, and another one for deploying a WAR file to the cloud. Gradle in Action


    2. Either create a few jobs by hand, or use the HTML form that provisioned jobs in the previous recipe. Jenkins Continuous Integration Cookbook


    3. DEV@cloud will provision a slave for you and kick off a build (it may take a minute or two for the slave to be provisioned) Jenkins The Definitive Guide


    4. Administrator) to insure that the resource is provisioned for use by the ion4 Java EE 7 Specification


    5. Once you’ve made up your mind, bought the hardware, or provisioned the instances, it’s time to deploy the software. HBase in Action


    6. After the cluster is provisioned, go to the Amazon EMR console (https://console. Hadoop MapReduce Cookbook


    7. For each cluster, the NameNode and the BackupNode hosts are specially provisioned with up to 64GB RAM; application tasks are never assigned to those hosts. The Hadoop Distributed File System


    8. In both cases, the default data source will be provisioned and available to the application. Java EE 7 Essentials


    9. The DynamoDB pricing model is particularly interesting; instead of paying for a certain number of servers hosting the service, you allocate a certain read/write capacity and DynamoDB manages the resources required to meet this provisioned capacity. Hadoop Beginners Guide


    10. As the cluster grows, these services are separated and dedicated hardware for each is provisioned. Hadoop Operations



    888、单词 unordered 的匹配文本:


    1. Note that limit also works on unordered streams (for example, if the source is a Set) Java 8 in Action Lambdas, Streams and Functional-style Programming


    2. A PCollection can either have a well-defined order (called a sequence), or the elements can be unordered (called a collection) FlumeJava - Easy, Efficient Data-Parallel Pipelines


    3. You are using the unordered list HTML tag (

      • ) to create a new list.

      • Beginning CouchDB
      • Arrays are indexed by integer values, while maps are like associative arrays or Python dictionaries and may be indexed by any type, with the indices unordered and the storage for the elements created on demand. Interpreting the Data Parallel Analysis with Sawzall


      • You’ll upload a small file with unordered names, and test whether the secondary sort code produces output sorted by first name: Hadoop in Practice


      • We sorted the output, as the reduce output partitions are unordered (owing to the hash partition function) Hadoop:The Definitive Guide 3rd Edition


      • Clients could insert values at unexpected timestamps and cause seemingly unordered version histories. HBase:The Definitive Guide


      • JsonObject provides a Map view to access the unordered collection of zero or more name/value pairs from the model. Java EE 7 Essentials


      • Unordered collections like Set simply guarantee that repeated calls to next( ) return all elements of the set without omissions or duplications but do not specify an ordering. Java in a Nutshell 5th Edition


      • Because we’re using Thrift as the underlying RPC mechanism to communicate with Cassandra, the results will come back to you unordered and you’ll have to sort them on the client. Cassandra The Definitive Guide



    889、单词 cdplayer 的匹配文本:


    1. Then you’ll create a CDPlayer class and have Spring discover it and inject it with the CompactDisc bean. Spring in Action 4th Edition



    890、单词 prototyping 的匹配文本:


    1. Other usability aspects of Pregel motivated by user experience include a set of status pages with detailed information about the progress of Pregel programs, a unittesting framework, and a single-machine mode which helps with rapid prototyping and debugging. Pregel  -  A System for Large-Scale Graph Processing


    2. Putting this data at the fingertips of analysts and engineers has grown increasingly important; interactive response times often make a qualitative difference in data exploration, monitoring, online customer support, rapid prototyping, debugging of data pipelines, and other tasks. Dremel - Interactive Analysis of WebScale Datasets


    3. MapReduce has been so successful because it makes it possible to write a simple program and run it efficiently on a thousand machines in the course of half an hour, greatly speeding up the development and prototyping cycle. MapReduce - Simplied Data Processing on Large Clusters


    4. This is an easy way to begin sketching out and prototyping code whose final form you do not yet know, which is a typical workflow in the development of new forms of build automation. Gradle Beyond The Basics


    5. We will also be discussing other advanced Hadoop features such as using DistributedCache for distribute data, using Hadoop Streaming for quick prototyping of Hadoop computations, and using Hadoop counters to report custom metrics for your computation as well as adding job dependencies to manage simple DAG-based workflows of Hadoop MapReduce computations. Hadoop MapReduce Cookbook


    6. This isn’t the approach you’ll want to take when working with large volumes of data, but nonetheless is great for prototyping and testing with smaller datasets: Hadoop in Practice


    7. There is also a JSON-based data encoder, which, being human-readable, is useful for prototyping and debugging Avro data. Hadoop:The Definitive Guide 3rd Edition


    8. This is useful for testing and prototyping, but should not be used for larger data sets. HBase:The Definitive Guide


    9. Furthermore, its improved ease of development enables rapid prototyping of alternative features. Hadoop in Action


    10. We shall start by looking at how to use scripting programming languages to aid MapReduce prototyping and initial analysis. Hadoop Beginners Guide



    891、单词 computationally 的匹配文本:


    1. Keep in mind that any heavy processing in your custom interceptor can affect overall throughput, so be mindful of object churn or computationally intensive processing in your implementations. Apache Flume Distributed Log Collection for Hadoop


    2. In such a setup, the performance metrics of the mute nodes aren’t measured because those nodes aren’t a computationally relevant portion of the grid. Monitoring with Ganglia


    3. The result of this misconfiguration was that none of the computationally intense work could be run in the map task, and the map method would return immediately with an exception. Pro Hadoop


    4. Parsing text or other types of content in the mapper can sometimes be the most computationally intense operation in a MapReduce job. MapReduce Design Patterns


    5. The natural method to tune the model would be to use a local search (with optimization) —  a technique for working with computationally extensive optimization problems. Professional Hadoop Solutions


    6. Different algorithms can be used that may be less computationally expensive while still achieving good entropy. Cassandra High Performance Cookbook


    7. This works fine for computationally intensive work, but for data-intensive processing, the size of data becomes too large to be moved around easily. Hadoop in Action


    8. At first glance, it may seem like fsck is a reasonable way to monitor HDFS health, but many of the metrics it provides can be accessed programmatically (and less computationally expensive) via the monitoring APIs. Hadoop Operations


    9. Note that the field has many distinct values, leading to large internal hash-tables; computing the hashes themselves on possibly large strings is already computationally quite expensive. PowerDrill - Processing a Trillion Cells per Mouse Click


    10. Common examples include highvolume Web servers or application servers that are computationally intensive but essentially stateless. Web search for a planet the google cluster architecture



    892、单词 antipattern 的匹配文本:


    1. The antipattern is the unnecessary line with the creation of the answer object before the return. Jenkins Continuous Integration Cookbook


    2. This is why you’ll sometime find classes that are declared “final” intentionally: they can’t be inherited from to prevent this kind of antipattern or have their core behavior messed with. Java 8 in Action Lambdas, Streams and Functional-style Programming


    3. What is an antipattern? An antipattern is a technique that is intended. SQL Antipatterns


    4. Do not follow the common antipattern of logging everything you can think of just in case someone might need it someday. Java Network Programming 4th Edition



    893、单词 elem 的匹配文本:


    1. First, you can use "$elemMatch" to force MongoDB to compare both clauses with a single array element. MongoDB The Definitive Guide 2nd Edition


    2. In this case we will use the built-in handler as.xml.Elem to handle the XHTML response: Scala in Action


    3. For convenience, the library will provide factory methods named “elem” that construct new elements from passed data. Programming in Scala 2nd Edition


    4. We are sending the pair of values (large and elem) to the max2( ) method. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


    5. Note that we combined the positiveDigit Parser with elem('0') into a Parser that accepts all digits. Beginning Scala


    6. In addition, if some string contains XML content, then one can use method loadString to create an Elem object from it. Steps in Scala An Introduction to Object-Functional Programming


    7. Matching an Entire Array If you want to match an entire array within a document, you can use the $elemMatch operator. The Definitive Guide to MongoDB


    8. To go from a chi.elem value ei to the underlying value of. PowerDrill - Processing a Trillion Cells per Mouse Click


    9. To restrict multiple conditions to the same sub-document, you use the $elemMatch operator. MongoDB in Action



    894、单词 dist 的匹配文本:


    1. Other tasks ----------clean - clean up dist - generate the distribution compile - compile the source init. Gradle in Action


    2. Getting ready You will need to install the Script Realm plugin and also have Perl installed with the URI module (http://search.cpan.org/dist/URI/URI/Escape.pm) Jenkins Continuous Integration Cookbook


    3. If we execute the filterFiles task, we get the resulting filter.txt file in the dist directory: Gradle Effective Implementation Guide


    4. This will compile source code and build a JAR file: $ ant dist. Cassandra High Performance Cookbook


    5. The link http://hbase.apache.org/book/standalone_dist.html#distributed explains how to run HBase in the distributed mode. Hadoop MapReduce Cookbook


    6. DistType cvw = cost of edge from v to w; Data Structures and Algorithm Analysis in Java 3rd Edition


    7. It also supports the HTFP filesystem, which utilities such as distCp use to enable cross-cluster copies when Hadoop versions differ. Hadoop in Practice


    8. Using DistCp You need to use a tool supplied by HBase to operate on a table. HBase:The Definitive Guide


    9. DistCp Run a distcp command to copy data to or from another HDFS cluster. Programming Hive


    10. The dist field that accompanies each document is a measure of that item’s distance from the center point. MongoDB in Action



    895、单词 euclidean 的匹配文本:


    1. This similarity metric computes the Euclidean distance d between two such user points.2 This value alone doesn’t constitute a valid similarity metric, because larger values would mean more-distant, and therefore less similar, users. Mahout in Action


    2. In our case, the value 2 tells Solr to calculate the Euclidean distance. Solr 3.1 Cookbook


    3. Mahout supports several different distance calculation methods such as Euclidean, Cosine, Manhattan, and so on. Hadoop MapReduce Cookbook


    4. Popular measures that can calculate these scores include Euclidean distance and Pearson’s correlation. Hadoop in Practice


    5. Since these objects represent points similar to Euclidean geometry, the 2D API also has other methods such as determining the distance between two points. Java 7 Recipes A Problem-Solution Approach


    6. In particular, the database uses Euclidean distance to determine the distance between points.4 For a lot of use cases, including finding the closest n locations to a given point, this is perfectly acceptable, and the simplicity of the math ensures the fastest query result. MongoDB in Action



    896、单词 nonpersistent 的匹配文本:


    1. For example, we run two types of Rabbit clusters: traditional RabbitMQ clustering for nonpersistent messaging, and pairs of active/hot-standby nonclustered Rabbit servers for persistent messaging (using load balancers) RabbitMQ in Action


    2. Finally, we group and aggregate around the term and document to get the term frequency, which is a nonpersistent aggregate. Storm Real-Time Processing Cookbook


    3. Local asynchronous session bean invocations and the nonpersistent EJB Timer Service are new additions in EJB 3.2 Lite. Java EE 7 Essentials


    4. Consequently, users employing nonpersistent job flows will not need to consider many of the topics in this chapter. Hadoop Beginners Guide


    5. It presents some general tuning techniques covering such topics as persistent versus nonpersistent messages, transactions, embedded brokers, tuning the wire level protocol, tuning the TCP transport, and some optimizations for message producers and message consumers. ActiveMQ in Action


    6. In such cases, it is optimal to identify such attributes as nonpersistent using the transient keyword. Java Performance


    7. Until an entity manager is used to actually create, read, or write an entity, the entity is nothing more than a regular (nonpersistent) Java object. Pro JPA2


    8. Config servers If mongos processes are nonpersistent, then something must durably store the shard cluster’s canonical state; that’s the job of the config servers. MongoDB in Action



    897、单词 vhost 的匹配文本:


    1. But if you’ve played around much with Rabbit, you know there’s one nagging concept we haven’t talked about yet: the vhost. RabbitMQ in Action


    2. This is just a normal Apache vhost stanza, with the exception of the inline included name variable. Managing Infrastructure with Puppet


    3. We gave a definition a title (apache::vhost) and then specified a list of potential variables. Pro Puppet



    898、单词 german 的匹配文本:


    1. For example, a resource bundle may map the string "readingFile" into strings "Reading file" in English or "Achtung! Datei wird eingelesen" in German. Core Java Volume I Fundamentals 9th Edition


    2. The name Dirichlet refers to a family of probability distributions defined by a German mathematician, Johann Peter Gustav Lejeune Dirichlet. Mahout in Action


    3. Colophon The animal on the cover of CouchDB: The Definitive Guide is a Pomeranian dog (Canis familiaris), a small variety of the generally larger German Spitz breed, named for the Baltic region of Pomerania (today spilt between northeastern Germany and northern Poland) where it was first bred. CouchDB The Definitive Guide


    4. For example, user code may want to count total number of words processed or the number of German documents indexed, etc. MapReduce - Simplied Data Processing on Large Clusters


    5. The success of this campaign was greatly due to the work of Alan Turing, who with his colleagues broke the German encryption algorithm known as Enigma. Java Security 2nd Edition


    6. VirtualBox was originally developed by the German company Innotek, who were acquired by Sun Microsystems, who in turn are now part of Oracle Corporation. Oracle JRockit The Definitive Guide


    7. We will close this chapter with a complete example—a retirement calculator with a user interface in English, German, and Chinese. Core Java Volume II Advanced Features 9th Edition


    8. The Locale.GERMAN argument was used to illustrate the use of this method. Java 7 New Features Cookbook


    9. A user can quickly drill down to values of interest, e.g., all German searches from yesterday afternoon that contain the word “auto”, by restricting a set of charts to these values. PowerDrill - Processing a Trillion Cells per Mouse Click


    10. Here, we construct a map that contains, for each language in the available locales, as key its name in your default locale (such as "German"), and as value its localized name (such as "Deutsch") Java SE 8 for the Really Impatient



    899、单词 cygwin 的匹配文本:


    1. It is possible to run and develop Hadoop applications under Windows, provided that Cygwin is installed. Pro Hadoop


    2. If you run MapReduce on Windows, you must install Cygwin.) By default, a local job runner uses the local filesystem to read/ write data. Professional Hadoop Solutions


    3. Windows users can try Cygwin to get an OpenSSH client. Cassandra High Performance Cookbook


    4. If you are using Windows machines, install Cygwin and SSH server in each machine. Hadoop MapReduce Cookbook


    5. In fact, Windows operating systems are not supported production platforms (although they can be used with Cygwin as a development platform; see Appendix A) Hadoop:The Definitive Guide 3rd Edition


    6. If you are running HBase on Windows, you must install Cygwin to have a Unix-like environment for the shell scripts. HBase:The Definitive Guide


    7. The software is pre-installed on many Linux systems and Mac OS X, and a Cygwin port is also available. Core Java Volume II Advanced Features 9th Edition


    8. For a Windows box, you’ll need to install cygwin   (http://www-cygwin.com/) to enable shell and Unix scripts. Hadoop in Action


    9. If you’re on Windows, you’ll first have to get the Cygwin POSIX emulator and then install Git. Cassandra The Definitive Guide


    10. Using a virtual machine is currently the only way to run Hadoop on Windows systems, even when Cygwin or similar Unix-like software is installed. Programming Hive



    900、单词 dataflow 的匹配文本:


    1. Pregel is also different because it implements a stateful model where long-lived processes compute, communicate, and modify local state, rather than a dataflow model where any process computes solely on input data and produces output data input by other processes. Pregel  -  A System for Large-Scale Graph Processing


    2. Even though the example is quite simple, it exposes the nature of a dataflow program. Programming Concurrency on the JVM


    3. This change in type may propagate to subsequent instructions as the dataflow analysis proceeds. The Java Virtual Machine Specification Java SE 7 Edition


    4. Building a high-level dataflow system on top of map-reduce: the pig experience. Building LinkedIn’s Real-time Activity Data1


    5. To enable parallel operations to run efficiently, FlumeJava defers their evaluation, instead internally constructing an execution plan dataflow graph. FlumeJava - Easy, Efficient Data-Parallel Pipelines


    6. The Hive query language provides facilities to control the MapReduce dataflow and inject your own custom map, and to reduce scripts at each stage. Hadoop RealWorld Solutions Cookbook


    7. As each step processes the data and all dependencies are defined as data dependencies, we call Pig a Dataflow language. Hadoop MapReduce Cookbook


    8. HBase Hadoop database for random read/write access Hive SQL-like queries and tables on large data sets Pig Dataflow language and compiler Oozie Workflow for interdependent Hadoop jobs Sqoop Integrates databases and data warehouses with Hadoop. HBase:The Definitive Guide


    9. Hadoop’s datajoin package implements the dataflow of a join as described previously. Hadoop in Action


    10. The overlap between the projects is that whereas Hive looks to present a familiar SQL-like interface to data, Pig uses a language called Pig Latin that specifies dataflow pipelines. Hadoop Beginners Guide



    901、单词 contravariant 的匹配文本:


    1. As you can see, the compiler gives us a nice message that we’ve used our type parameter A in a position that’s contravariant, when the type parameter is covariant. Scala in Depth


    2. Write a generic method with a contravariant argument of the first generic class that calls its method. Thinking in Java 4th Edition


    3. Type variance complements type parameterization with a mechanism to specify constraints like covariant and contravariant to the type system. Scala in Action


    4. Besides +, there is also a prefix -, which indicates contravariant subtyping. Programming in Scala 2nd Edition


    5. Scala uses kindskinds to track how many type arguments a type constructor takes, whether it is co- or contravariant in those arguments, and what their kinds are. Functional Programming in Scala


    6. This is especially true for library writers, who will want to understand when to use parameterized types versus abstract types, which type parameters should be covariant, contravariant, or invariant under subtyping, and so forth. Programming Scala


    7. We’ll discuss why this happened and the very complex topic of invariant, covariant, and contravariant types later in this chapter. Beginning Scala


    8. In general, reading is covariant (subtypes are okay) and writing is contravariant (supertypes are okay) Java SE 8 for the Really Impatient



    902、单词 dbcp 的匹配文本:


    1. In real-world applications, you can use Apache Commons BasicDataSource (http://commons.apache.org/dbcp/) or a DataSource implemented by a JEE application server (e.g., JBoss, WebSphere, WebLogic, GlassFish, etc.), which may further increase the performance of the application. Pro Spring 3


    2. As shown in figure 1.3, the code also specifically creates a dependency on a BasicDataSource, a specific DataSource implementation from the Apache Commons Database Connection Pool (DBCP) project. Spring in Practice


    3. If you plan to use the data source in a concurrent application, then use a connection pool, like Apache Commons DBCP or c3p0 Spring Batch in Action


    4. We’ll do our experimenting on the Apache Commons DBCP library. Spring Dynamic Modules in Action


    5. The preceding example uses the Apache Commons DBCP BasicDataSource to wrap the MySQL JDBC driver for connection pooling. ActiveMQ in Action


    6. If a connection pool is needed, it is easy to change the configuration to use Apache Commons DBCP or c3p0 connection pools. Spring Data Modern Data Access for Enterprise Java


    7. You might choose to configure a Commons DBCP connection pool like this: Spring in Action 4th Edition



    903、单词 dbref 的匹配文本:


    1. In the latter case, you use the DBRef specification, which provides more flexibility in case a collection changes from one document to the next. The Definitive Guide to MongoDB


    2. DBRef private Product product; private BigDecimal price; private int amount; Spring Data Modern Data Access for Enterprise Java


    3. DbRef Indicates that a field is intended to reference another document, possibly in another database. Spring in Action 4th Edition



    904、单词 placeholders 的匹配文本:


    1. Abstract methods act as placeholders for methods that are implemented in the subclasses. Core Java Volume I Fundamentals 9th Edition


    2. Instead of using the overloaded ‘+’ operator (which C doesn’t overload) to concatenate quoted text and variables, printf( ) uses special placeholders to show where the data should go. Thinking in Java 4th Edition


    3. Prepared statements can have parameters, which are question-mark placeholders for values that you can specify when you execute them. High Performance MySQL 3rd Edition


    4. In the properties file, add the following keys and replace the placeholders with the actual values of your account: Gradle in Action


    5. For actions, the listing only shows names and types, flow-control definitions, and placeholders for the action body section. Professional Hadoop Solutions


    6. The size may be larger, but that is because it has kept placeholders for each revision of the database. Beginning CouchDB


    7. It has placeholders for all methods required by the RegionObserver interface. HBase:The Definitive Guide


    8. This page defines a default structure for the page, including placeholders for the content that will be defined in the pages. Java EE 7 Essentials


    9. The string sql contains a SQL statement that can contain one or more parameter placeholders denoted by ? characters. Core Java Volume II Advanced Features 9th Edition


    10. An outer join uses null values as placeholders for the columns of. SQL Antipatterns



    905、单词 refactored 的匹配文本:


    1. Flume 1.X (Flume-NG) There were many reasons to why Flume was refactored. Apache Flume Distributed Log Collection for Hadoop


    2. It is good to keep in mind that our build script is just code, and code can be organized and refactored to create cleaner code. Gradle Effective Implementation Guide


    3. That sounds good, but in which situations? We discuss two common code patterns that can be refactored to leverage lambda expressions: conditional. Java 8 in Action Lambdas, Streams and Functional-style Programming


    4. Our implementation of the newCharacter() method could be refactored into multiple. Java Threads 3rd Edition


    5. Note that the example can easily be refactored to work properly: The Java Language Specification Java SE 7 Edition


    6. The logic of the refactored MapReduce job was not too hard to follow, was it? We added an explicit count for each key/value pair. Hadoop in Action


    7. Those applications must be refactored to be multithreaded to do their work in parallel. Java Performance


    8. To enable many sessions to be handled without using many threads, the tasks first must be refactored into an event-driven style, where an event here signifies IO availability. Concurrent Programming in Java Design Principles and Pattern


    9. So, what actually got refactored? Well, I moved all the drawing code from the paintComponent() method into another method called draw() Java 7 Recipes A Problem-Solution Approach


    10. It is unlikely that the Java collections library will be refactored in this way, but when you implement your own interfaces, there is no longer a reason to provide a separate companion class for utility methods. Java SE 8 for the Really Impatient



    906、单词 objectoriented 的匹配文本:


    1. The Java programming language has an interesting history, and draws heavily from earlier objectoriented languages such as C++ and Smalltalk. Java Network Programming and Distributed Computing


    2. Alan Kay summarized five basic characteristics of Smalltalk, the first successful objectoriented language and one of the languages upon which Java is based. Thinking in Java 4th Edition


    3. Complex build logic is best structured in custom task classes, which give you all the benefits of objectoriented programming. Gradle in Action


    4. This fits naturally into the way developers in modern objectoriented languages think about their data. MongoDB The Definitive Guide 2nd Edition


    5. Java code is organized in modular objectoriented units called classes. Java in a Nutshell 5th Edition


    6. DataJoinMapper and TaggedMapperOutput There is a way of implementing a reduce-side join in a more sophisticated and objectoriented fashion. Hadoop Beginners Guide


    7. On the other hand, good objectoriented design actually encourages many small methods and significant polymorphism in the method hierarchy. Java Performance Tuning 2nd Edition


    8. It’s also a great language to look into if you are familiar with programming, and you’re looking for a multi-paradigm programming language that permits several styles of programming (e.g., objectoriented programming, structured programming, and so on) The Definitive Guide to MongoDB


    9. The Java language is a robust, secure, and modern objectoriented language that can be used to develop applications to run on the JVM. Java 7 Recipes A Problem-Solution Approach


    10. In addition, most developers now work with objectoriented languages, and they want a data store that better maps to objects. MongoDB in Action



    907、单词 readme 的匹配文本:


    1. The README file that is included with the download contains the installation instructions. Monitoring with Ganglia


    2. The source tree contains some files that aren’t necessary for the application—the README and THANKS files are among those. CouchDB The Definitive Guide


    3. For more information, please check the README.txt file in the source code root directory. Hadoop Operations and Cluster Management Cookbook


    4. In the following example we have the filterFiles task, where we define a file collection of two files with the names INSTALL.txt and README. Gradle Effective Implementation Guide


    5. To learn more about the data set, refer to the documentation included with the download in README.txt. MapReduce Design Patterns


    6. To be used as the input, create a directory called input under HADOOP_HOME and copy the README.txt file to the directory. Hadoop MapReduce Cookbook


    7. For details on how to build and use the C API, refer to the README file in the src/c directory of the ZooKeeper distribution. Hadoop:The Definitive Guide 3rd Edition


    8. You might want to check out the README.txt file, as it will have the list of dependencies required to run the tool. Cassandra The Definitive Guide


    9. README.txt—A file containing some URLs to documentation to get new users started with ActiveMQ. ActiveMQ in Action


    10. Check the project’s README for details on tooling version requirements. Building and Testing with Gradle



    908、单词 solrj 的匹配文本:


    1. Client APIs and SolrJ client Apache Solr client  provides  different ways of  talking with Apache Solr web application. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr


    2. Ignore the client directory Most client libraries are maintained by other organizations, except for the Java client SolrJ which lies in the dist/ directory. Solr 3 Enterprise Search Server


    3. If you don't use Linux or UNIX, you can write a simple Java code using, for example, SolrJ. Solr 3.1 Cookbook


    4. Let’s continue our discussion of how to index documents by learning about a popular Java-based client for Solr called SolrJ. Solr in action



    909、单词 combiners 的匹配文本:


    1. Combiners are not enabled by default, because there is no mechanical way to find a useful combining function that is consistent with the semantics of the user’s Compute() method. Pregel  -  A System for Large-Scale Graph Processing


    2. Combiners also must be idempotent, as they may be run an arbitrary number of times by the Hadoop framework over a given map task’s output. Pro Hadoop


    3. It’ll explain what the map phase does, what the reduce phase does, and also lets you know if it’ll be using any custom partitioners, combiners, or input formats. MapReduce Design Patterns


    4. The primary goal of combiners is to save as much bandwidth as possible by minimizing the number of key/value pairs that will be shuffled across the network between mappers and reducers. Professional Hadoop Solutions


    5. There are two Pig recipes that show different analytics with the Audioscrobbler dataset and one MapReduce Java API recipe that shows Combiners. Hadoop RealWorld Solutions Cookbook


    6. The data size gets smaller in each iteration, and finally, we apply the Reduce function to the output of the last level of Combiners. Incoop MapReduce for Incremental Computations


    7. Solution Learn how to parse Apache log files, and how filtering, projection, and combiners can be used in Crunch. Hadoop in Practice


    8. Combiners Check whether your job can take advantage of a combiner to reduce the amount of data passing through the shuffle. Hadoop:The Definitive Guide 3rd Edition


    9. Fortunately, the Hadoop roadmap supports native Streaming scripts as combiners. Hadoop in Action


    10. In contrast, in our hand-coded Hadoop plan we (and the authors of [23]) failed to take advantage of hash aggregation for the smaller query because sort-based aggregation (using Combiners) is a MapReduce standard practice. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



    910、单词 subpackages 的匹配文本:


    1. The Java compiler itself is highly skilled in guessing the various meanings of the period character as separator between packages, subpackages, classes, inner classes, and methods and variables. Core Java Volume I Fundamentals 9th Edition


    2. In Scala, when you import a package, Scala makes its members, including subpackages, available to you. Scala in Action


    3. Several subpackages provide support of JDBC data access with more specific purposes (e.g., a JdbcTemplate class that supports named parameters) and related support classes as well. Pro Spring 3


    4. All collection classes are found in the package scala.collection or one of its subpackages: mutable, immutable, and generic. Programming in Scala 2nd Edition


    5. The members of a package are classes, interfaces, and subpackages. The Java Language Specification Java SE 7 Edition


    6. Protected types are visible only within the same package and subpackages. Programming Scala


    7. Once you import a package, you can access its subpackages with shorter names. Scala for the Impatient


    8. When specifying a package, the subpackages aren’t exported by default, which means you need to explicitly specify each one if you want to export them all. Spring Dynamic Modules in Action


    9. Such packages are known as subpackages, although there is no linguistic support for package hierarchies. Effective Java 2nd Edition


    10. The documentation of the javax.crypto package and its subpackages was also reviewed by Jon Eaves. Java in a Nutshell 5th Edition



    911、单词 uber 的匹配文本:


    1. Thankfully, Cargo provides an UberJar, a single JAR file that packages the API and container functionality, which will make the dependency management easier. Gradle in Action


    2. Almost all modern smartphones have an app for Twitter; however, if you want to compare with a freely available one, then UberSocial (http://ubersocial.com/) is a good alternative. Jenkins Continuous Integration Cookbook


    3. Chapter 8 completes the Oozie description by showing some of the advanced Oozie features, including custom Workflow activities, dynamic Workflow generation, and uber-jar support. Professional Hadoop Solutions


    4. You can add those JARs to the classpath, or you can create an uber-JAR, exploding all of those JARs’ classes inside your own. HBase in Action


    5. This is different from MapReduce 1, where small jobs are never run on a single tasktracker.) Such a job is said to be uberized, or run as an uber task. Hadoop:The Definitive Guide 3rd Edition


    6. As you’ll see later, this will help produce an executable uber-JAR file that contains all of the application’s dependencies. Spring in Action 4th Edition



    912、单词 heuristic 的匹配文本:


    1. For example, a typical heuristic employed for the Web graph is to colocate vertices representing pages of the same site. Pregel  -  A System for Large-Scale Graph Processing


    2. Behind the scenes, the fork-join framework uses an effective heuristic for. Core Java Volume I Fundamentals 9th Edition


    3. This is an arbitrary choice, but in most cases it’s difficult to find a good heuristic, other than trying to optimize it by making several attempts with different inputs. Java 8 in Action Lambdas, Streams and Functional-style Programming


    4. Otherwise, you’ll want to build a heuristic to decide on a precision based on the query parameters. HBase in Action


    5. In addition, the JRE has heuristic algorithms that adjust these assumptions as your process is running. HBase:The Definitive Guide


    6. As referenced objects may, in worst case, appear anywhere on the heap, on NUMA the GC usually needs an additional object moving heuristic. Oracle JRockit The Definitive Guide


    7. The benefit of this heuristic is much greater if we’re looking at reverse patent citation or text documents, where frequency of items are extremely skewed and quadratic expansion on a few popular items can dominate the amount of data processed. Hadoop in Action


    8. The heuristic for blacklisting a tasktracker is simple but effective. Hadoop Operations


    9. In practice, a good heuristic is to let a domain expert. PowerDrill - Processing a Trillion Cells per Mouse Click


    10. Thread.yield is a purely heuristic hint advising the JVM that if there are any other runnable but non-running threads, the scheduler should run one or more of these threads rather than the current thread. Concurrent Programming in Java Design Principles and Pattern



    913、单词 tablespace 的匹配文本:


    1. If the table uses the InnoDB storage engine, the amount of free space in the InnoDB tablespace appears here. High Performance MySQL 3rd Edition


    2. The Oracle database always has a tablespace called SYSTEM, used for similar purposes. Cassandra The Definitive Guide


    3. In general, the single-table approach tends to be more wasteful of database tablespace, but it does offer peak performance for both polymorphic queries and write operations. Pro JPA2


    4. Initially InnoDB tables could reside only in the tablespace file or raw device. Understanding MySQL Internals



    914、单词 artifactory 的匹配文本:


    1. If you’re eager to learn about it, feel free to directly jump to chapter 14, which talks about how to set up and use open source and commercial repository managers like Sonatype Nexus and JFrog’s Artifactory. Gradle in Action


    2. That is not Jenkins but a Maven repository or a repository manager such as Artifactory (http://www.jfrog.com/products.php), Apache Archiva (http://archiva.apache.org/) or Nexus (http://nexus.sonatype.org/) Jenkins Continuous Integration Cookbook


    3. He is a lead developer at Thomson Reuters where he’s responsible for a number of activities, some of which are directly related to Maven, Groovy, and build tools such as Artifactory and Jenkins. Jenkins The Definitive Guide


    4. One critical piece of this is to push good builds to a package repository (for example, Nexus, Artifactory, or even a simple fileshare) where the deployment process can find them. Spring in Practice


    5. Sonatype’s Nexus and JFrog’s Artifactory are two examples of products that can be used to deploy Maven-style binary repositories internally. Gradle Beyond The Basics


    6. Publishing to a Maven Repository After a successful Gradle build, a binary artifact such as a JAR should be deployed to a binary repository manager such as Artifactory or Nexus for team-wide consumption. Building and Testing with Gradle



    915、单词 inlined 的匹配文本:


    1. What happens if the virtual machine loads another subclass that overrides an inlined method? Then the optimizer must undo the inlining. Core Java Volume I Fundamentals 9th Edition


    2. After all, once you get through escaping quotes and leaving out newlines, it’s not much fun to edit HTML templates inlined into JavaScript. CouchDB The Definitive Guide


    3. Don't need foreign keys or joins if data is inlined. F1 - The Fault-Tolerant Distributed RDBMS


    4. For instance, in Java, when performing a generic sort (using a Comparator), an element comparison can be expensive (because comparisons might not be easily inlined, and thus the overhead of dynamic dispatch could slow things down), but moving elements is cheap (because they are reference assignments, rather than copies of large objects) Data Structures and Algorithm Analysis in Java 3rd Edition


    5. Let’s say we want to see each station’s history, with the station’s metadata inlined in each output row. Hadoop:The Definitive Guide 3rd Edition


    6. He and I spent several sessions together examining optimizations of WebLogic code and deciphering why this method or that wasn't getting inlined or devirtualized. Oracle JRockit The Definitive Guide


    7. Primitive constant fields (those primitive data type fields defined with the final modifier) are inlined within a class and across classes, regardless of whether the classes are compiled in the same pass. Java Performance Tuning 2nd Edition


    8. Each of these safepoints also contains all the information describing the chain of methods that were inlined and the description of the Java frame required for support of deoptimization. Java Performance


    9. If the method is inlined, the compiler may further rearrange the orders with respect to yet other statements. Concurrent Programming in Java Design Principles and Pattern


    10. Although the code contains HTML markup tags in Java code, which totally violates the principles of the separation of concerns, I inlined HTML by concatenating string values for brevity. Java 7 Recipes A Problem-Solution Approach



    916、单词 haskell 的匹配文本:


    1. Common functional languages (SML, OCaml, Haskell) also provide further constructs to help programmers. Java 8 in Action Lambdas, Streams and Functional-style Programming


    2. Haskell—If you want to use RabbitMQ with Haskell, take a look at this package on hackage: http://hackage.haskell.org/package/amqp. RabbitMQ in Action


    3. His non-work interests include functional programming in languages like Haskell and Lisp dialects, and their application to real-world problems. Hadoop RealWorld Solutions Cookbook


    4. For instance, Lisp, Haskell, and Python implement big integers; Fortran and Python implement complex numbers. Programming in Scala 2nd Edition


    5. Footnote 11mThis is named after the mathematician Haskell Curry, who discovered the principle. Functional Programming in Scala


    6. In fact, the sequence comprehensions we went over are both examples of a technique popularized by the highly functional language Haskell that is known as monadic transformations, which rely on a concept from category theory known as monads. Functional Programming Patterns in Scala and Clojure


    7. So, Scala requires more type annotations than languages like Haskell. Programming Scala


    8. NOTE: Some programming languages (such as ML and Haskell) can infer the type of a recursive function, using the Hindley-Milner algorithm. Scala for the Impatient


    9. It enables you to invoke scripts written in JavaScript, Groovy, Ruby, and even exotic languages such as Scheme and Haskell, from a Java program. Core Java Volume II Advanced Features 9th Edition


    10. So, why doesn’t Java have more immutable data structures? Because it’s not obvious that Java needs them until you code with them for a while, and very few Java developers I know spent a lot of time with Lisp, ML, or Haskell. Beginning Scala



    917、单词 linearization 的匹配文本:


    1. As implicits also have a lookup policy, the inheritance linearization, they can be used to change the return type of methods. Scala in Depth


    2. Scala solves this problem using a something called class linearization. Scala in Action


    3. With traits, the method called is determined by a linearization of the classes and traits that are mixed into a class. Programming in Scala 2nd Edition


    4. Not all linearization techniques are created equal The geohash is approximating the data space. HBase in Action


    5. We’ll also learn about Scala’s alternative to Java’s static class members and the linearization rules for method lookup. Programming Scala



    918、单词 xms 的匹配文本:


    1. Remember if you increase this value you may also have to increase your Java heap space using the -Xmx and optionally the -Xms parameters. Apache Flume Distributed Log Collection for Hadoop


    2. In addition, there may be a danger here of running out of memory if your byte buffer grows too large, so you must be mindful of memory consumption (perhaps adjust Java heap parameters such as Xms and Xmx) Pro Java 7 NIO.2


    3. We would set the Xms and Xms Java properties to 8g and for our case it should be enough, because our index size is not very high, and we don't have the parent-child relationships in our data because we don't facet on high cardinality fields. Mastering ElasticSearch


    4. To do that, you need to add the Xmx and preferably the Xms parameter to the start script of your servlet container (Apache Tomcat or Jetty) Solr 3.1 Cookbook


    5. Xms initmem[k|m] Specifies how much memory is allocated for the heap when the interpreter starts up. Java in a Nutshell 5th Edition


    6. Try setting the -Xmx and -Xms options to the same value to keep Java from having to manage heap growth. Cassandra The Definitive Guide


    7. The VMs provided by most vendors include the two main heap tuning parameters: -mx/-Xmx and -ms/-Xms. Java Performance Tuning 2nd Edition


    8. The memory management system within the HotSpot VM is capable of expanding and shrinking the garbage collected heap if the values set for -Xmx and -Xms differ. Java Performance


    9. The option -Xms size sets the starting size of the heap and the option -Xmx size sets the maximum allowed size of the heap. Lucene in Action 2nd Edition


    10. To do that, you need to add the Xmx and, preferably, the Xms parameter to the start-up script of your servlet container (Apache Tomcat or Jetty) Apache Solr 4 Cookbook



    919、单词 fanout 的匹配文本:


    1. Fanout queues are only currently used for the advertising of the service capabilities to nova-scheduler workers. Deploying OpenStack


    2. The next type of exchange that we’ll discuss is the fanout exchange. RabbitMQ in Action


    3. Using these segments, they achieve a much higher fanout compared to binary trees, resulting in a much lower number of I/O operations to find a specific key. HBase:The Definitive Guide


    4. Finally, we’ll see how the fanout connector enables clients to send messages to multiple brokers. ActiveMQ in Action


    5. Fanout—A message will be routed to all queues that are bound to the exchange, regardless of the routing key or headers/values in the table of arguments. Spring in Action 4th Edition



    920、单词 uptime 的匹配文本:


    1. In this example, we want to record the system load via the Linux uptime command, which prints out some system information to stdout and exits: Apache Flume Distributed Log Collection for Hadoop


    2. In a production system that’s handling a stream of classification requests, it’s fairly common for there to be an expectation of nearly 100 percent uptime. Mahout in Action


    3. You should now be able to run bin/slaves.sh uptime and receive the output of uptime. Pro Hadoop


    4. Computed by aggregating all metered CPU time and dividing by metered node uptime. Apache Hadoop YARN Yet Another Resource Negotiator


    5. Hector also provides client-side load balancing because detecting and automatically failing-over between servers is important to achieve good uptime. Cassandra High Performance Cookbook


    6. If you stay up at night worrying about your database (uptime, scale, or speed), you should seriously consider making a jump from the RDBMS world to HBase. Hadoop:The Definitive Guide 3rd Edition


    7. It is difficult to scale up our MySQL clusters rapidly while maintaining good load balancing and high uptime. Apache Hadoop Goes Realtime at Facebook


    8. Ring You can view system information such as uptime and heap usage. Cassandra The Definitive Guide


    9. You'll often hear terms such as "five nines" (referring to 99.999 percent uptime or availability) Hadoop Beginners Guide


    10. In our previous example, /hbase could be on a namenode that requires extremely high uptime while maybe /logs is used only by batch operations in MapReduce. Hadoop Operations



    921、单词 scalac 的匹配文本:


    1. Let’s compile the code using the scalac compiler, but first we must remember to specify the classpath to Akka library files. Programming Concurrency on the JVM


    2. When you compile this with scalac, you get the following compilation errors: Scala in Action


    3. One way to do this is to use scalac, which is the basic Scala compiler, like this: Programming in Scala 2nd Edition


    4. Here’s how to write a class and compile it using the scalac compiler. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


    5. This time, you must first compile the code to a JVM .class file using scalac: Programming Scala


    6. You can see exactly how Scala turns patterns into code by typing scalac -print FileName.scala. Beginning Scala


    7. In this appendix, we show how to use both the Scala compiler (scalac) and the Scala interpreter (scala) by experimenting with their command line arguments. Steps in Scala An Introduction to Object-Functional Programming



    922、单词 repo 的匹配文本:


    1. Its GitHub repo is top-notch: the build compiles and is easy to run locally, making it frictionless to develop against. Netty in Action MEAP V08


    2. Gradle’s API supports two ways of configuring a custom repository: maven() and mavenRepo() Gradle in Action


    3. Your Subversion repo contains an index.html file, which is pulled into the workspace of the job. Jenkins Continuous Integration Cookbook


    4. We define the URL of the Maven repository with the maven() or mavenRepo() methods. Gradle Effective Implementation Guide


    5. Documentation for the library can be found in its repo at http://doc.akka.io/docs/akka-modules/1.3.1/modules/amqp.html. RabbitMQ in Action


    6. Since a Maven repository is nothing more than a website containing downloadable POM files and modules in a predictable directory structure, declaring a Maven repository in Gradle begins with telling Gradle the URL of the repo. Gradle Beyond The Basics


    7. We’re going to show you a simple example of how to create an additional type and provider, one that manages version control systems (VCS), which we’re going to call repo. Pro Puppet


    8. See the book's source code repo on GitHub for more information on getting set up with sbt. Functional Programming in Scala


    9. Replace the URL in baseurl in the following code and execute the command to add the R mirror repo to your Yum configuration: Hadoop in Practice


    10. Since many organizations will need to additionally, or as a replacement, depend on a company-internal repository, that is equally easy with an addition of a URL to the mavenRepo configuration element of repositories in Example 4-15 Building and Testing with Gradle



    923、单词 redirects 的匹配文本:


    1. This is often issued in response to a POST request, which processes the information and redirects to a standard page. Java Network Programming and Distributed Computing


    2. This program attaches standard input to a file and redirects standard output and standard error to another file. Thinking in Java 4th Edition


    3. Gradle redirects standard error to log messages, with log level ERROR. Gradle Effective Implementation Guide


    4. Often, browsers follow these redirects transparently to the user; in Java, the programmer has the ability to determine if the redirection should automatically be followed or not. Java Security 2nd Edition


    5. What’s interesting with the implementation of this servlet is that it redirects the actual file download to one of the DataNodes that contains the first block of the file. Hadoop in Practice


    6. Summary This short overview of Nutch necessarily omits many details, such as error handling, logging, URL filtering and normalization, dealing with redirects or other forms of “aliased” pages (such as mirrors), removing duplicate content, calculating PageRank scoring, etc. Hadoop:The Definitive Guide 3rd Edition


    7. Starting the process before redirecting input or output will cause the process to disregard your redirects and the application will execute using the standard IO locations. Java 7 New Features Cookbook


    8. Redirects The 300-level response codes all indicate some sort of redirect; that is, the requested resource is no longer available at the expected location but it may be found at some other location. Java Network Programming 4th Edition


    9. The dispatcher redirects the client to send the request to another server. Java Performance Tuning 2nd Edition


    10. The sendRedirect() method accepts a URL in String format and then redirects the web browser to the given URL. Java 7 Recipes A Problem-Solution Approach



    924、单词 ssds 的匹配文本:


    1. Alternatively, good experiences have been reported by users placing RRD files on SAN storage or solid-state drives (SSDs) Monitoring with Ganglia


    2. Solid-state storage (SSDs and PCIe cards) presents special challenges for benchmarking, which we address in Chapter 9 High Performance MySQL 3rd Edition


    3. Example: specify compute hosts with SSDs In this example, we configure the Compute service to allow users to request nodes that have solid-state drives (SSDs) bk-compute-adminguide-grizzly


    4. WARNING: SSDS AND appendfsync always You’ll want to be careful if you’re using SSDs with appendfsync always. Redis in Action


    5. Solid State Drives (SSDs) are pretty sweet because they can append to a file while loading old blocks, with a minimum of overhead. CouchDB The Definitive Guide


    6. You should be wary of creating full-text indexes that will not fit in RAM (unless you have SSDs) MongoDB The Definitive Guide 2nd Edition


    7. The even larger standard deviation in read latencies is partially due to the fact that Paxos leaders are spread across two data centers, only one of which has machines with SSDs. Spanner - Google’s Globally-Distributed Database


    8. Disk access can be improved by using solid-state drives (SSDs) in place of spinning disks, providing an approximate 20 times increase in performance, or by using enterprise flash hardware, which can reduce latencies even further. Graph Databases


    9. It is a good performance practice to use SSDs or disk arrays with write caches for transaction logging and for storing JMS messages. Java Performance


    10. So the use of SSDs such as Flash is encouraged. Redis Cookbook



    925、单词 implementors 的匹配文本:


    1. The rules are complex enough to baffle the compiler implementors—early versions of Java implemented them with subtle errors. Core Java Volume I Fundamentals 9th Edition


    2. Much like synchronized, the implementors of the Lock interface guarantee that calls to their methods cross the memory barrier. Programming Concurrency on the JVM


    3. We describe YARN’s inception, design, opensource development, and deployment from our perspective as early architects and implementors. Apache Hadoop YARN Yet Another Resource Negotiator


    4. This is the one place most likely to require JVM implementors to change their implementation to be compliant with JSR-133 JSR-133 Java Memory Model and Thread


    5. There is a single method that implementors of the Principal interface must implement: Java Security 2nd Edition


    6. Implementors should retrieve the next record from the RecordReader, map it to. Hadoop in Practice


    7. This interface permits implementors to compare records read from a stream without deserializing them into objects, thereby avoiding any overhead of object creation. Hadoop:The Definitive Guide 3rd Edition


    8. The implementors of this class felt a need to express their individuality by introducing yet another iteration protocol. Core Java Volume II Advanced Features 9th Edition


    9. It is much harder to use the mutable companion class than to use BigInteger for all of the reasons outlined earlier, but luckily you don’t have to: the implementors of BigInteger did the hard work for you. Effective Java 2nd Edition


    10. The java.awt.peer package The interfaces in the java.awt.peer package are part of the Java platform but are documented for use by AWT implementors only. Java in a Nutshell 5th Edition



    926、单词 ini 的匹配文本:


    1. You can also remove unused PHP modules from your php.ini file. High Performance MySQL 3rd Edition


    2. Configuring your Compute installation involves many configuration files - the nova.conf file, the api-paste.ini file, and related Image and Identity management configuration files. bk-compute-adminguide-grizzly


    3. Find your local.ini file and open it in your text editor. CouchDB The Definitive Guide


    4. For example in Compute, you can remove the middleware parameters from api-paste.ini, as follows: bk-admin-guide-cloud-latest


    5. At the time of writing, the latest version of CouchDB provides two configuration files, default.ini and local.ini. Beginning CouchDB


    6. This is configured in the default.ini file, but may be specified using the q query parameter when creating a database. Scaling CouchDB


    7. The puppet.conf configuration file is constructed much like an INI-style configuration file and divided into sections. Pro Puppet


    8. In the Eclipse home folder, there is a configuration file, eclipse.ini, that can be altered to change the command-line flags of the JVM running Eclipse. Oracle JRockit The Definitive Guide


    9. To do so, open a text editor (e.g., vim, nano, or whichever text editor you prefer) and alter the file called php.ini, which is the main configuration file PHP uses to control its behavior, including which extensions it should load. The Definitive Guide to MongoDB


    10. Look for a pipeline value in the project’s conf or ini configuration files in /etc/ to identify projects that use Paste. OpenStack Operations Guide



    927、单词 puppetlabs 的匹配文本:


    1. See the Puppet language guide at http://docs.puppetlabs.com/guides/lan guage_guide.html for complete documentation. Managing Infrastructure with Puppet


    2. For more information on Hiera, please see the Puppet documentation page at http://docs.puppetlabs.com/hiera/1/index.html. Storm Real-Time Processing Cookbook


    3. Puppet (http://www.puppetlabs.com/puppet) is a reaction to these gaps in the tools available to SysAdmins, Operators and Developers. Pro Puppet



    928、单词 django 的匹配文本:


    1. Dashboard Horizon is a modular Django web application that provides an end user and administrator interface to OpenStack services. bk-compute-adminguide-grizzly


    2. Django may be built for the Web, but CouchDB is built of the Web. CouchDB The Definitive Guide


    3. Dashboard The dashboard is a modular Django web application that provides a graphical interface to OpenStack services. bk-admin-guide-cloud-latest


    4. That page also contains information on integrating Solr with other frameworks and applications, such as Django. Solr 3 Enterprise Search Server


    5. It also shows you how to develop applications that are housed entirely in the database itself, in addition to using Python, Django, and Ruby to interact with CouchDB from a traditional serverside application. Beginning CouchDB


    6. Most other web development frameworks, including Doctrine for PHP, Django for Python, and Microsoft ASP.NET, support features similar to Rails’ migrations, either included with the framework or available as a community project. SQL Antipatterns


    7. The source is all in Python, and it has a few dependencies on Django and a JSON library to sort out, but it’s a great place to start. Cassandra The Definitive Guide


    8. He works as an application developer and database administrator at Fermi National Accelerator Laboratory, and is the lead for the Django-Jython project (http://code.google.com/p/django-jython/) Java 7 Recipes A Problem-Solution Approach


    9. Additionally, the dashboard’s use of Django makes it a flexible framework for extension. OpenStack Operations Guide



    929、单词 truststore 的匹配文本:


    1. A client’s browser truststore (which contains a list of authorized root CAs) will also not trust our selfsigned certificate by default, since it cannot be verified by any of the known and trusted CAs. Pro Spring MVC


    2. If you run into PKIX/certificate trust issues, you may need to import the Gmail IMAP certificate into your truststore. Spring in Practice


    3. In many common administration scenarios, however, the key store and trust store are combined into a single file (in Tomcat, this would be done through the use of the keystoreFile and truststoreFile attributes of the connector) Spring Security 3.1


    4. Note N  A truststore is a repository of certificates that are trusted by the JRE that uses such a truststore. Pro Spring Security


    5. In fact, a truststore has exactly the same format as a keystore; both are administered with keytool, and both are represented programmatically as instances of the KeyStore class. Java Security 2nd Edition


    6. In most Java environments, a keystore is used to store the private keys, and a truststore to store the trusted certificates. Oracle JRockit The Definitive Guide


    7. Without creating and denoting the proper keystore and truststore, you can expect to see the following exceptions: ActiveMQ in Action



    930、单词 parameterless 的匹配文本:


    1. In the case of the parameterless findOne method, you’re using -1 as the key because the method doesn’t take a parameter. Scala in Action


    2. Web Flow creates an instance using the default (or parameterless) constructor of the class. Pro Spring MVC


    3. The supplier method has to return a Supplier of an empty result—a parameterless function that when invoked creates an instance of an empty accumulator used during the collection process. Java 8 in Action Lambdas, Streams and Functional-style Programming


    4. In addition to these topics, we’ll discuss abstract classes, parameterless methods, extending classes, overriding methods and fields, parametric fields, invoking superclass constructors, polymorphism and dynamic binding, final members and classes, and factory objects and methods. Programming in Scala 2nd Edition


    5. Ivan Tarasov discusses some Scala puzzlers, including a problem with parameterless case classes. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


    6. It’s also possible to omit the dot (period) when calling a parameterless method or one that takes only one argument. Programming Scala


    7. The rule of thumb is that a parameterless method that doesn’t modify the object has no parentheses. Scala for the Impatient


    8. Writable and the Parameterless Constructor You will find that most classes provided by the API and discussed throughout this chapter do possess a special constructor, one that does not take any parameters. HBase:The Definitive Guide


    9. A second alternative when you are faced with many constructor parameters is the JavaBeans pattern, in which you call a parameterless constructor to create the object and then call setter methods to set each required parameter and each optional parameter of interest: Effective Java 2nd Edition


    10. If a lambda expression has no parameters, you still supply empty parentheses, just as with a parameterless method: Java SE 8 for the Really Impatient



    931、单词 prefetch 的匹配文本:


    1. Caching read-ahead data If the RAID controller notices sequential requests for data, it might decide to do a read-ahead read—that is, to prefetch data it predicts will be needed soon. High Performance MySQL 3rd Edition


    2. In particular, inodes are embedded directly within directories, allowing the MDS to prefetch entire directories with a single OSD read request and exploit the high degree of directory locality present in most workloads [22] Ceph A Scalable, High-Performance Distributed File System


    3. In particular, a class loader may cache binary representations of classes and interfaces, prefetch them based on expected usage, or load a group of related classes together. The Java Language Specification Java SE 7 Edition


    4. You can also set how much to cache/prefetch on the Scan instance itself. Hadoop:The Definitive Guide 3rd Edition


    5. One way to mitigate future round-trips is to prefetch location information in a single request, thus updating the client cache ahead of time. HBase:The Definitive Guide


    6. Also, a prefetch retrieves an entire cache line, which takes time, so unless the prefetch operation can be pipelined, or hidden in parallel with other actions before its data is to be used, it has no or even negative effects. Oracle JRockit The Definitive Guide


    7. ActiveMQ uses a prefetch limit to determine the number of messages it will pre-send to consumers, so that network is used optimally. ActiveMQ in Action


    8. However, if a prefetch instruction was inserted upstream in the sequence of instructions generated by a compiler to prefetch from memory the data being loaded by the load instruction, it is likely the number of clock cycles required to load the data will be less with the additional prefetch instruction since the prefetch can be done in parallel with other CPU instructions ahead of the load instruction. Java Performance


    9. Although tablet locations are stored in memory, so no GFS accesses are required, we further reduce this cost in the common case by having the client library prefetch tablet locations: it reads the metadata for more than one tablet whenever it reads the METADATA table. Bigtable - A Distributed Storage System for Structured Data



    932、单词 deserialize 的匹配文本:


    1. The key feature of a Writable is that the framework knows how to serialize and deserialize a Writable object. Pro Hadoop


    2. Developers should be aware that no special care is taken to protect the contents of a serialized object from scrutiny or modification, and that any class in any JVM may choose to deserialize an object at a later time. Java Network Programming and Distributed Computing


    3. There’s a GitHub project called csv-serde,44 which has a Hive SerDe that can both serialize and deserialize CSV. Hadoop in Practice


    4. We construct a new, value-less IntWritable, and then call deserialize() to read from the output data that we just wrote. Hadoop:The Definitive Guide 3rd Edition


    5. Clients attempting to serialize an instance using an old version of the class and deserialize it using the new version will experience program failures. Effective Java 2nd Edition


    6. The SignedObject can then be serialized and transmitted to a recipient, who can deserialize it and use the verify( ) method to verify the signature: Java in a Nutshell 5th Edition


    7. The serialized int at that location holds the byte offset into the data file, so you deserialize that int. Java Performance Tuning 2nd Edition


    8. For example, a complex type can be serialized as an encoded string and a UDTF will deserialize the complex type when needed. Programming Hive


    9. This will allow you to serialize classes, modify them, and then deserialize the original classes while implementing some backward compatibility. Java 7 Recipes A Problem-Solution Approach


    10. The bottom, colored segment of the bars represents the time taken by HadoopDB when hand-coded and the rest of the bar indicates the additional overhead as a result of the SMS planner (e.g., SMS jobs need to serialize tuples retrieved from the underlying database and deserialize them before further processing in Hadoop) HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



    933、单词 subelement 的匹配文本:


    1. Here we show just the header enricher’s chat-to subelement in isolation to focus on this option: Spring Integration in Action


    2. In the lazy scenario, the Order-OrderLine relationship has a fetched-with subelement of  so that the OrderLines are not fetched when the Order is looked up. Java Performance


    3. Configuration options are passed using a single  subelement with arbitrarily named attributes. Lucene in Action 2nd Edition


    4. It can be specified either at the global level as a subelement of entity-mappings, at the entity level as a subelement of entity, or at the field or property level as a subelement of the id mapping element. Pro JPA2


    5. For example, to list the contents of a directory using an Ant FileScanner and Ant FileSet, just use the ant instance with Groovy closure nesting for Ant subelement access, as shown in Example 3-18 Building and Testing with Gradle



    934、单词 uml 的匹配文本:


    1. Many programmers use the UML (Unified Modeling Language) notation to draw class diagrams that describe the relationships between classes. Core Java Volume I Fundamentals 9th Edition


    2. Figure 17.3 Simplified UML view of database tables used to support the data flow at Shop It To Me. Mahout in Action


    3. I began using Enterprise Architect from Sparxsystems on this book, and it has rapidly become my UML tool of choice. Thinking in Java 4th Edition


    4. Yes libvirt Generally considered a lower performance virtualization option, UML runs each guest as a regular process in user space. Deploying OpenStack


    5. Figure 8.2 illustrates the UML diagram of the observer pattern. Java 8 in Action Lambdas, Streams and Functional-style Programming


    6. There are even tools, such as UmlGraph, that let you produce Javadoc with embedded UML diagrams to give you a better picture of how the classes fit together in the application. Jenkins The Definitive Guide


    7. If you do a thorough program design and Unified Modeling Language (UML) model of. Java Threads 3rd Edition


    8. We’ve used the black-diamond composition marker in UML to show how data fits into the aggregation structure. NoSQL Distilled


    9. The UML diagram keys on pages 3-4 of the present book are excerpted by permission. Concurrent Programming in Java Design Principles and Pattern


    10. We say in this case that Employee has a one-to-one relationship with Address, represented in the Unified Modeling Language (UML) model by the 0..1 notation. Pro JPA2



    935、单词 jira 的匹配文本:


    1. In Hadoop JIRA (the issue-tracking system), item 4686 is a tracking ticket to separate HDFS into its own Hadoop project. Pro Hadoop


    2. For publishing with a different groupId, you’ll need to create another JIRA ticket. Gradle in Action


    3. If your organization is using Atlassian products such as JIRA and Confluence, you may also be using Crowd. Jenkins The Definitive Guide


    4. It is used in reallife search applications by a wide variety of companies, including Apple, IBM, Attlassian (Jira), Wolfram, and others. Professional Hadoop Solutions


    5. Hadoop has a contrib project (contributed in JIRA ticket HADOOP-3754) that contains a Thrift server and bindings for various client languages including Python, Ruby, and Perl. Hadoop in Practice


    6. For an interesting flash back in time, see HBASE-287 on the Apache JIRA, the issue tracking system. HBase:The Definitive Guide


    7. Recovering from a checkpoint image is explained in http://issues.apache.org/jira/ browse/HADOOP-2585 Hadoop in Action


    8. For more information on this work, see the JIRA HDFS-3077 Hadoop Operations


    9. This is something that should happen automatically and will probably be corrected in the near term based on a JIRA issue that was created to point this out. ActiveMQ in Action


    10. Also, more than in any other chapter in this book, we’ll occasionally refer you to Hive JIRA entries for more information. Programming Hive



    936、单词 zmq 的匹配文本:


    1. Note that when you use a SUB socket you must set a subscription using zmq_setsock opt() and SUBSCRIBE, as in this code. ZeroMQ



    937、单词 tenzing 的匹配文本:


    1. Tenzing supports a mostly complete SQL implementation (with several extensions) combined with several key characteristics such as heterogeneity, high performance, scalability, reliability, metadata awareness, low latency, support for columnar storage and structured data, and easy extensibility. Tenzing - A SQL Implementation On The MapReduce Framework



    938、单词 conditionally 的匹配文本:


    1. The control transfer instructions conditionally or unconditionally cause the Java Virtual Machine to continue execution with an instruction other than the one following the control transfer instruction. The Java Virtual Machine Specification Java SE 7 Edition


    2. The last interesting feature allows us to conditionally remove the whole document. Mastering ElasticSearch


    3. The columns loc and fatalities are conditionally checked for empty strings; and if found to be empty, are set to a default value. Hadoop RealWorld Solutions Cookbook


    4. A compare and exchange instruction is also commonly available, for atomically and conditionally loading and/or storing data in memory. Oracle JRockit The Definitive Guide


    5. The unconditionally and conditionally thread-safe categories in the above taxonomy are both covered under the ThreadSafe annotation. Effective Java 2nd Edition


    6. It is an if statement, which executes another statement conditionally. Java in a Nutshell 5th Edition


    7. The simplest way to handle all this is to have a flag on which objects are conditionally passed to the monitor from the Object constructor and to have this flag in a simple class with no superclasses so that classloading does not impose extra calls to superclasses. Java Performance Tuning 2nd Edition


    8. Thus, given the present, the future is conditionally independent of the past. Java Performance


    9. It must conditionally swap in a new state representation only if the existing state representation is the one expected by the caller. Concurrent Programming in Java Design Principles and Pattern


    10. The contents of the closure printlns the result, but could also perform manipulation or testing of the nodes, searching for a given pattern and conditionally acting on its inclusion. Building and Testing with Gradle



    939、单词 typesafe 的匹配文本:


    1. His current work at Typesafe Inc., has him doing everything from building MSIs to profiling performance issues. Scala in Depth


    2. Understanding this concept is important for building generic, typesafe, reusable components in Scala. Scala in Action


    3. That way you can use Long, String, or any other Serializable type in a typesafe way. Spring in Practice


    4. Now we’ve successfully added both new implementations of Shape and new operations over it, and we’ve done so in a typesafe manner! Functional Programming Patterns in Scala and Clojure


    5. This commonly happens when you are implementing singletons and typesafe enumerations. Core Java Volume II Advanced Features 9th Edition


    6. If you eliminate all warnings, you are assured that your code is typesafe, which is a very good thing. Effective Java 2nd Edition


    7. The java.util collections classes have been converted to be generic types, providing support for typesafe collections. Java in a Nutshell 5th Edition


    8. This is a clear and typesafe interface but is by definition Java specific. Hadoop Beginners Guide


    9. We will look at some recent developments around typesafe querying using Querydsl. Spring Data Modern Data Access for Enterprise Java



    940、单词 auc 的匹配文本:


    1. Audio page 285 Ted and Ellen discuss the AUC evaluation method. Mahout in Action



    941、单词 april 的匹配文本:


    1. After its first release in April 2008, a vibrant community quickly started to form around it. Gradle in Action


    2. As shown here, all the data for April 13 will be in the first directory shown. Professional Hadoop Solutions


    3. About Packt Publishing Packt, pronounced 'packed', published its first book "Mastering phpMyAdmin for Effective MySQL Management" in April 2004 and subsequently continued to specialize in publishing highly focused books on specific technologies and solutions. Cassandra High Performance Cookbook


    4. Class signing bug A bug in the getSigners( ) method of the Class class was discovered in April 1997 Java Security 2nd Edition


    5. CouchDB: The Story So Far In April 2005, Damien Katz posted on his blog about a new database engine he was working on. Beginning CouchDB


    6. As Cassandra matured and began attracting more mainstream users, it became clear that there was a need for commercial support; thus, Matt Pfeil and I cofounded Riptano in April 2010 Cassandra The Definitive Guide


    7. This branch has been one of the longest-lived branches in Hadoop’s history since