文档章节

2000个软件开发领域的高频特殊词及精选例句(五)

杨尚川
 杨尚川
发布于 2015/03/20 23:31
字数 58214
阅读 128
收藏 0

superword是一个Java实现的英文单词分析软件,主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。

1101、单词 uuids 的匹配文本:


  1. For example, when accessing /_uuids, you get a list of UUIDs from the system. Getting Started with CouchDB


  2. The images in the replicated glance server preserve the uuids, metadata, and image data from the original. bk-compute-adminguide-grizzly


  3. When you write your first programs, we recommend assigning your own UUIDs. CouchDB The Definitive Guide


  4. Randomly distributed keys could be usernames, email addresses, UUIDs, MD5 hashes, or any other key that has no identifiable pattern in your dataset. MongoDB The Definitive Guide 2nd Edition


  5. None This is an ordered list of firewall rule uuids. bk-admin-guide-cloud-latest


  6. The columns are sorted chronologically, using unique IDs (UUIDs) for column names to avoid clashes. Cassandra High Performance Cookbook


  7. Request Parameters: count (integer, the number of UUIDs to return, default 1) Beginning CouchDB


  8. The simplest way to generate mostly monotonic document IDs is to use the default value of sequential for the algorithm option in the uuids configuration section and let CouchDB generate your document IDs. Scaling CouchDB


  9. These can be simple numbers but also UUIDs† and so on. HBase:The Definitive Guide


  10. Both row keys and column names can be strings, like relational column names, but they can also be long integers, UUIDs, or any kind of byte array. Cassandra The Definitive Guide



1102、单词 ycsb 的匹配文本:


  1. Therefore, we will start by introducing how to use Yahoo! Cloud Serving Benchmark (YCSB) to measure (benchmark) performance of a HBase cluster. HBase Administration Cookbook


  2. The Yahoo! Cloud Serving Benchmark (YCSB) provides benchmarking for the bases of comparison between NoSQL systems. Cassandra High Performance Cookbook


  3. Although YCSB is built for comparing systems, you can use it to test the performance of any of the databases it supports, including HBase. HBase in Action


  4. Installation YCSB is available in an online repository only, and you need to compile a binary version yourself. HBase:The Definitive Guide



1103、单词 des 的匹配文本:


  1. For the DES algorithm, there are a total of 256 possible keys. Pro Spring 3


  2. All the native SerDes and complex types supported in Hive are also implementations of these interfaces. Hive A Petabyte Scale Data Warehouse Using Hadoop


  3. This secret key can then be used for a variety of operations: it can be used directly for creating MACs, or it can be converted into a DES key for use in a cipher. Java Security 2nd Edition


  4. The simplicity of the format has a lot going for it, such as making it easy to process with other tools, including MapReduce programs or Streaming, but there are more compact and performant binary SerDes that you might consider using. Hadoop:The Definitive Guide 3rd Edition


  5. The Data Encryption Standard (DES) is a venerable block cipher with a key length of 56 bits. Core Java Volume II Advanced Features 9th Edition


  6. In order to use this package, you need to have a basic understanding of cryptographic algorithms such as DES. Java in a Nutshell 5th Edition


  7. Besides key lengths, there’s an important difference between DES/AES and RC4-based ciphers. Java Network Programming 4th Edition


  8. Third-party input and output formats and SerDes can be specified, a feature which permits users to customize Hive for a wide range of file formats not supported natively. Programming Hive



1104、单词 stax 的匹配文本:


  1. Java can process XML input using different techniques, including using a Streaming API for XML (StAX) parser. Spring Batch in Action


  2. In this code you use Java’s built-in Streaming API for XML (StAX) parser to extract the key and value for each property and output them. Hadoop in Practice


  3. Produce/consume JSON text in a streaming fashion (similar to StAX API for XML) • Build a Java object model for JSON text (similar to DOM API for XML) Java EE 7 Essentials


  4. In the future, support for streaming through StAX and/or SAX may be added to Spring Integration. Spring Integration in Action


  5. In the following sections, we discuss the streaming parsers supplied by the Java library: the venerable SAX parser and the more modern StAX parser that was added to Java SE 6 Core Java Volume II Advanced Features 9th Edition


  6. As you can see, we’ve used a simple StAX API (http://mng.bz/0S2s) to create an XML representation of our stock data. ActiveMQ in Action


  7. If using JAXP, the first step in parsing a document is the creation of the parser, SAXParser, XMLStreamReader, or DocumentBuilder depending on the API selected (SAX, StAX, and DOM, respectively) Java Performance


  8. The newer, simpler, and more efficient model is the Streaming API for XML (StAX) Java 7 Recipes A Problem-Solution Approach



1105、单词 frm 的匹配文本:


  1. Thus, when you create a table named MyTable, MySQL stores the table definition in MyTable.frm. High Performance MySQL 3rd Edition


  2. The Table Manager is responsible for creating, reading, and modifying the table definition files (.frm extension), maintaining a cache of table descriptors called table cache, and managing table-level locks. Understanding MySQL Internals



1106、单词 rdbmss 的匹配文本:


  1. Some of the biggest face-palm moments we’ve had were when someone published flawed benchmarks comparing MySQL to other relational database management systems (RDBMSs) with the default settings. High Performance MySQL 3rd Edition


  2. Similar to traditional relational database management systems (RDBMSs), data in HBase is organized in tables. Professional Hadoop Solutions


  3. Some RDBMSs ship powerful tools for managing these kinds of issues, but many don’t. HBase in Action


  4. We’ve seen similar contention with coarse-grained table-level locking in RDBMSs, where writes are latent even when there’s logically no contention. Graph Databases


  5. Examples include working with relational data in RDBMSs, structured files, and HBase. Hadoop in Practice


  6. However, there are several differences between the two languages, and between Pig and relational database management systems (RDBMSs) in general. Hadoop:The Definitive Guide 3rd Edition


  7. The HBase data model is not the relational approach we saw used in Hive and all other RDBMSs. Hadoop Beginners Guide


  8. Some applications use in-memory databases, while others use traditional relational database management systems (RDBMSs) Java 7 Recipes A Problem-Solution Approach


  9. Because MongoDB and most RDBMSs use the same data structure for their indexes, advice for managing indexes in both of these systems is compatible. MongoDB in Action


  10. Additionally, Sinfonia’s mini-transactions have limited semantics compared to the transactions provided by RDBMSs or Percolator: the user must specify a list of items to compare, read, and write prior to issuing the transaction. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



1107、单词 chris 的匹配文本:


  1. In the 4th edition, Chris Grindstaff was very helpful during the development of the SWT section, and Sean Neville wrote the first draft of the Flex section for me. Thinking in Java 4th Edition


  2. While talking one afternoon about how to solve an unrelated problem, Chris mentioned Redis as a database that I might find interesting (given my education in theoretical computer science) Redis in Action


  3. Chris uses is that CouchDB has felt like a boulder we’ve been pushing up a hill. CouchDB The Definitive Guide


  4. Also to the authoring team, including Chris, Manuel and Brent, in providing me extraordinary support in writing this book. Pro Spring 3


  5. Another big thanks goes to Chris Nelson for keeping all of us focused and for his advice on the book; it was a pleasure working with you. Pro Spring MVC


  6. So I consulted with Chris Mattmann, another Nutch committer with whom I had worked, about the potential for refactoring all these disparate tools in a common and standardized project. Tika in Action


  7. A search for "Chris" would match on "Chris Isaak" since he is tagged with pop, but "Chris Cagle" would be filtered out since he plays only American and country music. Solr 3 Enterprise Search Server


  8. After several years of experience with the language, and significant contributions by Ed Frank, Patrick Naughton, Jonathan Payne, and Chris Warth it was retargeted to the Internet, renamed, and substantially revised to be the language specified here. The Java Language Specification Java SE 7 Edition


  9. I would like to thank my wife Karen for editing and proofreading my chapters; my children Chris, Connor, and Michael for keeping the zombies at bay; and my dog Rex for forcing me to go on walks in the snow and the rain. ActiveMQ in Action


  10. Chris Beams for his legitimizing of Gradle through SpringSource projects. Building and Testing with Gradle



1108、单词 multiprocessor 的匹配文本:


  1. Threads in Java can take advantage of multiprocessor systems if the base operating system does so. Core Java Volume I Fundamentals 9th Edition


  2. These kinds of issues can also be exposed or amplified if a program is moved to a multiprocessor system. Thinking in Java 4th Edition


  3. In this chapter, we show a process for exploiting the power of multiprocessor. Java Threads 3rd Edition


  4. Such an approach is particularly interesting if you want to leverage multicore or multiprocessor hardware, as illustrated in figure 13.1 Spring Batch in Action


  5. Figure 10.6 A second optimal solution for the multiprocessor case. Data Structures and Algorithm Analysis in Java 3rd Edition


  6. As with any cache mechanism, invalidation issues are a problem, especially on multiprocessor systems where we often get the situation that two processors want to access the same memory at the same time. Oracle JRockit The Definitive Guide


  7. The concurrent garbage collector should be especially effective on multiprocessor machines. Java Performance Tuning 2nd Edition


  8. Being able to make efficient use of CPU cycles can be challenging for multithreaded applications running on multiprocessor and multicore. Java Performance


  9. The cost advantages of using inexpensive, PC-based clusters over high-end multiprocessor servers can be quite substantial, at least for a highly parallelizable application like ours. Web search for a planet the google cluster architecture


  10. Each computer system may be a uniprocessor, a multiprocessor, or even a cluster of machines administered as a single unit and sharing a common operating system. Concurrent Programming in Java Design Principles and Pattern



1109、单词 cursors 的匹配文本:


  1. Table 8.3 lists the constants to use with this method along with what the cursors look like under Windows. Core Java Volume I Fundamentals 9th Edition


  2. Create an application and change the cursor to one of the stock cursors in the Cursor class. Thinking in Java 4th Edition


  3. MySQL’s implementation of stored code is pretty limited—execution plan caches are per-connection, cursors are materialized as temporary tables, there’s very. High Performance MySQL 3rd Edition


  4. Cursors The database returns results from find using a cursor. MongoDB The Definitive Guide 2nd Edition


  5. Reading with ORM cursors implies that code responsible for managing domain classes doesn’t use a first-level cache. Spring Batch in Action


  6. Scans Now that we have discussed the basic CRUD-type operations, it is time to take a look at scans, a technique akin to cursors† in database systems, which make use of the underlying sequential, sorted storage layout HBase is providing. HBase:The Definitive Guide


  7. In most cases, you can use one of the out-of-the box reader implementations and customize it for your application’s needs so that you can avoid the critical yet tedious tasks of dealing with file line reading, database cursors, and so on. Spring Integration in Action


  8. Additionally, the system usage memory limit determines the point at which messages are offloaded to disk by the pending message cursors. ActiveMQ in Action


  9. Cursors, found in many database systems, return query result sets in batches for efficiency iteratively. MongoDB in Action



1110、单词 filesort 的匹配文本:


  1. Just because a query does a filesort with a temporary table doesn’t mean it is a problem. High Performance MySQL 3rd Edition


  2. On the code level, the turning point is in the following lines inside sortlength( ) in sql/filesort.cc: Understanding MySQL Internals



1111、单词 runtimes 的匹配文本:


  1. We report runtimes for binary trees (to study scaling properties) and lognormal random graphs (to study the performance in a more realistic setting) using various graph sizes with the weights of all edges implicitly set to 1 Pregel  -  A System for Large-Scale Graph Processing


  2. This trade-off is illustrated in figure 13.7, where the runtimes for hypothetical sequential and parallel scalable algorithms are compared. Mahout in Action


  3. If the runtimes of tasks are too long, a single task may hold the cluster for a long period, or retrying a failed task becomes expensive. Pro Hadoop


  4. Any preprocessing of that data that can be done to improve execution time and reduce the byte count should be done to improve runtimes. MapReduce Design Patterns


  5. From there, we use sum() to calculate the sum off all runtimes, and we divide by the number of runs to get the average: Functional Programming Patterns in Scala and Clojure


  6. This way you’ll have a good sense of the expected compression and runtimes for the codecs. Hadoop in Practice


  7. An implementation of TaskRuntimeEstima tor used by Specula tor instances that provides estimates for task runtimes (MapReduce 2 only) Hadoop:The Definitive Guide 3rd Edition


  8. He has a background in computer security but has worked with runtimes since 1999 Oracle JRockit The Definitive Guide


  9. All objects may have to fit into memory without any garbage collection for these runtimes. Java Performance Tuning 2nd Edition


  10. Modern JVMs continue to evolve by integrating more sophisticated optimizations, runtimes, and garbage collectors. Java Performance



1112、单词 balancers 的匹配文本:


  1. Incoming web requests are handled by load balancers that distribute the requests to clusters of web servers. Monitoring with Ganglia


  2. This will include all facets of the application and all supporting system resources, including, but not limited to, infrastructure, network, database, servers, and load balancers. Performance Testing With JMeter 2.9


  3. A wide variety of load-balancing solutions are available, ranging from peer-based implementations such as Wackamole (http://www.backhand.org/wackamole/) to  DNS, LVS (Linux Virtual Server; http://www.linuxvirtualserver.org), hardware load balancers, TCP proxies, MySQL Proxy, and managing the load balancing in the application. High Performance MySQL 3rd Edition


  4. If there are no other balancers active, the mongos will take a cluster-wide lock from the config servers and do a balancing round. MongoDB The Definitive Guide 2nd Edition


  5. You may want to consider having multiple load balancers so that you can remove the load balancer as a single point of failure. Scaling CouchDB


  6. In this domain, several data centers support many applications on behalf of many customers using different pieces of infrastructure, from virtual machines to physical load balancers. Graph Databases


  7. As such, it is the home of the Staged Event-Driven Architecture (SEDA) classes, the gossiper, the balancers, and the classes that flush data in memtables. Cassandra The Definitive Guide


  8. Along with this, EC2 offers a suite of complimentary services, including load balancers, static IP addresses, high-performance additional virtual disk drives, and many more. Hadoop Beginners Guide


  9. The most common network problems included inadequate bandwidth somewhere along the communication route, and undersized, misconfigured, or incompatible routers, switches, firewalls, and load balancers. Java Performance Tuning 2nd Edition


  10. The load is balanced to the various systems through the use of hardware or software load balancers. Java Performance



1113、单词 spliterator 的匹配文本:


  1. This uses the fork/join framework introduced in Java 7 and the Spliterator abstraction that you’ll learn about in the next chapter. Java 8 in Action Lambdas, Streams and Functional-style Programming



1114、单词 sha 的匹配文本:


  1. When the first connection to a resource manager is established as part of the transaction, a resource manager specific local transaction is started on the connect can sha transact. Java EE 7 Specification


  2. A message digest may be implemented by a particular algorithm, such as MD5 or SHA. Java Security 2nd Edition


  3. Gradle relies heavily on hashes to optimize download performance; when resolving a dependency, it will first attempt to download the much-smaller SHA from the repo, skipping the download if it determines that it already has that content in the artifact cache. Gradle Beyond The Basics


  4. The newfunction block takes the incoming argument and we process it, first adding in support for working with SHA hashes by requiring the sha1 library, and then passing the argument to the hexdigest method. Pro Puppet


  5. They’re both faster than cryptographic hashers such as SHA-1 and produce good distributions. Hadoop in Practice


  6. The fingerprint is obtained by ordering the descriptions of the class, superclass, interfaces, field types, and method signatures in a canonical way, and then applying the so-called Secure Hash Algorithm (SHA) to that data. Core Java Volume II Advanced Features 9th Edition


  7. A popular algorithm in the past has been SHA-1, but researchers have. SQL Antipatterns


  8. Otherwise, a unique version number is computed by applying the Secure Hash Algorithm (SHA) to the API defined by the class. Java in a Nutshell 5th Edition


  9. Subclassing Thread Consider a program that calculates the Secure Hash Algorithm (SHA) digest for many files. Java Network Programming 4th Edition


  10. Even these hashing families have some theoretical vulnerabilities; however, no one has yet demonstrated a practical case of creating intentional collisions for the SHA family of hashes. The Definitive Guide to MongoDB



1115、单词 unary 的匹配文本:


  1. The unary minus (-) and unary plus (+) are the same operators as binary minus and plus. Thinking in Java 4th Edition


  2. For example, the operations of an IntStream are restricted to produce primitive integers: the map operation of an IntStream takes a lambda that takes an int and produces an int (an IntUnaryOperator) Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. In this case, however, the name of the method has “unary_” prepended to the operator character. Programming in Scala 2nd Edition


  4. Here’s an example of defining unary operators on a Sample class: Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


  5. It is also possible for a node to have only one child, as is the case with the unary minus operator. Data Structures and Algorithm Analysis in Java 3rd Edition


  6. Some operators apply unary numeric promotion to a single operand, which must produce a value of a numeric type: • If the operand is of compile-time type Byte, Short, Character, or Integer, it. The Java Language Specification Java SE 7 Edition


  7. But the identity function is special: it returns its argument unmodified, so we know that it is typesafe to use it as a UnaryFunction

    whatever the value of T. Effective Java 2nd Edition


  8. Unary operators and assignment operators are evaluated from right to left. Java in a Nutshell 5th Edition


  9. The unary negative operator (-) is also supported for both integers and floating-point numbers. Programming Pig


  10. Look carefully at the return type of the compose method of UnaryOperator

    Java SE 8 for the Really Impatient



1116、单词 multiuser 的匹配文本:


  1. These benchmarks measure online transaction processing (OLTP) throughput and are most suitable for interactive multiuser applications. High Performance MySQL 3rd Edition


  2. In a multiuser environment, multiple jobs can be submitted and run simultaneously. Hadoop Operations and Cluster Management Cookbook


  3. Because it’s embedded, Derby can’t be shared between users, and as such it can’t be used in a multiuser environment where the metastore needs to be shared. Hadoop in Practice


  4. The default in MapReduce 1 is the original FIFO queue-based scheduler, and there are also multiuser schedulers called the Fair Scheduler and the Capacity Scheduler. Hadoop:The Definitive Guide 3rd Edition


  5. OS/2 and the Integer multiuser spreadsheet engine for the JVM. Beginning Scala


  6. When you get to a multiuser production environment, you’ll have to narrow down your jobs by looking for your Hadoop user name and the name of your current job. Hadoop in Action


  7. Other ecosystem projects do have additional information or higher level constructs that must be secured in multiuser environments. Hadoop Operations


  8. Multiuser response times depending on the number of users (if applicable) Java Performance Tuning 2nd Edition


  9. These requirements include: Collaborative multiuser environments Hadoop enables new classes of analysis that were prohibitive computationally and economically with traditional RDBMS technologies. Programming Hive



1117、单词 committers 的匹配文本:


  1. Over Ganglia’s history, we’ve had nearly 40 active committers and hundreds of people who have submitted patches and bug reports. Monitoring with Ganglia


  2. Chris I would like to acknowledge all the committers of CouchDB, the people sending patches, and the rest of the community. CouchDB The Definitive Guide


  3. Code changes can be submitted as pull requests and undergo a close review process by the core committers before making it into the code base. Gradle in Action


  4. Last but not the least, Apache Hadoop YARN continues to be a community driven open source project and owes much of its success to the Apache Hadoop YARN and MapReduce communities— a big thanks to all the contributors and committers who have helped YARN in every way possible. Apache Hadoop YARN Yet Another Resource Negotiator


  5. Typically, the key committers have insights into the problem and the code base and help code get committed faster. Cassandra High Performance Cookbook


  6. Todd’s version is downstream of the master version maintained by Kevin Weil and other committers. Hadoop in Practice


  7. Output Committers Hadoop MapReduce uses a commit protocol to ensure that jobs and tasks either succeed or fail cleanly. Hadoop:The Definitive Guide 3rd Edition


  8. Code was there for more than a year in Apache and has active contributors and committers list. Namenode High Availability


  9. Cassandra was accepted into the Apache Incubator, and by the time it graduated in March 2010, it had become a true open source success story, with committers from Rackspace, Digg, Twitter, and other companies that wouldn’t have written their own database from scratch, but together built something important. Cassandra The Definitive Guide


  10. Cloudera employs many of the Apache Hadoop committers (the people who have privileges to commit code to the Apache source repositories) who work on Hadoop full-time. Hadoop Operations



1118、单词 multivalued 的匹配文本:


  1. You can bind numeric attributes to documents, including multivalued attributes. High Performance MySQL 3rd Edition


  2. Sorting with multivalued fields With versions prior to 0.90, ElasticSearch had problems with sorting on the field that had multiple values in their contents. Mastering ElasticSearch


  3. Cardinality Prescribes whether the metadata property is multivalued, for example, metadata describing a file’s set of MimeType names. Tika in Action


  4. Lucene's document structure is flat, but it does support multivalued fields—that is a field with an array of values. Solr 3 Enterprise Search Server


  5. For example, if we had a field named title, which was multivalued, we could set this parameter to split the data like this: Solr 3.1 Cookbook


  6. With Pig, the data structures are much richer, typically being multivalued and nested, and the set of transformations you can apply to the data are much more powerful. Hadoop:The Definitive Guide 3rd Edition


  7. A Catch all field should not be stored as it is populated from another field #B Destination field must be multivalued if any of the source fields are multi-valued. Solr in action


  8. We’ll first consider how analysis is impacted by multivalued fields. Lucene in Action 2nd Edition


  9. Bidirectional many-to-one relationships are explained later as part of the discussion of multivalued bidirectional associations. Pro JPA2


  10. Please be careful when using this component on the multivalued fields as it can be a performance bottleneck. Apache Solr 4 Cookbook



1119、单词 jstatd 的匹配文本:


  1. If a remote host is specified, it must be running the jstatd daemon. Java in a Nutshell 5th Edition


  2. The remote system must be configured to run the jstatd daemon. Java Performance



1120、单词 xcp 的匹配文本:


  1. The nova-compute process is primarily a worker daemon that creates and terminates virtual machine instances via hypervisor's APIs (XenAPI for XenServer/XCP, libvirt for KVM or QEMU, VMwareAPI for VMware, etc.) bk-compute-adminguide-grizzly


  2. Xen Yes libvirt Most popular (along with XCP/XenServer) technology for larger scale and production deployments. Deploying OpenStack


  3. XenAPI (XenServer/XCP) Compute uses the XenAPI agent to inject passwords into guests when using the XenAPI hypervisor backend. bk-admin-guide-cloud-latest



1121、单词 jmenu 的匹配文本:


  1. JMenuItem add(JMenuItem item) adds a menu item (or a menu) Core Java Volume I Fundamentals 9th Edition


  2. You can use an Icon inside a JLabel or anything that inherits from AbstractButton (including JButton, JCheckBox, JRadioButton, and the different kinds of JMenuItem) Thinking in Java 4th Edition


  3. You will notice the apply() method creates a JMenuItem instance with an inner class definition containing an actionPerformed() method. Java 7 Recipes A Problem-Solution Approach



1122、单词 classname 的匹配文本:


  1. In fact, if I had my own custom source written, I would use its classname for the source's type parameter. Apache Flume Distributed Log Collection for Hadoop


  2. The classname parameter specifies the name of the class, and the codebase parameter specifies a URL to the resource (though this can also be a local file:// URL) Java Network Programming and Distributed Computing


  3. You may list their classname or their class label (the string that appears in JMeter's UI) here, and they will no longer appear in the menus. Performance Testing With JMeter 2.9


  4. Finally, the option java_outer_ classname declaration is the output class name that will be used. Hadoop RealWorld Solutions Cookbook


  5. The classname is the full classname of the login module you want to use. Java Security 2nd Edition


  6. In the previously sketched-out plug-in, we applied the plug-in directly by its classname with the line apply plugin: LiquibasePlugin at the top of the build.5 A properly packaged Liquibase plug-in should be applied just like the core plug-ins are, with the line apply plugin: 'liquibase' Gradle Beyond The Basics


  7. When the hadoop command is invoked with a classname as the first argument, it launches a Java Virtual Machine (JVM) to run the class. Hadoop:The Definitive Guide 3rd Edition


  8. To enable assertions within a specific class, use -ea followed by a colon and the classname: Java in a Nutshell 5th Edition


  9. The first is the full package, classname, and method name. Programming Pig


  10. Use the Services API (as detailed in the JAR specification), if available, to determine the classname. Java Performance



1123、单词 authenticates 的匹配文本:


  1. When a user successfully authenticates, a hash is generated from the username and a secret key and is stored in a cookie and made available to the rest of gweb. Monitoring with Ganglia


  2. It authenticates container leases, manages containers’ dependencies, monitors their execution, and provides a set of services to containers. Apache Hadoop YARN Yet Another Resource Negotiator


  3. To begin a session, a client first authenticates to the AS of the KDC. Professional Hadoop Solutions


  4. The web server then authenticates the r in the specified realm (referred to as HTTP Realm in this document) Java EE 7 Specification


  5. A login module is the code that actually authenticates a user. Java Security 2nd Edition


  6. The client authenticates itself to the Authentication Server and receives a timestamped Ticket-Granting Ticket (TGT) Hadoop:The Definitive Guide 3rd Edition


  7. The meaning of these keywords is given by the following algorithm: A login authenticates a subject, which can have multiple principals. Core Java Volume II Advanced Features 9th Edition


  8. The request should be sent to a certificate authority (CA), which authenticates the requestor and sends back a signed certificate authenticating the requestor’s public key. Java in a Nutshell 5th Edition


  9. Authorization So far, we’ve discussed only how clients identify themselves and how Hadoop authenticates them. Hadoop Operations


  10. We’ll demonstrate this process by building a custom security plug-in that authenticates the clients based on their IP address. ActiveMQ in Action



1124、单词 dijkstra 的匹配文本:


  1. Semaphores were invented by Edsger Dijkstra in 1968, for use as a synchronization primitive. Core Java Volume I Fundamentals 9th Edition


  2. The dining philosophers problem, invented by Edsger Dijkstra, is the classic demonstration of deadlock. Thinking in Java 4th Edition


  3. Many other graph algorithms can be applied to the graph at hand, such as Dijkstra’s algorithm [Dijkstra’s] for finding the shortest or cheapest path between nodes. NoSQL Distilled


  4. After all, as Edsger Dijkstra said, testing can only prove the presence of errors, never their absence.14 So the guarantees that static typing gives may be simple, but they are real guarantees of a form no amount of testing can deliver. Programming in Scala 2nd Edition


  5. Dijkstra’s algorithm proceeds in stages, just like the unweighted shortest-path algorithm. Data Structures and Algorithm Analysis in Java 3rd Edition


  6. A call to findSinglePath on the Dijkstra path finder returns the shortest path between the two delivery bases. Graph Databases


  7. Dijkstra’s algorithm is a shortest path algorithm commonly taught in undergraduate computer science courses. Hadoop in Practice


  8. The concept of a semaphore was introduced by Edsger Dijkstra in 1965 and was used for the first time in the THEOS operating system. Java 7 Concurrency Cookbook



1125、单词 interoperate 的匹配文本:


  1. Each operating system, server vendor, and application developer creates specific agents and software for performance monitoring, none of which interoperate. Monitoring with Ganglia


  2. For applications to interoperate, the implementation of application protocols must be precise. Java Network Programming and Distributed Computing


  3. Both Java 8 and Scala combine object-oriented and functional programming features into one programming language; both run on the JVM and to a large extent can interoperate. Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. By now, you should be familiar with the main components of Oozie and the way they interoperate. Professional Hadoop Solutions


  5. This required that we enhance the Hadoop clients to be able to interoperate with Hadoop servers running different versions of the Hadoop software. Apache Hadoop Goes Realtime at Facebook


  6. Occasionally, you may need to interoperate with legacy APIs that use the File class instead of the Path class. Core Java Volume II Advanced Features 9th Edition


  7. The well-intentioned equals method in this class naively attempts to interoperate with ordinary strings. Effective Java 2nd Edition


  8. Although these are two very different network protocols that do not interoperate on the same network without special gateways and/or tunneling protocols, Java hides almost all of the differences from you. Java Network Programming 4th Edition


  9. To interoperate with pure thread-based versions, worker threads can be packaged as Executors. Concurrent Programming in Java Design Principles and Pattern


  10. Every complete source code example in this book has been compiled and executed on Windows and Solaris platforms, and in many cases has been used to interoperate between both platforms. Fundamental Networking in Java



1126、单词 tcpdump 的匹配文本:


  1. If using multicast, check the interface where packets are sent (a packet sniffer such as tcpdump might help) Monitoring with Ganglia


  2. You can use tcpdump to save the traffic to disk, then use pt-query-digest with the --type=tpcdump option to decode and analyze the queries. High Performance MySQL 3rd Edition


  3. In the first terminal, on the host running nova-network, use tcpdump to monitor DNSrelated traffic (UDP, port 53) on the VLAN interface. bk-compute-adminguide-grizzly


  4. Another option is to use a packet-sniffing tool such as tcpdump to capture HTTP traffic in PCAP format, and to then use a tool such as pcap2har to generate the HAR. Testable JavaScript


  5. You can use tcpdump to identify if packets are being routed to the inbound interface on the compute host. bk-admin-guide-cloud-latest


  6. A common example is to query the output of the tcpdump command to analyze network behavior. Programming Hive


  7. It’s recommended to use tcpdump at several points along the network path to correlate where a problem might be. OpenStack Operations Guide



1127、单词 localization 的匹配文本:


  1. That method formats the message part of the record, substituting parameters and applying localization. Core Java Volume I Fundamentals 9th Edition


  2. This feature has been renamed from push-down joins to adaptive query localization.) NDB used to have a completely different performance profile from other MySQL storage engines, but recent versions are more general-purpose. High Performance MySQL 3rd Edition


  3. The second trend reflects the increasing availability and use by applications of internet services accessible through public APIs, made available by known providers such as Google (for example, localization information), Facebook (for example, social information), and Twitter (for example, news) Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. Commonly these are noncompiled files such as localization bundles or images, which, understandably might not have an effect on unit or integration tests. Jenkins The Definitive Guide


  5. Examples of when this may be needed include situations with changed attributes, isolation levels, character settings, and localization ration. Java EE 7 Specification


  6. Hadoop uses the standard Java localization mechanisms to load the correct properties for the locale you are running in. Hadoop:The Definitive Guide 3rd Edition


  7. The toString() method of Date produces a textual representation of a date and time but does no localization and allows no customization of which fields (day, month and year or hours and minutes, for example) are to be displayed. Java in a Nutshell 5th Edition


  8. Furthermore, sorting international Strings requires the ability to handle many kinds of localization issues, such as the sorted location for accented characters, characters that can be treated as character pairs, and so on. Java Performance Tuning 2nd Edition


  9. This book covers fundamentals of Java development such as installation of the JDK, writing classes, and running applications.It delves into essential topics such as the development of object-oriented constructs, exception handling, unit testing, and localization. Java 7 Recipes A Problem-Solution Approach


  10. Some localization mechanisms are built into the validation message interpolator, but custom message interpolation can also be plugged into the validator to perform localization in custom ways. Pro JPA2



1128、单词 springsource 的匹配文本:


  1. For users of the Spring framework, the author of Spring Data’s Redis interface, Costin Leau, has teamed up with Redis author Salvatore Sanfilippo to produce a one-hour introduction for using Spring with Redis available at http://www.springsource.org/ spring-data/redis. Redis in Action


  2. But why install these plugins manually, when you can do it the easy and convenient way using the Spring Tool Suite (STS) (http://www.springsource.org/sts)? STS is an Eclipse-based development environment mainly targeted for building applications using the Spring framework. Gradle in Action


  3. Installing Gradle plugin To install the Gradle plugin, we use the update site, http://dist.springsource. Gradle Effective Implementation Guide


  4. So, which one is better, XML or annotations? There have been lots of debates on this topic, and you can find numerous discussions about this topic on the Internet (for example, try the Spring Community Forum at http://forum.springsource.org) Pro Spring 3


  5. Spring Security LDAP support is assisted by the Spring LDAP module (http://www.springsource.org/ldap), which is actually a separate project from the core Spring Framework and Spring Security projects. Spring Security 3.1


  6. Following is the current supported functionality of SpEL extracted directly from Spring documentation at http://static.springsource.org/spring/docs/3.0.x/reference/expressions.html: Pro Spring Security


  7. To address this problem, SpringSource has repackaged a large number of open source libraries and made them available through its EBR (http://www.springsource.com/repository/app/) Spring Dynamic Modules in Action


  8. To follow along with the book, you’ll need to download and install Spring Roo, version 1.2.1, from http://springsource.org/spring-roo. Spring Roo in Action


  9. There are many ways of building workflows; a common approach is with Extract Transform and Load (ETL) tools such as Pentaho Kettle (http://kettle.pentaho.com) and Spring Batch (http://static.springsource.org/spring-batch) Hadoop Beginners Guide


  10. Feel free to reach out at any time to the Springsource Forums, Stackoverflow, or the Neo4j Google Group for answers to your questions. Spring Data Modern Data Access for Enterprise Java



1129、单词 kahadb 的匹配文本:


  1. Although not presented here, we also tested an alternative AMQ message store and found its performance very similar to that of KahaDB. Kafka a Distributed Messaging System for Log Processing


  2. For example, ActiveMQ offers its own style of ultra-fast message persistence via KahaDB, but also supports standard JDBC-accessible databases. ActiveMQ in Action



1130、单词 squeryl 的匹配文本:


  1. You’ll build applications using the Simple Build Tool (SBT), connect to a database using Squeryl, build scalable and reusable components in Scala, and use actors to make concurrent programming easy. Scala in Action



1131、单词 caveats 的匹配文本:


  1. Many of the caveats and “gotchas” you will face over time aren’t immediately obvious. CouchDB The Definitive Guide


  2. This recipe shows how to use this setting and explains the caveats that come with it. Cassandra High Performance Cookbook


  3. Within the framework of Release-to-Release Binary Compatibility in SOM (Forman, Conner, Danforth, and Raper, Proceedings of OOPSLA '95), Java programming language binaries are binary compatible under all relevant transformations that the authors identify (with some caveats with respect to the addition of instance variables) The Java Language Specification Java SE 7 Edition


  4. Pitfalls and false optimizations As in previous chapters, we will finish up with a discussion of obvious caveats. Oracle JRockit The Definitive Guide


  5. The API resulting from this refactoring is essentially identical to the state-testing method API in Item 57 and the same caveats apply: if an object is to be accessed concurrently without external synchronization or it is subject to externally induced state transitions, this refactoring is inappropriate, as the object’s state may change between the invocations of actionPermitted and action. Effective Java 2nd Edition


  6. Note that this method has two important caveats: first, it is intended to be used only once; second, it will probably be removed by version 0.8 Cassandra The Definitive Guide


  7. If we assume a table with 1 million records and four mappers, then each will process SQL statements to retrieve the data that each use the desired primary key column range as caveats. Hadoop Beginners Guide


  8. It’s not meant to supplant a complete understanding of the system, and as always, the normal caveats apply when dealing with systems that store data or serve critical functions. Hadoop Operations


  9. And, finally, a multitude of tuning parameters can be applied, each of which have benefits and caveats. ActiveMQ in Action


  10. Reduced-power servers are attractive for large-scale clusters, but you must keep some caveats in mind. Web search for a planet the google cluster architecture



1132、单词 jcomponent 的匹配文本:


  1. To draw on a component, you define a class that extends JComponent and override the paintComponent method in that class. Core Java Volume I Fundamentals 9th Edition


  2. So, for virtually anything you place on your form, all you need to do is say (for an object j c of any JComponent-derived class): Thinking in Java 4th Edition


  3. One way to implement a cell renderer is to create a class that extends JComponent, like this: Click here to view code imageClick here to view code image. Core Java Volume II Advanced Features 9th Edition


  4. The ability to draw over a JComponent has been added. Java 7 New Features Cookbook


  5. Most of the recipes in this chapter extend the JComponent class and also containing a main() method. Java 7 Recipes A Problem-Solution Approach



1133、单词 builtin 的匹配文本:


  1. As a proof of concept, look no further than CouchDB’s builtin administrative interface. CouchDB The Definitive Guide


  2. Our partitioning function for this benchmark has builtin knowledge of the distribution of keys. MapReduce - Simplied Data Processing on Large Clusters


  3. Use one HDFS dir to store one “table”, associated with builtin serialization format. MapReduce and Parallel DBMSs Friends or Foes


  4. Log4j also has a number of builtin appenders such as the SyslogAppender used in this recipe. Cassandra High Performance Cookbook


  5. I rounded up this chapter and this part of the book by covering some of CouchDB’s builtin specialized views for retrieving all documents and some of the parameters that can be used to manipulate the resultset returned by these views. Beginning CouchDB


  6. The only builtin Writable array type in Hadoop, ArrayWritable, can only store one type of Writable, so it’s not a good fit for storing your tuple, which contains a variety of field types. Hadoop in Practice


  7. Their name is just an arbitrary number, based on the Java builtin random generator. HBase:The Definitive Guide


  8. Relational databases have some builtin capabilities to help ensure data integrity, such as primary keys (which ensure entity integrity) and foreign key constraints (which ensure referential integrity) Cassandra The Definitive Guide


  9. The shell fencing method has no builtin provision for a timeout. Hadoop Operations


  10. See Task Types for a description of the most important builtin task types.) The task declares properties (i.e., hostname, database, sql, etc.) in conventional Groovy idiom. Building and Testing with Gradle



1134、单词 ltw 的匹配文本:


  1. AspectJ supports another weaving mechanism called load-time weaving (LTW), in which it intercepts the underlying JVM class loader and provides weaving to the bytecode when it is being loaded by the class loader. Pro Spring 3


  2. OSGi environment for the chosen JPA implementations, such as the underlying mechanisms required to configure packages of classes used at runtime, and also LTW. Spring Dynamic Modules in Action


  3. AspectJ 5’s load-time weaving (LTW) support weaves aspects this way. Spring in Action 4th Edition



1135、单词 ngram 的匹配文本:


  1. Making a misspelling-proof search If you look back at the mappings, you will see that we have the title field defined as multi_field and one of the fields is analyzed with a defined ngram analyzer. Mastering ElasticSearch


  2. Create a class named NGram.java in your JAR file at whatever source package is appropriate. Hadoop RealWorld Solutions Cookbook


  3. On a technical level, David has solved challenging problems with Lucene and Solr including geospatial search, wildcard ngram query parsing, searching multiple multi-valued fields at coordinated positions, and part-of-speech search using Lucene payloads. Solr 3 Enterprise Search Server


  4. We’ll give special attention here to the snowball analyzers and shingle and ngram filters. Lucene in Action 2nd Edition


  5. In Solr, there are multiple ways to undo that: using a spellchecker component to try and correct the user's mistake, using the fuzzy query, or for example, using the ngram approach. Apache Solr 4 Cookbook



1136、单词 mlt 的匹配文本:


  1. The MLT capability in Solr can be used in the following three ways: Solr 3 Enterprise Search Server


  2. Next, the mlt.fl parameter specifies which fields we want to use with the more like this component. Solr 3.1 Cookbook


  3. The parameter mlt=true says that we want to add the more like this component to the result processing. Apache Solr 4 Cookbook



1137、单词 pseudodistributed 的匹配文本:


  1. The following table shows configuration files for configuring a Hadoop cluster in pseudodistributed mode: Hadoop Operations and Cluster Management Cookbook


  2. To run a Pipes job, we need to run Hadoop in pseudodistributed mode (where all the daemons run on the local machine), for which there are setup instructions in Appendix A. Hadoop:The Definitive Guide 3rd Edition


  3. A pseudodistributed mode is simply a distributed mode that is run on a single host. HBase:The Definitive Guide


  4. Now that you have all the different configurations set up and know how to put data into each configuration, let’s look at how to develop and debug in local and pseudodistributed modes. Hadoop in Action


  5. Pseudodistributed mode means that you have several instances of HBase, but they’re all running on the same host. Cassandra The Definitive Guide


  6. As we only have a single host and one DataNode in the pseudodistributed mode, we change this value to 1 Hadoop Beginners Guide


  7. Figure 7-9 shows a sample page taken from a cluster running in pseudodistributed mode on a Linux desktop. Programming Pig


  8. To address this need, a single machine can be configured to run in pseudodistributed mode, where the behavior is identical to distributed mode, namely filesystem references default to the distributed filesystem and jobs are managed by the JobTracker service, but there is just a single machine. Programming Hive



1138、单词 rna 的匹配文本:


  1. Say you want to create a new sequence type for RNA strands, which are sequences of bases A (adenine), T (thymine), G (guanine), and U (uracil) Programming in Scala 2nd Edition



1139、单词 firehose 的匹配文本:


  1. In particular, we’ll offer the ability to filter over messages with an equivalent of follow (users), track (keywords), and location filters, in addition to a randomly selected subset of messages, similar to Twitter’s firehose and sample streams. Redis in Action


  2. The Firehose Strategy If you have some servers that are more powerful than others, you might want to let them handle proportionally more load than your less-powerful servers. MongoDB The Definitive Guide 2nd Edition


  3. Twitter client application that reads a subset of the Twitter firehose and writes. Storm Blueprints Patterns for Distributed Real-time Computation



1140、单词 prepended 的匹配文本:


  1. Execute the downloaded file, which is prepended by the path to it. Web Crawling and Data Mining with Apache Nutch


  2. He is also known as mrhaki, which is simply the initials of his name prepended by mr. Gradle Effective Implementation Guide


  3. Here, chroot is a base directory that is prepended to all path operations (this effectively namespaces all Kafka znodes to allow sharing with other applications on the same ZooKeeper cluster) Apache Kafka


  4. Since no member class can have the same name as any containing class, however, the use of the enclosing class name prepended to this is a perfectly general way to refer to any containing instance. Java in a Nutshell 5th Edition


  5. This file can optionally be prepended with the private key. admin-user-guide-trunk


  6. As with join, to avoid ambiguity, the field name will have the bag’s name and :: prepended to it. Programming Pig


  7. The body of each document from the docmaker will be truncated to this size, with the leftover being prepended to the next document. Lucene in Action 2nd Edition


  8. This option is not necessary if your key is prepended to your cert file. user-guide


  9. Note When a class resides within a Java package, it is no longer referenced by only the class name, but instead the package name is prepended to the class name, which is known as the fully qualified name. Java 7 Recipes A Problem-Solution Approach


  10. When specified, the schema name will be prepended to the table name when the persistence provider goes to the database to access the table. Pro JPA2



1141、单词 hcatalog 的匹配文本:


  1. Finally, you learn about HCatalog, and the way it can be used to advertise and access data. Professional Hadoop Solutions


  2. The Apache HCatalog project (http://incubator.apache.org/hcatalog/) solves this problem by providing a table metadata service, based on Hive’s metastore, so that Pig queries can reference schemas by name, rather than specifying them in full each time. Hadoop:The Definitive Guide 3rd Edition


  3. Apache HCatalog A relatively new entry, Apache HCatalog is a service that provides shared schema and data access abstraction services to applications with the ecosystem. Hadoop Operations


  4. Metadata in Hadoop Apache HCatalog provides a metadata and table management layer for Hadoop. Programming Pig


  5. HCatalog is a separate Apache project from Hive, and is part of the Apache Incubator. Programming Hive



1142、单词 suboptimal 的匹配文本:


  1. Even if your estimate for the value k is suboptimal, the clustering quality isn’t affected much by it. Mahout in Action


  2. This leads to fragmentation and suboptimal utilization, which is not viable for us, and so we did not explore this option any further. Omega - flexible, scalable schedulers for large compute clusters


  3. For example, suboptimal configuration on data replication properties can cause a large number of data block copies over the network, which will pose a negative effect on the performance of a cluster. Hadoop Operations and Cluster Management Cookbook


  4. It focuses on potential coding problems such as unused or suboptimal code, code size and complexity, and good coding practices. Jenkins The Definitive Guide


  5. Although splitting files on the file block boundaries works well in the majority of cases, sometimes such a split might be suboptimal. Professional Hadoop Solutions


  6. Region hot-spotting typically points to another problem, though—bad key design leading to suboptimal load distribution. HBase in Action


  7. Show that this algorithm is suboptimal, regardless of the choices for Algorithms A, B, and C. Data Structures and Algorithm Analysis in Java 3rd Edition


  8. This is to make sure that objects referenced near other objects in time appear near them in memory as well, evacuating them from suboptimal NUMA nodes. Oracle JRockit The Definitive Guide


  9. These use cases would have workloads that are challenging to scale because of very high write throughput, massive datasets, unpredictable growth, or other patterns that may be difficult or suboptimal in a sharded RDBMS environment. Apache Hadoop Goes Realtime at Facebook


  10. Some VMs are intended purely for development and are highly suboptimal in terms of performance. Java Performance Tuning 2nd Edition



1143、单词 mvcc 的匹配文本:


  1. Instead, they use row-level locking in conjunction with a technique for increasing concurrency known as multiversion concurrency control (MVCC) High Performance MySQL 3rd Edition


  2. Instead of locks, CouchDB uses Multi-Version Concurrency Control (MVCC) to manage concurrent access to the database. CouchDB The Definitive Guide


  3. The existing MVCC-like read-write consistency control (RWCC) provided sufficient isolation guarantees and the HLog (write ahead log) on HDFS provided sufficient durability. Apache Hadoop Goes Realtime at Facebook


  4. CouchDB is interesting in part for what it terms Multi-Version Concurrency Control (MVCC) Cassandra The Definitive Guide


  5. Many databases choose the multi-version concurrency control (MVCC) approach, which allows multiple users to see different versions of the data. The Definitive Guide to MongoDB



1144、单词 extractors 的匹配文本:


  1. You’ll see more examples of extractors and pattern matching throughout the book. Scala in Action


  2. Programs are written in a variant of SQL, with extensions to call out to custom extractors, filters, and processors that are written in C# FlumeJava - Easy, Efficient Data-Parallel Pipelines


  3. If you want to use pattern matching on one of your classes, but you do not want to open access to your classes the way case classes do, then you can use the extractors described in Chapter 26 Programming in Scala 2nd Edition


  4. If you want to match arbitrary patterns, Scala extractors are your friend. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


  5. We can even introduce  as a pattern , which lets us** using custom extractors write: Functional Programming in Scala


  6. The following script demonstrates the extractors in pattern matching case statements: Programming Scala


  7. It turns out that they also get properties and extractors. Beginning Scala



1145、单词 reuses 的匹配文本:


  1. A high-fidelity simulator that replays historic workload traces from Google production clusters, and reuses much of the Google production scheduler’s code. Omega - flexible, scalable schedulers for large compute clusters


  2. As shown in the command-line output, Gradle inspects the available Ant targets, wraps them with Gradle tasks, reuses their description, and even keeps their dependencies intact. Gradle in Action


  3. HadoopDB[15] reuses most of Hive’s system, except, it uses traditional database instances in each of the nodes to store data instead of using a distributed file system. Hive A Petabyte Scale Data Warehouse Using Hadoop


  4. Hadoop starts only a single JVM per task slot and then reuses it for an unlimited number of tasks in the job. Hadoop MapReduce Cookbook


  5. The MapReduce framework reuses iterator value objects supplied to combine. Hadoop in Practice


  6. It is necessary to make a copy of the record with the highest temperature found so far, since the iterator reuses the instance for reasons of efficiency (and only the fields are updated) Hadoop:The Definitive Guide 3rd Edition


  7. The schema also reuses the same table to store various other details required to implement full Lucene support. HBase:The Definitive Guide


  8. If the same query is prepared twice, the database simply reuses the query strategy. Core Java Volume II Advanced Features 9th Edition


  9. It reuses familiar concepts from the relational database   world, such as tables, rows, columns, and schema, to ease learning. Hadoop in Action


  10. The cached thread pool you have created creates new threads if needed to execute the new tasks, and reuses the existing ones if they have finished the execution of the task they were running, which are now available. Java 7 Concurrency Cookbook



1146、单词 jlist 的匹配文本:


  1. Note If you want to show a permanently displayed list instead of a drop-down list, use the JList component. Core Java Volume I Fundamentals 9th Edition


  2. While a JComboBox box drops down when you activate it, a JList occupies some fixed number of lines on a screen all the time and doesn’t change. Thinking in Java 4th Edition


  3. The JList component has many more features, and its design is similar to that of the tree and table components. Core Java Volume II Advanced Features 9th Edition


  4. In the constructor you’ll notice it takes a reference to a JListBox; this is where to display the words as the user is typing characters. Java 7 Recipes A Problem-Solution Approach



1147、单词 prepend 的匹配文本:


  1. For example, if the file is in the current directory, prepend it with ./ (necessary if. Web Crawling and Data Mining with Apache Nutch


  2. The simplest solution to achieve this is to prepend the arguments of the lambda expression with an additional argument for each of the captured variables, so the method generated to implement the former lambda expression will be something like this: Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. You may wonder why you prepend the new element to the list head. RabbitMQ in Action


  4. The form has prependId set to false to ensure that the id of each element is preserved as mentioned in the form. Java EE 7 Essentials


  5. You prepend the command with the exclamation mark (!) and end it with a semicolon (;) Hadoop in Action


  6. I said earlier that to invoke an instance method you must prepend a reference to the object to be operated on. Java in a Nutshell 5th Edition


  7. By default, you have to prepend the destination name with either queue:// or topic:// ActiveMQ in Action


  8. You must reside within the same directory as the source file or prepend the name of the file with the path to where it is located. Java 7 Recipes A Problem-Solution Approach


  9. To facilitate this, we will prepend the query name with the name of the entity. Pro JPA2


  10. If the code is being run from a Ruby file, prepend Ruby’s p method to print the output to the screen: MongoDB in Action



1148、单词 odbc 的匹配文本:


  1. An Impala implementation makes use of some of the existing Hadoop infrastructure, namely the Hive metastore and Hive ODBC driver. Professional Hadoop Solutions


  2. HiveServer – The component that provides a thrift interface and a JDBC/ODBC server and provides a way of integrating Hive with other applications. Hive A Petabyte Scale Data Warehouse Using Hadoop


  3. What’s more, SQL is the lingua franca in business intelligence tools (ODBC is a common bridge, for example), so Hive is well placed to integrate with these products. Hadoop:The Definitive Guide 3rd Edition


  4. It was named to be reminiscent of ODBC, a standard database API pioneered by Microsoft and since incorporated into the SQL standard. Core Java Volume II Advanced Features 9th Edition


  5. However, the JDBC package does not provide concrete implementations of those APIs (except an ODBC driver) Java Performance Tuning 2nd Edition


  6. When you do need access to API libraries for capabilities such as visualization and graphing, you can access Impala data from programs written in languages such as Java and C++ through the standard JDBC and ODBC protocols. Cloudera Impala


  7. Bundled with the Hive distribution is the CLI, a simple web interface called Hive web interface (HWI), and programmatic access through JDBC, ODBC, and a Thrift server (see Chapter 16) Programming Hive


  8. It was created as a Java-specific version of its more generic predecessor, the Object Database Connectivity (ODBC) specification, a standard for accessing any relational database from any language or platform. Pro JPA2


  9. Business Intelligence tools typically connect to databases using ODBC or JDBC, so databases that want to work with these tools must accept SQL queries through these interfaces. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads


  10. You have a legacy, proprietary database and want to give it an SQL/ODBC interface. Understanding MySQL Internals



1149、单词 initializations 的匹配文本:


  1. Any initializations that occur at the point of field definition are executed. Thinking in Java 4th Edition


  2. It’s instructive to trace the sequence of initializations that lead to the string 1/2 to be printed in the code above: Programming in Scala 2nd Edition


  3. For convenience, and to avoid the stutter endemic in some languages’ declaration syntaxes, in initializations the appropriate conversion operation (with default parameter values) is supplied implicitly by the compiler. Interpreting the Data Parallel Analysis with Sawzall


  4. The restrictions above are designed to catch, at compile time, circular or otherwise malformed initializations. The Java Language Specification Java SE 7 Edition


  5. This seems like a good idea in general; moreover, the Scheme interpreter needs some cumbersome initializations that we did not want to include in every event handler script. Core Java Volume II Advanced Features 9th Edition


  6. It would be possible to eliminate the unnecessary initializations by lazily initializing these fields (Item 71) the first time the isBabyBoomer method is invoked, but it is not recommended. Effective Java 2nd Edition


  7. Both the initialize and update expressions of a for loop can use a comma to separate multiple initializations and update expressions. Java in a Nutshell 5th Edition


  8. You can start several asynchronous operations in parallel, then perform your local initializations, and then request the results of the network operations: Java Network Programming 4th Edition


  9. The second component in the startup time of the VM is the time taken to manage the VM runtime initializations. Java Performance Tuning 2nd Edition


  10. The code evolved over time, gradually becoming more compact and readable as various initializations involving THD variables were moved under the THD class. Understanding MySQL Internals



1150、单词 ebook 的匹配文本:


  1. Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub. Apache Flume Distributed Log Collection for Hadoop


  2. Buy the Book If you liked this eBook, perhaps you'd like to have a paper copy of the book. Programming Concurrency on the JVM


  3. The purchaser may place the eBook title on any of their personal computers for their own personal reading and reference. Pro Hadoop


  4. Did you know that Packt offers eBook versions of every book published, with. Storm Blueprints Patterns for Distributed Real-time Computation


  5. This book is available in both paper and PDF eBook form. Programming in Scala 2nd Edition


  6. For more information, reference our Special Bulk Sales–eBook Licensing web page at http://www.apress.com/info/bulksales. Beginning CouchDB


  7. Also, for ebook buyers, clicking on the box above the code extracts downloads the code for that extract for you. Functional Programming Patterns in Scala and Clojure


  8. Buy the Book If you liked this eBook, perhaps you’d like to have a paper copy of the book. SQL Antipatterns


  9. While on the project home page, look for a link to download a free O’Reilly ebook by Josh Long and Steve Mayzak called Getting Started with Roo [LongMay11] Spring Data Modern Data Access for Enterprise Java


  10. Even if you have an eBook copy that didn’t go through that process, there were numerous hands on the bits and bytes that you downloaded— hands that edited it, reviewed it, typeset it, and proofread it. Spring in Action 4th Edition



1151、单词 oauth 的匹配文本:


  1. OAuth is an authentication protocol that allows users to approve applications to act on their behalf, without sharing their password. Jenkins Continuous Integration Cookbook


  2. In addition, more recent trends such as mobile, social, and NoSQL are now commonplace in both corporate and noncorporate settings, and some of the recipes in the book treat topics such as GitHub, OAuth, MongoDB, and Neo4j as well. Spring in Practice


  3. Throughout his career, he has developed hands on experience integrating Spring Security with an array of security standards (that is, LDAP, SAML, CAS, OAuth, and so on) Spring Security 3.1


  4. There is also the OAuth integration, which lives on its own as an individual project. Pro Spring Security


  5. In order to connect to the Twitter API, we must first generate a set of OAuth. Storm Blueprints Patterns for Distributed Real-time Computation


  6. Recent developments in the trunk version of CouchDB include support for cookie authentication and OAuth authentication, which should allow for a much more streamlined security solution than the basic HTTP authentication option. Beginning CouchDB


  7. We cover the timeline reading adapter shortly, but first we discuss how you should provide the configuration necessary for creating a Twitter template instance that can pass OAuth credentials. Spring Integration in Action


  8. Problem In this recipe, we’ll implement a data model and interaction to support an OAuth v1.0a API. Redis Cookbook



1152、单词 fetcher 的匹配文本:


  1. FetcherJob The job of the fetcher is to fetch the URLs which are generated by the GeneratorJob. Web Crawling and Data Mining with Apache Nutch


  2. For example, the content part is populated by a tool called Fetcher, which downloads raw data from URLs on the fetchlist (2) Hadoop:The Definitive Guide 3rd Edition


  3. We added a time-shutoff parameter that terminates the fetcher after a fixed amount of time as an engineering fix to this problem. Hadoop in Action


  4. We’ll first look at how this fetcher works and then we’ll peel back the covers to reveal its implementation. MongoDB in Action



1153、单词 rados 的匹配文本:


  1. Rados Block Device (RBD) - This backend stores images inside of a Ceph storage cluster using Ceph's RBD interface. bk-compute-adminguide-grizzly


  2. Rados block device (RBD) Stores images inside of a Ceph storage cluster using Ceph's RBD interface. bk-admin-guide-cloud-latest


  3. To maintain system availability and ensure data safety in a scalable fashion, RADOS manages its own replication of data using a variant of primary-copy replication [2], while taking steps to minimize the impact on performance. Ceph A Scalable, High-Performance Distributed File System


  4. We present the design and implementation of RADOS, a reliable object storage service that can scales to many thousands of devices by leveraging the intelligence present in individual storage nodes. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.



1154、单词 composable 的匹配文本:


  1. To provide full flexibility, each composable trait should be able to call a super method, even in that super method doesn’t do anything. Scala in Depth


  2. Monads are a great way to raise the abstraction level that is composable. Scala in Action


  3. We have developed a Java library, based on a small set of composable primitives, that is both expressive and convenient. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  4. The calculations that need to be run must be composable. Professional Hadoop Solutions


  5. An important property of averages is that they are not composable—that is, if I take two groups of orders, I can’t combine their averages alone. NoSQL Distilled


  6. A pure function is modular and composable because itcomposable separates the logic of the computation itself from "what to do with the result" and. Functional Programming in Scala


  7. Mathematical functions are side-effect-free, and they are composable from other functions. Programming Scala


  8. However, they tend to be at the wrong level of granularity for creating sophisticated, highly composable code that can be shared among different developers. Hadoop:The Definitive Guide 3rd Edition


  9. This forces you to architect the pre- and postprocessing steps in a modular and composable manner. Hadoop in Action


  10. In Chapter 6, you learn about improvements in atomic counters, concurrent hash maps, parallel array operations, and composable futures. Java SE 8 for the Really Impatient



1155、单词 memtables 的匹配文本:


  1. Writes are first written to commit logs and memtables, and are only considered good when the write to commit log and memtable was successful. NoSQL Distilled


  2. It does this by isolating the disk traffic for Commit Log activity from the traffic used for reads as well as flush Memtables and compact SSTables. Cassandra High Performance Cookbook


  3. Memtables, SSTables, and Commit Logs When you perform a write operation, it’s immediately written to the commit log. Cassandra The Definitive Guide


  4. The manner in which Bigtable uses memtables and SSTables to store updates to tablets is analogous to the way that the Log-Structured Merge Tree [26] stores updates to index data. Bigtable - A Distributed Storage System for Structured Data



1156、单词 jtree 的匹配文本:


  1. On the other hand, the JList class is consistent with the JTree and JTable classes where this generality is useful. Core Java Volume II Advanced Features 9th Edition



1157、单词 syncing 的匹配文本:


  1. Writing to remote memory (a replica’s acknowledgment) is faster than writing to the local disk (syncing on commit) High Performance MySQL 3rd Edition


  2. Table 4.1 shows the appendfsync options and how they affect file-write syncing to disk. Redis in Action


  3. The candidate will continue syncing and once it has synced operation 124, it will call for an election again (if no one else has become primary in that time) MongoDB The Definitive Guide 2nd Edition


  4. HDFS-200, and implemented syncFs() to make the process of syncing changes to a file more reliable. HBase:The Definitive Guide


  5. Once it connects, the follower and the leader sync their state, and only after syncing can the follower start processing new requests. ZooKeeper Distributed Process Coordination


  6. Journaling works by syncing a write buffer to disk every 100 ms. MongoDB in Action



1158、单词 testability 的匹配文本:


  1. Even though you took it to the extreme and provided configurable properties for your tasks, code maintainability and testability fell by the wayside. Gradle in Action


  2. A secondary advantage of having a compiled source code is that you can run a number of statistic code review tools over the code base and obtain testability metrics. Jenkins Continuous Integration Cookbook


  3. The testability property of your design determines how easy it is to write tests. Scala in Action


  4. Improved testability: When you design your classes for DI, you make it possible to replace dependencies easily. Pro Spring 3


  5. Starting with the good habits of structuring your code syntactically and semantically for testability, writing the right tests at the right times, running them regularly, and monitoring their results will keep you in that lower-right sweet spot in the matrix. Testable JavaScript


  6. IoC promotes better decoupling and testability, as the object only knows about the abstractions of its dependencies, not specific concrete implementers of them. Programming Scala


  7. Ideally, you should reach out to developers and recommend that they add either the name attribute or title for better testability and accessibility. Selenium Testing Tools Cookbook


  8. Most presentations of constructions and design patterns later in this book include descriptions of how they resolve applicable forces discussed here (as well as others that are less directly tied to concurrency, such as accuracy, testability, and so on) Concurrent Programming in Java Design Principles and Pattern


  9. Integration and Testability Multitier applications hosted on an application server have become the de facto standard for application architectures. Pro JPA2


  10. This is really nice from a usability point of view, but from a testability point it is a nightmare! Selenium 2 Testing Tools Beginner's Guide



1159、单词 sdo 的匹配文本:


  1. If you wanted additionally to prevent code from accessing classes in the sdo package, you would edit the java.security file so that it defined a property like this: Java Security 2nd Edition



1160、单词 usability 的匹配文本:


  1. Having the dynamic schema built on top of the static schema, rather than the other way around, allows most applications to enjoy the performance, usability, Megastore - Providing Scalable, Highly Available Storage for Interactive Services


  2. We chose a different model for reasons of usability and performance. Pregel  -  A System for Large-Scale Graph Processing


  3. This data further underscores the usability of the FlumeJava API. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  4. We could keep tinkering with it, but at this point let's try  the library to construct tests and see if weusing notice any deficiencies, either in what it can express or its general usability. Functional Programming in Scala


  5. By focusing on structured data , Hive can add certain optimization and usability features that MapReduce, being more general, doesn’t have. Hadoop in Action


  6. Like Chapter 5, this chapter focuses on usability, robustness, and flexibility. Effective Java 2nd Edition


  7. The JavaBeans conventions are widely used and wellunderstood, however, and you can improve the usability and reusabilty of your code by following the relevant ones. Java in a Nutshell 5th Edition


  8. Lucli lets you scroll through a history of commands and reexecute a previously entered command to enhance its usability. Lucene in Action 2nd Edition


  9. I believe it’s imperative to have server-side validation, but for better usability, client-side validation can add that extra polish your application needs. Java 7 Recipes A Problem-Solution Approach


  10. In the case of session beans and message-driven beans, solutions to usability issues were reached by simply removing some of the more onerous implementation requirements and letting components look more like plain Java objects. Pro JPA2



1161、单词 evaluator 的匹配文本:


  1. You could try using this as the UserSimilarity in the evaluator code from before. Mahout in Action


  2. Somewhat akin to FlumeJava’s executor, the Cascading evaluator breaks the dataflow graph into pieces, and, if possible, runs those in parallel, using the underlying Hadoop job scheduler. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  3. This method (hasPermission) uses the permission evaluator we defined in Listing 7-22 to decide if the authentication has the required permissions on the object being passed. Pro Spring Security


  4. Hence, there’s a mutual dependency between the Model and the Evaluator. Programming in Scala 2nd Edition


  5. It is a compile-time error if the condition does not provide enough information to construct a reasonable evaluator for the quantifier. Interpreting the Data Parallel Analysis with Sawzall


  6. The algorithm is also configured with a cost evaluator (another static member), which simply identifies the property on a relationship representing that relationship’s weight or cost. Graph Databases


  7. Also implement , for anIO runAsync asynchronous evaluator for , and , the synchronous evaluator:Future run. Functional Programming in Scala


  8. An evaluator must implement five methods, described in turn here (the flow is illustrated in Figure 12-4): init() Hadoop:The Definitive Guide 3rd Edition


  9. It is possible to build rules that are not based on numeric attributes; for string attributes there is a string matching expression instead of a numeric evaluator. Oracle JRockit The Definitive Guide


  10. In the init method, the object inspectors for the result type are set, after determining what mode the evaluator is in. Programming Hive



1162、单词 usb 的匹配文本:


  1. For the novice Linux user who just wants to play around a bit, the Live CD and a USB stick for permanent storage can provide a simple and quick way to boot up a test environment. Pro Hadoop


  2. Volumes may be attached to a single instance at a time, but may be detached or reattached to a different instance while retaining all data, much like a USB drive. bk-compute-adminguide-grizzly


  3. In this section, we will cover steps of creating a kickstart file and a USB boot media with the operating system image. Hadoop Operations and Cluster Management Cookbook


  4. It shouts at you through mobile devices, radiates information as you walk past big screens, and fires at you with USB sponge missile launchers. Jenkins Continuous Integration Cookbook


  5. It comes in several versions and two formats (CD or USB stick image) Deploying OpenStack


  6. This includes devices such as Ambient Orbs, Lava Lamps, traffic lights, or other more exotic USB-controlled devices. Jenkins The Definitive Guide


  7. The JRockit VE kernel with a small built-in E1000 network driver can boot from a USB stick and run Java applications on any x86 machine out of the box (It is doubtful, however, why this demo, except for the fact that it is really cool, would illustrate any benefits of JRockit VE in cloud computing, but we'll get to that) Oracle JRockit The Definitive Guide


  8. These are purely abstractions in the computer’s memory and do not represent anything physical, like a USB port. Java Network Programming 4th Edition


  9. Manage volumes A volume is a detachable block storage device, similar to a USB hard drive. admin-user-guide-trunk


  10. Once you have dumped the database, you can archive and store the folder on to any online or offline media, such as CD, USB Drive, Tape, or S3 format. The Definitive Guide to MongoDB



1163、单词 manifoldcf 的匹配文本:


  1. Mahout, ManifoldCF, Lucene, Solr, Nutch, Droids—all of these will roll off the tongue by the time you’re done surveying Lucene’s rich and vibrant community. Tika in Action


  2. Maintaining document security with ManifoldCF A frequent requirement for search engines is to maintain document level security. Solr 3 Enterprise Search Server


  3. Sending data and running queries by sending JSON objects over HTTP makes it easy for someone to extend anything, from a syslog daemon like rsyslog to a connecting framework like ManifoldCF, to interact with Elasticsearch. Elasticsearch in Action MEAP V07 cHAPTER 1



1164、单词 setuptools 的匹配文本:


  1. Setuptools for Python 2.7 for Windows can be download from here: bk-compute-adminguide-grizzly


  2. But you’ll download and install a simple helper package called setuptools, which will help you download and install the Redis client libraries.1 This last step of installing the Redis client libraries for Python is shown next. Redis in Action


  3. If you got an installation error, the best next step is to attempt to upgrade setuptools and then upgrade CouchApp by running the following commands: CouchDB The Definitive Guide


  4. When the download has completed and you are returned to the shell, issue the following command to install setuptools: Beginning CouchDB


  5. As when installing the PHP driver, there are two methods you can use to install PyMongo: an automated approach that relies on setuptools or a manual approach where you download the source code for the project. The Definitive Guide to MongoDB


  6. Many Linux distributions provide packages to make setuptools easy to install. user-guide



1165、单词 functors 的匹配文本:


  1. The map method is associated with functors, and the flatMap method is associated with monads. Scala in Depth


  2. All monads are functors, but not all functors are monads. Functional Programming in Scala


  3. Assume thatA andB are two categories and thatBA is the collection of all functors from A andB. Steps in Scala An Introduction to Object-Functional Programming



1166、单词 hlog 的匹配文本:


  1. When passing the --dump option to the HLog class, it internally invokes the HLogPrettyPrinter class to dump the WAL file. HBase Administration Cookbook


  2. When a write is made, by default, it goes into two places: the write-ahead log (WAL), also referred to as the HLog, and the MemStore (figure 2.1) HBase in Action


  3. The first set of files are the write-ahead log files handled by the HLog instances, created in a directory called .logs underneath the HBase root directory. HBase:The Definitive Guide


  4. The existing MVCC-like read-write consistency control (RWCC) provided sufficient isolation guarantees and the HLog (write ahead log) on HDFS provided sufficient durability. Apache Hadoop Goes Realtime at Facebook



1167、单词 versioned 的匹配文本:


  1. Documents in CouchDB are versioned, much like they would be in a regular version control system such as Subversion. CouchDB The Definitive Guide


  2. Because the Java language doesn’t provide or propose any tooling for managing versioned dependencies, teams will have to come up with their own strategies to store and retrieve them. Gradle in Action


  3. Dependency configuration Java has no real support for working with versioned libraries as dependencies. Gradle Effective Implementation Guide


  4. As a consequence, Spanner has evolved from a Bigtable-like versioned key-value store into a temporal multi-version database. Spanner - Google’s Globally-Distributed Database


  5. To make things more complicated: Freshness requirements Heavily-versioned documents (e.g. Storage Architecture and Challenges


  6. Normally Gradle caches a module once and never reloads it from its source repository again, since versioned modules are supposed to be immutable. Gradle Beyond The Basics


  7. Versioning support The data types are capable of being versioned to support updates to the client API. Cassandra The Definitive Guide


  8. VersionedWritable: This is a base implementation to allow writable classes to track versions over time. Hadoop Beginners Guide


  9. Hightide is an optimized, versioned distribution of the Jetty open source web container. ActiveMQ in Action


  10. To make the management of versioned data less onerous, we support two per-column-family settings that tell Bigtable to garbage-collect cell versions automatically. Bigtable - A Distributed Storage System for Structured Data



1168、单词 findbugs 的匹配文本:


  1. FindBugs findbugs XML or HTML Discovers potential bugs, performance issues, and bad coding practices. Gradle in Action


  2. The FindBugs Eclipse plugin The automatic install location for the Eclipse plugin is http://findbugs.cs.umd.edu/eclipse. Jenkins Continuous Integration Cookbook


  3. The plugin will add the tasks findbugsMain and findbugsTest to analyze the source code from the main and test source sets. Gradle Effective Implementation Guide


  4. To make the build more portable, we are storing the FindBugs installation in our project directory structure, in the tools/findbugs directory: Jenkins The Definitive Guide


  5. The default Sonar Way profile does include Java standards rules but for a more comprehensive inspection, Sonar Way with Findbugs is recommended. Sonar Code Quality Testing Essentials


  6. Getting ready Before stating this recipe, you should download FindBugs from the project's web page (http://findbugs.sourceforge.net/) Java 7 Concurrency Cookbook


  7. Uncompress into a folder in your computer; then copy the contents of the ./lib/ folder into your project’s /dep/findbugs folder (create the /dep/findbugs folder if necessary) Java 7 Recipes A Problem-Solution Approach



1169、单词 zkybase 的匹配文本:


  1. This chapter shows how Willie is using Spring to implement several features in an open source configuration management database (CMDB) called Zkybase1 (http:// zkybase.org/) Spring in Practice



1170、单词 downloadable 的匹配文本:


  1. A README.txt file has more details about the downloadable code. Pro Hadoop


  2. A minimal amount of additional software is required, and most of the tools for Java programming are available for free and downloadable via the WWW. Java Network Programming and Distributed Computing


  3. The essential part of that CD, the Thinking in C multimedia seminar (created for MindView by Chuck Allison), is now available as a downloadable Flash presentation. Thinking in Java 4th Edition


  4. The downloadable code example contains all the relevant code if you want to dig deeper. Gradle in Action


  5. For example, follow the link http://mirror.quintex.com/apache/hbase/ stable/ and you can see the downloadable files as shown in the following screenshot: Hadoop Operations and Cluster Management Cookbook


  6. To help, the modified configuration files mentioned in this recipe will be downloadable from the Packt website. Jenkins Continuous Integration Cookbook


  7. We can run the job again, and this time, we see the artifacts of our projects as downloadable links on the job page. Gradle Effective Implementation Guide


  8. Since a Maven repository is nothing more than a website containing downloadable POM files and modules in a predictable directory structure, declaring a Maven repository in Gradle begins with telling Gradle the URL of the repo. Gradle Beyond The Basics


  9. The downloadable files contain instructions on how to use them. Oracle JRockit The Definitive Guide


  10. There you’ll see a grid with all the latest downloadable MongoDB binaries. MongoDB in Action



1171、单词 bashrc 的匹配文本:


  1. On your Mac system, you can run the following command or add it to ~/.bashrc. Web Crawling and Data Mining with Apache Nutch


  2. Add the following two lines to your .bashrc or .bash_profile: Pro Hadoop


  3. Note These commands need to be run as root only if the credentials used to interact with nova-api have been put under /root/.bashrc. bk-compute-adminguide-grizzly


  4. For example, the .bashrc file under a user's home directory is the run configuration file for bash shell. Hadoop Operations and Cluster Management Cookbook


  5. For example, you can do this by defining the JAVA_HOME and PATH variables in the .bashrc file, as shown here: Jenkins The Definitive Guide


  6. In Linux, edit the .bashrc or .bash_profile configuration files, and append the following lines and substitute the path highlighted in the following snippet with yours: Sonar Code Quality Testing Essentials


  7. You must run these commands as root only if the credentials used to interact with nova-api are in /root/.bashrc. bk-admin-guide-cloud-latest


  8. Mac OS X systems don’t have the /etc/profile.d directory and they are typically single-user systems, so it’s best to put the environment variable definitions in your $HOME/.bashrc. Programming Hive



1172、单词 checkboxes 的匹配文本:


  1. It also saves you the trouble of error checking.) In this section, you will learn how to program checkboxes, radio buttons, lists of choices, and sliders. Core Java Volume I Fundamentals 9th Edition


  2. It includes handling various HTML form elements, (checkboxes, radio buttons, file uploads, downloads, and so on), JSON data, and XML. Performance Testing With JMeter 2.9


  3. It’s in the same class as MySQL Workbench, but both tools have some checkboxes in their feature matrices that the other doesn’t have. High Performance MySQL 3rd Edition


  4. Click on the Extensions panel, scroll to the section Language and Framework Tooling, and tick the checkboxes next to the extensions named Gradle Support and Groovy-Eclipse, as shown in figure 10.9 Gradle in Action


  5. This is defined in the For previous build result set of checkboxes. Jenkins Continuous Integration Cookbook


  6. Installing all that stuff will take a long time so if you just want the adb tool, uncheck all the other checkboxes and then click Install. Testable JavaScript


  7. They should be listed with a black font, and the checkboxes next to them should be checked, as seen in Figure 14-5 Programming Scala


  8. Let's create a test which checks that specified checkboxes are selected when page is displayed, as follows: Selenium Testing Tools Cookbook


  9. An HTML form When the user clicks the Submit button, the text in the text fields and the settings of the checkboxes and radio buttons are sent back to the web server. Core Java Volume II Advanced Features 9th Edition


  10. For instance, it doesn’t matter if it’s a set of checkboxes, a pop-up list, or a text field. Java Network Programming 4th Edition



1173、单词 clob 的匹配文本:


  1. However, make sure that the problem is caused by the design of the DOM (e.g., a single domain object was found containing a large number of long text fields like CLOB or TEXT, which impact the performance of data retrieval) Pro Spring 3


  2. For example, MySQL’s direct mode cannot handle large objects, such as CLOB or BLOB columns, because Sqoop needs to use a JDBC-specific API to load these columns into HDFS.) For databases that provide such tools, Sqoop can use these to great effect. Hadoop:The Definitive Guide 3rd Edition


  3. To read a LOB, execute a SELECT statement and call the getBlob or getClob method on the ResultSet. Core Java Volume II Advanced Features 9th Edition


  4. Because the size of the Strings that need to be stored is unlimited, it is best to use a character large object (CLOB) data type to store the data. Java 7 Recipes A Problem-Solution Approach


  5. As their names imply, a CLOB column holds a large character sequence, and a BLOB column can store a large byte sequence. Pro JPA2



1174、单词 akkaoogle 的匹配文本:


  1. To understand how the individual pieces of Akka fit together, you’re going to build a large real-time product search application using Akka called Akkaoogle. Scala in Action



1175、单词 sys 的匹配文本:


  1. The benchmark was the standard SysBench read-only workload, with all data in InnoDB, fully in-memory and CPU-bound. High Performance MySQL 3rd Edition


  2. Keep that in mind if you are cutting and pasting this code: #!/usr/bin/python import sys from datetime import datetime, timedelta. Hadoop RealWorld Solutions Cookbook


  3. Puppet (http://www.puppetlabs.com/puppet) is a reaction to these gaps in the tools available to SysAdmins, Operators and Developers. Pro Puppet


  4. However, if you are interested only in the existence of a file or directory, the exists() method on FileSys tem is more convenient: Hadoop:The Definitive Guide 3rd Edition


  5. The supplied ChecksumFileSys tem class is loaded by the client and uses local disk paths to store all the data. HBase:The Definitive Guide


  6. In this code, a new JsonWriter instance is created and configured to write to Sys tem.out. Java EE 7 Essentials


  7. The FileSystem object, zipFileSys, was created in the try-with-resources block, so the resource will automatically be closed, but if you do not wish to use the nested try-with-resources block you must use the FileSystem class' close method to close the resource manually. Java 7 New Features Cookbook


  8. Sun originally planned to deprecate PrintStream in favor of PrintWriter but backed off when it realized this step would invalidate too much existing code, especially code that depended on Sys tem.out. Java Network Programming 4th Edition


  9. For example, if monitoring operating system statistics suggests high sys CPU utilization, you should profile the application to determine what methods are consuming the highest sys CPU cycles. Java Performance


  10. However, there is one external file it will absolutely not run without: errmsg.sys. Understanding MySQL Internals



1176、单词 numa 的匹配文本:


  1. For example, one implementation may be suitable for a small shared-memory machine, another for a large NUMA multi-processor, and yet another for an even larger collection of networked machines. MapReduce - Simplied Data Processing on Large Clusters


  2. MongoDB will warn you about a variety of issues: that you’re running on a 32-bit machine (which MongoDB is not designed for), that you have NUMA enabled (which can slow your application to a crawl), or that your system does not allow enough open file descriptors (MongoDB uses a lot of file descriptors) MongoDB The Definitive Guide 2nd Edition


  3. Typically, in a NUMA architecture, the address space is divided between processors. Oracle JRockit The Definitive Guide


  4. If the application is deployed on a NUMA (Non-Uniform Memory Architecture) system, an additional HotSpot VM command line option that can be used with the throughput garbage collector is. Java Performance


  5. In the solution to this recipe, two values are accepted as input and they are referenced by their id attributes as numa and numb. Java 7 Recipes A Problem-Solution Approach



1177、单词 discriminator 的匹配文本:


  1. For example, Roo doesn’t have a command to let you configure the discriminator for the SINGLE_TABLE model, so you’ll just have to edit the classes and add the proper annotations yourself. Spring Roo in Action


  2. Uses one table for all classes and distinguishes between instance types by using a discriminator column. Java Performance


  3. The name element of this annotation specifies the name of the column that should be used as the discriminator column, and if not specified will be defaulted to a column named “DTYPE” Pro JPA2



1178、单词 denoting 的匹配文本:


  1. One of rows and columns (but not both) may be zero, denoting an arbitrary number of components per row or column. Core Java Volume I Fundamentals 9th Edition


  2. The revision number is the md5 hash of the transport representation of a document with an N- prefix denoting the number of times a document got updated. CouchDB The Definitive Guide


  3. Now we need to output each vertex's current value denoting the minimum number of hops from the source vertex. Hadoop RealWorld Solutions Cookbook


  4. A compile-time constant expression is an expression denoting a value of primitive type or a String that does not complete abruptly and is composed using only the following: The Java Language Specification Java SE 7 Edition


  5. All nodes other than the starting node start with a distance of infinity, denoting. Hadoop in Practice


  6. As can be seen from the previous example, the output is sorted in the form of an inheritance tree, with the stars denoting the depth in the tree. Oracle JRockit The Definitive Guide


  7. The method add() adds an object to the set, and the method contains() returns a Boolean true/false value denoting whether an object is in the set or not. Hadoop in Action


  8. Without creating and denoting the proper keystore and truststore, you can expect to see the following exceptions: ActiveMQ in Action


  9. Alternative supports a select method that returns an index denoting which of them can (and then must) be chosen. Concurrent Programming in Java Design Principles and Pattern


  10. You will first add a JLabel component that represents a read-only label denoting the first name beside the input field. Java 7 Recipes A Problem-Solution Approach



1179、单词 tokenize 的匹配文本:


  1. The following listing shows a custom Lucene Analyzer that can tokenize a document using the StandardTokenizer, a somewhat error-resilient tokenizer implementation in Lucene. Mahout in Action


  2. The usual solution is to read in a line of text, tokenize it, and then use the various parse methods of Integer, Double, etc., to parse the data: Thinking in Java 4th Edition


  3. As part of listing 7.1, we include a list of stop words (fetched from http://www.textfixer.com/resources/), as well as functions to both tokenize and index a document, taking into consideration the stop words that we want to remove. Redis in Action


  4. The pipeline also has two functions — a tokenize and a count function (which is an aggregator), and the workflow has a GroupBy pipe assembly. Professional Hadoop Solutions


  5. The call to strip() method removes any leading/trailing whitespace, and then we tokenize it into an array of named variables. Hadoop RealWorld Solutions Cookbook


  6. A better approach would be to tokenize each line and produce an intermediary file containing a word per line. Hadoop in Practice


  7. You can even use this class to tokenize words that are delimited by characters other than spaces: Java in a Nutshell 5th Edition


  8. In line 3, we have to cast the value to a character array in order to tokenize it with the built-in TOKENIZE function. Cassandra The Definitive Guide


  9. SimpleAnalyzer left in what may be considered irrelevant (stop) words, but it did lowercase and tokenize at nonalphabetic character boundaries. Lucene in Action 2nd Edition


  10. Now, we will use the TRANSFORM feature and two Python scripts, one to tokenize lines of text into words, and the second to accept a stream of word occurrences and an intermediate count of the words (mostly the number “1”) and then sum up the counts for each word. Programming Hive



1180、单词 replicator 的匹配文本:


  1. When Solr runs in a replication mode, the index replicator is responsible for distributing indexes across multiple slaves. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr


  2. Replicator An interface to the replication system that enables you to initiate replication between local and remote databases. Getting Started with CouchDB


  3. Another option is to use Continuent’s Tungsten Replicator, which we’ll discuss later in this chapter. High Performance MySQL 3rd Edition


  4. Replicating images across multiple data centers The image service comes with a tool called glance-replicator that can be used to populate a new glance server using the images stored in an existing glance server. bk-compute-adminguide-grizzly


  5. Now click “Replicator” in the sidebar and choose hello-world as the source and hello-replication as the target. CouchDB The Definitive Guide


  6. For each local partition, the replicator compares it against the replicated copies in the other zones to see if there are any differences. bk-admin-guide-cloud-latest


  7. This is useful when you have large databases and are using the Futon Replicator to replicate these databases between instances or if you are compacting a large database. Beginning CouchDB


  8. Finally, Lounge includes a replicator which keeps design documents synchronized and can replicate documents for redundancy. Scaling CouchDB



1181、单词 jpeg 的匹配文本:


  1. If the user should choose a JPEG image file, the extension can be either .jpg or .jpeg. Core Java Volume I Fundamentals 9th Edition


  2. We’re using the -H option to tell CouchDB that we’re uploading a JPEG file. CouchDB The Definitive Guide


  3. What follows is a discussion of the growing complexity of the internet in terms of the types of information available (PDF files, Word documents, JPEG images, QuickTime files), and in terms of the number of languages and encoding schemes that this information is provided in. Tika in Action


  4. The response is the actual file attachment (in this example, a JPEG photo) Beginning CouchDB


  5. It is recommended that you enable compression unless you have a reason not to do so—for example, when using already compressed content, such as JPEG images. HBase:The Definitive Guide


  6. It was possible to read GIF and JPEG images, but there was no official support for writing images at all. Core Java Volume II Advanced Features 9th Edition


  7. It could well be pointing to a GIF or JPEG image, an MP3 sound file, or something else entirely. Java Network Programming 4th Edition


  8. Among other things, it has its own Content-Type header indicating that it’s a JPEG image. Spring in Action 4th Edition



1182、单词 scaladoc 的匹配文本:


  1. Because the collections library is always improving, the best source for learning these methods is the scaladoc documentation for the current release. Scala in Depth


  2. Creating documentation with the Scala plugin The Scala plugin also adds a scaladoc task to our build. Gradle Effective Implementation Guide


  3. Predef is interesting, and you can learn a lot about Scala by looking at the scaladoc or source of the scala.Predef object. Scala in Action


  4. For more information, you can also consult the library’s Scaladoc documentation, which is available in the distribution and online at http://www.scala-lang.org. Programming in Scala 2nd Edition


  5. This documentation was generated using the scaladoc tool, analogous to Java’s javadoc tool. Programming Scala


  6. You will also learn how to browse the Scaladoc documentation at a beginner’s level. Scala for the Impatient



1183、单词 memleak 的匹配文本:


  1. The Memleak tool, which is part of the JRockit Mission Control suit is ideal for this kind of analysis. Oracle JRockit The Definitive Guide



1184、单词 booleans 的匹配文本:


  1. For booleans, the bitwise operators have the same effect as the logical operators except that they do not short circuit. Thinking in Java 4th Edition


  2. The Boolean class now includes the static methods logicalAnd, logicalOr, and logicalXor, to apply the and, or, and xor operations between two booleans. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. You can choose from several different parameter types, such as Strings, Booleans, and drop-down lists. Jenkins The Definitive Guide


  4. A BitSet saves space compared to an array of booleans since the. Java Threads 3rd Edition


  5. The values stored in the document can be strings, numbers, dates, booleans, lists, maps, or other data types. Beginning CouchDB


  6. The term filter is used to filter by exact values, be they numbers, dates booleans, Elasticsearch The Definitive Guide


  7. Avro also supports primitive types such as integers, floats, and booleans as well as other structured types such as arrays and enums. Hadoop Beginners Guide


  8. Any data type manipulation other than with ints or booleans produced highly varying and misleading times. Java Performance Tuning 2nd Edition


  9. You’ll notice the call to super() where you will pass in Booleans to the super class to set the JInternalFrame object to be resizable, closable, maximizable, and iconifiable. Java 7 Recipes A Problem-Solution Approach


  10. Literals There are a number of different literal types that can be used in JP QL, including strings, numerics, booleans, enums, entity types, and temporal types. Pro JPA2



1185、单词 deserializing 的匹配文本:


  1. The core concept is that of defining a type in a text file and having a tool generate per-language APIs for accessing the data structure and for serializing and deserializing the data structure. Pro Hadoop


  2. For this reason, a SUID is added as a field, to enable a deserializing ObjectInputStream to check for a match. Java Network Programming and Distributed Computing


  3. Additionally, leaf-level indexes are structured in a way to allow a binary search on the key without deserializing. Professional Hadoop Solutions


  4. This interface permits implementors to compare records read from a stream without deserializing them into objects, thereby avoiding any overhead of object creation. Hadoop:The Definitive Guide 3rd Edition


  5. It does deserializing to allow multiple object references to be recovered. Core Java Volume II Advanced Features 9th Edition


  6. Encoding an object as a byte stream is known as serializing the object; the reverse process is known as deserializing it. Effective Java 2nd Edition


  7. These byte-stream classes are used for serializing and deserializing the internal state of objects for storage or interprocess communication. Java in a Nutshell 5th Edition


  8. Deserializing Booleans would have required special handling to return the canonical Boolean. Java Performance Tuning 2nd Edition


  9. Serializing and deserializing data to pass it in and out of the pipe is relatively inefficient. Programming Hive


  10. This is in addition to the already robust library for handling input and output streams, and serializing (and deserializing) object information. Java 7 Recipes A Problem-Solution Approach



1186、单词 encapsulating 的匹配文本:


  1. With the basic Checkstyle definitions in place, you can apply the encapsulating script plugin to all subprojects of your multiproject build, as shown in the next listing. Gradle in Action


  2. It’s likely that you may want to apply this manipulation to a date in several points of your code, and for this reason we suggest encapsulating its logic in a proper class as we did here. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. Listing 9-10 (code file: class TableManager) shows the class encapsulating HTablePool (TableManager), which additionally provides all configuration information (table names, family names, and so on) Professional Hadoop Solutions


  4. At the end of this stage the physical plan looks like a DAG of tasks with each task encapsulating a part of the plan. Hive A Petabyte Scale Data Warehouse Using Hadoop


  5. After confirming that the job has completed, we call the RunningJob’s getCounters() method, which returns a Counters object, encapsulating all the counters for a job. Hadoop:The Definitive Guide 3rd Edition


  6. The Java platform supports a number of permission classes, each encapsulating the details of a particular permission. Core Java Volume II Advanced Features 9th Edition


  7. In effect, we are applying the advice of Item 13 by encapsulating the lock object within the object it synchronizes. Effective Java 2nd Edition


  8. Encapsulating the complexity makes it easier for end users to construct complex queries from reusable parts. Programming Hive


  9. Optimizing for extensibility entails removing hard-wired decisions and instead allowing them to vary, for example by encapsulating them as overridable methods, supporting callback hooks, or abstracting functionality via interfaces that can be re-implemented in completely different ways by dynamically loaded components. Concurrent Programming in Java Design Principles and Pattern


  10. Methods can be very useful for encapsulating logic that performs tasks. Java 7 Recipes A Problem-Solution Approach



1187、单词 adt 的匹配文本:


  1. So far you’ve learned that ADT is a kind of type that represents a set of values. Scala in Action


  2. Thus any other part of the program that needs to perform an operation on the ADT can do so by calling the appropriate method. Data Structures and Algorithm Analysis in Java 3rd Edition


  3. List is just one example of what is called an  (ADT).algebraic data type (Somewhat confusingly, ADT is sometimes used in OO to stand for "abstract data type".) An ADT is just a data type defined by one or more data constructors, each of which may contain zero or more arguments. Functional Programming in Scala


  4. You can set up the Android Test framework with Eclipse by installing the Android Development Tools (ADT) plugin. Selenium Testing Tools Cookbook


  5. It is easy to define your own ADT classes, for example, Fraction, Interval, ComplexFloat, and so on. Concurrent Programming in Java Design Principles and Pattern


  6. Download and install the ADT plug-in for Eclipse according to the documentation that can be found at http://developer.android.com/sdk/eclipse-adt.html#installing. Java 7 Recipes A Problem-Solution Approach



1188、单词 retrying 的匹配文本:


  1. Disk failover mode stores undeliverable data to the local disk (or sometimes a local database) and keeps retrying until the data can be delivered to the next recipient in your data flow. Apache Flume Distributed Log Collection for Hadoop


  2. If the runtimes of tasks are too long, a single task may hold the cluster for a long period, or retrying a failed task becomes expensive. Pro Hadoop


  3. To throw an error in such a way that the user will be asked to authenticate, before retrying the request, use JavaScript code like: CouchDB The Definitive Guide


  4. In this case, a “standard” Hadoop retrying mechanism will do you no good. Professional Hadoop Solutions


  5. The framework tries to narrow down the skipped range by retrying until this threshold is met or all attempts get exhausted for this task. Hadoop RealWorld Solutions Cookbook


  6. Even if a node is a group member, communications with it may fail, and such failures must be handled in the usual ways (retrying, trying a different member of the group, and so on) Hadoop:The Definitive Guide 3rd Edition


  7. On the contrary, throwing a timeout exception or retrying the RPC request causes tasks to fail unnecessarily or add additional load to a RPC server. Apache Hadoop Goes Realtime at Facebook


  8. After checking the datanode processes’ logs and confirming that they were still alive and retrying, Mike checked the namenode user interface again. Hadoop Operations


  9. None of these exception classes have any special methods you wouldn’t find in any other exception class, but you can take advantage of these subclasses to provide more informative error messages or to decide whether retrying the offending operation is likely to be successful. Java Network Programming 4th Edition


  10. You can contain local failure to the current method, rather than throwing exceptions back to clients, if you have reason to believe that retrying an action will succeed. Concurrent Programming in Java Design Principles and Pattern



1189、单词 rmiregistry 的匹配文本:


  1. Included as part of the Java platform is an application called rmiregistry, which runs as a separate process and allows applications to register RMI services or obtain a reference to a named service. Java Network Programming and Distributed Computing


  2. For security reasons, the rmiregistry service that is part of the JDK only allows binding calls from the same host. Core Java Volume II Advanced Features 9th Edition


  3. A remote Java process may be probed by specifying the remote process id, the remote host name, and the port number on which the remote host’s rmiregistry server is running (if other than the default of 1099) Java in a Nutshell 5th Edition



1190、单词 associativity 的匹配文本:


  1. Scala’s treatment of the : character in operator notation is a general concept designed to handle cases like this where left associativity is not as expressive as right associativity. Scala in Depth


  2. The associativity of the cons ( :: ) is right instead of left. Scala in Action


  3. With this more round-about algorithm, the reducer code can be used as a combiner as associativity is preserved. MapReduce Design Patterns


  4. Operator associativity will be described in more detail in Section 5.8 Programming in Scala 2nd Edition


  5. The constraints of commutativity and associativity are not too restrictive; they permit a wide range of valuable analyses, including: counting, filtering, sampling, generating histograms, finding the most frequent items, and many more. Interpreting the Data Parallel Analysis with Sawzall


  6. Associativity is a nice property to expect of operations in an algebra. Functional Programming in Scala


  7. The P and A columns of the table specify the precedence and associativity of each group of related operators, respectively. Java in a Nutshell 5th Edition


  8. Associativity of operators whose Operator precedence of operator name ends with the corresponding whose name starts with characters. Steps in Scala An Introduction to Object-Functional Programming



1191、单词 inmemory 的匹配文本:


  1. When a deferred operation is evaluated, it converts its result PCollection into a materialized state, e.g., as an inmemory data structure or as a reference to a temporary intermediate file. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  2. The order of the data sets in the line of code matters because all but the first data sets listed are stored inmemory. MapReduce Design Patterns


  3. The test is very fast because it is inmemory, but it has a nonzero probability of false positives, in which case the regular get() method is called. Hadoop:The Definitive Guide 3rd Edition


  4. Like a CheckpointNode, the BackupNode is capable of creating periodic checkpoints, but in addition it maintains an inmemory, up-to-date image of the file system namespace that is always synchronized with the state of the NameNode. The Hadoop Distributed File System


  5. Memstore flush size We discussed the storage model earlier and identified how HBase uses an inmemory store to buffer values before writing them to disk as a new storage file in an operation called flush. HBase:The Definitive Guide


  6. If small enough, the secondary table is pulled into the memory of each mapper / reducer process for inmemory lookups, which typically is the fastest method for joining. Tenzing - A SQL Implementation On The MapReduce Framework


  7. Because the update mechanism is SQL, you can log the SQL statements locally to disk as you execute them on the inmemory database, a process called journaling. Java Performance Tuning 2nd Edition


  8. Its speed is the result of the combination of a fast transactional journal comprised of data log files, the highly optimized indexing of message IDs, and inmemory message caching. ActiveMQ in Action


  9. Between the two in-memory parsers, JAXB has a larger cost of building the inmemory tree because of the higher binding overhead incurred by JAXB. Java Performance


  10. A typical strategy for persistence providers dealing with bulk operations is to invalidate any inmemory cache of data related to the target entity. Pro JPA2



1192、单词 breakpoint 的匹配文本:


  1. A debugger runs your program in full motion until it reaches a breakpoint, and then you can look at everything that interests you. Core Java Volume I Fundamentals 9th Edition


  2. For Figure 7-5, a breakpoint was set in the map task, and the job launched via the Debug As Java Application menu item. Pro Hadoop


  3. You can also use the familiar debugger statement somewhere in your code to trigger a breakpoint. Testable JavaScript


  4. You also can modify your code to catch an exception, which will allow you to set a breakpoint in your IDE and observe the input that’s causing your exception. Hadoop in Practice


  5. This command should be used when the current thread is stopped at a breakpoint. Java in a Nutshell 5th Edition


  6. Unfortunately, you cannot set a breakpoint on a native method, so this is not possible. Java Performance Tuning 2nd Edition


  7. By default, when you debug a concurrent application and the debugger finds a breakpoint, it only stops the thread that has that breakpoint while the rest of the threads continue with their execution. Java 7 Concurrency Cookbook


  8. The debugger shows you the stack trace at the current breakpoint. Understanding MySQL Internals


  9. You simply right-click on the line and select breakpoint from the list. Selenium 2 Testing Tools Beginner's Guide



1193、单词 pong 的匹配文本:


  1. PongWebSocketFrame WebSocketFrame which is sent as response to a PingWebSocketFrame. Netty in Action MEAP V08


  2. From the WSDL file, SoapUI created a basic test for the Ping and Pong services. Jenkins Continuous Integration Cookbook


  3. Here is an example of two actors communicating with each other by sending ping-pong messages: Scala in Action


  4. If the answer is pong, then you succeeded; if you get pang as reply, that means you couldn’t connect to the other node. RabbitMQ in Action


  5. If we try to use a REQ socket in anything other than a strict send/receive fashion, we’ll get an error (technically, the REQ socket implements a small finite-state machine to enforce the send/receive ping-pong, so the error code is called “EFSM”) ZeroMQ


  6. Redis should respond with the message "PONG" if everything has been set up properly. Hadoop RealWorld Solutions Cookbook


  7. There will be Ping messages that the clock sends the simulants, and Pong messages that the simulants send back when they are ready for the clock to move forward. Programming in Scala 2nd Edition


  8. A pong message is a WebSocket control message and is generally not dealt with at the application layer. Java EE 7 Essentials


  9. It’s vulnerable to a “ping-pong” denialof-service attack, in which spoofed Internet packets cause two hosts to spew an unlimited amount of data at each other. Java Network Programming 4th Edition


  10. This means that MarcoHandler will also handle binary and pong messages, but will do nothing with those messages. Spring in Action 4th Edition



1194、单词 referent 的匹配文本:


  1. Here, the referent can be inserted into any queue whose element type is a supertype of the type T of the referent; T is the lower bound for the wildcard. The Java Language Specification Java SE 7 Edition


  2. For a single instance, Spring DM will automatically look for a replacement when the current service referent disappears. Spring Dynamic Modules in Action


  3. However, reference handles don’t work well with random access, because the referent class may occur at any point in the preceding stream—that is, there is state stored in the stream. Hadoop:The Definitive Guide 3rd Edition


  4. A weak reference is one that does not prevent the referent object from being garbage-collected. Java in a Nutshell 5th Edition


  5. You can access the private object (termed the referent) using the Reference.get( ) method. Java Performance Tuning 2nd Edition



1195、单词 xenapi 的匹配文本:


  1. The nova-compute process is primarily a worker daemon that creates and terminates virtual machine instances via hypervisor's APIs (XenAPI for XenServer/XCP, libvirt for KVM or QEMU, VMwareAPI for VMware, etc.) bk-compute-adminguide-grizzly


  2. XenAPI (XenServer/XCP) Compute uses the XenAPI agent to inject passwords into guests when using the XenAPI hypervisor backend. bk-admin-guide-cloud-latest



1196、单词 ldif 的匹配文本:


  1. Add the LDIF records from the command line; you will then be asked for the administrator's password you filled in, in step 1 Jenkins Continuous Integration Cookbook


  2. Fortunately, this is a relatively simple exercise, using the embedded LDAP server and a sample LDIF file. Spring Security 3.1


  3. I will be importing a couple of users using an LDIF file. Pro Spring Security


  4. You can import your host definitions using LDIF files or manipulate your directory using your choice of tools such as phpldapadmin (http://phpldapadmin.sourceforge.net/wiki/index.php/Main_Page) Pro Puppet


  5. When the LDAP server starts, it will attempt to load data from any LDIF files that it can find in the classpath. Spring in Action 4th Edition



1197、单词 docid 的匹配文本:


  1. There are a few things going on here, so let’s list them out to be clear: • The URL contains the full path to the document (that is DATABASE/DOCID) Getting Started with CouchDB


  2. As we’ve seen, design documents are normal JSON documents, denoted by the fact that their DocID is prefixed with _design/ CouchDB The Definitive Guide


  3. A Document has a required integer DocId and optional Links, containing a list of Forward and Backward entries holding DocIds of other web pages. Dremel - Interactive Analysis of WebScale Datasets


  4. When skipping a large number of rows, CouchDB still needs to scan the entire B-tree index, starting from the startkey and startkey_docid (if specified) Scaling CouchDB


  5. Some of the Solr caches (the document cache, actually) operate on internal identifiers called docid. Solr 3.1 Cookbook


  6. Every Web page has an associated 1D number called a docID which is assigned whenever a new URL is parsed out of a Web page. The anatomy of a large-scale hypertextual Web search engine


  7. In the reduce phase, terms are sorted so that all term / docID pairs are sent to the same reducer process for each unique term. Solr in action


  8. For each of the top N results, TopDocs records the int docID (which you can use to retrieve the document) as well as the float score. Lucene in Action 2nd Edition


  9. Some of the Solr caches (documentCache actually) operate on internal identifiers called docid. Apache Solr 4 Cookbook



1198、单词 tiered 的匹配文本:


  1. Tiered data collection (multiple flows and/or agents) You can chain your Flume agents depending on your particular use case. Apache Flume Distributed Log Collection for Hadoop


  2. But you can smartly reduce the distance-measure computation and clustering time by an order of magnitude by using a two-tiered approach for batch clustering. Mahout in Action


  3. Site Architecture Tagged’s scale-out, tiered site architecture, shown in Figure 9-1, is typical of social networking websites. Monitoring with Ganglia


  4. As a result, he has been involved in the planning, development, implementation, integration, and testing of numerous applications, including multi-tiered, standalone, distributed, and cloud-based applications. Performance Testing With JMeter 2.9


  5. The tiered merge policy This is the default merge policy that ElasticSearch uses. Mastering ElasticSearch


  6. Our design further seeks to minimize metadata related disk I/O through the use of a two-tiered storage strategy, and to maximize locality and cache efficiency with Dynamic Subtree Partitioning [30] Ceph A Scalable, High-Performance Distributed File System


  7. We intend to implement a priority queue so that queries can be tiered by priority. Tenzing - A SQL Implementation On The MapReduce Framework


  8. There are tiered cost models, so the actual costs tend to have smaller marginal increases at higher levels. Hadoop Beginners Guide


  9. By far, the N-tiered tree network (see Figure 4-3) is the predominant architecture deployed in data centers today. Hadoop Operations


  10. At the time of this writing development is underway to introduce a hybrid HotSpot JIT compiler that combines the major attributes of the Client JIT compiler and the Server JIT compiler called tiered compilation. Java Performance



1199、单词 tableswitch 的匹配文本:


  1. The compiler will then emit a tableswitch bytecode for this pattern match. Scala in Depth


  2. Compilation of switch statements uses the tableswitch and lookupswitch instructions. The Java Virtual Machine Specification Java SE 7 Edition


  3. It contains either a "tableswitch" bytecode identifier or a "lookupswitch" bytecode identifier. Java Performance Tuning 2nd Edition



1200、单词 sqlexception 的匹配文本:


  1. Suppose the code is inside a method public void updateRecord() throws SQLException. Core Java Volume I Fundamentals 9th Edition


  2. Exception Handling Because Spring advocates using runtime exceptions rather than checked exceptions, you need a mechanism to translate the checked SQLException into a runtime Spring JDBC exception. Pro Spring 3


  3. Each SQLException has a chain of SQLException objects that are retrieved with the getNextException method. Core Java Volume II Advanced Features 9th Edition


  4. The catch block then handles a SQLException, so if one is thrown the exception will be handled using the code within the catch block. Java 7 Recipes A Problem-Solution Approach


  5. And, to appease JDBC’s anger, you must catch SQLException, a checked exception, even though there’s not a lot you can do if it’s thrown. Spring in Action 4th Edition



1201、单词 confi 的匹配文本:


  1. A Solr core is nothing but the running instance of a Solr index along with its confi guration. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr


  2. Along the way, you’ll explore Springbased approaches to domain-specifi c challenges like CRM, confi guration management, and site reliability. Spring in Practice


  3. And it uses Spring’s familiar programming model to simplify confi guration and implementation, so it’ll be comfortably familiar to most Java developers. Spring Batch in Action


  4. Along the way, you’ll learn to handle data access and web-based components, and explore topics like unit testing and confi guration in OSGi. Spring Dynamic Modules in Action


  5. Numerous examples will help you develop confi dence in the crucial area of data modeling. MongoDB in Action



1202、单词 rev 的匹配文本:


  1. This will save the document, and then display the new document with the saved revision information (the _rev field) Getting Started with CouchDB


  2. We’ll go into more detail about this in later chapters, but for now, the important thing to note is that _rev acts like a safety feature when saving a document. CouchDB The Definitive Guide


  3. The REV column is for storing each revision number, which will be autoincremented when a new history record is created. Pro Spring 3


  4. Reverse could be implemented using concatenation (:::), like in the following method, rev: Programming in Scala 2nd Edition


  5. Issue the following command to delete your johndoe document from the database (be sure to replace the revision number after ?rev= with the actual revision number of your document): Beginning CouchDB


  6. This requires us to pass the incoming argument list, of type List

    , as an argument to rev() The Java Language Specification Java SE 7 Edition


  7. Mrs., Ms., Dr., and Rev., you’ve accounted for virtually everyone. SQL Antipatterns


  8. Exercise 2.37 Explain why function rev computes the reverse of a list. Steps in Scala An Introduction to Object-Functional Programming



1203、单词 sgt 的匹配文本:


  1. In this case, you’ll start with one: the SgtPeppers class, as shown in the next listing. Spring in Action 4th Edition



1204、单词 minimized 的匹配文本:


  1. When you are debugging a GUI program, it is a good idea to keep the console available on the screen and not minimized.) Core Java Volume I Fundamentals 9th Edition


  2. How can you cut the graph for distribution across the cluster so that the number of arcs bridging machines is minimized? Professional Hadoop Solutions


  3. Because the O(N logN) comparison-based sorting algorithms will generally look only at a small number of characters in each string comparison, once the average string length starts getting large, radix sort’s advantage is minimized or evaporates completely. Data Structures and Algorithm Analysis in Java 3rd Edition


  4. Using this filter combination will cause the region server to only load the row key of the first KeyValue (i.e., from the first column) found and return it to the client, resulting in minimized network traffic. HBase:The Definitive Guide


  5. If you have a development environment that provides Hadoop integration or are using Hadoop in standalone mode, the problems are minimized; just remember that Streaming does give you this ability to try the scripts outside of Hadoop; it may be useful some day. Hadoop Beginners Guide


  6. More realistically, several identical copies of the data traverse the Internet; but, by carefully choosing the points at which the streams are duplicated, the load on the network is minimized. Java Network Programming 4th Edition


  7. By choosing the most recently used thread, paging and cache overhead may be minimized. Java Performance Tuning 2nd Edition


  8. But when such a data structure is not available, an alternative is to identify a way to design the application such that the frequency at which multiple threads access the same data and the scope of the data that is accessed is minimized. Java Performance


  9. Useless signals, and the resulting "thundering herds" of context switches can be minimized by delegating operations with different wait conditions to different helper objects. Concurrent Programming in Java Design Principles and Pattern


  10. By breaking tasks into small, granular tasks, the effect of faults and “straggler” nodes can be minimized. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



1205、单词 splunk 的匹配文本:


  1. Splunk Splunk (http://www.splunk.com) is a log aggregator and search engine that can help you gain operational insight into all of the machine-generated data in your environment. High Performance MySQL 3rd Edition


  2. Processing Applications Logs You can use a wide range of solutions for logging, starting from specialized software (for example, the Splunk App for HadoopOps) and up to a custom log-processing application. Professional Hadoop Solutions


  3. Splunk is one commercial product, another is Loggly, a cloud based logging tool that is based on Solr! More information is available at http://www.splunk.com/ and http://www.loggly.com. Solr 3 Enterprise Search Server


  4. On the consumer side, it outputs into Splunk, Graphite, or Esper-like real-time alerting. Apache Kafka


  5. Another product, Splunk, also requires a wide range of functionality to create real-world big data pipeline solutions. Spring Data Modern Data Access for Enterprise Java



1206、单词 tgt 的匹配文本:


  1. A ticket is issued with a Ticket Granting Ticket (TGT), which is issued by the KDC. HBase Administration Cookbook


  2. For Hadoop users, this is done via the kinit command.) The KDC responds with something called a Ticket Granting Ticket (TGT), which is simply a ticket used for requesting tickets to communicate to other servers and services. Professional Hadoop Solutions


  3. This means that in the case of a tgt restart or even a node reboot your existing volumes on that node will be restored automatically with their original IQN. bk-admin-guide-cloud-latest


  4. The client authenticates itself to the Authentication Server and receives a timestamped Ticket-Granting Ticket (TGT) Hadoop:The Definitive Guide 3rd Edition


  5. The KDC is made up of two distinct services: the authentication server (AS), which is responsible for authenticating a client and providing a ticket granting ticket (TGT), and the ticket granting service (TGS), which, given a valid TGT, can grant. Hadoop Operations



1207、单词 omega 的匹配文本:


  1. Indeed, the Omega service scheduler will try to place tasks to resist both independent and coordinated failures, which is an NP-hard chance-constrained optimization problem with tens of failure domains that nest and overlap. Omega - flexible, scalable schedulers for large compute clusters


  2. Although this might be the best of all possible cookbooks, there are two tiny problems with The Cookbook Omega. MongoDB in Action



1208、单词 mixins 的匹配文本:


  1. This gives all our mixed-in traits the ability to delegate to super, which is a common theme when using traits as mixins. Scala in Depth


  2. Mixins The term mixin seems to have acquired numerous meanings over time, but the fundamental concept is that of mixing in capabilities from multiple classes in order to produce a resulting class that represents all the types of the mixins. Thinking in Java 4th Edition


  3. Another way of thinking about Scala mixins is as decorators. Scala in Action


  4. Using ProxyFactoryBean for Introductions You are not limited in using the ProxyFactoryBean class for just advising an object but also for introducing mixins to your objects. Pro Spring 3


  5. The order of mixins is significant.2 The precise rules are given in the following section, but, roughly speaking, traits further to the right take effect first. Programming in Scala 2nd Edition


  6. Traits As Mixins Scala provides a complete mixin solution, called traits. Programming Scala


  7. If you are familiar with Ruby, traits are similar to Ruby’s mixins. Beginning Scala


  8. Abstract classes can’t be used to define mixins for the same reason that they can’t be retrofitted onto existing classes: a class cannot have more than one parent, and there is no reasonable place in the class hierarchy to insert a mixin. Effective Java 2nd Edition



1209、单词 makefile 的匹配文本:


  1. First, gmetad has one additional software dependency (RRDtool), and second, you must include the --with-gmetad option to the configure script, because only gmond is built by the default Makefile. Monitoring with Ganglia


  2. Any automation method will do; for example, a Makefile or a set of custom scripts. High Performance MySQL 3rd Edition


  3. The first file is called Makefile and will reference the umbrella make file. RabbitMQ in Action


  4. Here is a quick makefile that will run unit tests on all the code and then compress the code into a release directory to be blasted out to production web servers if all is OK: Testable JavaScript


  5. For example, many software projects contain text files such as README, LICENSE, and Makefile without any filename extensions. Tika in Action


  6. The .pro file is the Qt makefile or the project file. Storm Real-Time Processing Cookbook


  7. Compiling and Running Now we can compile and link our program using the makefile in Example 2-13 Hadoop:The Definitive Guide 3rd Edition


  8. For example, add the following options to Makefile.in, and then. SQL Antipatterns


  9. For each directory where you added files, edit Makefile.am in that directory. Understanding MySQL Internals



1210、单词 attr 的匹配文本:


  1. For example, you can extract the POSIX permissions of a file and create another file with the same attributes as follows (this example uses the attr object from the previous examples): Pro Java 7 NIO.2


  2. Our getAttr method uses the getAttrs method to extract the first value. Spring Security 3.1


  3. For example, if Tika returned a field named creator and we don't have such a field in our index, than Solr would try to index it under a field named attr_creator, which is a dynamic field. Solr 3.1 Cookbook


  4. NamedNodeMap getAttributes() returns a node map that contains Attr nodes that describe all attributes of this node. Core Java Volume II Advanced Features 9th Edition


  5. Some people try to extend the EAV design by defining a separate attr_ SQL Antipatterns


  6. An Attr object represents an attribute of an Element node. Java in a Nutshell 5th Edition


  7. For example, if Tika returned a field named creator, and we don't have such a field in our index, then Solr would try to index it under a field named attr _ creator which is a dynamic field. Apache Solr 4 Cookbook



1211、单词 plaintext 的匹配文本:


  1. However, some developers prefer a more minimalistic editing environment: plaintext editors or power editors. Gradle in Action


  2. Listing 13-4 provides a modification to the previous logs DDL statement for the data stored as JSON in plaintext files, where each JSON document is stored on a single line in the file. Professional Hadoop Solutions


  3. The bulk of the work of any cipher engine will be in the engineUpdate( ) method, which is responsible for actually providing the ciphertext or plaintext. Java Security 2nd Edition


  4. The history log includes job, task, and attempt events, all of which are stored in a plaintext file. Hadoop:The Definitive Guide 3rd Edition


  5. For decryption, the very last byte of the plaintext is a count of the padding characters to discard. Core Java Volume II Advanced Features 9th Edition


  6. You can protect against this kind of exposure if you don’t put the plaintext password into the SQL query. SQL Antipatterns


  7. When writing Java programs, you should use a text editor that saves files in plaintext format, not a word processor that supports fonts and formatting and saves files in a proprietary format. Java in a Nutshell 5th Edition


  8. Other features, such as storage of non-XML documents (for example, full plaintext [unstructured] documents) Cassandra The Definitive Guide


  9. The query code will be styled in bold, whereas the resulting output will be rendered in plaintext. The Definitive Guide to MongoDB


  10. And the payload here is a simple plaintext message, but could be anything in principle: MongoDB in Action



1212、单词 bucketing 的匹配文本:


  1. On top of the bag of key-value mappings, the Spanner implementation supports a bucketing abstraction called a directory, which is a set of contiguous keys that share a common prefix. Spanner - Google’s Globally-Distributed Database


  2. Now take a look at a special case of a reducer join called a “Bucketing” join. Professional Hadoop Solutions


  3. Alphabetic range bucketing Solr does not directly support alphabetic range bucketing (A-C, D-F, and so on) Solr 3 Enterprise Search Server


  4. We can see that during the copy process Puppet has backed up the old file, a process Puppet calls file bucketing. Pro Puppet


  5. Both of these arguments support the Flume functionality called output bucketing, which permits some macro substitutions. Hadoop in Practice


  6. Each file is copied by a single map, and distcp tries to give each map approximately the same amount of data by bucketing files into roughly equal allocations. Hadoop:The Definitive Guide 3rd Edition


  7. For example, in computing the average of a column, a random sample of data can provide a good approximation.) Bucketing divides data into a specified number of files based on the hash of the bucket column. Hadoop in Action


  8. Bucketing Table Data Storage Partitions offer a convenient way to segregate data and to optimize queries. Programming Hive



1213、单词 leftmost 的匹配文本:


  1. The mapper key class will be the key class of the leftmost data source, and the key classes of all data sources should be identical. Pro Hadoop


  2. I created a JSlider (the arguments are the leftmost value of the JSIider, the rightmost value, and the starting value, respectively, but there are other constructors as well) and dropped it into the JFrame. Thinking in Java 4th Edition


  3. If you index more than one column, the column order is very important, because MySQL can only search efficiently on a leftmost prefix of the index. High Performance MySQL 3rd Edition


  4. We’ve written this as a function type (the leftmost Function) to explicitly affirm the fact that you could pass this differentiating function to yet another function. Java 8 in Action Lambdas, Streams and Functional-style Programming


  5. The leftmost bit in an integer type is the sign bit. Programming in Scala 2nd Edition


  6. Note that the leftmost reducer has more load due to more data under the “ellipse” key. Hadoop in Action


  7. When using new with multidimensional arrays, you do not have to specify a size for all dimensions of the array, only the leftmost dimension or dimensions. Java in a Nutshell 5th Edition


  8. In the case of the leftmost button, all we need to do is to display the total calories in the specially designated label: Steps in Scala An Introduction to Object-Functional Programming


  9. Range matches An exact match on any set of leftmost keys (including none), followed by either a range or a sort using the next key to the right. MongoDB in Action


  10. When the crawl rate is low, Percolator clusters documents faster than MapReduce as expected; this scenario is illustrated by the leftmost pair of points which correspond to crawling 1 percent of documents per hour. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



1214、单词 california 的匹配文本:


  1. In 1999, I packed everything I owned into my car for a cross-country trip to begin my new job as Staff Researcher at the University of California, Berkeley Computer Science Department. Monitoring with Ganglia


  2. Carla Schroer and her teams of compatibility testers in Cupertino, California, and Novosibirsk, Russia (with special thanks to Leonid Arbouzov and Alexei Kaigorodov) painstakingly wrote compatibility tests for each testable assertion in the First Edition. The Java Virtual Machine Specification Java SE 7 Edition


  3. For example, if your application is US-only and you want to divide your dataset into 20 shards, you probably shouldn’t shard by state, because California has such a huge population. High Performance MySQL 3rd Edition


  4. For example, if we want to find a random plumber in California, we can create an index on "profession", "state", and "random": MongoDB The Definitive Guide 2nd Edition


  5. To hijack a great analogy from Gregor Hohpe, we could call it the Coffee Bean model (Coffee Bean & Tea Leaf is a chain of coffee houses in California) RabbitMQ in Action


  6. Any action related to this Agreement will be governed by California law and controlling U.S. The Java Language Specification Java SE 7 Edition


  7. With the view created, we then execute a query against it, in this case, to simply count how many of the sightings took place in California. Hadoop Beginners Guide


  8. Ganglia was built by a group at the University of California, Berkeley, specifically to collect, aggregate, and plot a large number of metrics from large clusters of machines. Hadoop Operations


  9. This table contains just the name, salary, and address columns from the employee table records for employees in California. Programming Hive


  10. Consider the following example that returns the distinct departments based in California that are participating in the “Release1” project: Pro JPA2



1215、单词 snapshotting 的匹配文本:


  1. So, the initial copy is basically an instantaneous operation, no matter how large a volume you’re snapshotting. High Performance MySQL 3rd Edition


  2. One is a method called snapshotting that takes the data as it exists at one moment in time and writes it to disk. Redis in Action


  3. Snapshotting makes queries slower, so only use snapshotted queries when necessary. MongoDB The Definitive Guide 2nd Edition


  4. It is important to realize that this snapshotting feature is built into Web Flow and is automatically at your disposal. Pro Spring MVC


  5. In addition to that, when requested the result in enriched by information about the recovery status of shards and snapshotting. Mastering ElasticSearch


  6. Alternatively (or in addition to snapshotting), Redis can run in append mode. The Little Redis Book


  7. As a result, we have written a simple database using write ahead logging and snapshotting similar to the design of Birrell et al. Chubby - The lock service for loosely-coupled distributed systems


  8. Snapshotting often will minimize the number of transactions that must be applied after the snapshot is read in. ZooKeeper Distributed Process Coordination


  9. Solution The default persistence model is snapshotting, which consists of saving the entire database to disk in the RDB format (basically a compressed database dump) Redis Cookbook


  10. To deal with the “dirty” buffer issue, we recommend using the sync command before snapshotting: OpenStack Operations Guide



1216、单词 jquery 的匹配文本:


  1. Out of the many available libraries, pick JQuery (http://jquery.com/), an established, feature-rich, easy-to-use API for handling AJAX calls and manipulating the HTML DOM. Gradle in Action


  2. To implement drag-and-drop, use the jQuery-ui plug-in (http://jqueryui.com) for jQuery (http://jquery.com), a JavaScript framework that simplifies HTML, document traversing, event handling, and Ajax interactions for web development. Scala in Action


  3. For the samples in this chapter, jQuery (http://jquery.org) and jQuery UI (http://jqueryui.com) JavaScript libraries will be used to implement a rich user interface. Pro Spring 3


  4. Adding AJAX to the View with Spring JS and JQuery Finally, we need to physically invoke an asynchronous call from our browser. Pro Spring MVC


  5. Our header.jsp file has already included the JQuery library and the OpenID Selector library in the

    of our page. Spring Security 3.1


  6. For more details and a list of available jQuery selectors, please visit http://api.jquery.com/category/selectors/ Selenium Testing Tools Cookbook


  7. You’ll need to download the jQuery library from http://jquery.org and place it in the previously mentioned directory for this to work. Spring Roo in Action



1217、单词 activatable 的匹配文本:


  1. Developers creating activatable services must extend the Activatable class, implement a remote service interface, and provide their own implementing methods for that service interface. Java Network Programming and Distributed Computing


  2. Your remote objects don’t actually have to extend the Activatable class. Core Java Volume II Advanced Features 9th Edition



1218、单词 octal 的匹配文本:


  1. Naturally, this can be confusing, so we recommend against the use of octal constants. Core Java Volume I Fundamentals 9th Edition


  2. Two command-line tools that are helpful in this process are the command-line octal dump utility, od, and the strings utility, which displays human readable strings inside binary files. Cassandra High Performance Cookbook


  3. In a decimal or octal literal, the integer is denoted by all the digits in the literal before any type suffix. The Java Language Specification Java SE 7 Edition


  4. For example, the default in HDFS is the three digit octal 755, equivalent to -rwxr-xr-x. Hadoop in Practice


  5. Notice that the octal form of the delimiter characters can be used—001 for Control-A, for instance. Hadoop:The Definitive Guide 3rd Edition


  6. Text in single quotes is treated as a literal, whereas double-quoted text is interpolated, that is, it transforms the octal, or hexadecimal, values into bytes. HBase:The Definitive Guide


  7. The underscore can be applied to primitive data types in any supported base (binary, octal, hexadecimal, or decimal), and to both integer and floating-point literals. Java 7 New Features Cookbook


  8. Integer literals can also be expressed in hexadecimal or octal notation. Java in a Nutshell 5th Edition


  9. These permissions are granted by using an optional fourth octal number placed to the left of the standard set of three. Hadoop Operations


  10. Written using the octal code \001 when explicitly specified in CREATE TABLE statements. Programming Hive



1219、单词 nonrelational 的匹配文本:


  1. For example, a web crawler is needed for getting data from the Web, and a data translation module is needed to transfer data from relational databases to a nonrelational Big Data platform. Hadoop Operations and Cluster Management Cookbook


  2. The data used in web and scientific computing is often nonrelational. Dremel - Interactive Analysis of WebScale Datasets


  3. It’s generally applied to a number of recent nonrelational databases such as Cassandra, Mongo, Neo4J, and Riak. NoSQL Distilled


  4. He has recently been exploring build automation, nonrelational data stores, and abstract ideas, like how to make software architecture look more like an ant colony. Gradle Beyond The Basics


  5. Nonrelational Database Systems, Not-Only SQL or NoSQL? Over the past four or five years, the pace of innovation to fill that exact problem space has gone from slow to insanely fast. HBase:The Definitive Guide


  6. If you have nonrelational data management needs, the best answer is. SQL Antipatterns


  7. Here we contextualize Cassandra against a variety of the more popular nonrelational databases, examining documentoriented databases, distributed hashtables, and graph databases, to better understand Cassandra’s offerings. Cassandra The Definitive Guide


  8. Apache HBase Apache HBase is a low-latency, distributed (nonrelational) database built on top of HDFS. Hadoop Operations


  9. The umbrella term NoSQL was coined in 2009 to lump together the many nonrelational databases gaining in popularity at the time. MongoDB in Action


  10. He has recently been exploring build automation, nonrelational data stores, and abstract ideas like how to make software architecture look more like an ant colony. Building and Testing with Gradle



1220、单词 hregion 的匹配文本:


  1. As we did not configure the region server here, HBase will start a single slave daemon (HRegionServer) on the same JVM too. HBase Administration Cookbook


  2. HBase has a number of server processes, a single HBaseMaster that manages the HBase cluster and a set of HRegionServers, each of which is responsible for a set of MapFiles containing column regions. Pro Hadoop


  3. It also includes the server that hosts the region in the input split, which means that the map tasks will be scheduled to execute on the same nodes as the HRegionServer hosting the data. Hadoop in Practice


  4. It lists all the hosts on which you want to run HRegionServer daemons. HBase:The Definitive Guide


  5. At a very high level, the master server (HMaster) is responsible for keeping track of the region servers (HRegionServer) available and assigning regions to servers. ZooKeeper Distributed Process Coordination



1221、单词 decoders 的匹配文本:


  1. Compression codecs Codecs (coder/decoders) are used to compress and decompress data using various compression algorithms. Apache Flume Distributed Log Collection for Hadoop


  2. Various types of abstract classes are provided for encoders and decoders, depending on the task at hand. Netty in Action MEAP V08


  3. The Priorities class defines built-in priorities for security, decoders/encoders, and more. Java EE 7 Essentials



1222、单词 gigabyte 的匹配文本:


  1. If the ratio or the block size increases, a gigabyte of RAM will support more petabytes of physical storage, and vice versa. HDFS scalability the limits to growth


  2. HBase servers, particularly the version using memcached, are memory intensive and generally require at least a gigabyte of real memory per server; any paging will drastically affect performance. Pro Hadoop


  3. Nodes on the same rack can be interconnected with a 1 GBps (Gigabyte per second) Ethernet switch. Hadoop Operations and Cluster Management Cookbook


  4. Both have their sweet spots, but neither one alone is capable of solving a common business problem — fast access to large (megabyte or gigabyte size) data items. Professional Hadoop Solutions


  5. Unless the cumulative output from the map tasks is relatively small, less than a gigabyte, the default value should not be used. Hadoop RealWorld Solutions Cookbook


  6. A typical job will process anywhere from a gigabyte to many terabytes of data on hundreds or even thousands of machines in parallel, some executing the query while others aggregate the results. Interpreting the Data Parallel Analysis with Sawzall


  7. The data gathered included a photo taken every minute, which resulted in an overall data volume of one gigabyte per month. Hadoop:The Definitive Guide 3rd Edition


  8. Now assume your cells are, on average, 1 KB in size; in this case, the filter needs only Bloom filter of a few hundred kilobytes for a store file of one or more gigabyte. HBase:The Definitive Guide


  9. If the data is 1 gigabyte in size and on a single host, Hadoop will schedule the processing accordingly. Hadoop Beginners Guide


  10. In Example 5-16, we generate a one gigabyte file and copy it into the two separate filesystem namespaces. Hadoop Operations



1223、单词 cfg 的匹配文本:


  1. Add the following settings to each node's zoo.cfg, so that every node knows about every other node in the ensemble: HBase Administration Cookbook


  2. It references a number of files with the extension .cfg, which contains specific monitoring configurations. Hadoop Operations and Cluster Management Cookbook


  3. For example, if you’re using grub, you can add the numa=off option to grub.cfg: MongoDB The Definitive Guide 2nd Edition


  4. One of the places dupfind looks for its configuration file in the current directory is in a file named dupfind.cfg. Testable JavaScript


  5. MCollective plugins should be placed in the directory specified by the libdir setting in the server.cfg configuration file. Pro Puppet


  6. The configuration file is conventionally called zoo.cfg and placed in the conf subdirectory (although you can also place it in /etc/zookeeper, or in the directory defined by the ZOOCFGDIR environment variable, if set) Hadoop:The Definitive Guide 3rd Edition


  7. There are some ZooKeeper client settings that are not read from zoo.cfg but must be set in hbase-site.xml. HBase:The Definitive Guide


  8. An assembled image is always uniquely identified by its hypervisor specific config file (in our case vm.cfg for Oracle VM or Xen) Oracle JRockit The Definitive Guide


  9. So, first we create z1/z1.cfg using the configuration file we discussed at the beginning of this section. ZooKeeper Distributed Process Coordination


  10. Please remember to preserve the directory structure you'll see in the example deployment, so for example, the /usr/share/solr directory should contain the solr.xml (and in addition zoo.cfg in case you want to use SolrCloud) file with the contents like so: Apache Solr 4 Cookbook



1224、单词 substrings 的匹配文本:


  1. Overall, the designers of Java decided that the efficiency of sharing outweighs the inefficiency of string editing by extracting substrings and concatenating. Core Java Volume I Fundamentals 9th Edition


  2. This required preprocessing the data before indexing to convert all the interesting substrings into standalone “words.” Here’s a sample URL before and after preprocessing: High Performance MySQL 3rd Edition


  3. Table 3.2 shows some methods that can be used to manipulate substrings and individual bits of STRINGs in Redis. Redis in Action


  4. The newTuple() method creates a new tuple with the required number of fields, which is just the number of Range classes, and the fields are populated using substrings of the line, which are determined by the Range objects. Hadoop:The Definitive Guide 3rd Edition


  5. Usually, you don’t want to match the entire input against a regular expression, but to find one or more matching substrings in the input. Core Java Volume II Advanced Features 9th Edition


  6. Given a string and a delimiter, the Splitter class will produce substrings broken out by the provided delimiter. Getting Started with Google Guava


  7. Comparing substrings is bound to be inefficient or inaccurate in SQL. SQL Antipatterns


  8. The replaceFirst( ) and replaceAll( ) methods search a string for the first substring or all substrings that match a given pattern and replace the string or strings with the specified replacement text, returning a new string that contains the replacements. Java in a Nutshell 5th Edition


  9. For example, Vector.toString( ) calls toString( ) on all its elements and combines the generated substrings with the comma character surrounded by opening and closing square brackets. Java Performance Tuning 2nd Edition


  10. In order to achieve this, you’d have to decompose your words into substrings and index those. Redis Cookbook



1225、单词 nondistributed 的匹配文本:


  1. You’ll learn how a simple distributed recommender system is designed in a distributed environment, because it differs greatly from nondistributed implementations. Mahout in Action


  2. For example, consider a large data set partitioned into a collection of nondistributed databases, perhaps using a hash function. MapReduce a flexible data processing tool


  3. Since you are running each process type on one machine only, you need to consider two ports per server type—unless you run in a nondistributed setup. HBase:The Definitive Guide


  4. To lessen the burden, you should test in stages, from a nondistributed (i.e., local) mode to a single-node pseudo-distributed mode, and finally to a fully distributed mode. Hadoop in Action


  5. Cluster Configuration MapReduce and other tools can run in a nondistributed way for trying things out or troubleshooting a problem. Cassandra The Definitive Guide


  6. So when performance is bad, the application tends to slow significantly more than in nondistributed applications. Java Performance Tuning 2nd Edition



1226、单词 shakespeare 的匹配文本:


  1. For example, you could use the combined works of Shakespeare to create a profile for detecting his plays, those of his contemporaries, or modern works that mimic the Shakespearean style. Tika in Action


  2. In this recipe, we will use the Apache Mahout k-means implementation to cluster the words found in Shakespeare's tragedies. Hadoop RealWorld Solutions Cookbook


  3. That works for exploring a single user, but what if you want to calculate a statistic over all users? Given your user base, perhaps it would be interesting to know what percentage of twits are about Shakespeare. HBase in Action


  4. Here we have high-quality information about Shakespeare and some of his plays, together with details of one of the companies that has recently performed the plays, plus a theatrical venue, and some geospatial data. Graph Databases


  5. Those of you who’ve read Hamlet know that Shakespeare got some of it right: the important decision is whether you should be a slave to your invokers or take matters into your own hands. Spring Integration in Action



1227、单词 acled 的匹配文本:


  1. For the ACLED Nigeria dataset, a 512 MB memory is more than enough. Hadoop RealWorld Solutions Cookbook



1228、单词 gus 的匹配文本:


  1. She first sends Gus the key they’ll use to exchange the secret. Java Network Programming 4th Edition



1229、单词 classloading 的匹配文本:


  1. A (or one of that classloader's ancestors in the classloading hierarchy) Java Threads 3rd Edition


  2. The lifecycle layer relies on the module layer for classloading and provides a dynamic approach to bundle management, making it possible to update parts of an application without stopping it. Spring Dynamic Modules in Action


  3. Dynamic Contextual Objects Application component container contexts, such as classloading, namespace, and security, can be associated with an object instance via ContextService. Java EE 7 Essentials


  4. This means that if a large amount of classloading takes place, the permanent generation will fill up and OutOfMemoryErrors will be thrown. Oracle JRockit The Definitive Guide


  5. The simplest way to handle all this is to have a flag on which objects are conditionally passed to the monitor from the Object constructor and to have this flag in a simple class with no superclasses so that classloading does not impose extra calls to superclasses. Java Performance Tuning 2nd Edition


  6. For example, dynamic compilation allows many extensible components to be treated as if they are closed at classloading time, leading to optimizations and specializations that exploit particular run-time contexts more effectively than any programmer could. Concurrent Programming in Java Design Principles and Pattern



1230、单词 resync 的匹配文本:


  1. And if the inconsistency you discovered isn’t critical, you might be able to leave the replica online and resync only the affected data. High Performance MySQL 3rd Edition


  2. One method of addressing the slave resync issue is to reduce the total data volume that’ll be sent between the master and its slaves. Redis in Action


  3. With this, AMs can continue to progress with existing containers while the RM is down, and can resync with the RM when it comes back up. Apache Hadoop YARN Yet Another Resource Negotiator


  4. If you want to change a non-index-building member to an index-building one, you must remove it from the set, delete all of its data, re-add it to the set, and allow it to resync from scratch. MongoDB The Definitive Guide 2nd Edition


  5. To deal with this I will add two concepts to the protocol: a resync option and a cache field (a dictionary) ZeroMQ


  6. The following sections explain the three main methods you can use to resync a slave with its master. The Definitive Guide to MongoDB


  7. Because the only remedy for halted replication is a complete resync of the primary’s data, you’ll want to strive to avoid this state. MongoDB in Action



1231、单词 lda 的匹配文本:


  1. Finally, you’ll explore latent Dirichlet allocation (LDA)—an algorithm that closely resembles clustering but that achieves something far more interesting. Mahout in Action


  2. Some other example use-cases of LDA are identifying influential Twitter users for particular topics and Twahpic (http://twahpic.cloudapp. Hadoop MapReduce Cookbook



1232、单词 loc 的匹配文本:


  1. Figure 4-12 includes two aggregate graphs showing all metrics matching host regex of loc and metric regex of load. Monitoring with Ganglia


  2. Adds a "$diskLoc" field to the results that shows where on disk that particular result lives. MongoDB The Definitive Guide 2nd Edition


  3. The following screen shows what JDK 7 looks like (size is for LOC and color for Rules compliance): Sonar Code Quality Testing Essentials


  4. The columns loc and fatalities are conditionally checked for empty strings; and if found to be empty, are set to a default value. Hadoop RealWorld Solutions Cookbook


  5. The expression int(loc.lat) converts loc.lat, a float, to an integer, thereby truncating it to the degree and making it suitable as an index value. Interpreting the Data Parallel Analysis with Sawzall


  6. Buy a Feature contains 15,000 Scala lines of code (LoC) and represents about one manyear of effort. Beginning Scala


  7. After you add the data, you need to tell the MongoDB shell to create an index based on the location information that was specified in the loc key, as in this example: The Definitive Guide to MongoDB


  8. In addition to the expected city, state, and ZIP fields, you’ll see a fourth field, loc, that stores the coordinates for the geographic center of the given ZIP code. MongoDB in Action


  9. The index structure is simple, it contains the identifier (the id field), name of the company (the name field), and the geographical location of the company (the loc field) Apache Solr 4 Cookbook



1233、单词 wget 的匹配文本:


  1. Curl/wget utilities can be used for uploading data to Solr in your environment. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr


  2. But it would also be possible to use Google Chrome and for example a unix tool like wget to test for fallback to HTTPS. Netty in Action MEAP V08


  3. We can also use the following wget command to download the image file: Hadoop Operations and Cluster Management Cookbook


  4. It also assumes that you have a modern version of wget (http://www.gnu.org/s/wget/) installed. Jenkins Continuous Integration Cookbook


  5. For example, if my Jenkins server was running on http://myserver:8080/jenkins, I could start the gameoflife build job by invoking the following URL using a tool like wget or curl: Jenkins The Definitive Guide


  6. Then you obtained the library tarball by using wget and decompressed the file that you got from GitHub. RabbitMQ in Action


  7. Download a matching version of Thrift and compile it: $ wget http://apache.imghat.com/ Cassandra High Performance Cookbook


  8. Note In this section, you are using wget to download Django. Beginning CouchDB


  9. First we’ll use GNU Wget (http://mng.bz/DMf6), a popular tool for retrieving files using HTTP, to subscribe to the desired destination: ActiveMQ in Action


  10. Note that we wrapped the long line for the wget command: Programming Hive



1234、单词 orthogonal 的匹配文本:


  1. The division of inputs is orthogonal to the partitioning of the graph itself, and is typically based on file boundaries. Pregel  -  A System for Large-Scale Graph Processing


  2. Concurrency choice is orthogonal to language choice; we can program concurrency with STM from any of the JVM languages. Programming Concurrency on the JVM


  3. What is important in this context is to understand that maintaining redundant copies is orthogonal to the harder task of ensuring that the cluster consistently chooses the same partition for a particular document ID. CouchDB The Definitive Guide


  4. Thus, upgrading a cluster requires users to halt, validate, and restore their pipelines for orthogonal changes. Apache Hadoop YARN Yet Another Resource Negotiator


  5. Keeping interfaces minimal and orthogonal lets you achieve great reuse and composition of behavior inside your codebase. Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. This ensures the existence of an A-orthogonal vector at each step of the process. Professional Hadoop Solutions


  7. The advice code was often described as being orthogonal to the original code, meaning that the purposes of the two blocks of code weren’t correlated in any direct way, even though the execution sequence was. Gradle Beyond The Basics


  8. Both of these are special cases of an (orthogonal) range query. Data Structures and Algorithm Analysis in Java 3rd Edition


  9. Lastly, it’s important to note that HA and federation are orthogonal features. Hadoop Operations


  10. However, a text file could contain JSON or XML “documents.” For Hive, the file format choice is orthogonal to the record format. Programming Hive



1235、单词 decentralized 的匹配文本:


  1. Centralized Versus Decentralized A first decision we have to make is whether to work with a central server or not. ZeroMQ


  2. Although Cassandra is a completely decentralized system we have learned that having some amount of coordination is essential to making the implementation of some distributed features tractable. Cassandra A Decentralized Structured Storage System


  3. While this decentralized scheduling model may not always lead to globally optimal scheduling, we have found that it performs surprisingly well in practice, allowing frameworks to meet goals such as data locality nearly perfectly. Mesos A Platform for Fine-Grained Resource Sharing in the Data Center


  4. It is itself part of the Open Participation Software for Java (OPS4J) community, whose open source model is more decentralized and open than that of some other communities. Spring Dynamic Modules in Action


  5. The publish-subscribe channel solution, on the other hand, is decentralized and open; the routing configuration is emerging as a sum of all the conditions defined on the individual filters, and new subscribers can be added without modifying any existing component. Spring Integration in Action


  6. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.


  7. The second decision that we made is to not have a central “master” node, but instead let consumers coordinate among themselves in a decentralized fashion. Kafka a Distributed Messaging System for Log Processing


  8. It performs blazingly fast writes, can store hundreds of terabytes of data, and is decentralized and symmetrical so there’s no single point of failure. Cassandra The Definitive Guide


  9. These systems address concerns that do not arise for Bigtable, such as highly variable bandwidth, untrusted participants, or frequent reconfiguration; decentralized control and Byzantine fault tolerance are not Bigtable goals. Bigtable - A Distributed Storage System for Structured Data



1236、单词 parallelizing 的匹配文本:


  1. If you add in the needed synchronization, you’ll likely discover that thread contention robs you of all the performance that parallelism was supposed to give you! Parallelizing this computation requires a different approach: partition the input, sum the partitions, and combine the sums. Java 8 in Action Lambdas, Streams and Functional-style Programming


  2. But for many programs with CPU-intensive loops, parallelizing the loop. Java Threads 3rd Edition


  3. We are working on improving this by having multiple replicas take part in the bootstrap transfer thereby parallelizing the effort, similar to Bittorrent. Cassandra A Decentralized Structured Storage System


  4. Parallelizing the computation worked well last time, so you might as well throw more computers at it. HBase in Action


  5. The choice of splitting column is essential to parallelizing work efficiently. Hadoop:The Definitive Guide 3rd Edition


  6. On the upside, you could use multiple threads to read this data from distinct servers, therefore parallelizing read access. HBase:The Definitive Guide


  7. There are several variants to parallelizing mark and sweep beyond the scope of this chapter. Oracle JRockit The Definitive Guide


  8. In MapReduce, developers write jobs that consist primarily of a map function and a reduce function, and the framework handles the gory details of parallelizing the work, scheduling parts of the job on worker machines, monitoring for and recovering from failures, and so forth. Hadoop Operations


  9. So even on a single-CPU machine, parallelizing this calculation enables it to run faster. Java Performance Tuning 2nd Edition


  10. Second, we tailor the design for best aggregate request throughput, not peak server response time, since we can manage response times by parallelizing individual requests. Web search for a planet the google cluster architecture



1237、单词 smith 的匹配文本:


  1. Thanks to my buddy Al Smith for creating it and making it such a great place, and for being such an interesting and entertaining part of the Crested Butte experience. Thinking in Java 4th Edition


  2. That is, you won’t be able to find all people whose last name is Smith and who were born on a particular date. High Performance MySQL 3rd Edition


  3. After spending a number of years running his own web agency, managing the development team, and working for Smith Electric Vehicles on developing its web-based vehicle telematics platform, he currently serves as head developer for an ambitious new start-up: leading the development team and managing the software development processes. Jenkins Continuous Integration Cookbook


  4. For example, if you want to sort by last name first, and city second, use a key that looks like Smith^Baltimore. MapReduce Design Patterns


  5. Names such as Smith are very common while names such as Capriolo are very rare. Cassandra High Performance Cookbook


  6. Now let’s update this document with John Smith’s actual contact details. Beginning CouchDB


  7. And the response will be John Smith’s original JSON document: Elasticsearch The Definitive Guide


  8. There’s enough information in this message to let someone snooping packets use John Smith’s credit card number for nefarious purposes. Java Network Programming 4th Edition


  9. Michael O’Brien spent many long nights translating our chapterware into running code, and probably got more than he bargained for! Thanks to Doug Clarke and Shaun Smith for spreading the word that a JPA book was available, and to Dennis Leung for offering his full support of my writing this book. Pro JPA2


  10. To take an example, suppose that user smith decides to add her country of residence. MongoDB in Action



1238、单词 rereduce 的匹配文本:


  1. The rereduce is a boolean value that is used to indicate when the reduce function is being called by itself (i.e., in rereduce mode) Getting Started with CouchDB


  2. If you’d like to count rows without depending on the row value, you can switch on the rereduce parameter: CouchDB The Definitive Guide


  3. When this happens, the data will be processed by the reduce function before sending the result to the reduce function with the rereduce argument set to true. Beginning CouchDB



1239、单词 appender 的匹配文本:


  1. One way to avoid this problem is to use the Flume Log4J Appender in your Java application(s) Apache Flume Distributed Log Collection for Hadoop


  2. Provide Scanner and Appender interfaces – Specialized to structured data. Introduction to Tajo


  3. A scanner reads input data from HDFS or local file system, whereas an appender writes output data to either of them. Tajo A Distributed Data Warehouse System on Large Clusters


  4. The AppenderBase class defines a single abstract method as follows: Storm Blueprints Patterns for Distributed Real-time Computation


  5. Log4j also has a number of builtin appenders such as the SyslogAppender used in this recipe. Cassandra High Performance Cookbook


  6. Loggers output their log events to an appender which is responsible to handling the event in some meaningful way. Hadoop Operations


  7. The default set here says that messages below the INFO level should be discarded and messages should be output using the CONSOLE appender. ZooKeeper Distributed Process Coordination


  8. A special log appender valve may have to be written for GlassFish to seamlessly integrate with these solutions, the implementation details of which are beyond the scope of this book. Java Performance


  9. For example, here we set the default logger to the DEBUG level and send output to the console appender: Programming Hive



1240、单词 tla 的匹配文本:


  1. We refer to these thread local buffers as Thread Local Areas (TLA) Oracle JRockit The Definitive Guide



1241、单词 sakai 的匹配文本:


  1. He has also co-authored two books about Sakai (http://sakaiproject.org)—a highly successful open source learning management platform used by many millions of students around the world. Jenkins Continuous Integration Cookbook



1242、单词 lexicographically 的匹配文本:


  1. The net result is a single part file that is output from the reducer with a list of locations in lexicographically sorted order. Hadoop RealWorld Solutions Cookbook


  2. It orders numeric data numerically, Strings (chararray) lexicographically, and bytearray as binary data. Hadoop in Practice


  3. The first field, left, is a UTF-8-encoded string, for which Avro can compare the bytes lexicographically. Hadoop:The Definitive Guide 3rd Edition


  4. All rows are always sorted lexicographically by their row key. HBase:The Definitive Guide


  5. Note that the rows are sorted lexicographically because Streaming processes everything as text and doesn’t know other data types. Hadoop in Action


  6. You can also use the compareTo method to compare two paths lexicographically using an implementation of the Comparable interface. Java 7 New Features Cookbook


  7. What you can do, however, is sort as if the column were one of several different types (ASCII, Long integer, TimestampUUID, lexicographically, etc.) Cassandra The Definitive Guide


  8. Since the SSTables and the memtable are lexicographically sorted data structures, the merged view can be formed efficiently. Bigtable - A Distributed Storage System for Structured Data


  9. For our purposes we chose a very easy to implement heuristic which in practice gives good results: we sort lexicographically by the field order chosen for the partitioning. PowerDrill - Processing a Trillion Cells per Mouse Click


  10. The result will be a negative integer if the String lexicographically precedes the argument String. Java 7 Recipes A Problem-Solution Approach



1243、单词 stdin 的匹配文本:


  1. If you specify neither of these, stdin will be used. Apache Flume Distributed Log Collection for Hadoop


  2. You can simply run it on any fi le or type in your input through STDIN to load it in Apache Solr. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr


  3. One practical example is in Unix or Linux, where many programs operate by reading data from standard input (stdin in Unix and C, System.in in Java), operating on it, and then writing their results to standard output (stdout in Unix and C, System.out in Java) Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. Both mappers and reducers receive their input on stdin and emit output (key/value pairs) to stdout. Professional Hadoop Solutions


  5. Although put is slightly more general, it is able to copy multiple files into HDFS, and also can read input from stdin. Hadoop RealWorld Solutions Cookbook


  6. The program iterates over lines from standard input by executing a block for each line from STDIN (a global constant of type IO) Hadoop:The Definitive Guide 3rd Edition


  7. Inputs come in through STDIN and outputs go to STDOUT. Hadoop in Action


  8. Alternatively, you can pass images to the client through stdin. admin-user-guide-trunk


  9. Pig instantiates the executable and keeps feeding data to it via stdin. Programming Pig


  10. The same thing is done when using the STDIN redirection such as shown in the example. OpenStack Operations Guide



1244、单词 arrayref 的匹配文本:


  1. Description The arrayref must be of type reference and must refer to an array whose components are of type reference. The Java Virtual Machine Specification Java SE 7 Edition



1245、单词 mpstat 的匹配文本:


  1. In addition to these tools, your operating system might provide others, such as mpstat or sar. High Performance MySQL 3rd Edition


  2. Finally, mpstat is useful because it gives statistics broken down by CPU, and not aggregated across all the CPUs, as other commands will do. Hadoop in Practice


  3. Solaris and Linux also offer a tabular view of CPU utilization for each virtual processor using the command line tool mpstat. Java Performance



1246、单词 geolocation 的匹配文本:


  1. The weblog data is parsed, summarized, and combined with the IP address geolocation data. Hadoop RealWorld Solutions Cookbook


  2. Use th compre You’ll geolocate the IP addresses from the logs table using the free geolocation database from MaxMind. Hadoop in Practice


  3. Geolocation (TODO) Adding geolocation to your documents Geolocation-aware search Sorting by distance Geo-shapes Optimizing geo-queries 24 Elasticsearch The Definitive Guide


  4. Other missing types include XML, image, and geolocation (the lat-long variety) Hadoop in Action


  5. Both hotels and points of interest need to maintain geolocation data so that they can be found on maps for mashups, and to calculate distances. Cassandra The Definitive Guide


  6. Such data might include zipcode tables, IP geolocation tables, parts catalogs, and so on. The Definitive Guide to MongoDB


  7. A popular operation is determining the geolocation of web traffic based on the IP address. Programming Hive


  8. In the following example, we are going to disable Geolocation from our tests. Selenium 2 Testing Tools Beginner's Guide



1247、单词 closeable 的匹配文本:


  1. It is a subinterface of AutoCloseable, also with a single close method. Core Java Volume I Fundamentals 9th Edition


  2. Therefore, you can use the try-with-resources statement with any Closeable. Core Java Volume II Advanced Features 9th Edition


  3. The Closer class, which gives us a very clean way of ensuring Closeable instances are properly closed. Getting Started with Google Guava


  4. Any objects created with the try-with-resources block must implement the AutoCloseable interface. Java 7 New Features Cookbook


  5. Java 5.0 adds the Closeable and Flushable interfaces to identify types that have close( ) and flush( ) methods. Java in a Nutshell 5th Edition


  6. Java automatically invokes close() on any AutoCloseable objects declared inside the argument list of the try block. Java Network Programming 4th Edition


  7. Also, third-party implementers can create resources that will work with the try-with-resources statements by implementing the AutoCloseable interface. Java 7 Recipes A Problem-Solution Approach


  8. Use the try-with-resources statement with any object that implements AutoCloseable. Java SE 8 for the Really Impatient



1248、单词 ziplist 的匹配文本:


  1. When using short LISTs, HASHes, and ZSETs, Redis can optionally store them using a more compact storage method known as a ziplist. Redis in Action



1249、单词 notifier 的匹配文本:


  1. But you should complement this with one of the more active strategies, such as instant messaging or a desktop notifier. Jenkins The Definitive Guide


  2. Defined in rpc_notifier for rpc way, can be comma separated values. bk-admin-guide-cloud-latest


  3. This listener uses the notifier when a job execution fails. Spring Batch in Action


  4. Why can the previous snippet be considered tightly coupled? The reason is that the notification technology is concretely defined using the JmsNotifier property. Spring Dynamic Modules in Action


  5. NewsNotifierBolt Tells the web application to update the user interface immediately. Getting Started with Storm


  6. In parallel, the integration team replaces the basic notifier with a bus so they can connect multiple sources of notifications. Spring Integration in Action



1250、单词 mongofiles 的匹配文本:


  1. Getting Started with GridFS: mongofiles The easiest way to try out GridFS is by using the mongofiles utility. MongoDB The Definitive Guide 2nd Edition


  2. Rather than describe all the options you can use with mongofiles, let’s jump right in and start playing with some of the tool’s features. The Definitive Guide to MongoDB


  3. The GridFS specification is implemented by all of the official drivers and by MongoDB’s mongofiles tool, ensuring consistent access across platforms. MongoDB in Action



1251、单词 lexically 的匹配文本:


  1. This can be used to lexically scope certain features of an API. Scala in Depth


  2. Creating a Custom Mapper and Reducer As you’ve seen, your first Hadoop job, in MapReduceIntro, produced sorted output, but the sorting was not suitable, as it sorted lexically rather than numerically, and the keys for the job were numbers. Pro Hadoop


  3. It is the responsibility of a Java compiler to ensure that the method identified via the method_index is indeed the closest lexically enclosing method of the class that contains this EnclosingMethod attribute. The Java Virtual Machine Specification Java SE 7 Edition


  4. In this case you’re importing the Random class defined in the scala.util package in the Scala code block, and it’s lexically scoped inside the block and won’t be available outside it. Scala in Action


  5. A class O is the zeroth lexically enclosing class of itself. The Java Language Specification Java SE 7 Edition


  6. Java is a lexically scoped language, which means that its concept of scope has to do with the way the source code is written. Java in a Nutshell 5th Edition


  7. Data is sorted based on the types of the indicated fields: numeric values are sorted numerically, chararray fields are sorted lexically, and bytearray fields are sorted lexically, using byte values rather than character values. Programming Pig


  8. A system developed at Princeton University’s Cognitive Science Laboratory, driven by Psychology Professor George Miller, illustrates the net of synonyms.8 WordNet represents word forms that are interchangeable, both lexically and semantically. Lucene in Action 2nd Edition



1252、单词 popup 的匹配文本:


  1. If we go back a page, we will get a nice popup asking if we want to resubmit the form. Pro Spring MVC


  2. For example, if the user clicks the Send button, you may wish to display a popup or perhaps log the action in a file. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. There is no name or title provided for Chat Page Popup //We will iterate through all the open Windows and check the //contents to find //out if it's Chat Window. Selenium Testing Tools Cookbook


  4. The setMillisToPopup is your estimation of the time the dialog box needs to pop up. Core Java Volume II Advanced Features 9th Edition


  5. The following screenshot shows an example of the window type Type.POPUP: Java 7 New Features Cookbook


  6. Click OK (on each of the popup boxes that were opened before) to accept the changes. Java 7 Recipes A Problem-Solution Approach


  7. Verify the text in the popup by right-clicking and selecting VerifyText id=popup text within the popup window. Selenium 2 Testing Tools Beginner's Guide



1253、单词 apr 的匹配文本:


  1. Still, there are some undesired words, like 7-apr-1987, said, he, and so on. Mahout in Action


  2. So rather than reinvent a new type of modular interface, why not just reuse a tried and true interface? Of course, the fact that gmond is built on top of the Apache Portability Runtime (APR) libraries made the Apache way of implementing a modular interface an obvious fit. Monitoring with Ganglia


  3. INFO: The APR based Apache Tomcat Native library which allows optimal performance in production environments was not found on the java.library. Jenkins Continuous Integration Cookbook



1254、单词 itds 的匹配文本:


  1. These ITDs are the magic behind Spring Roo and store all the logic generated and maintained by Roo. Pro Spring 3


  2. Roo automatically creates the service and repository beans, and their respective ITDs: Spring Roo in Action


  3. There is, for instance, an @RooJavaBean annotation that triggers the generation of an AspectJ aspect declaration that provides ITDs that introduce getters and setters in your Java class. Spring Data Modern Data Access for Enterprise Java



1255、单词 subscribes 的匹配文本:


  1. All you need to do is write a small app that connects to RabbitMQ and subscribes to the authorization requests your auth module is already publishing. RabbitMQ in Action


  2. I’ve added a service definition that subscribes to the ntp package and its configuration file. Managing Infrastructure with Puppet


  3. A subscriber subscribes with a publisher to be notified of any published events. Programming in Scala 2nd Edition


  4. The following command is used for starting the console-based consumer that shows output at command line as soon as it subscribes to the topic created in Kafka broker: Apache Kafka


  5. Having a class that subscribes for DeadEvent instances can be very helpful when trying to ensure that all events have registered subscribers. Getting Started with Google Guava


  6. The consumer registry includes the consumer group to which a consumer belongs and the set of topics that it subscribes to. Kafka a Distributed Messaging System for Log Processing


  7. Then, similar to the Java examples, it creates a connection, adds a listener, starts a connection, and finally subscribes to the desired destinations. ActiveMQ in Action


  8. The method subscribes or unsubscribes the sender of the message depending on the start of the subject line (This is akin to a mailing list, where sending a message with the subject of “subscribe” adds the sender to the mailing list.) Java 7 Recipes A Problem-Solution Approach


  9. The optimistic locking model subscribes to the philosophy that there is a good chance that the transaction in which changes are made to an entity will be the only one that actually changes the entity during that interval. Pro JPA2


  10. In the request-reply pattern, the client subscribes to a destination expecting a one-time response at that destination. Spring in Action 4th Edition



1256、单词 emulated 的匹配文本:


  1. These emulated decisions are the end product of the classification system. Mahout in Action


  2. The average computer must be capable of running Java code without new chips, so a "virtual" machine is emulated. Java Network Programming and Distributed Computing


  3. We have just emulated one user and essentially repeated the process five times. Performance Testing With JMeter 2.9


  4. The first prototype implementation of the Java Virtual Machine, done at Sun Microsystems, Inc., emulated the Java Virtual Machine instruction set in software hosted by a handheld device that resembled a contemporary Personal Digital Assistant (PDA) The Java Virtual Machine Specification Java SE 7 Edition


  5. With the help of a test automation framework, you remote-controlled the browser and emulated user interaction. Gradle in Action


  6. This functionality is also emulated with condition variables using the. Java Threads 3rd Edition


  7. A general set can be emulated by using a MapWritable (or a SortedMapWritable for a sorted set) with NullWritable values. Hadoop:The Definitive Guide 3rd Edition


  8. Multiple secondary indexes can be emulated by using multiple column families—although that is not the recommended way of designing a schema. HBase:The Definitive Guide


  9. In order to reconstruct an expression, such as add, the contents of the execution stack must be emulated at any given point in the program. Oracle JRockit The Definitive Guide


  10. This behavior of the Timestamp class was a mistake and should not be emulated. Effective Java 2nd Edition



1257、单词 queens 的匹配文本:


  1. An imperative solution to this problem would place queens one by one, moving them around on the board. Programming in Scala 2nd Edition


  2. You want to store that data closer to the Midtown data than, say, data about Brooklyn or Queens. HBase in Action


  3. Two queens are said to attack each other if they are on the same row, column, or (not necessarily main) diagonal. Data Structures and Algorithm Analysis in Java 3rd Edition


  4. Imagine if you had a deck of cards and you were asked to remove the odd-numbered cards and then remove all the queens. Functional Programming in Scala


  5. For example, here is a class that solves the classic N-Queens problem, searching for the placement of N queens that do not attack each other on a chessboard of size NxN. Concurrent Programming in Java Design Principles and Pattern



1258、单词 matchers 的匹配文本:


  1. To effectively work with Specs, you need to get comfortable with specifications and the available matchers. Scala in Action


  2. At this point, we have a union of two MethodMatchers: one that matches all methods starting with get and one that matches all methods starting with set. Pro Spring 3


  3. Jasmine matchers (toEqual in the previous example) are equivalent to YUI Test assertions. Testable JavaScript


  4. To enable support for using these matchers, you simply need to add the attribute request-matcher to the

    element specifying the type of matcher your patterns will use within the values ant, regex, and ciRegex. Pro Spring Security


  5. For running unit tests we use junit, as well as a couple of helper libraries: hamcrest-all provides useful matchers for writing test assertions, and mrunit is used for writing MapReduce tests. Hadoop:The Definitive Guide 3rd Edition


  6. This test framework builds on top of Hamcrest to offer custom matchers that can be used with assertThat. Spring Integration in Action


  7. Specs provides a lot of different matchers that allow you to test Strings by testing them against a regular expression: Beginning Scala


  8. Boundary matchers These are special symbols that should be used when it matters where the string that will be matched is located. Steps in Scala An Introduction to Object-Functional Programming


  9. You also need to know the exact value that you want to remove—you can’t apply regular expressions or other matchers and you can’t remove by index. Redis Cookbook


  10. The first call to antMatchers() specifies that requests whose path is /spitters/me should be authenticated. Spring in Action 4th Edition



1259、单词 gif 的匹配文本:


  1. For example, suppose the user should choose a GIF image file. Core Java Volume I Fundamentals 9th Edition


  2. For example, any sort of dynamic graphing is nearly impossible to perform with consistency because a Graphics Interchange Format (GIF) file must be created and moved from the server to the client for each version of the graph. Thinking in Java 4th Edition


  3. Other formats that are supported include extracting metadata from images such as JPG, GIF, and PNG, as well as from various audio formats such as MP3, MIDI, and Wave audio. Solr 3 Enterprise Search Server


  4. The image is in GIF format and is less than 4KB in size. Beginning CouchDB


  5. The objects that are returned by standard content types such as text/plain and image/gif require classes in the com.sun hierarchy for processing. Core Java Volume II Advanced Features 9th Edition


  6. It could well be pointing to a GIF or JPEG image, an MP3 sound file, or something else entirely. Java Network Programming 4th Edition


  7. Java can currently load .jpg, .gif, and .png image formats. Java 7 Recipes A Problem-Solution Approach


  8. The accept attribute is set to limit file types to JPEG, PNG, and GIF images. Spring in Action 4th Edition



1260、单词 simplification 的匹配文本:


  1. A simplification that results from this decision is that, in the first pass, using Text is acceptable for the key and value, as the records may be distinguished lexically. Pro Hadoop


  2. MapReduce can be considered a simplification and distillation of some of these models based on our experience with large real-world computations. MapReduce - Simplied Data Processing on Large Clusters


  3. Over the past few years, new Domain Specific Languages (DSLs) have been developed for the simplification of Hadoop MapReduce programming, and this is a growth area of Hadoop — especially in the area of graph processing. Professional Hadoop Solutions


  4. But the rewards—both in terms of the simplification of program logic and. Java Threads 3rd Edition


  5. The sorter takes the barrels, which are sorted by docID (this is a simplification, see Section 4.2.5 in the full version), and resorts them by wordID to generate the inverted index. The anatomy of a large-scale hypertextual Web search engine


  6. So, for simplification, small methods are frequently inlined, replacing the call with the code of the called function. Oracle JRockit The Definitive Guide


  7. Chubby used few of the features of Berkeley DB, and so this rewrite allowed significant simplification of the system as a whole; for example, while we needed atomic operations, we did not need general transactions. Chubby - The lock service for loosely-coupled distributed systems


  8. This is not an inherent limitation of the technique, but a simplification that makes our code easier to follow. Hadoop in Action


  9. That's all there is to it! As you've seen, each MapReduce program sits atop a significant amount of machinery provided by Hadoop and the sketch provided is in many ways a simplification. Hadoop Beginners Guide


  10. The JPA specification is a simplification over the EJB 2.1 persistent entity programming model. Java Performance



1261、单词 lcov 的匹配文本:


  1. When all the tests are finished, the global _yuitest_coverage variable will be available to be persisted, and will be converted to LCOV format and optionally HTML-ized. Testable JavaScript



1262、单词 jim 的匹配文本:


  1. Amusingly, the company that did was led by the same Jim Clark who started Netscape—a company that did much to make Java successful.) Core Java Volume I Fundamentals 9th Edition


  2. Jim Gray introduced a contest called the TeraByteSort, which was a benchmark to sort one terabyte of data and write the results to disk. Pro Hadoop


  3. Thank you to my father, Jim, who has always worked his socks off to make sure that I had everything I could ever need or want. Beginning CouchDB


  4. The startup Powerset decided to dedicate Jim Kellerman and Michael Stack to work on this Bigtable analog as a way of contributing back to the open source community on which it relied.9 HBase in Action


  5. Figure 7.13 shows a network of people with Jim, one of the users, highlighted. Hadoop in Practice


  6. In February 2007, Mike Cafarella made a code drop of a mostly working system that Jim Kellerman then carried forward. Hadoop:The Definitive Guide 3rd Edition


  7. This Nutch distributed filesystem would later grow up to be HDFS.) Jim Kellerman of Powerset took Mike’s dump and started filling in the gaps, adding tests and getting it into shape so that it could be committed as part of Hadoop. HBase:The Definitive Guide


  8. Marc Loy and Jim Elliott reviewed some of the most bleeding edge material in the book. Java Network Programming 4th Edition


  9. On the other hand, Jim Elliott wanted me to point out that custom tags are so much better than the alternative of mixing presentation and logic that eliminating custom tags may not be worth the performance gain.) Java Performance Tuning 2nd Edition


  10. A big thanks to Jim Weaver for recommending me for this project and being so encouraging. Java 7 Recipes A Problem-Solution Approach



1263、单词 castor 的匹配文本:


  1. Classes for abstraction of XML marshaling and unmarshaling and support for popular tools like Castor, JAXB, XMLBeans, XStream, and so on, are packed into this module. Pro Spring 3


  2. The OXM module provides an abstraction layer that offers simplified and consistent support for popular Object/XML mapping tools such as Castor, the Java Architecture for XML Binding (JAXB), JiBX, XMLBeans, and XStream. Spring in Practice


  3. This marshaller uses Castor through the Spring OXM class CastorMarshaller, which implements both the Marshaller and Unmarshaller interfaces. Spring Batch in Action



1264、单词 javap 的匹配文本:


  1. You can use javap to generate additional examples of compiled methods. The Java Virtual Machine Specification Java SE 7 Edition


  2. To see what really happens, you can decompile the above code using the javap tool that comes as part of the JDK. Thinking in Java 4th Edition


  3. You could use the Java class file disassembler javap to disassemble Scala byte code (chapter 11 looks into this in more detail) as you could for Java classes. Scala in Action


  4. You can find out what translation your current Scala compiler uses by examining the “.class” files with tools like javap. Programming in Scala 2nd Edition


  5. The scalap, javap, and jad Command-Line Tools When you are learning Scala and you want to understand how Scala constructs are mapped to the runtime, there are several decompilers that are very useful. Programming Scala


  6. NOTE: To see these methods with your own eyes, compile the Person class and then look at the bytecode with javap: Scala for the Impatient


  7. Bytecode for a class can be dumped using the javap command with the –c command-line switch. Oracle JRockit The Definitive Guide


  8. First, run the javap program to find out how the compiler translates the fun method. Core Java Volume II Advanced Features 9th Edition


  9. You may want to use the javap disassembler to disassemble some of the class files for nested types so you can see what tricks the compiler has used to make the nested types work. Java in a Nutshell 5th Edition


  10. A compiler is not obliged to use the second type of switch bytecode at all, but generally it does if it can easily be used.) You can determine which switch a particular statement has been compiled into using javap, the disassembler available with the JDK. Java Performance Tuning 2nd Edition



1265、单词 blackhole 的匹配文本:


  1. However, the server writes queries against Blackhole tables to its logs, so they can be replicated or simply kept in the log. High Performance MySQL 3rd Edition


  2. If you want to avoid a warning when restarting apache2, create a blackhole directory in the dashboard directory like so: bk-compute-adminguide-grizzly


  3. On Ubuntu: If you want to avoid a warning when you restart apache2, create a blackhole directory in the dashboard directory, as follows: bk-admin-guide-cloud-latest


  4. These real-time blackhole lists need to respond to queries extremely quickly, and process a very high load. Java Network Programming 4th Edition


  5. Those who need to integrate their storage engine into other versions are advised to search (case-insensitive) for the string “blackhole” in the source tree of the given version, and follow the patterns of the blackhole storage engine. Understanding MySQL Internals



1266、单词 mp3 的匹配文本:


  1. The DataGrid is followed by a VBox containing an Image to show the front of the album along with song information, and a MediaPlayback control that will play MP3 files. Thinking in Java 4th Edition


  2. For example, suppose that you are running an online store and someone searches for mp3 MongoDB The Definitive Guide 2nd Edition


  3. That allows you to double-click on an MP3 attachment in your. Java Threads 3rd Edition


  4. Aside from his work at Core, Joe has worked on several successful web development projects, including Learn French by Podcast, a language-learning web site that offers its members free highquality MP3 podcasts and allows them to purchase accompanying professional PDF guides for a small fee. Beginning CouchDB


  5. For you audiophiles, it’s a bit like an MP3 of your source recording. HBase in Action


  6. A table without a primary key is like organizing your MP3 collection with no song titles. SQL Antipatterns


  7. This then proceeds down the music directory and to the mp3 file. Java 7 New Features Cookbook


  8. It could well be pointing to a GIF or JPEG image, an MP3 sound file, or something else entirely. Java Network Programming 4th Edition


  9. Readers are very welcome to use all these tools to implement a simple MP3 player. Steps in Scala An Introduction to Object-Functional Programming


  10. Solution Create an MP3 player by utilizing the following classes: Java 7 Recipes A Problem-Solution Approach



1267、单词 recompiling 的匹配文本:


  1. Editing and recompiling a Java file weekly is more tedious. Core Java Volume I Fundamentals 9th Edition


  2. It is possible to increase this value by recompiling Ganglia; alternatively, you could also split the value into multiple metrics. Monitoring with Ganglia


  3. Even if tune( ) is in a separate file and new methods are added to the interface of Instrument, tune( ) will still work correctly, even without recompiling it. Thinking in Java 4th Edition


  4. The MapReduce community has made sure that applications written against 1.x can run on top of YARN in a fully binary compatible manner (mapred APIs) or just by recompiling (source compatibility for mapreduce APIs) Apache Hadoop YARN Yet Another Resource Negotiator


  5. Recompiling the application produces errors because it depends on the Resizable interface. Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. As a result, in the most simplistic case, existing MapReduce applications will work as is, but will require recompiling. Professional Hadoop Solutions


  7. Then, recompiling Super and executing this new binary with the original binaries for Test and Hyper produces the output: The Java Language Specification Java SE 7 Edition


  8. Possibly this involves going over a large number of recent source code check-ins, recompiling the application at different changes and rerunning the affected application until the guilty check-in is spotted. Oracle JRockit The Definitive Guide


  9. You can add or reorder constants in an enum type without recompiling its clients because the fields that export the constants provide a layer of insulation between an enum type and its clients: the constant values are not compiled into the clients as they are in the int enum pattern. Effective Java 2nd Edition


  10. Although you can specify this in code, it’s usually advisable to set this up in a configuration file so log locations can be changed without recompiling. Java Network Programming 4th Edition



1268、单词 resultset 的匹配文本:


  1. In later sections of this chapter, you will see examples to retrieve the data via JDBC from the database and directly map the resultset into Java objects (i.e., POJOs) Pro Spring 3


  2. I rounded up this chapter and this part of the book by covering some of CouchDB’s builtin specialized views for retrieving all documents and some of the parameters that can be used to manipulate the resultset returned by these views. Beginning CouchDB


  3. This is the query that will determine which documents are included in our resultset— we can trim the. Elasticsearch The Definitive Guide



1269、单词 scp 的匹配文本:


  1. If you are on a Unix-flavored machine, chances are that you already have the scp command-line utility handy. Performance Testing With JMeter 2.9


  2. This time we use SSH, the secure protocol upon which SCP is based. High Performance MySQL 3rd Edition


  3. You may know that transferring a file to a remote machine running a SSH daemon can be achieved with Secure Copy (SCP) Gradle in Action


  4. The SCP task (http://Ant.apache.org/manual/Tasks/scp.html) is run a large number of times across many servers. Jenkins Continuous Integration Cookbook


  5. In the following sample, we are using the scp ANT optional task. Gradle Effective Implementation Guide


  6. For a PHP application, an FTP or SCP file transfer may suffice. Jenkins The Definitive Guide


  7. Several recipes in this chapter will use password-less access to the OpenSSL tools such as ssh, scp, and rsync. Cassandra High Performance Cookbook


  8. When the SSH service is enabled in a running virtual machine image, the virtual machine will answer SCP and SFTP requests, given some preconfigured authentication policy. Oracle JRockit The Definitive Guide


  9. You’ll copy your application code to the master node in your Hadoop EC2 cluster using scp. Hadoop in Action


  10. The act of copying files to or from HDFS is more like SCP or FTP than working with an NFS mounted filesystem, for example. Hadoop Operations



1270、单词 reboots 的匹配文本:


  1. You need to set vm.swappiness in the /etc/sysctl.conf file, so that the setting is enabled whenever the system reboots. HBase Administration Cookbook


  2. Also, our cron job runs frequently enough that if the tmpfs is cleared (for instance, if the server reboots), our window of lost data is small. Monitoring with Ganglia


  3. Ephemeral storage exists only for the life of an instance, it will persist across reboots of the guest operating system but when the instance is deleted so is the associated storage. bk-compute-adminguide-grizzly


  4. If your build server is a Windows box, for example, you probably should install Tomcat as a Windows service, so that you can ensure that it starts automatically whenever the server reboots. Jenkins The Definitive Guide


  5. It persists across reboots of the guest operating system, but when the instance is deleted, the ephemeral storage is also removed. bk-admin-guide-cloud-latest


  6. Things like kernel upgrades, minor reboots, and so on become impossible to do without downtime. HBase in Action


  7. For node reboots or other short outages, however, this is not necessary—the recent PG logs are sufficient to quickly resynchronize replicas. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.


  8. Kernel parameters should be configured in /etc/sysctl.conf so that settings survive reboots. Hadoop Operations


  9. There would be little point in doing this if the machine used only one or two connections per hostname between successive reboots. Java Performance Tuning 2nd Edition


  10. Validating and Repairing Your Data It is possible that your data will be left in a damaged or incomplete state if your server unexpectedly reboots or your MongoDB server crashes for any reason. The Definitive Guide to MongoDB



1271、单词 tls 的匹配文本:


  1. Among these are codecs for various protocols including HTTP and SSL/TLS. Netty in Action MEAP V08


  2. You might be tempted to not implement TLS, leaving your packets open. Jenkins Continuous Integration Cookbook


  3. To change this behavior we are going to switch to SSL (Secure Socket Layer, which is now called TLS, or Transport Layer Security, its successor, but for consistency we’ll call it SSL), whenever a user logs in. Pro Spring MVC


  4. Client certificate authentication is also known as mutual authentication and is part of the Secure Sockets Layer (SSL) protocol and its successor, Transport Layer Security (TLS) Spring Security 3.1


  5. Since later versions of the protocol can support earlier versions, the string TLS provides the most generic instance of an SSL context. Java Security 2nd Edition


  6. There is some limited support for TLS or SSL, but only if your LDAP server does not require client-side certificates. Pro Puppet


  7. A comma-delimited list of SSL/ TLS cipher suites to enable. Oracle JRockit The Definitive Guide


  8. Algorithm restrictions can also be placed at the TLS level. Java 7 New Features Cookbook


  9. This package defines an API for secure network sockets using the SSL (Secure Sockets Layer) protocol, or the closely related TLS (Transport Layer Security) protocol. Java in a Nutshell 5th Edition


  10. Defaults to env[OS_CACERT] --insecure            Explicitly allow keystoneclient to perform "insecure" TLS (https) requests. admin-user-guide-trunk



1272、单词 uat 的匹配文本:


  1. So, for instance, test plans recorded against the User Acceptance Test (UAT) environment can be run in production if those two environments bear a resemblance in structure. Performance Testing With JMeter 2.9


  2. A similar process has to be followed for setting up the hardware and software infrastructure for other environments (for example, UAT and production) that are part of the deployment pipeline. Gradle in Action


  3. The application is automatically deployed into test environments for testing by the QA team either as changes are committed, or on a nightly basis; a version can be deployed (or “promoted”) to UAT and possibly production environments using a manually-triggered build when testers consider it ready. Jenkins The Definitive Guide


  4. You will need to have these databases in your UAT, QA, and Dev environments. NoSQL Distilled



1273、单词 x86 的匹配文本:


  1. The success of NOW led to a following project, the Millennium Project, that aimed to support even larger clusters built on x86 hardware and distributed across the Berkeley campus. Monitoring with Ganglia


  2. Solaris is the leader on SPARC hardware, and it runs on x86 hardware too. High Performance MySQL 3rd Edition


  3. Specifically for virtualization on certain hypervisors on the node or nodes running nova-compute, you need a x86 machine with an AMD processor with SVM extensions (also called AMD-V) or an Intel processor with VT (virtualization technology) extensions. bk-compute-adminguide-grizzly


  4. VirtualBox and the Android-x86 project There are a number of options for running Android apps. Jenkins Continuous Integration Cookbook


  5. An example of the yum repository configuration for the x86_64 architecture is: Pro Puppet


  6. Then x86 will be the only architecture on which the program can run. Oracle JRockit The Definitive Guide


  7. While not strictly necessary, machines in a Hadoop cluster are usually relatively homogeneous x86 Linux boxes. Hadoop in Action


  8. On workloads with a much larger number of runnable threads, especially threads that experience CPU stalls, the SPARC T-series will likely perform better than an x86/x64 quad core processor since the time it takes to switch between hardware threads on a SPARC T-series is faster than the time it takes for a thread context switch on a single hardware thread per core architecture because the thread context switch may require CPU caches to be primed with data, which means the switched-to-thread will waste clock cycles waiting for data to be loaded from memory. Java Performance


  9. The servers run the Linux operating system on x86 processors; each machine is connected to several commodity SATA drives. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications


  10. On an x86 or Alpha Linux, the MySQL server binary is capable of unwinding its own stack and printing the stack trace when it receives a fatal signal such as SIGSEGV. Understanding MySQL Internals



1274、单词 porting 的匹配文本:


  1. It attempts to maintain compatibility with the (sequential) BGL [43] to facilitate porting algorithms. Pregel  -  A System for Large-Scale Graph Processing


  2. Having a fixed size for number types eliminates a major porting headache. Core Java Volume I Fundamentals 9th Edition


  3. Software written for Java can then be executed on any CPU type and operating system that supports Java, without the need to modify and convert source code (a process known as porting) Java Network Programming and Distributed Computing


  4. However, simply porting these database-oriented structures into a MapReduce-based data warehouse system cannot fully satisfy all four requirements. RCFile A Fast and Space-efficient Data Placement Structure in MapReduce-based Warehouse Systems


  5. By porting Storm on YARN a great deal of flexibility in resource allocation can be unblocked. Apache Hadoop YARN Yet Another Resource Negotiator


  6. Because Lucene’s Directory APIs expose filesystem semantics, a “standard” way to implement a new Lucene back end is to impose such semantics on every new back end, which is not always the simplest (most convenient) approach to porting Lucene. Professional Hadoop Solutions


  7. As an interesting follow-up, a paper was published in 201120 that explores methods for porting traditional data structures like quad-trees and kd-trees to HBase in the form of a secondary index. HBase in Action


  8. Once this is complete, it will be added as the thrift2 package so that you can maintain your existing code using the older schema, while working on porting it over to the new schema. HBase:The Definitive Guide


  9. As you can see, the NMS API is practically identical to the JMS API, which can greatly simplify developing and porting message-based applications. ActiveMQ in Action


  10. Without Hive, developers would face a daunting challenge when porting their SQL applications to Hadoop. Programming Hive



1275、单词 chars 的匹配文本:


  1. They do not support TEXT or BLOB column types, and they support only fixed-size rows, so they really store VARCHARs as CHARs, which can waste memory. High Performance MySQL 3rd Edition


  2. Listing 7.11 shows a ByteToCharDecoder, which decodes bytes to chars and will be later combined. Netty in Action MEAP V08


  3. The hash code for an Int is the value of the Int, as are the hash codes of Shorts, Bytes, and Chars when automatically widened to Int. Programming in Scala 2nd Edition


  4. In addition to a possible loss of information about the magnitude of the numeric value, this may cause the resulting value to be a negative number, even though chars represent 16-bit unsigned integer values. The Java Language Specification Java SE 7 Edition


  5. Compiling this file and decompiling the resulting class file with javap AllOpChars yields the following Java. Programming Scala


  6. You can obtain a char array that holds the characters of a string with toCharArray( ), or use getChars( ) to copy just a selected region of the string into an existing array. Java in a Nutshell 5th Edition


  7. The writeChars() method simply iterates through the String argument, writing each character in turn as a two-byte, big-endian Unicode character (a UTF-16 code point, to be absolutely precise) Java Network Programming 4th Edition


  8. FloatingDecimal stores the digits of the floating-point number as an array of chars when the FloatingDecimal is created; no strings are created until the floating-point number is converted to a string. Java Performance Tuning 2nd Edition


  9. A String is a sequence of Chars that is enclosed in double quotes: Steps in Scala An Introduction to Object-Functional Programming


  10. The CharSequence interface has methods codePoints and chars that yield an IntStream of the Unicode codes of the characters or of the code units in the UTF-16 encoding. Java SE 8 for the Really Impatient



1276、单词 foundational 的匹配文本:


  1. Instead, it is a basic building block that can be a foundational part of a testing tool. Core Java Volume I Fundamentals 9th Edition


  2. Before we go on to study recommender engines in detail, it’s important to spend some time with another foundational concept for recommenders in Mahout: the representation of data. Mahout in Action


  3. Code organization and reuse are the foundational levers of all computer programming: Write it once, use it more than once, and keep the code in one place. Thinking in Java 4th Edition


  4. Unfortunately, the implementation of this pattern isn’t straightforward in Hadoop because one of the foundational pieces of the framework is assigning one map task to an input split and assigning one map function call to one record. MapReduce Design Patterns


  5. It turns out that files() returns a FileCollec tion, which is a foundational interface for file programming in Gradle. Gradle Beyond The Basics


  6. You need not be an expert in all these technologies to make effective use of HBase, but it helps to have an understanding of these foundational layers in order to take full advantage of HBase. HBase in Action


  7. After considerable research and experimentation, we chose Hadoop and HBase as the foundational storage technology for these next generation applications. Apache Hadoop Goes Realtime at Facebook


  8. A Quick Review of Relational Databases Though you are likely familiar with them, let’s briefly turn our attention to some of the foundational concepts in relational databases. Cassandra The Definitive Guide


  9. We’ll revisit QueryParser in section 3.5, after we cover the more foundational pieces. Lucene in Action 2nd Edition


  10. This is foundational JDBC that needs to be known if you are working with databases within Java applications. Java 7 Recipes A Problem-Solution Approach



1277、单词 vhosts 的匹配文本:


  1. Within every RabbitMQ server is the ability to create virtual message brokers called virtual hosts (vhosts) RabbitMQ in Action



1278、单词 ternary 的匹配文本:


  1. Finally, Java supports the ternary ?: operator that is occasionally useful. Core Java Volume I Fundamentals 9th Edition


  2. Ternary if-else operator The ternary operator, also called the conditional operator, is unusual because it has three operands. Thinking in Java 4th Edition


  3. You can implement that method in a single statement and without using any conditional constructs like the ternary operator as follows: Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. As demonstrated here, Scala’s if expression can result in a value, similar to Java’s ternary operator. Programming in Scala 2nd Edition


  5. Conditional x ? y : z Bincond/ternary; y if x evaluates to true, z otherwise. Hadoop:The Definitive Guide 3rd Edition


  6. Basically, instead of using just one binary mark bit per object, a color, or ternary value is used. Oracle JRockit The Definitive Guide


  7. Because Scala’s if expression works like Java’s ternary operator, the if in the previous code returns a if it’s longer than b. Beginning Scala


  8. Java also defines one ternary operator, often called the conditional operator. Java in a Nutshell 5th Edition


  9. Bentley's article also looks briefly at optimizing partialmatch searching in ternary search trees by transforming a tail recursion in the search into an iteration. Java Performance Tuning 2nd Edition


  10. In this case, the expression is using a ternary operator that returns an int value. Java 7 Recipes A Problem-Solution Approach



1279、单词 readonly 的匹配文本:


  1. For example, as soon as a document has been set to readonly mode, you can locate the Save and Save As menu items and disable them. Core Java Volume I Fundamentals 9th Edition


  2. Attributes may be mutable or immutable to the remote client through the readonly keyword. Java Network Programming and Distributed Computing


  3. An index is much like a database, in the sense that it can have its own completely different settings, such as the way it's stored on disk or whether it's readonly. Elasticsearch in Action MEAP V07 cHAPTER 1


  4. Other Linux tools such as dmesg can help determine if a drive has gone into a readonly mode. Hadoop in Practice


  5. Recall from our earlier discussion of upper-bounded wildcards that if you have a collection whose element type is an upper-bounded wildcard, it is effectively readonly. Java in a Nutshell 5th Edition


  6. If it’s false, you will see a label indicating the readonly value; if it’s true, you will see a set of one or more fields to add your new value and a button to update it. Cassandra The Definitive Guide


  7. As an additional safeguard, the NameNode process will hold the HDFS filesystem in a readonly mode until it has confirmed that a given percentage of blocks meet their replication threshold. Hadoop Beginners Guide


  8. Note that monitorRole is the role name and readonly is the access level. ActiveMQ in Action


  9. Processing each query shares mostly readonly data with the rest of the system, and constitutes a work unit that requires little communication. Web search for a planet the google cluster architecture


  10. In many cases you can instead selectively permit some leakage by constructing and returning an Adapter object surrounding the part that exposes only those operations that clients may use without introducing any potential interference — generally, readonly operations. Concurrent Programming in Java Design Principles and Pattern



1280、单词 manageability 的匹配文本:


  1. The problems that you solve with concurrency can be roughly classified as "speed" and "design manageability." Thinking in Java 4th Edition


  2. Note You can also install Foreman from source if you wish, though we recommend for manageability that you stick with packages. Pro Puppet


  3. In this time, the software has made great leaps in performance, reliability, scalability, and manageability. Hadoop:The Definitive Guide 3rd Edition


  4. The Management Console relies on the JMX standard and provides a way to monitor any application that exposes manageability features through JMX, including the JRockit JVM. Oracle JRockit The Definitive Guide


  5. We consider the peer-to-peer design and its corresponding gossip protocol, as well as what Cassandra does on read and write requests, and examine how these choices affect architectural considerations such as scalability, durability, availability, manageability, and more. Cassandra The Definitive Guide


  6. In contrast to functional requirements, which dictate functionally what an application computes or produces for output, systemic requirements dictate a particular aspect of an application’s operation such as its throughput, response time, the amount of memory it consumes, startup time, availability, manageability, and so on. Java Performance


  7. This increases your productivity, reduces the chances of typing errors, and also enhances manageability because if you have to make a change, it can occur in one place rather than in several different locations. Java 7 Recipes A Problem-Solution Approach



1281、单词 markdown 的匹配文本:


  1. The resulting blog engine features access-controlled posting, open comments with the possibility of moderation, Atom feeds, Markdown formatting, and a few other little goodies. CouchDB The Definitive Guide


  2. We won’t go into the syntax of Markdown here because that’s available on the web and because you can easily discover it by using the button bar interface. Spring in Practice


  3. Here is the Markdown text we get for the worker protocol: ## The MDP/Worker Protocol. ZeroMQ


  4. For example, to convert Markdown text to HTML using MarkdownJ, see Example 1-9 Gradle Beyond The Basics



1282、单词 hyperlink 的匹配文本:


  1. You supply the name of a class, method, or variable, and javadoc inserts a hyperlink to the documentation. Core Java Volume I Fundamentals 9th Edition


  2. By placing a hyperlink over a word (such as a scientific term) or a phrase, users would be able to jump instantly from one document to another, even though the documents could reside on servers located in other countries. Java Network Programming and Distributed Computing


  3. When it comes to the reduce phase, all the comment IDs that reference the same hyperlink will be grouped together. MapReduce Design Patterns


  4. They’re used to represent data such as the hyperlink structure of the internet, social networks (where they represent relationships between users), and in internet routing to determine optimal paths for forwarding packets. Hadoop in Practice


  5. Each hyperlink is an edge, and the frequency at which people click from one page to the next is edge metadata. Hadoop:The Definitive Guide 3rd Edition


  6. For example, all action components, like the command button or the hyperlink, have default action listeners that are invoked in this phase. Java EE 7 Essentials


  7. The HyperlinkListener interface has a single method, hyperlinkUpdate, that is called when the user moves over or clicks on a link. Core Java Volume II Advanced Features 9th Edition


  8. If reference is not a quoted string or a hyperlink, it is expected to have the following form: Java in a Nutshell 5th Edition


  9. For example, suppose that while browsing http://www.ibiblio.org/javafaq/javatutorial.html you click on this hyperlink: Java Network Programming 4th Edition


  10. Solution 3 is used when a user clicks a special hyperlink on a web page that launches the Swing application that will be pushed (installed) onto the local workstation. Java 7 Recipes A Problem-Solution Approach



1283、单词 cmd 的匹配文本:


  1. If you use Windows XP, select the Run option from the Start menu and type cmd. Core Java Volume I Fundamentals 9th Edition


  2. Based on your operating system, you’ll either end up with a batch script named grunt.cmd (Windows) or a shell script named grunt (*nix) Gradle in Action


  3. Commands in MongoDB are implemented as a special type of query that gets performed on the $cmd collection. MongoDB The Definitive Guide 2nd Edition


  4. JENKINS_JAVA_CMD The version of Java you want to use to run Jenkins. Jenkins The Definitive Guide


  5. The easiest way to do this is to open Spotlight (Cmd+Spacebar) and enter Terminal into the Spotlight text box. Beginning CouchDB


  6. The command cmd is usually named after the corresponding Unix equivalent. Hadoop in Action


  7. So JMX is doing the real work, the NodeProbe class is used to connect to the JMX agent and sort out the data, and the NodeCmd class is used to present it in an interactive command-line interface. Cassandra The Definitive Guide


  8. In a Command Prompt window, or in a cmd file, the command looks like. Java Performance


  9. To open a command window in Microsoft Windows, click Start, type CMD, and press Enter. Java 7 Recipes A Problem-Solution Approach


  10. Regardless of the functionality they provide, what all database commands have in common is their implementation as queries on a special virtual collection called $cmd. MongoDB in Action



1284、单词 restlet 的匹配文本:


  1. In the XML world he is known as the developer of DB Generator for the Apache Cocoon project, the open source projects DBPrism and DBPrism CMS, the Lucene-Oracle integration by using Oracle JVM Directory implementation and in the Restlet.org project the Oracle XDB Restlet Adapter, an alternative to write native REST web services inside the database-resident JVM. Mastering ElasticSearch


  2. He recently joined Noelios Technologies, the company behind the Restlet framework, and lives in Brittany (France) Spring Batch in Action


  3. In this section, we’ll describe some general concepts related to integrating frameworks of this kind with Spring DM, and we’ll take a look at examples of the most popular ones: Spring Web Services (Spring WS) and Restlet. Spring Dynamic Modules in Action


  4. In the XML world, he is known as the developer of the DB Generator for the Apache Cocoon project, the open source projects DBPrism and DBPrism CMS, the Lucene-Oracle integration by using Oracle JVM Directory implementation, and the Restlet.org project – the Oracle XDB Restlet Adapter, an alternative to writing native REST web services inside the database resident JVM. Apache Solr 4 Cookbook



1285、单词 jackson 的匹配文本:


  1. Although it’s true that Jackson provides JSON-specific annotations for object/ JSON mapping, you can configure Jackson to understand JAXB annotations, and this allows you to avoid parallel sets of JAXB and Jackson annotations. Spring in Practice


  2. They use the Jackson JSON library, which is included in your Pig distribution. Programming Pig


  3. For the purpose of discussion, the Jackson serializer for JSON and JAXB for XML were selected. Java Performance


  4. Thanks to my supportive, patient, and loving wife Robyn; and our five children Jackson, Nicholas, Matthew, Tressa, and Ruby. Java 7 Recipes A Problem-Solution Approach


  5. Jackson (the JSON marshalling technology used by Spring Data REST) seems to choke on serializing the EmailAddress value object. Spring Data Modern Data Access for Enterprise Java


  6. Registered if the Jackson JSON library is present on the classpath. Spring in Action 4th Edition



1286、单词 exe 的匹配文本:


  1. A wrapper is a Windows program with the familiar .exe extension that locates and launches the Java virtual machine (JVM) or tells the user what to do when no JVM is found. Core Java Volume I Fundamentals 9th Edition


  2. If you've already saved the lightbulb schema as LightBulb.idl (preferably in a directory of its own), the next step is to generate the Java mapping, using idlj.exe. Java Network Programming and Distributed Computing


  3. Now that you have a data directory, open the command prompt (cmd.exe) MongoDB The Definitive Guide 2nd Edition


  4. The installer comes in the form of a ZIP file containing an MSI package for Jenkins, as well as a setup.exe file that can be used to install the .NET libraries if they have not already been installed on your machine. Jenkins The Definitive Guide


  5. Typically, this works best in something like a native binary executable, such as an .exe file, where distinctions between code and data are less clear. Oracle JRockit The Definitive Guide


  6. The other two were a Word document and the executable java.exe file. Java 7 New Features Cookbook


  7. It can be used to transfer TIFF pictures, Microsoft Word documents, Windows .exe files, or anything else that can be represented in bytes. Java Network Programming 4th Edition


  8. Assuming that you have appropriate NMS DLLs, the preceding command should produce the Consumer.exe binary. ActiveMQ in Action


  9. Once the installation is complete, you will find the easy_install.exe file in Python’s Scripts subdirectory. The Definitive Guide to MongoDB


  10. The core database server runs via an executable called mongod (mongodb.exe on Windows) MongoDB in Action



1287、单词 speedups 的匹配文本:


  1. The overall effect of these speedups is that raw data to be classified can be read, parsed, and encoded at a rate of about 15 MB/s without much effort. Mahout in Action


  2. Although the max-parallelism policy produces the largest improvements, the relative job size policy also does quite well, and its speedups probably have a higher likelihood of being achieved because it requires fewer new MapReduce workers to be constructed: the time to set up a worker on a new machine is not fully accounted for in the simple model. Omega - flexible, scalable schedulers for large compute clusters


  3. It is possible that some algorithmic tuning of these programs could reduce this effect, and in turn lead to better speedups. A Java ForkJoin Framework


  4. There are a number of additional speedups possible in a JVM. Thinking in Java 4th Edition


  5. At the scale of the bulk data processing jobs that run in today’s data centers, these asymptotic improvements can translate to huge speedups and cluster utilization savings. Incoop MapReduce for Incremental Computations


  6. More than once, the simple removal of a couple of calls to System.gc has led to immense speedups for quite a few customer applications. Oracle JRockit The Definitive Guide


  7. Order-of-magnitude speedups are typical for the first round of performance tuning. Java Performance Tuning 2nd Edition


  8. You cranked up mergeFactor and got awesome speedups, so you want to push it even higher. Lucene in Action 2nd Edition


  9. However, there are also efficient alternative concurrent algorithms for many problems, including those that open up the possibility of further speedups via parallelism. Concurrent Programming in Java Design Principles and Pattern



1288、单词 pearson 的匹配文本:


  1. Audio page 50 Sean addresses questions about the implementation of the Pearson correlation. Mahout in Action


  2. Popular measures that can calculate these scores include Euclidean distance and Pearson’s correlation. Hadoop in Practice


  3. InformIT is a brand of Pearson and the online presence for the world’s leading technology publishers. Java SE 8 for the Really Impatient


  4. He currently serves as a Director of Technology for Pearson Education, driving the development of new educational service platforms. Pro JPA2



1289、单词 hly 的匹配文本:


  1. Create an hly_temp_normal table in your MySQL database, using the following SQL statements: HBase Administration Cookbook



1290、单词 subinterface 的匹配文本:


  1. It is a subinterface of AutoCloseable, also with a single close method. Core Java Volume I Fundamentals 9th Edition


  2. NIO.2 also introduces the MulticastChannel interface as a subinterface of NetworkChannel. Pro Java 7 NIO.2


  3. This class implements the MutableTreeNode interface, a subinterface of TreeNode (see Figure 6.17) Core Java Volume II Advanced Features 9th Edition


  4. In fact, the key types implement WritableComparable   , a subinterface of Writable. Hadoop in Action


  5. If you answered no to the first question, ask yourself one more: Do I want to limit the use of this marker to elements of a particular interface, forever? If so, it makes sense to define the marker as a subinterface of that interface. Effective Java 2nd Edition


  6. TreeSet actually implements the SortedSet interface, which is a subinterface of Set. Java in a Nutshell 5th Edition


  7. Unfortunately, you cannot add a method to the Comparator interface, so you have to use the following subinterface: Java Performance Tuning 2nd Edition


  8. This mechanism is called the Executor framework and is around the Executor interface, its subinterface ExecutorService, and the ThreadPoolExecutor class that implements both interfaces. Java 7 Concurrency Cookbook


  9. Optionally, define a subinterface that supports additional update methods used in the normal. Concurrent Programming in Java Design Principles and Pattern


  10. It is a subinterface of AutoCloseable, also with a single close method, but that method is declared to throw an IOException. Java SE 8 for the Really Impatient



1291、单词 binlog 的匹配文本:


  1. The sync_binlog option controls how MySQL flushes the binary log to disk. High Performance MySQL 3rd Edition


  2. If the low-level module has made a modification to the data in some way and if the binary update logging is enabled, the module will be responsible for asking the Logging Module to log the update event to the binary update log, sometimes known as the replication log, or, among MySQL developers and power users, the binlog. Understanding MySQL Internals



1292、单词 proc 的匹配文本:


  1. The dendrite would send periodic heartbeats as well as publish any significant /proc metric changes on a common multicast channel. Monitoring with Ganglia


  2. You can capture /proc/diskstats to record disk I/O for later analysis with the pt-diskstats tool,5 for example. High Performance MySQL 3rd Edition


  3. Create the proc folder under the root filesystem of the image file using the following command: sudo mkdir -pv /mnt/centos/proc. Hadoop Operations and Cluster Management Cookbook


  4. The input-events startLogProc in Listing 6-7 defines a dependency between two data sets: systemLog and applicationLog. Professional Hadoop Solutions


  5. Swift Recon The Swift Recon middleware (see http://swift.openstack.org/admin_guide.html#clustertelemetry-and-monitoring) provides general machine statistics, such as load average, socket statistics, /proc/meminfo contents, and so on, as well as Swift-specific metrics: bk-admin-guide-cloud-latest


  6. Determine how much physical memory your system has by searching through the /proc/meminfo file: Cassandra High Performance Cookbook


  7. The cumulative CPU time for a task in milliseconds, as reported by /proc/cpuinfo. Hadoop:The Definitive Guide 3rd Edition


  8. One example of this would be not having to emulate parts of /proc file system in the kernel, as this is the way JRockit on Linux collects information on memory layout. Oracle JRockit The Definitive Guide


  9. There are other ways to monitor for swap activity on Linux such as using the top command or observing the contents of the file /proc/meminfo. Java Performance


  10. This is because the DUMMY_PROC procedure simply assigns the contents if the IN parameter to the OUT parameter. Java 7 Recipes A Problem-Solution Approach



1293、单词 superinterfaces 的匹配文本:


  1. The value of the interfaces_count item gives the number of direct superinterfaces of this class or interface type. The Java Virtual Machine Specification Java SE 7 Edition


  2. The type Object, if C is an interface type with no direct superinterfaces. The Java Language Specification Java SE 7 Edition


  3. A class that implements such an interface must implement the abstract methods defined directly by the interface, as well as all the abstract methods inherited from all the superinterfaces. Java in a Nutshell 5th Edition


  4. Loading a class requires loading all Java superclasses and all Java superinterfaces. Java Performance


  5. NOTE: When calling Java.extend, you can specify any number of superinterfaces as well as a superclass. Java SE 8 for the Really Impatient



1294、单词 jbutton 的匹配文本:


  1. Caution Most Swing component classes start with a “J”: JButton, JFrame, and so on. Core Java Volume I Fundamentals 9th Edition


  2. Making a button Making a button is quite simple: You just call the JButton constructor with the label you want on the button. Thinking in Java 4th Edition


  3. For example, you can’t serialize any Swing components (like JButton, JSpinner), and you can’t serialize File objects, but you can serialize the Color class (awt.color, to be more precise) Java 7 Recipes A Problem-Solution Approach



1295、单词 comparators 的匹配文本:


  1. Key Contents and Comparators For simplicity in this pass, we are going to use the same object, Text, for the keys for both datasets, and Text for the values. Pro Hadoop


  2. In this chapter, the recipe Using column metadata and comparators for schema enforcement stores meta-information inside the schema so it displays properly. Cassandra High Performance Cookbook


  3. It’s not customary to modify an object from within a Comparator Normally you wouldn’t write Comparators the way we did in the code example. HBase in Action


  4. The sorting algorithms are easily rewritten to use Comparators, in the event that the default ordering is unavailable or unacceptable. Data Structures and Algorithm Analysis in Java 3rd Edition


  5. Another tool to improve the execution times of your MapReduce jobs are binary comparators, which we’ll examine next. Hadoop in Practice


  6. If you are using your own custom Writable objects or custom comparators, make sure you have implemented RawComparator. Hadoop:The Definitive Guide 3rd Edition


  7. Be advised that the KeyValue class, and its accompanying comparators, are designed for internal use. HBase:The Definitive Guide


  8. A TreeBasedTable table where the row and column keys are ordered, either by the natural order or by specified comparators for the row and column keys. Getting Started with Google Guava


  9. The Comparator interface is generic (Item 26) so that it is applicable to comparators for objects other than strings. Effective Java 2nd Edition


  10. NOTE: As you will see in Chapter 8, the Comparator class has several methods that yield or modify comparators. Java SE 8 for the Really Impatient



1296、单词 etag 的匹配文本:


  1. Etag The Etag HTTP header field is used to show the revision for a document. Getting Started with CouchDB


  2. An Etag in HTTP-speak identifies a specific version of a resource. CouchDB The Definitive Guide


  3. Whenever you get a resource, the server responds with an etag in the header. NoSQL Distilled


  4. An ETag is a string that identifies a specific version of a component. Solr 3 Enterprise Search Server


  5. The response to every GET request to a document or view includes an Etag HTTP header (for documents, the Etag’s value is the document’s revision in double quotes) Scaling CouchDB


  6. ETag - An entity tag which can be used for cache validation by a client. A Little Riak Book


  7. The ETag header (HTTP 1.1) is a unique identifier for the resource that changes when the resource does. Java Network Programming 4th Edition


  8. For example, if your documents are crawled from a web server, then one way to detect that the content has changed is to look for a changed ETag HTTP header. Lucene in Action 2nd Edition


  9. Next, we have the eTagSeed attribute, which is responsible for generating the ETag HTTP cache header. Apache Solr 4 Cookbook


  10. ETag MD5 hash of an object within swift, used to ensure data integrity. OpenStack Operations Guide



1297、单词 lowercased 的匹配文本:


  1. The first letter after "get" or "set" will automatically be lowercased by any tools that look at the methods, in order to produce the property name. Thinking in Java 4th Edition


  2. In order to actually perform the autocomplete, we’ll insert lowercased contact names. Redis in Action


  3. Lowercase filter: It makes all the tokens lowercased • ASCII folding filter: It removes non ASCII parts from tokens. Mastering ElasticSearch


  4. Returns a list containing all elements of the thrill list in alphabetical order of the first character lowercased (returns List("fill", "until", "Will")) Programming in Scala 2nd Edition


  5. Remember that facet values are the final result of text analysis, and therefore are probably lowercased for fields you might want to do term completion on. Solr 3 Enterprise Search Server


  6. We tell Solr to split the data on whitespaces, split on case change, make text parts lowercased, and finally to stem text with the appropriate algorithm—in this case, it is one of the English stemming algorithms available in Solr and Lucene. Solr 3.1 Cookbook


  7. Thus, unless you want to actually bring back facet counts for each of those terms individually and lowercased, you have to consider how you may want to facet on a field when you create the field definition in Solr’s schema.xml. Solr in action


  8. The terms of the contents field, however, were lowercased when indexed. Lucene in Action 2nd Edition


  9. The next parameter lowernames is set to true; this tells Solr to lower all names that come from Tika and have them lowercased. Apache Solr 4 Cookbook


  10. The resolution algorithm starts with interpreting the entire part (AddressZipCode) as a property and checks the domain class for a property with that name (with the first letter lowercased) Spring Data Modern Data Access for Enterprise Java



1298、单词 base64 的匹配文本:


  1. To output binary data, there is the option to return a Base64-encoded string, like this: CouchDB The Definitive Guide


  2. Request Parameters: full (Boolean, return full documents including metadata, default false) revs (Boolean, return a list of previous revisions, default false) rev (String, set a specific revision number) attachments (Boolean, get attachments in Base64, default false) Beginning CouchDB


  3. Because you’ve stored the passwords as simple Strings, you can decode them enough to find the value using the base64 utility: HBase in Action


  4. Discussion Similar to Protocol Buffers, Elephant Bird includes a Base64-encoded, line-based mechanism to serialize Thrift, as well as a block-based mechanism, which uses a Protocol Buffers generic container to write Thrift objects. Hadoop in Practice


  5. The column name and the actual value are encoded in Base64,† as explained in the online schema documentation. HBase:The Definitive Guide


  6. The program is straightforward, except for the computation of the Base64 encoding. Core Java Volume II Advanced Features 9th Edition


  7. Here we are taking a binary file (a PDF document) and encoding the bytes to a base64 encoded string. Getting Started with Google Guava


  8. The BASE64 encoder encoded binary data for instances where the data needs to be stored and transferred across textual mediums, such as e-mail and XML files. Java 7 New Features Cookbook


  9. The CertificateFactory class serves as a certificate parser, providing the ability to convert a stream of bytes (or the base64 encoding of those bytes) into a Certificate, a CertPath or a CRL object. Java in a Nutshell 5th Edition


  10. The other dependency is an API that encodes arbitrary strings first with the Metaphone algorithm, then the Base64 format. Building and Testing with Gradle



1299、单词 nrpe 的匹配文本:


  1. The NRPE and check_log Nagios plugins can be used to achieve this simple goal, with a few simple steps. HBase Administration Cookbook


  2. Collectively, these enable Nagios to query metric information from gweb instead of relying on remote execution systems such as Nagios Service Check Acceptor (NSCA) and Nagios Remote Plugin Executor (NRPE) Monitoring with Ganglia


  3. Install the Nagios Remote Plugin Executor (NRPE) package with the following command: sudo yum install nrpe. Hadoop Operations and Cluster Management Cookbook


  4. You can create automated alerts for critical processes by using Nagios and NRPE. OpenStack Operations Guide



1300、单词 spinner 的匹配文本:


  1. Several variations of the JSpinnerJSpinner component component The values in the spinner can be numbers, dates, values from a list, or, in the most general case, any sequence of values for which predecessors and successors can be determined. Core Java Volume II Advanced Features 9th Edition


  2. However, a widget called a Spinner is constructed within the activity as well. Java 7 Recipes A Problem-Solution Approach



1301、单词 tokenizers 的匹配文本:


  1. You can defi ne Tokenizers specifi c to your fi eld types. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr


  2. Analyzers, Tokenizers, Filters, oh my! The various components involved in text analysis go by various names, which are about to be defined. Solr 3 Enterprise Search Server


  3. Furthermore, type definition is composed of tokenizers and filters (both token filters and character filters) Solr 3.1 Cookbook


  4. The first property, tokenizers B, registers all LineTokenizers in a map. Spring Batch in Action


  5. Ironically, the next step may be to fall back on the StringTokenizer class, use of which is discouraged in the class Javadocs comments in favor of the newer regular expression-based tokenizers. Hadoop in Practice


  6. Elasticsearch provides many character filters, tokenizers and token filters out. Elasticsearch The Definitive Guide


  7. In Solr, you must specify the factory class instead of the underlying Tokenizer implementation class because most tokenizers do not provide a default no-arg constructor. Solr in action


  8. It’s also straightforward to build your own analyzer, or create arbitrary analyzer chains combining Lucene’s tokenizers and token filters, to customize how tokens are created. Lucene in Action 2nd Edition


  9. The indentation of the actual output was changed to fit the page.) For those not familiar with parsers and tokenizers, this can look overwhelming. Programming Hive



1302、单词 soa 的匹配文本:


  1. Attune Infocom provides enterprise open source solutions and services for SOA, BPM, ESB, Portal, cloud computing, and ECM. Web Crawling and Data Mining with Apache Nutch


  2. Additionally, he is an InfoQ editor on SOA and Big Data, and a frequent speaker at industry conferences. Professional Hadoop Solutions


  3. Remember, OSGi is sometimes referred to as a service-oriented architecture (SOA) in a JVM. Spring Dynamic Modules in Action


  4. Oracle SOA Suite in the delivery of real-world SOA applications. Oracle JRockit The Definitive Guide


  5. In many SOA scenarios, service consumers may not be under the control of the service implementation. Spring Integration in Action


  6. They are now employed in a variety of use cases, such as content management and supply chain systems, document management, publishing, and support of SOA initiatives. Cassandra The Definitive Guide


  7. SOA, CEP, and many other higher-level concepts built on top of enterprise messaging wouldn’t have come about. ActiveMQ in Action


  8. Service Oriented Architecture (SOA) is an architectural style that enables complex business applications to be built from smaller individual services distributed over the network. Java Performance


  9. One of the most hyped TLAs (three-letter acronyms) in recent years is SOA (serviceoriented architecture) Spring in Action 4th Edition



1303、单词 andy 的匹配文本:


  1. In this book by Andy Hunt, you’ll learn how our brains are wired, and how to take advantage of your brain’s architecture. Programming Concurrency on the JVM


  2. Thanks to Andy Oram, Rachel Head, and the whole O’Reilly staff who do such a classy job of publishing books and running conferences. High Performance MySQL 3rd Edition


  3. This practice is better known by the DRY acronym and was introduced by Andy Hunt and Dave Thomas in their book, The Pragmatic Programmer. Sonar Code Quality Testing Essentials


  4. Acknowledgments Thanks to Andy Oram for making this happen at O’Reilly and editing the book. ZeroMQ


  5. The support staff, especially our editor Andy Oram, has been extremely helpful in guiding us through this process. MapReduce Design Patterns


  6. To discuss supporting OSGi in Spring, Adrian proposed a conference call with Hal Hildebrand (Oracle), John Wells (BEA), and one of the authors of this book: Andy Piper (BEA) Spring Dynamic Modules in Action


  7. Now let’s consider a third roommate, Andy, who loves almonds. A Little Riak Book


  8. Acknowledgements We thank Pieter Noordhuis for thoroughly reviewing several chapters of our book, our editor Andy Oram for his work on making us look good, Salvatore Sanfilippo for his words of encouragement, and our respective companies for the extra free time to write this book. Redis Cookbook


  9. First, a big thank you to everyone at Manning for working hard, for their patience when the writing wasn’t moving as fast as it should have, and for prodding me along to get it done: Marjan Bace, Michael Stephens, Cynthia Kane, Andy Carroll, Benjamin Berg, Alyson Brener, Dottie Marisco, Mary Piergies, Janet Vail, and many others behind the scenes. Spring in Action 4th Edition


  10. Interestingly enough, my editor happened to be Andy Oram, who also participated in the publication of Understanding the Linux Kernel and Linux Device Drivers. Understanding MySQL Internals



1304、单词 kickstart 的匹配文本:


  1. See also f The Creating the kickstart file and boot media recipe in Chapter 2, Preparing. Hadoop Operations and Cluster Management Cookbook


  2. Instructions for installing these RPMs and configuring them with a kickstart script are available at the Mirantis blog. Deploying OpenStack


  3. In addition, Escalate Software can help your business get started and succeed with Scala through its “kickstart” program, which helps you get skills and infrastructure in place for your build, development, and deployment. Programming in Scala 2nd Edition


  4. Tip If you use a provisioning tool like Kickstart or Preseed, you can also include Puppet installation and signing as part of your build process. Pro Puppet


  5. To ease the burden of installing and maintaining the same software on each node, it is normal to use an automated installation method such as Red Hat Linux’s Kickstart or Debian’s Fully Automatic Installation. Hadoop:The Definitive Guide 3rd Edition


  6. Kickstart users can commission entire Hadoop clusters without manual intervention. HBase:The Definitive Guide


  7. Ubuntu and Red Hat Linux both include mechanisms for configuring the operating system, including preseed and kickstart, that you can use after a network boot. OpenStack Operations Guide



1305、单词 unmodifiable 的匹配文本:


  1. The Collections class has methods that produce unmodifiable views of collections. Core Java Volume I Fundamentals 9th Edition


  2. In Java we could pass an unmodifiable Collection as messages to send more than one object in. Programming Concurrency on the JVM


  3. The full list of "unmodifiable" Collections methods is described later. Thinking in Java 4th Edition


  4. But an unmodifiable collection is just a wrapper over a modifiable collection. Java 8 in Action Lambdas, Streams and Functional-style Programming


  5. SetView is a static, abstract inner class of the Sets class and represents an unmodifiable view of a given Set instance. Getting Started with Google Guava


  6. For example, the Java Collections Framework has thirty-two convenience implementations of its collection interfaces, providing unmodifiable collections, synchronized collections, and the like. Effective Java 2nd Edition


  7. Immutable or unmodifiable collections throw this exception when a modification method, such as add( ) or delete( ), is called. Java in a Nutshell 5th Edition


  8. The headers should be returned in an unmodifiable map with keys that are the HTTP header field names and values that are lists of values for each named HTTP header. Java Network Programming 4th Edition



1306、单词 externalizable 的匹配文本:


  1. You can control the process of serialization by implementing the Externalizable interface instead of the Serializable interface. Thinking in Java 4th Edition


  2. Externalizable classes supply custom read and write methods that take over the output of their instance fields. Core Java Volume II Advanced Features 9th Edition


  3. An Externalizable class defines a writeExternal() method responsible for writing the complete state of an object to the serialization stream. Java in a Nutshell 5th Edition


  4. The Externalizable interface also provides support for serializing objects using ObjectInputStream and ObjectOutputStream. Java Performance Tuning 2nd Edition


  5. As such, it requires implementing the Externalizable interface in lieu of the Serializable interface. Java 7 Recipes A Problem-Solution Approach



1307、单词 interoperable 的匹配文本:


  1. A core part of sFlow is the specification of standard sets of metrics, allowing each switch vendor to embed the measurements in hardware and produce interoperable results. Monitoring with Ganglia


  2. In a world of heterogeneous networks, this is an important quality, as it makes networks interoperable. Java Network Programming and Distributed Computing


  3. A more interoperable solution is to convert data to XML format, which allows it to be consumed by a large variety of platforms and languages. Thinking in Java 4th Edition


  4. The second ingredient for building interoperable data management components is a shared storage format. Dremel - Interactive Analysis of WebScale Datasets


  5. Grid computing has mostly focused on the problem of making diverse virtual organizations share geographically distributed and separately administered resources in a secure and interoperable way. Mesos A Platform for Fine-Grained Resource Sharing in the Data Center


  6. Interoperable For some systems, it is desirable to be able to support clients that are written in different languages to the server, so the format needs to be designed to make this possible. Hadoop:The Definitive Guide 3rd Edition


  7. This makes REST ideal for communicating between heterogeneous systems: the protocol layer takes care of transporting the data in an interoperable format. HBase:The Definitive Guide


  8. It was deemed critical that all of this code remain legal and interoperable with new code that does use generics. Effective Java 2nd Edition


  9. Note that CharSequence implementations do not typically have interoperable equals( ) or hashCode( ) methods, and it is not usually possible to compare two CharSequence objects or use multiple sequences in a set or hashtable unless they are instances of the same implementing class. Java in a Nutshell 5th Edition


  10. If you are already experienced with the Apache Hadoop software stack and are adding Impala as another arrow in your quiver, you will find it interoperable on several levels. Cloudera Impala



1308、单词 lowercasing 的匹配文本:


  1. For example, if you are using stemming and lowercasing during indexing, you need to be sure that the term in the query are also lowercased and stemmed, or your queries will return no results at all. Mastering ElasticSearch


  2. One interesting thing to notice about the analysis results is that Quoting ultimately became quot after stemming and lowercasing. Solr 3 Enterprise Search Server


  3. The second filter defined is the lowercase filter; you can see how it works by referring to the Lowercasing the whole string recipe in this chapter. Solr 3.1 Cookbook


  4. Token filters Last, each term is passed through any token filters in turn, which can change terms (eg lowercasing "Quick"), remove terms (eg stopwords like "a", "and","the" etc) or add terms (eg synonyms like "jump" and "leap") Elasticsearch The Definitive Guide


  5. Transformation – Changing the token to a different form such as lowercasing all letters or stemming. Solr in action


  6. An analyzer tokenizes text by performing any number of operations on it, which could include extracting words, discarding punctuation, removing accents from characters, lowercasing (also called normalizing), removing common words, reducing words to a root form (stemming), or changing words into the basic form (lemmatization) Lucene in Action 2nd Edition


  7. Lowercasing the whole string Imagine you have a system where you only want to have perfect matches for names of the documents. Apache Solr 4 Cookbook


  8. Specifically, the bean was given an ID of sgtPeppers by lowercasing the first letter of the class name. Spring in Action 4th Edition



1309、单词 tabbed 的匹配文本:


  1. The JTabbedPane allows you to create a "tabbed dialog," which has filefolder tabs running across one edge. Thinking in Java 4th Edition


  2. The report is divided into a three-tabbed table summed and sorted by files, folders, and languages. Jenkins Continuous Integration Cookbook


  3. Once you connect to the process, you will see a tabbed window with various details in it. HBase:The Definitive Guide


  4. We will finish the chapter by covering component organizers, such as tabbed panes and desktop panes with internal frames. Core Java Volume II Advanced Features 9th Edition


  5. Its tabbed and well integrated user interface allows for rapid browsing and experimentation. Lucene in Action 2nd Edition


  6. Each menu option will add an instance of a TabPlacementAction that is responsible for calling the tabbed pane’s setTabPlacement() method. Java 7 Recipes A Problem-Solution Approach



1310、单词 inode 的匹配文本:


  1. In the case of the nodiratime attribute, mounting disks does not update the directory inode access times on the filesystem. HBase Administration Cookbook


  2. When a file has two names of equal weight and the inode table (Linux files don’t actually live in directories; they are assigned an inode number, which Linux uses to locate them) points directly to the blocks on the disk that contain the data, the link is a hard link. Pro Java 7 NIO.2


  3. You can use partitioning to avoid some bottlenecks in specific workloads, such as per-index mutexes with InnoDB or per-inode locking with the ext3 filesystem. High Performance MySQL 3rd Edition


  4. Noatime does not update inode information each time it is read. Cassandra High Performance Cookbook


  5. Continued reliance on traditional file system principles like allocation lists and inode tables and a reluctance to delegate intelligence to the OSDs have further limited scalability and performance, and increased the cost of reliability. Ceph A Scalable, High-Performance Distributed File System


  6. The metadata includes things like filename, inode number, block location, and so on; the data is the actual content of the file. HBase in Action


  7. Each inode is an internal representation of a file or directory’s metadata and contains such information as the file’s replication level, modification and access times, access permissions, block size, and the blocks a file is made up of. Hadoop:The Definitive Guide 3rd Edition


  8. The inode data and the list of blocks belonging to each file comprise the metadata of the name system called the image. The Hadoop Distributed File System


  9. In UNIX, the device id or inode is used for this purpose. Java 7 New Features Cookbook


  10. Similar to ext4, allocation is extent-based, but its extents are within allocation groups, each of which is responsible for maintaining its own inode table and space. Hadoop Operations



1311、单词 concat 的匹配文本:


  1. Another good optimization is to manually generate the IN() list by executing the subquery as a separate query with GROUP_CONCAT() High Performance MySQL 3rd Edition


  2. You’ve assumed that the missing methods insertAll and concat are themselves functional and deduced that your function subsets is also, because no operation in it mutates any existing structure. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. The following are a few additional notes to help with the concat_ws() function: Hadoop RealWorld Solutions Cookbook


  4. The lists to be concatenated are supplied as direct arguments to concat: Programming in Scala 2nd Edition


  5. Calling concatUpper with an underscore ( _ ) turns the method into a function value. Programming Scala


  6. Use the concat function for the latter in both MySQL and Hive. Hadoop:The Definitive Guide 3rd Edition


  7. GROUP_CONCAT( ) that concatenates all the values in the group into one. SQL Antipatterns


  8. Other examples include string manipulation functions, like ucase(), which converts the string to upper case; reverse(), which reverses a string; and concat(), which joins multiple input strings into one output string. Programming Hive


  9. If you want to concatenate Strings onto the end of each other, use the concat() method. Java 7 Recipes A Problem-Solution Approach


  10. You can concatenate two streams with the static concat method of the Stream class: Java SE 8 for the Really Impatient



1312、单词 underflow 的匹配文本:


  1. In particular, the Java Virtual Machine requires full support of IEEE 754 denormalized floating-point numbers and gradual underflow, which make it easier to prove desirable properties of particular numerical algorithms. The Java Virtual Machine Specification Java SE 7 Edition


  2. This example demonstrates, among other things, that gradual underflow can result in a gradual loss of precision. The Java Language Specification Java SE 7 Edition


  3. Integer arithmetic in Java is modular, which means that it never produces an overflow or an underflow when you exceed the range of a given integer type. Java in a Nutshell 5th Edition


  4. You have to be careful about data overflow or underflow when doing arithmetic. Programming Hive



1313、单词 joda 的匹配文本:


  1. A good example of a well-written Java library is Joda-Time (http://jodatime.sourceforge.net) Scala in Action


  2. As shown in Listing 14-1, for the birth date attribute, we use JodaTime’s DateTime class. Pro Spring 3


  3. The consequence is that all these flaws and inconsistencies have encouraged the use of third-party date and time libraries, such as Joda-Time. Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. Still, some popular, high-quality libraries, such as Joda-Time and Google’s collections library, provide excellent support for programming with immutable data. Functional Programming Patterns in Scala and Clojure


  5. This class uses the Joda Time project (http://joda-time.sourceforge.net) to represent dates. Spring Integration in Action


  6. During scaffolding, Roo takes this information and uses it to translate the date into a localized String using the Joda-Time library. Spring Roo in Action


  7. The @DateTimeFormat annotation no longer has a hard dependency on JodaTime. Spring in Action 4th Edition



1314、单词 maintainers 的匹配文本:


  1. He is currently one of the maintainers of the Ganglia project. Monitoring with Ganglia


  2. We’ve been working closely with the Netty maintainers to improve on parts of Netty that both Finagle and the wider community can benefit from60 Netty in Action MEAP V08


  3. Imagine all the angry maintainers of alternative collection frameworks such as Guava and Apache Commons who now need to modify all the classes implementing the List interface to provide an implementation for the sort method too! Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. Equally important is the fact that this construct shows future maintainers of your code that you know what you are doing and are comfortable with idiomatic JavaScript. Testable JavaScript


  5. With this book, written by Tika’s two main creators and maintainers, Chris and Jukka, you’ll understand the problems of document analysis and document information extraction. Tika in Action


  6. Chief among these are the maintainers of javac, the reference compiler for the Java programming language. The Java Language Specification Java SE 7 Edition


  7. Imagine also that the maintainers of StringUtil decide to return a List instead of the default: Programming Scala


  8. Software maintainers must give priority to maintaining and improving their most popular product features. Chubby - The lock service for loosely-coupled distributed systems


  9. The only major downside is that package maintainers may not always keep up with the latest MongoDB releases. MongoDB in Action


  10. Redis evolves very quickly and package maintainers have a hard time keeping up with the latest developments. Redis Cookbook



1315、单词 datasource 的匹配文本:


  1. Several subpackages provide support for embedded databases, database initialization, and various datasource lookup mechanisms. Pro Spring 3


  2. We are going to use profiles extensively when we cover testing and deploying to the cloud because the two tasks require different configurations for the datasource. Pro Spring MVC


  3. Notice that the DAO no longer has a hardwired dependency on BasicDatasource. Spring in Practice


  4. You can also see here that in the tag you are also allowed to specify SQL script locations you want to execute when the datasource is started up. Pro Spring Security


  5. If the class name is specified as ataSource, an XA datasource must be provided. Java EE 7 Specification


  6. The same scenario applies to the dataaccess and then the datasource bundles; all the application contexts are properly destroyed without breaking service reference integrity! Spring Dynamic Modules in Action


  7. The journal can be used with any JDBC datasource, but it’s important to know when it should and shouldn’t be used. ActiveMQ in Action



1316、单词 mozilla 的匹配文本:


  1. By convention, browser applications begin their identification string with the keyword Mozilla, which was the identification string of the Netscape browser. Java Network Programming and Distributed Computing


  2. Songbird is a free software media player with an integrated web browser, based on the Mozilla XULRunner platform. CouchDB The Definitive Guide


  3. All tests are configured to work exclusively against Mozilla Firefox. Gradle in Action


  4. Both Mozilla and Google provide browser-based graphical interfaces for REST. api-quick-start-onepager


  5. CouchDB now featured a JavaScript view engine based on Mozilla Spidermonkey and an attractive web-based. Beginning CouchDB


  6. The Mozilla Foundation is responsible for the Firefox web browser and Thunderbird email client. HBase in Action


  7. Mozilla, for instance, uses the Neo4j graph database as part of its next-generation cloud browser, Pancake. Graph Databases


  8. These reports are subsequently read and analyzed by the Mozilla development team to make their software more reliable on the vast number of machines and configurations on which it is used. HBase:The Definitive Guide


  9. You can find a good example for the use of entities in the user interface descriptions for the Mozilla/Netscape 6 browser. Core Java Volume II Advanced Features 9th Edition


  10. The W3C has had considerably less success in convincing vendors like Mozilla and Microsoft to fully and consistently implement its standards. Java Network Programming 4th Edition



1317、单词 bytearray 的匹配文本:


  1. The bytes are returned in network byte order, with the highest byte as bytearray[0] Java Network Programming and Distributed Computing


  2. It orders numeric data numerically, Strings (chararray) lexicographically, and bytearray as binary data. Hadoop in Practice


  3. The types default to bytearray, the most general type, representing a binary string. Hadoop:The Definitive Guide 3rd Edition


  4. By default, they are returned as bytearray, matching the way they are stored in the HBase table. HBase:The Definitive Guide


  5. In defining a schema, if you leave out the type, Pig will default to bytearray as the most generic type. Hadoop in Action


  6. With the exception of bytearray, they are all represented in Pig interfaces by java.lang classes, making them easy to work with in UDFs: int. Programming Pig



1318、单词 tsdb 的匹配文本:


  1. OpenTSDB is an extremely scalable Time Series Database (TSDB) built on top of HBase. HBase Administration Cookbook


  2. OpenTSDB is a distributed, scalable Time Series Database (TSDB) written on top of HBase. HBase in Action



1319、单词 usages 的匹配文本:


  1. One of the example usages of this functionality is dividing the cluster topology between virtual machines or physical locations, to be sure that you don't have a single point of failure. Mastering ElasticSearch


  2. Fortunately, as you’ll see, when Java 8 refers to functions these usages very nearly coincide. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. In one of the most common usages of Sonar, Sonar automatically runs a set of Maven code quality related plugins against your Maven project, and stores the results into a relational database. Jenkins The Definitive Guide


  4. Important future direction: Our workloads are increasingly seek heavy Best usages are still being explored. Storage Architecture and Challenges


  5. To ensure correct operation, web components should obey wing guidelines, and the web container must support at least these usages. Java EE 7 Specification


  6. These areas of Hadoop haven’t received much coverage, and that’s what attracted me to the potential of this book—that of going beyond the fundamental word-count Hadoop usages and covering some of the more tricky and dirty aspects of Hadoop. Hadoop in Practice


  7. Few Kafka usages Some of the companies that are using Apache Kafka in their respective use cases are as follows: Apache Kafka


  8. Class redefinition is beyond the scope of this chapter, but the following code uses the new instrumentation and management features of Java 5.0 to determine resource usages of a Java program. Java in a Nutshell 5th Edition


  9. They provide a variety of useful information including lock contentions, usages of the various pools, I/O activity, as well as a quick feel about the load on the system. Java Performance


  10. They present highlevel design principles and strategies, technical details surrounding constructs, utilities that encapsulate common usages, and associated design patterns that address particular concurrency problems. Concurrent Programming in Java Design Principles and Pattern



1320、单词 apk 的匹配文本:


  1. You will either have to find the .apk file for a particular app, yourself, or add other marketplaces, such as SlideME (http://m.slideme.org) Jenkins Continuous Integration Cookbook


  2. First, you need to build the driver application bundle (.apk file) and install it on your device or in the simulator. Testable JavaScript


  3. The AndroidDriver requires the Android server APK to be installed on the emulator or device. Selenium Testing Tools Cookbook


  4. This will compile and build a deployable Android .apk file for your application. Java 7 Recipes A Problem-Solution Approach


  5. The emulator will then get the Selenium WebDriver APK installed and then that will control the browser on the device. Selenium 2 Testing Tools Beginner's Guide



1321、单词 oreillymedia 的匹配文本:


  1. Find us on Facebook: http://facebook.com/oreilly Follow us on Twitter: http://twitter.com/oreillymedia Watch us on YouTube: http://www.youtube.com/oreillymedia. Getting Started with CouchDB



1322、单词 schemaless 的匹配文本:


  1. They embrace schemaless data, run on clusters, and have the ability to trade off traditional consistency for other useful properties. NoSQL Distilled


  2. Most applications that need schemaless data really need it for only a. SQL Antipatterns


  3. Instead, it is a key-value, schemaless solution that takes a column-oriented view of data; columns can be added at run-time and depend on the values inserted into HBase. Hadoop Beginners Guide


  4. It might seem odd to refer to schema design when MongoDB is considered a schemaless database. The Definitive Guide to MongoDB


  5. Second, and more significantly, a schemaless model allows you to represent data with truly variable properties. MongoDB in Action


  6. With the schemaless nature of the graph database, the order will be stored in a node but only contains the state (and relationships) that are needed in the current state (and those still needed from past states) Spring Data Modern Data Access for Enterprise Java


  7. Or you might consider one of the new breed of NoSQL databases (or schemaless databases, as I prefer to call them) that are popular these days. Spring in Action 4th Edition



1323、单词 hmaster 的匹配文本:


  1. A fully distributed HBase cluster has one or more master nodes (HMaster), which coordinate the entire cluster, and many slave nodes (RegionServer), which handle the actual data storage and request. HBase Administration Cookbook


  2. Similar to HDFS, HBase implements master/slave (HMaster/region server) architecture, as shown in Figure 2-7 Professional Hadoop Solutions


  3. This will return an RPC proxy instance of HMasterInterface, allowing you to communicate directly with the master server. HBase:The Definitive Guide


  4. In particular, RegionServer metrics are far more useful for evaluating the health of the cluster than HMaster or ZooKeeper metrcs. Apache Hadoop Goes Realtime at Facebook


  5. At a very high level, the master server (HMaster) is responsible for keeping track of the region servers (HRegionServer) available and assigning regions to servers. ZooKeeper Distributed Process Coordination



1324、单词 infoset 的匹配文本:


  1. Both DOM and JAXB also support partial processing of the documents: DOM through the use of DOM Level 3 load and save APIs, and JAXB by accepting the XML infoset in different forms (DOM, SAX, StreamSource) Java Performance



1325、单词 importtsv 的匹配文本:


  1. We will then describe how to use the importtsv and bulk load tools to load TSV data files into HBase. HBase Administration Cookbook


  2. Loading large datasets to an Apache HBase data store using importtsv and bulkload tools. Hadoop MapReduce Cookbook


  3. HBase ships with a command-line tool called importtsv which, when given files containing data in tab-separated value (TSV) format, can prepare this data for bulk import into HBase. HBase:The Definitive Guide



1326、单词 statsd 的匹配文本:


  1. One of the solutions for dealing with counter values is statsd. Monitoring with Ganglia


  2. I am not sure what the Etsy server does but our StatsD server turns timing metrics into five derivative metrics with new segments appended, so it probably works as coded. bk-admin-guide-cloud-latest



1327、单词 ebr 的匹配文本:


  1. However, if you plan to deploy your application in an OSGi container (e.g., Spring dynamic modules), then use Spring EBR. Pro Spring 3


  2. There’s not a lot to say here, but one thing to point out is that because you’re using SpringSource’s Enterprise Bundle Repository (EBR), you need to help the Failsafe plug-in deal with the fact that the EBR renames the JUnit artifact (or TestNG if you’re using that) Spring in Practice


  3. You can download it from the SpringSource Enterprise Bundle Repository (EBR) by following these steps: Spring Dynamic Modules in Action



1328、单词 rtti 的匹配文本:


  1. When the actor receives a message, we check whether the message is an instance of one of the message types we expect using runtime type identification’s (RTTI’s) instanceof. Programming Concurrency on the JVM


  2. Type Information Runtime type information (RTTI) allows you to discover and use type information while a program is running. Thinking in Java 4th Edition



1329、单词 monadic 的匹配文本:


  1. Option is a monad because it has both a flatten and flatMap operation that abide by the monadic laws. Scala in Depth


  2. Now that we have our primitive combinators for monads, we can look back at previous chapters and see if there were some other combinators that we implemented for each of our monadic data types. Functional Programming in Scala


  3. In fact, the sequence comprehensions we went over are both examples of a technique popularized by the highly functional language Haskell that is known as monadic transformations, which rely on a concept from category theory known as monads. Functional Programming Patterns in Scala and Clojure



1330、单词 netscape 的匹配文本:


  1. Various versions of Netscape and Internet Explorer ran different versions of Java, some of which were seriously outdated. Core Java Volume I Fundamentals 9th Edition


  2. Both Netscape and Microsoft licensed this technology for use in their respective Web browsers, and the language became a runaway success. Java Network Programming and Distributed Computing


  3. One of the first uses of cookies on the web was pioneered by Netscape way back in the mid ’90s, and ultimately resulted in the login session cookies we just talked about. Redis in Action


  4. Some browsers (e.g., Netscape 6) allow you to accept the public key certificate when you first run the signed program, but usually you must install the public key certificate before. Java Security 2nd Edition


  5. You can find a good example for the use of entities in the user interface descriptions for the Mozilla/Netscape 6 browser. Core Java Volume II Advanced Features 9th Edition


  6. A Netscape engineer who shan’t be named once passed a. SQL Antipatterns


  7. The refusal of Netscape and other key vendors to participate or even acknowledge the process was a crucial problem. Java Network Programming 4th Edition



1331、单词 olap 的匹配文本:


  1. Many applications have a mixture of online transaction processing (OLTP) and online analytical processing (OLAP) queries. High Performance MySQL 3rd Edition


  2. Online analytical processing (OLAP) systems are used to answer analytical queries about the data stored in them. HBase in Action


  3. They can be thought of as being in the same category as other technologies for analysis of data in bulk, such as data mining and online analytical processing (OLAP) Graph Databases


  4. If you want to analyze this data the traditional mechanism for doing so would be to periodically copy that data into a OLAP data warehouse. Hadoop in Practice


  5. On the integration side, JDBC and ODBC drivers are being developed in order to integrate with OLAP and BI tools. Hadoop:The Definitive Guide 3rd Edition


  6. Columnar (or “columnoriented”) databases are well-suited to online analytical processing (OLAP) work, where queries are executed over a broad dataset. Cassandra The Definitive Guide


  7. These conditions are often satisfied by OLAP queries with star joins to large dimensions, a type of query often used with Tenzing. Tenzing - A SQL Implementation On The MapReduce Framework


  8. This intentional denormalization of data is very common in OLAP systems in general, and in large data-processing systems such as Hadoop in particular. Programming Pig


  9. An OLAP or OLTP, i.e., SQL, interface is provided to then mine the data interactively. PowerDrill - Processing a Trillion Cells per Mouse Click


  10. It’s closer to being an OLAP tool, Online Analytic Processing, but as we’ll see, Hive isn’t ideal for satisfying the “online” part of OLAP, at least today, since there can be significant latency between issuing a query and receiving a reply, both due to the overhead of Hadoop and due to the size of the data sets Hadoop was designed to serve. Programming Hive



1332、单词 cyclomatic 的匹配文本:


  1. A report produced by Cobertura contains the percentage of line and branch coverage, as well as the cyclomatic complexity for each package. Gradle in Action


  2. Measures such as JSLint, cyclomatic complexity, lines of code, and fan-in and fan-out are important. Testable JavaScript


  3. Additionally, it calculates cyclomatic complexity for each class and the average cyclomatic complexity for each package. Sonar Code Quality Testing Essentials



1333、单词 iteratively 的匹配文本:


  1. By using oversharding and iteratively replacing full shards (database nodes that host only one partition) with proxy nodes that point to another set of oversharded partitions, we can grow the cluster to very large sizes while incurring a minimum of latency. CouchDB The Definitive Guide


  2. In the spirit of agile development, you’ll iteratively build the functionality in digestible pieces. Gradle in Action


  3. Then, more implementation details are added iteratively as the discussion (and solution implementation) progresses. Professional Hadoop Solutions


  4. You’ll start with a simple schema design and iteratively improve it, and we’ll introduce important concepts along the way. HBase in Action


  5. Since then, we have iteratively built up the collection infrastructure, programming interfaces, and an interactive web-based user interface to help Dapper users solve their problems independently. Dapper a Large-Scale Distributed Systems Tracing Infrastructure


  6. You need to iterate over the development of a MapReduce job, and have a large dataset that you want to work with to iteratively test with. Hadoop in Practice


  7. They can start with a small application that just filters a logfile, but then can iteratively build up more features into the application as needed. Hadoop:The Definitive Guide 3rd Edition


  8. It iteratively moves replicas from DataNodes with higher utilization to DataNodes with lower utilization. The Hadoop Distributed File System


  9. Then it starts the process of moving the regions by calling the unassign() method of the administrative API iteratively. HBase:The Definitive Guide


  10. Similar to the maximum function, you can globally compute these functions by iteratively applying them to smaller chunks of data. Hadoop in Action



1334、单词 spock 的匹配文本:


  1. By the end of this chapter, you’ll write tests with JUnit, TestNG, and Spock and execute them as part of the build lifecycle. Gradle in Action


  2. Now start up two more mongod servers with the replSet option and the same identifier (spock): these will be the other members of the set: MongoDB The Definitive Guide 2nd Edition


  3. This format is also used by many other Java testing tools, such as TestNG, Spock and Easyb. Jenkins The Definitive Guide


  4. The second is a full automation of the testing pipeline, including separating integration tests from unit test and the leveraging of more advanced testing frameworks like Spock and Geb. Building and Testing with Gradle



1335、单词 textbox 的匹配文本:


  1. Handling checkboxes Capturing checkbox submission is similar to that of capturing textbox submissions, which we encountered earlier in Chapter 2, Recording Your First Test. Performance Testing With JMeter 2.9


  2. Locate ROW-READ-STAGE and select Attributes, and change the CorePoolSize by entering in the textbox on the right. Cassandra High Performance Cookbook


  3. Enter a search term in the q textbox and click on Execute Query. Hadoop MapReduce Cookbook


  4. For example, a disabled textbox gets enabled based on the user's rights. Selenium Testing Tools Cookbook


  5. In the Run category, the Arguments textbox allows you to set the command line arguments, as shown in the following screenshot: Java 7 New Features Cookbook


  6. The Target textbox allows you to input the location of the element that you want to work against. Selenium 2 Testing Tools Beginner's Guide



1336、单词 stemmer 的匹配文本:


  1. For example, a stemmer might stem the word catfish to cat or fish. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr


  2. There are some "ICU" Unicode classes for multilingual support, a Chinese stemmer, and a Polish stemmer. Solr 3 Enterprise Search Server


  3. The file that describes the index for English documents uses an English stemmer for text data, and the file that describes the index for German documents uses a German stemmer for text data. Solr 3.1 Cookbook


  4. KStemFilterFactory Stemming on English text; less aggressive than the Porter stemmer. Solr in action


  5. The Porter stemming algorithm (or ‘Porter stemmer’) is a process for removing the commoner morphological and inflexional endings from words in English. Lucene in Action 2nd Edition


  6. Using Hunspell as a stemmer Solr supports numerous stemmers for various languages. Apache Solr 4 Cookbook



1337、单词 editable 的匹配文本:


  1. If the drop-down list box is set to be editable, then you can edit the current selection as if it were a text field. Core Java Volume I Fundamentals 9th Edition


  2. This field is set to non-editable because it’s used only to display data, not to collect it. Thinking in Java 4th Edition


  3. For example, we might create a checksum over the not editable fields (like id) in the controller (or an interceptor), and then review this checksum to see whether any fields have been tampered with. Pro Spring MVC


  4. Managing quality profiles Sonar comes with three predefined profiles—they are not editable but you can use them as a basis for a new custom one. Sonar Code Quality Testing Essentials


  5. The bare-bones sample contact-management app is a master list of contacts with editable details pages corresponding to individual contacts. Spring in Practice


  6. In this case you want to display an editable TextField that contains the data the user has entered so far. Programming in Scala 2nd Edition


  7. The editable configuration is not saved to disk! It is purely for live trialand-error debugging. Solr 3 Enterprise Search Server


  8. Changing the field name is very simple—simply double-click the name, and it will show up as an editable text box once again. Beginning CouchDB


  9. To enable cell editing, the table model must indicate which cells are editable by defining the isCellEditable method. Core Java Volume II Advanced Features 9th Edition


  10. Problem You need to create some settings for your program that needs to be editable either with text or programmatically. Java 7 Recipes A Problem-Solution Approach



1338、单词 passphrase 的匹配文本:


  1. The passphrase for the ssh keyfile is a secret and we don't want to keep it in a file somewhere, so we ask the user for it. Gradle Effective Implementation Guide


  2. If a machine is compromised, a key with no passphrase would allow a user to spring to another server. Cassandra High Performance Cookbook


  3. This requires that both the sender and receiver of the data have a shared passphrase that they have kept secret, though that's often easier than sharing a secret key. Java Security 2nd Edition


  4. Check that you can login to the localhost and all other nodes using SSH without a passphrase by running one of the following commands: Hadoop MapReduce Cookbook


  5. Even though we want password-less logins, keys without passphrases are not considered good practice (it’s OK to have an empty passphrase when running a local pseudodistributed cluster, as described in Appendix A), so we specify a passphrase when prompted for one. Hadoop:The Definitive Guide 3rd Edition


  6. To avoid the hassle of being asked for the passphrase for every single command sent to a remote server, it is recommended that you use ssh-agent, a helper that comes with SSH. HBase:The Definitive Guide


  7. Be certain to avoid entering a passphrase, or you’ll have to manually enter that phrase every time the master node attempts to access another node. Hadoop in Action


  8. We do this by creating a Secure Shell (SSH) key pair that has an empty passphrase. Hadoop Beginners Guide


  9. The private key must not require a passphrase, although it should be protected by filesystem permissions such that only the HDFS super user can access it (usually this is user hdfs) Hadoop Operations


  10. Fill the KeyStore object with keys and certificates; for instance, by loading them from the filesystem using the passphrase they’re encrypted with. Java Network Programming 4th Edition



1339、单词 gregorian 的匹配文本:


  1. This particular description follows the Gregorian calendar, which is the calendar used in most countries of the world. Core Java Volume I Fundamentals 9th Edition


  2. The Gregorian calendar might not be the local preference for expressing dates. Core Java Volume II Advanced Features 9th Edition


  3. It is simply a wrapper around a long number of milliseconds but can represent that instant in time according to the calendar of the current locale (usually a Gregorian calendar) and the time zone of the current locale. Java in a Nutshell 5th Edition


  4. The scheme Cassandra uses is a version one UUID, which means that it is generated based on conflating the computer’s MAC address and the number of 100-nanosecond intervals since the beginning of the Gregorian calendar. Cassandra The Definitive Guide


  5. ZonedDateTime is a point in time in a given time zone (similar to GregorianCalendar) Java SE 8 for the Really Impatient



1340、单词 rowkeys 的匹配文本:


  1. Why can’t you store the user’s name directly? All data in HBase is stored as raw data in the form of a byte array, and that includes the rowkeys. HBase in Action



1341、单词 sasl 的匹配文本:


  1. What’s the difference between the sasl log and the other one? SASL (System Application Support Libraries) is a set of libraries that are part of the Erlang-OTP distribution. RabbitMQ in Action


  2. If SASL is enabled (see below), this file will NOT be used. Sonar Code Quality Testing Essentials


  3. I’m not going to give a deep explanation now, since we’ll see SASL in action a bit later. ZeroMQ


  4. You have seen how users, Hadoop services, and many projects within the Hadoop ecosystem (for example, Oozie and HBase) authenticate via Kerberos via the SASL/GSSAPI, often referred to as Kerberos RPC. Professional Hadoop Solutions


  5. If you need to implement SASL in your application, look at http://docs.oracle.com/javase/7/docs/technotes/guides/security/sasl/sasl-refguide.html. Core Java Volume II Advanced Features 9th Edition


  6. Next we see a message about SASL, which we will ignore, followed by a confirmation that the client successfully established a TCP connection with the local ZooKeeper server. ZooKeeper Distributed Process Coordination



1342、单词 hypertext 的匹配文本:


  1. The key to the World Wide Web was the browser translating the hypertext page to the screen. Core Java Volume I Fundamentals 9th Edition


  2. Hypertext documents contain hyperlinks, which are links to other hypertext documents and files. Java Network Programming and Distributed Computing


  3. To launch the program, you need a download page containing a hypertext link to the .jnlp file. Thinking in Java 4th Edition


  4. Representational State Transfer (REST) in this sense refers to the fact that data access is available via a series of simple web services that are implemented in Hypertext Transfer Protocol (HTTP) and adhere to the principles of REST. Beginning CouchDB


  5. In this paper, we present Google, a prototype of a large-scale search engine which makes heavy use of the structure present in hypertext. The anatomy of a large-scale hypertextual Web search engine


  6. This method is often used for testing hypertext links for validity, accessibility, and recent modification. Java EE 7 Essentials


  7. It locates all hypertext references in a web page and prints them. Core Java Volume II Advanced Features 9th Edition


  8. For example, the Hypertext Transfer Protocol (HTTP) defines how web browsers and. Java Network Programming 4th Edition


  9. Hypertext Transfer Protocol (HTTP) was originally designed to transmit hypertext (HTML) pages over the web. ActiveMQ in Action


  10. The user’s browser then sends a hypertext transport protocol (HTTP) request to one of these clusters, and thereafter, the processing of that query is entirely local to that cluster. Web search for a planet the google cluster architecture



1343、单词 tpc 的匹配文本:


  1. We wanted to show you a more complex read/write benchmark (such as TPC-C) over a broader range of concurrencies, but we found it ultimately impossible to do across such a diversity of server versions. High Performance MySQL 3rd Edition


  2. From the viewpoints of both data compression and query execution times, these results are consistent with the previously presented TPC-H results. RCFile A Fast and Space-efficient Data Placement Structure in MapReduce-based Warehouse Systems


  3. To give a deep understanding of the Tajo architecture and behavior during query processing, the demonstration will allow users to submit TPC-H queries to 32 Tajo cluster nodes. Tajo A Distributed Data Warehouse System on Large Clusters


  4. In many ways, the index server’s memory system behavior resembles the behavior reported for the Transaction Processing Performance Council’s benchmark D (TPC-D).6 Web search for a planet the google cluster architecture


  5. We’ll also evaluate Percolator with microbenchmarks and a synthetic workload based on the well-known TPC-E benchmark [1]; this test will give us a chance to evaluate the scalability and efficiency of Percolator relative to Bigtable and DBMSs. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



1344、单词 jasmine 的匹配文本:


  1. Testing frameworks like Jasmine (http://pivotal.github.io/jasmine/) let you write test code in JavaScript. Gradle in Action


  2. However, two popular, behavior-driven development (BDD) testing frameworks are also available for server-side testing: Vows and Jasmine. Testable JavaScript



1345、单词 successively 的匹配文本:


  1. You can see that the methods provide successively more information—each is effectively a superset of the previous one. Thinking in Java 4th Edition


  2. This query shows that increasing the prefix length results in successively smaller improvements as it approaches seven characters. High Performance MySQL 3rd Edition


  3. It’s possible to successively put a number and a string inside the same variable. Scala in Action


  4. In summary, this chapter introduces ideas that are successively elaborated in the rest of the book. Java 8 in Action Lambdas, Streams and Functional-style Programming


  5. One common example of this is if you want several build jobs to all work successively in the same directory. Jenkins The Definitive Guide


  6. Shrinking: After we have found a failing test case, we can run a separate procedure to minimize the test case, by successively decreasing its "size" until it no longer fails. Functional Programming in Scala


  7. The following code works by determining the magnitude of the number first, then successively stripping off the highest digit, as shown. Java Performance Tuning 2nd Edition


  8. TokenFilters then take over the remainder of the analysis, initially wrapping a Tokenizer and successively wrapping nested TokenFilters. Lucene in Action 2nd Edition


  9. This means that, for each collection you want to back up, you can call mongodump successively to add a given collection to your backup, as shown in the following example: The Definitive Guide to MongoDB


  10. Successively, the largest chunk is split into two (ideally evenly balanced) chunks. PowerDrill - Processing a Trillion Cells per Mouse Click



1346、单词 deliverable 的匹配文本:


  1. Although in many projects it won’t make a difference if you leave the test code in the deliverable (especially if you make all the test methods private, which you can do if you like), in some cases you will want to strip out the test code either to keep the deliverable small or so that it is not exposed to the client. Thinking in Java 4th Edition


  2. Both teams sit together at Tom’s computer to run the compilation for the whole application, build a deliverable, and deploy it to a web server in a test environment. Gradle in Action


  3. An artifact might be a binary executable (a JAR or WAR file for a Java project, for example), or some other related deliverable, such as documentation or source code. Jenkins The Definitive Guide


  4. This package can combine bundles with arbitrary resources into a single deliverable that can be installed and uninstalled. Spring Dynamic Modules in Action


  5. Roo uses Maven’s pom project type as an aggregator; it allows you to add subprojects below but doesn’t actually create a new deliverable artifact. Spring Roo in Action



1347、单词 nonempty 的匹配文本:


  1. Caution Trying to copy a nonempty directory will result in an empty directory. Pro Java 7 NIO.2


  2. For an antijoin, if at least one of the lists is empty, output the records from the nonempty list with an empty Text object. MapReduce Design Patterns


  3. The fact that subtree Y in Figure 4.34 has had an item inserted into it guarantees that it is nonempty. Data Structures and Algorithm Analysis in Java 3rd Edition


  4. The test, therefore, asserts that the query returns a nonempty result containing a distance value of 4 Graph Databases


  5. Putting this all together for this case, our function will take as arguments the value to return in the case of the empty list, and the function to add an element to the result in the case of a nonempty list:12 Functional Programming in Scala


  6. It’s because the seq of an empty collection is nil, which evaluates to false, while the seq of any other collection yields a nonempty sequence. Functional Programming Patterns in Scala and Clojure


  7. A nonempty directory is deleted, along with its contents, only if recursive is true (otherwise, an IOException is thrown) Hadoop:The Definitive Guide 3rd Edition


  8. The clone method on HashTable allocates a new buckets array of the proper size and iterates over the original buckets array, deep-copying each nonempty bucket. Effective Java 2nd Edition


  9. Again, if you have followed the factory design pattern, it is relatively simple to replace the return new Something( ) statement with an access to the collection of spare objects (presumably testing for a nonempty collection as well) Java Performance Tuning 2nd Edition


  10. NOTE: There is no convenient method for removing or copying a nonempty directory. Java SE 8 for the Really Impatient



1348、单词 jdepend 的匹配文本:


  1. The static code analysis tool JDepend (http://clarkware.com/software/JDepend.html) produces metrics that measure the design quality of your code. Gradle in Action


  2. When you get used to the implications of the relatively simple summary of JavaNCSS, consider adding JDepend to your safety net of code metrics. Jenkins Continuous Integration Cookbook


  3. There are tools already available for Java and Groovy projects to analyze and check source code, such as Checkstyle, JDepend, PMD, FindBugs, CodeNarc, and Sonar. Gradle Effective Implementation Guide



1349、单词 vpn 的匹配文本:


  1. To enable the use of a proxy server, check the box for Use a proxy server for your LAN (These settings will not apply to dial-up or VPN connections) as shown in the following screenshot: Performance Testing With JMeter 2.9


  2. Compute generates a certificate and key for the user to access the VPN and starts the VPN automatically. bk-compute-adminguide-grizzly


  3. When you are developing remotely and don’t have a VPN connection, you won’t be able to connect to the database and thus won’t be able to run the tests. Pro Spring MVC


  4. In order for a user to access the instances in their project, a special VPN instance (code named cloudpipe) needs to be created. bk-admin-guide-cloud-latest


  5. In order to access and provision into the private network, we need to set up an IPSEC-based VPN access to the private network. Storm Real-Time Processing Cookbook


  6. With certain environments that have high latency or lower bandwidths, rendering internal frames across the network can be too expensive (for example, remoting using a VPN) Java 7 Recipes A Problem-Solution Approach


  7. In doing this, consider running your logging over a management network, or using an encrypted VPN to avoid interception. OpenStack Operations Guide



1350、单词 abstracting 的匹配文本:


  1. The MapReduce model simplifies parallel processing by abstracting away the complexities involved in working with distributed systems, such as computational parallelization, work distribution, and dealing with unreliable hardware and software. Hadoop in Practice


  2. Cascading simplifies this by abstracting away keys and values and replacing them with tuples that have corresponding field names, similar in concept to tables and column names in a relational database. Hadoop:The Definitive Guide 3rd Edition


  3. This very visually oriented model makes building MapReduce jobs more like construction work, while abstracting the complexity of the actual work involved. HBase:The Definitive Guide


  4. However, it always concerns abstracting a physical resource as a virtual one. Oracle JRockit The Definitive Guide


  5. We are currently working on abstracting the specific object interface to allow key/value. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.


  6. By abstracting away the underlying complexity, ZooKeeper makes it easy to implement consensus, leader election, presence protocols, and other primitives, and frees the developer to focus on the semantics of her application. Hadoop in Action


  7. Instead of just abstracting the database interactions from the developer’s point of view, the way JDBC does, an entirely different mechanism is used. Cassandra The Definitive Guide


  8. Optimizing for extensibility entails removing hard-wired decisions and instead allowing them to vary, for example by encapsulating them as overridable methods, supporting callback hooks, or abstracting functionality via interfaces that can be re-implemented in completely different ways by dynamically loaded components. Concurrent Programming in Java Design Principles and Pattern


  9. Make use of the factory method pattern to instantiate instances of the class while abstracting the creation process from the creator. Java 7 Recipes A Problem-Solution Approach


  10. The main thing to notice in the C++ code sample is that there are no explicit classes for abstracting databases and collections. MongoDB in Action



1351、单词 collection1 的匹配文本:


  1. The collection1 and bin directories contain the necessary configuration files. Web Crawling and Data Mining with Apache Nutch


  2. Click on the link labeled "collection1" to access more tools such as the query form. Solr in action


  3. Your cores may have other names than the default collection1, so please be aware of that. Apache Solr 4 Cookbook



1352、单词 cloudpipe 的匹配文本:


  1. If users need to access the instances in their project across a VPN, a special VPN instance (code named cloudpipe) needs to be created as described in the section titled Cloudpipe — Per Project VPNs. bk-compute-adminguide-grizzly


  2. In order for a user to access the instances in their project, a special VPN instance (code named cloudpipe) needs to be created. bk-admin-guide-cloud-latest



1353、单词 metaprogramming 的匹配文本:


  1. Groovy is a good choice among languages if we’re looking for easy metaprogramming and dynamic typing while preserving Java semantics. Programming Concurrency on the JVM


  2. They’re primarily used to automatically convert from one type to another as needed, but can also be used to limited forms of compiler time metaprogramming. Scala in Depth


  3. If you’re used to metaprogramming in Ruby, Groovy, or other programming languages, implicit conversions are Scala’s way of doing metaprogramming but in a more controlled way. Scala in Action


  4. Those great features include a lot of metaprogramming techniques, new powerful constructs like closures, faster development cycles, and a clearer and more concise and developer-friendly syntax. Pro Spring Security


  5. Scala’s philosophy in cases like this is to include the minimum, orthogonal support in the core language such that a wide variety of metaprogramming tools can be written. Programming in Scala 2nd Edition


  6. Matthew has a long history in the build tool space, and his insights into build metaprogramming were no small help in getting that chapter right. Gradle Beyond The Basics


  7. Clojure Macros Macros are a form of metaprogramming: they are pieces of code that transform other pieces of code. Functional Programming Patterns in Scala and Clojure


  8. Programmer… Dynamically typed languages like Ruby, Python, Groovy, JavaScript, and Smalltalk offer very high productivity due to their flexibility, powerful metaprogramming, and elegance. Programming Scala


  9. Why’s Dwemthy’s Array example demonstrated Ruby’s metaprogramming by creating a subclass of Ruby’s Array class and using method_missing to forward method calls intended for a particular monster to the first monster in the Array. Beginning Scala


  10. Gradle offers the flexibility of Ant, which many teams still cherish, but with the dependency management style of Ivy, the intelligent defaults of Maven, the speed and hashing of Git, and the metaprogramming power of Groovy. Building and Testing with Gradle



1354、单词 adder 的匹配文本:


  1. As a result, you can see that IntegerAdder and IntegerSubtracter can be types of Combiner. Thinking in Java 4th Edition


  2. SmartAdder isn’t a functional interface because it specifies two abstract methods called add (one is inherited from Adder) Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. For instance, the method shown in Listing 18.6 constructs a half-adder. Programming in Scala 2nd Edition


  4. For example, all possible uses of the following StatelessAdder class and its add method are obviously always safe and live: Concurrent Programming in Java Design Principles and Pattern


  5. In this example you create two unit tests for the MathAdder class. Java 7 Recipes A Problem-Solution Approach


  6. If you anticipate high contention, you should simply use a LongAdder instead of an AtomicLong. Java SE 8 for the Really Impatient



1355、单词 upcasting 的匹配文本:


  1. We call this process of treating a derived type as though it were its base type upcasting. Thinking in Java 4th Edition


  2. This is an example of upcasting, which is legal in Java. Java 7 New Features Cookbook



1356、单词 brian 的匹配文本:


  1. However, for more intricate system-level programming, we suggest that you turn to a more advanced reference, such as Java Concurrency in Practice by Brian Goetz et al. Core Java Volume I Fundamentals 9th Edition


  2. For an exceptional treatise on the topic of Java Memory Model and how it affects concurrency, refer to Brian Goetz’s seminal book Java Concurrency in Practice [Goe06] Programming Concurrency on the JVM


  3. But strongly resist the urge to rely on it yourself; see Brian’s Rule of Synchronization, presented earlier. Thinking in Java 4th Edition


  4. In particular, Java Language Architect Brian Goetz clearly stated the purpose of Optional is to support the optional-return idiom only. Java 8 in Action Lambdas, Streams and Functional-style Programming


  5. A sincere thanks to the many people who read the early drafts of these chapters, and provided comments, edits, insights, and ideas — specifically Mike Daconta, Ralph Perko, Praveena Raavichara, Frank Tyler, and Brian Uri. Professional Hadoop Solutions


  6. I owe a great deal to Brian Femiano, Bruce Miller, and Jonathan Larson for allowing me to be exposed to many great ideas, points of view, and zealous inspiration. Hadoop RealWorld Solutions Cookbook


  7. In their book The C Programming Language, Brian Kernighan and Dennis Ritchie said that they felt that the C language "wears well as one's experience with it grows." If you like C, we think you will like the Java programming language. The Java Language Specification Java SE 7 Edition


  8. I'm very grateful to Brian Goetz for clarifying several points in this section. Java Performance Tuning 2nd Edition


  9. The following snippet adds the author Griffin, Brian into the authors array because it isn’t there yet: The Definitive Guide to MongoDB


  10. The members of Ralph Johnson's patterns seminar (especially Brian Foote and Ian Chai) read through early forms of some patterns and suggested many improvements. Concurrent Programming in Java Design Principles and Pattern



1357、单词 jstl 的匹配文本:


  1. Runtime dependencies like the JSTL library aren’t needed for the compilation process, but are needed at runtime. Gradle in Action


  2. For web applications you need servlet.jar and jstl.jar if you want to use Spring’s JSTL support. Pro Spring 3


  3. We will also submit the index (which we retrieve from the JSTL supplied by a varStatus object) through a hidden field. Pro Spring MVC


  4. This approach relies on standard JSTL conditional page rendering and data binding, and is slightly more complicated than Spring Security tag libraries; however, it is more in line with the standard web application MVC logical design. Spring Security 3.1


  5. The important part is that you are using the standard jstl tag library to iterate through the list of movies  you are expecting to get back from your controller in the model. Pro Spring Security


  6. All products are required to provide JSTL for use by all JSP pages. Java EE 7 Specification


  7. We’ll add JSP support to our basic container configuration by providing a JSP compiler, because JSPs are compiled to Java classes, and use the JSP Standard Tag Library (JSTL) for our tag library. Spring Dynamic Modules in Action


  8. This security configuration can be extended and customized by adding more JSTL scriptlets and conditions using the Expression Language (EL) Spring Roo in Action


  9. It uses the JavaServer Pages Standard Tag Library (JSTL) to iterate over the collection of Employee instances and display the name of each employee as well as the name of the department to which that employee is assigned. Pro JPA2


  10. Therefore, the spittles.jsp file can use JavaServer Pages Standard Tag Library’s (JSTL)

    tag to render the list of spittles: Spring in Action 4th Edition



1358、单词 pipelined 的匹配文本:


  1. Figure 17.2 shows how pipelined requests are handled in the correct order which means the response for the first request will be returned and then the response for the second and so on... Netty in Action MEAP V08


  2. Then, reduce tasks will run on the shuffled data and generate final (or intermediate, if multiple consecutive MapReduce jobs are pipelined) results. Hadoop Operations and Cluster Management Cookbook


  3. Our implementation of Paxos is pipelined, so as to improve Spanner’s throughput in the presence of WAN latencies; but writes are applied by Paxos in order (a fact on which we will depend in Section 4) Spanner - Google’s Globally-Distributed Database


  4. When a file is closed, the remaining data in the temporary local file is pipelined to the DataNodes. Professional Hadoop Solutions


  5. If you need to do a noncombining reducer with one of these frameworks, you’ll need to separate the processing into pipelined map-reduce steps. NoSQL Distilled


  6. Let’s look at the basic concepts in Crunch, including its type system and pipelined architecture. Hadoop in Practice


  7. Unfortunately, calling this method involves a pipelined write to N servers (where N is the replication factor set for the write-ahead log files) HBase:The Definitive Guide


  8. Also, a prefetch retrieves an entire cache line, which takes time, so unless the prefetch operation can be pipelined, or hidden in parallel with other actions before its data is to be used, it has no or even negative effects. Oracle JRockit The Definitive Guide


  9. The processor consists of a series of pipelined operations, including stream processing and protocol parsing. Java Performance


  10. Exploitation of such opportunities (via pipelined superscalar CPUs, multilevel caches, load/store balancing, interprocedural register allocation, and so on) is responsible for a significant amount of the massive improvements in execution speed seen in computing over the past decade. Concurrent Programming in Java Design Principles and Pattern



1359、单词 whitespaces 的匹配文本:


  1. Coding standards define agreed-on source code conventions within a team or organization, and can range from simple code formatting aspects, such as the use of whitespaces and indentation, to programming best practices. Gradle in Action


  2. The output of the multiLine variable has leading whitespaces, and maybe you don’t want that. Scala in Action


  3. We tell Solr to split the data on whitespaces, split on case change, make text parts lowercased, and finally to stem text with the appropriate algorithm—in this case, it is one of the English stemming algorithms available in Solr and Lucene. Solr 3.1 Cookbook


  4. We see q that WordCount uses Java’s StringTokenizer in its default setting, which tokenizes based only on whitespaces. Hadoop in Action


  5. Whitespaces within the text of a JSP page, even though not significant, are preserved. Java Performance


  6. Of course you could index the whole page, splitting it by whitespaces, but then you would probably hear the clients complain about the HTML tags being searchable and so on. Apache Solr 4 Cookbook



1360、单词 map2 的匹配文本:


  1. For example, you can implement map2 using foldLeft and reverse the result: Scala in Action


  2. Write abothMatch generic function , that combines two  values using a binary function.map2 Option If either  value is , then the return value is too. Functional Programming in Scala


  3. In this setup, you should think of Map2 and Reduce as the core of the MapReduce job, with the standard partitioning and shuffling applied between the mapper and reducer. Hadoop in Action



1361、单词 windowing 的匹配文本:


  1. Eclipse is written in Java, but since it uses a nonstandard windowing library, it is not quite as portable as Java itself. Core Java Volume I Fundamentals 9th Edition


  2. This type of system is widely used in object-oriented programming, and in the context of Java, the Abstract Windowing Toolkit. Java Network Programming and Distributed Computing


  3. Instead, the Java l.o Abstract Windowing Toolkit (AWT) produced a GUI that looked equally mediocre on all systems. Thinking in Java 4th Edition


  4. It requires a windowing system such as X11 to run on the system you start JConsole from, not on the server it will connect to. Cassandra High Performance Cookbook


  5. It didn’t really work out that way, except in some rare cases, like the windowing APIs of various platforms. Programming Scala


  6. Which is better? MDI reduces window clutter, but having separate top-level windows means that you can use the buttons and hotkeys of the host windowing system to flip through your windows. Core Java Volume II Advanced Features 9th Edition


  7. A class that allocates system resources other than memory (such as file descriptors or windowing system graphic contexts) should override the finalize( ) method to release these resources when the object is no longer referred to and is about to be garbage-collected. Java in a Nutshell 5th Edition


  8. On top of this we feel a library of helpful stream utilities, such as different windowing functions or join techniques will be beneficial to this kind of applications. Kafka a Distributed Messaging System for Log Processing


  9. For example, if you can create the startup window as quickly as possible and then run any initializations in the background without blocking windowing activity, the user sees this as a faster startup than if you waited for initializations to finish before creating the initial window. Java Performance Tuning 2nd Edition


  10. Long before the Swing API, the Abstract Window Toolkit (AWT) alone provided an abstraction layer over the native platform to enable standard windowing functionality. Java 7 Recipes A Problem-Solution Approach



1362、单词 jlabel 的匹配文本:


  1. The constructor for a JLabel lets you specify the initial text or icon and, optionally, the alignment of the content. Core Java Volume I Fundamentals 9th Edition


  2. We can make things a little more interesting by adding a JLabel to the JFrame: Thinking in Java 4th Edition


  3. If the rendered image just contains text, an icon, and possibly a change of color, you can get by with configuring a JLabel. Core Java Volume II Advanced Features 9th Edition


  4. In the inheritance hierarchy, all Swing components such as the JLabel, JTextField and JPanel classes extend from the JComponent class. Java 7 Recipes A Problem-Solution Approach



1363、单词 london 的匹配文本:


  1. There are too many to name, but all of you in Dublin, Portland, Lisbon, London, Zurich, San Francisco, Mountain View, Dortmund, Stockholm, Hamburg, Frankfurt, Salt Lake City, Blacksburg, San Diego, and Amsterdam: you know who you are—thanks! To my family, friends, and coworkers: thanks you for your support and your patience with me over the last year. CouchDB The Definitive Guide


  2. Alex Blewitt is a technical architect, working at an investment bank in London. Jenkins Continuous Integration Cookbook


  3. Indeed, Tony Hoare, one of the giants of computer science, said in a presentation at QCon London 2009: Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. Or you could specify that a particular build job is only to be run on a UAT environment in Sydney or London: Jenkins The Definitive Guide


  5. In the early 2000s, a young entrepreneur out of the London financial sector cofounded a company for caching Java objects: Metalogic. RabbitMQ in Action


  6. Martin and Cindy are a couple considering this room, but they are discussing this on the phone because Martin is in London and Cindy is in Boston. NoSQL Distilled


  7. Currently living and working in London, Carlo focuses mostly on Java and Ruby software development. Pro Spring Security


  8. The diversity of the drawings in the Collection of the Dresses of Different Nations speaks vividly of the richness of the costumes presented on the London stage over 200 years ago. Spring Batch in Action


  9. London, which is in southeastern England, which, in turn, is in Great Britain. Graph Databases


  10. This configuration will update any clients that are using the failover transport protocol with the locations of any brokers joining that have newyork or london in their broker names. ActiveMQ in Action



1364、单词 destructor 的匹配文本:


  1. The most common activity in a destructor is reclaiming the memory set aside for objects. Core Java Volume I Fundamentals 9th Edition


  2. Java has no destructor or similar concept, so you must create an ordinary method to perform this cleanup. Thinking in Java 4th Edition


  3. Example 4-7 defines the worker class: a structure and a set of functions that act as constructor, destructor, and methods on worker objects. ZeroMQ


  4. It includes two methods that effectively act as the constructor and destructor for the class: Hadoop in Action


  5. As we will see, they do not behave quite like C++ destructor methods either. Java in a Nutshell 5th Edition



1365、单词 xtradb 的匹配文本:


  1. They have also contributed directly to that improvement via XtraDB and XtraBackup. High Performance MySQL 3rd Edition



1366、单词 nix 的匹配文本:


  1. Solr being a web-based application can run on many operating systems such as *nix and Windows. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr


  2. For *nix systems, this is the shell script gradlew; for Windows operating systems, it’s gradlew.bat. Gradle in Action


  3. For a typical *NIX system, it will be similar to this: Jenkins Continuous Integration Cookbook


  4. For it to be really useful to sysadmins, it has to provide command-line tools that allow access to its features from a machine that lacks a window system, like most *nix servers. RabbitMQ in Action


  5. You can nix the setter method and declare a constructor instead: Spring in Practice


  6. For *nix and Mac users, building it from source is your best option. The Little Redis Book


  7. The following example shows how to find all loaded classes containing the string LoadAnd on a *NIX system: Oracle JRockit The Definitive Guide


  8. If you do not have it installed, you can install it (on *NIX systems) by running: Scaling MongoDB


  9. For the purposes of this chapter, we’ll stick to the *NIX version, where Redis is most at home. Spring Data Modern Data Access for Enterprise Java


  10. Linux and MacOS Installation To install Gradle on *nix operating systems like Linux and MacOS, follow this command-line script: Building and Testing with Gradle



1367、单词 nullable 的匹配文本:


  1. This is similar to accessing nullable values within other languages. Scala in Depth


  2. A lot of tables include nullable columns even when the application does not need to store NULL (the absence of a value), merely because it’s the default. High Performance MySQL 3rd Edition


  3. A common use for unions is to specify nullable values. Professional Hadoop Solutions


  4. Sparse tables with nullable columns require special checking in code, despite the presence of a schema. Graph Databases


  5. Note that each field must be nullable in the child classes, so that the SQL statement can insert the row without those columns. Spring Roo in Action


  6. In this unit test example, we are creating an Optional instance using the fromNullable static method. Getting Started with Google Guava


  7. Consider the following case, where a nullable column may behave in a more intuitive way by serendipity. SQL Antipatterns


  8. The ofNullable method is intended as a bridge from the use of null values to optional values. Java SE 8 for the Really Impatient


  9. Primary keys are assumed to be insertable, but not nullable or updatable. Pro JPA2



1368、单词 multiplier 的匹配文本:


  1. Where RETRY_BACKOFF is a retry back off multiplier table, which has the following definition: HBase Administration Cookbook


  2. The Multiplier class (which only works with positive integers) has a multiply( ) method which calls the private add( ) method numerous times to perform multiplication. Thinking in Java 4th Edition


  3. To keep things simple, we’ll say that the score of an item is a function of the time that the article was posted, plus a constant multiplier times the number of votes that the article has received. Redis in Action


  4. Score boosting You can easily modify the degree to which a clause in the query string contributes to the ultimate relevancy score by adding a multiplier. Solr 3 Enterprise Search Server


  5. We defined a variable, factor, to use as the multiplication factor, and we pulled out the previous anonymous function into a value called multiplier that now uses factor. Programming Scala


  6. Both CPU usage attributes have a pre-multiplier setting of 100 Oracle JRockit The Definitive Guide


  7. These are the private fields set by the constructor private String abbrev; private double multiplier; Java in a Nutshell 5th Edition


  8. The weight of a pool simply acts as a multiplier; a weight of 2 means the pool receives two slots to every one slot the other pools receive. Hadoop Operations


  9. You can configure the amount of time the ActiveMQ broker should wait before trying to resend the message, whether that time should increase after every failed attempt (use an exponential back-off and back-off multiplier), and the maximum number of redelivery attempts before the message(s) are moved to a dead-letter queue. ActiveMQ in Action


  10. The 1.5 multiplier is a fudge factor to prevent underutilization of the cluster. Programming Hive



1369、单词 rdf 的匹配文本:


  1. Outer XML tags (called root elements), namespaces, and referenced schemas are some of the clues that Tika uses to determine an XML file’s real type (RDF, RSS, and so on) Tika in Action


  2. The employee network is stored in HDFS as a line-separated list of RDF triples. Hadoop RealWorld Solutions Cookbook


  3. You can use the Open Directory project RDF dump (http://rdf.dmoz. Hadoop MapReduce Cookbook


  4. There are three dominant graph data models: the property graph, Resource Description Framework (RDF) triples, and hypergraphs. Graph Databases


  5. It allows you to execute SPARQL Protocol and RDF Query Language (SPARQL) queries for interacting with Resource Description Framework (RDF) and acts as a partial Web Ontology Language (OWL) store. Cassandra The Definitive Guide


  6. For instance, it omits various XML applications such as RDF (.rdf), XSL (.xsl), and so on that should have the MIME type application/xml. Java Network Programming 4th Edition


  7. But more often these days documents are binary in nature (PDF, Microsoft Office, Open Office, Adobe Flash, streaming video and audio multimedia files, etc.) or contain substantial markups which you must remove before indexing (RDF, XML, HTML) Lucene in Action 2nd Edition



1370、单词 reordering 的匹配文本:


  1. Compilers are required to respect locks by flushing local caches as necessary and not inappropriately reordering instructions. Core Java Volume I Fundamentals 9th Edition


  2. This may be fixed by reordering the classpath or by explicitly setting the XML parser by setting a Java property. Pro Hadoop


  3. In effect, reads and writes go directly to memory, and are not cached, volatile also restricts compiler reordering of accesses during optimization. Thinking in Java 4th Edition


  4. Several mechanisms can produce this reordering: the just-in-time compiler and the processor may rearrange code. JSR-133 Java Memory Model and Thread


  5. Join reordering – The larger tables are streamed and not materialized in memory in the reducer while the smaller tables are kept in memory. Hive A Petabyte Scale Data Warehouse Using Hadoop


  6. Reordering the fields, methods, or constructors in an existing type declaration. The Java Language Specification Java SE 7 Edition


  7. All of the stores are always sorted by key, so no reordering is required to fit new keys in between existing ones. HBase:The Definitive Guide


  8. The representation tries to capture the minimal set of constraints on the execution of each operation, which allows for aggressive reordering of operations and global value numbering, which reduces redundant computations. Java Performance


  9. Reordering Rows The next step is to “help” Zippy in compressing the elements (chunk-ids) representing the data columns. PowerDrill - Processing a Trillion Cells per Mouse Click


  10. Even though JLS addresses some particular legal and illegal reorderings that can occur, interactions with these other issues reduce practical guarantees to saying that the results may reflect just about any possible interleaving of just about any possible reordering. Concurrent Programming in Java Design Principles and Pattern



1371、单词 rethrow 的匹配文本:


  1. Sometimes, you just want to log an exception and rethrow it without any change: Core Java Volume I Fundamentals 9th Edition


  2. Sometimes you’ll want to rethrow the exception that you just caught, particularly when you use Exception to catch any exception. Thinking in Java 4th Edition


  3. Any execution failure (e.g., authenticati errors from client) bubbles up as exception, which is caught and rethrow as specific Gradle exception. Gradle in Action


  4. The big question is, should you rethrow the exception, or swallow it? Hadoop in Practice


  5. We simply rethrow the exception10 and let the caller create a new ZooKeeper instance, so that the whole write() method can be retried. Hadoop:The Definitive Guide 3rd Edition


  6. Rethrowing exceptions in Java 7 When an exception is caught in a catch block, it is sometimes desirable to rethrow the exception. Java 7 New Features Cookbook


  7. You can catch ThreadDeath errors to do any necessary cleanup for a thread, but if you do, you must rethrow the error so that the thread actually terminates. Java in a Nutshell 5th Edition


  8. You need to rethrow the same exception type as you caught. Java 7 Recipes A Problem-Solution Approach


  9. However, the doInOrderAsync returns right away and does the work in a separate thread, so it is not possible to have the method rethrow the exception. Java SE 8 for the Really Impatient


  10. We factor out the flushing from the rest of the processing code because every method must flush and catch the exception and then rethrow a domain-specific application exception. Pro JPA2



1372、单词 vip 的匹配文本:


  1. We will set up a Virtual IP (VIP) address using Heartbeat and Pacemaker, and then associate it with the active master node. HBase Administration Cookbook


  2. The NVP LBaaS and FWaaS plugins require the routed-insertion extension, which adds the router_id attribute to the VIP (Virtual IP address) and firewall resources and binds these services to a logical router. bk-admin-guide-cloud-latest


  3. Users with the role ROLE_VIP can see the movie budget. Pro Spring Security


  4. This recipe will take a list of Nigerian VIPs and join any Nigerian ACLED events that occurred on any VIP's birthday. Hadoop RealWorld Solutions Cookbook


  5. Configure the VIP First of all, we need to select and assign a virtual IP address (VIP) that can freely float between cluster nodes. high-availability-guide


  6. The logical name can be anything you want, and is analogous to a virtual IP (VIP) Hadoop Operations



1373、单词 mariadb 的匹配文本:


  1. Two of the three (Percona Server and MariaDB) are drop-in replacements, so the effort involved in trying them out is not large. High Performance MySQL 3rd Edition


  2. In fact, for some systems, such as MariaDB or Percona, this may be your only option.) For example, to check the status of the cluster, open the MySQL client and check the status of the various parameters: high-availability-guide



1374、单词 wordcount 的匹配文本:


  1. Test the queue configuration by submitting an example wordcount job to the queue hdqueue using the following command: Hadoop Operations and Cluster Management Cookbook


  2. The wordcount field counts instances of rows that have the same values along the dimensions provided. Storm Blueprints Patterns for Distributed Real-time Computation


  3. We construct the head of our pipe assembly and name it “wordcount.” This name is used to bind the source and sink Taps to the assembly. Hadoop:The Definitive Guide 3rd Edition


  4. Without specifying any arguments, executing wordcount will show its usage information: Hadoop in Action


  5. You will see it has a single entry called wordcount, which is a directory. Hadoop Beginners Guide


  6. The wordcount application is written using the Hadoop MapReduce API. Spring Data Modern Data Access for Enterprise Java



1375、单词 interleaved 的匹配文本:


  1. In addition to allowing interleaved reads and writes, the concurrent collections provide better throughput than the synchronized versions. Programming Concurrency on the JVM


  2. If more than one consolidation function is used (for example, MIN, MAX, and AVERAGE values are retained for a single data source), these values are not interleaved. Monitoring with Ganglia


  3. The DataNode storage will be spread over multiple disks or arrays to allow interleaved I/O, and the TaskTracker intermediate output will also go to a separate disk or array. Pro Hadoop


  4. The figure also illustrates the interleaved layout for the example database: for. Spanner - Google’s Globally-Distributed Database


  5. One of the biggest practical advantages of using languages with pattern matching is that you can avoid using big chains of switch or if-then-else statements interleaved with field-selection operations. Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. Should we reach the length of lat before lon, or vice versa, print 0 for an interleaved spot in the iteration. Hadoop RealWorld Solutions Cookbook


  7. A "preferred local" policy can also be selected, that is JRockit should try to use the local node, but interleaved allocation is also fine. Oracle JRockit The Definitive Guide


  8. This ensures that multiple invocations won’t be interleaved, and that each invocation will see the effects of all previous invocations. Effective Java 2nd Edition


  9. The problem is that even though these 10 tasks are attempting to perform sequential reads, because all I/O requests are issued to the same underlying device, the end result of interleaved reads will look like random reads, drastically reducing throughput. Hadoop Operations


  10. For example, an interleaved add operation would not interfere with the required semantics of a typical traversal, yet would cause an exception to be thrown here. Concurrent Programming in Java Design Principles and Pattern



1376、单词 gpars 的匹配文本:


  1. We could use Akka actors from Groovy; instead, we’ll use GPars, which is a concurrency library with close ties to Groovy. Programming Concurrency on the JVM



1377、单词 paul 的匹配文本:


  1. Speaking of MySQL AB, thanks to all the other great folks there who have encouraged me in writing this: Kerry, Larry, Joe, Marten, Brian, Paul, Jeremy, Mark, Harrison, Matt, and the rest of the team there. High Performance MySQL 3rd Edition


  2. Accountants Don’t Use Erasers Say you want to give $100 to your cousin Paul for the New York cheesecake he sent to you. CouchDB The Definitive Guide


  3. Paul Sandoz in the email he sent to the lambda-dev mailing list: http://mail.openjdk.java.net/pipermail/lambda-dev/2013-November/011516.html. Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. Beyond CouchDB, Paul contributes to a number of other open source projects. Beginning CouchDB


  5. These bundles are currently being managed by Paul Phillips on the GitHub website. Programming Scala


  6. Also thanks are due to Andrew Ryan, Matthew Welty and Paul Tuckfield for doing a lot of work on operations, monitoring and the statistics setup that makes these tasks easy. Apache Hadoop Goes Realtime at Facebook


  7. Paul is a former contributing editor for MacTutor Magazine, served as a technical reviewer for Paradigms of. Beginning Scala


  8. In particular, Paul O’Rorke was the technical reviewer that went beyond his call of duty and made some wonderful suggestions on how to make the manuscript better. Hadoop in Action


  9. Special thanks also go to Brian Aker, Martin “MC” Brown, and Paul Kinzelman for their reviews and suggestions. Understanding MySQL Internals


  10. Patrick Lightbody and Paul Hammant thought that there must be a better way to drive their tests and in a way that they could use their favorite development language. Selenium 2 Testing Tools Beginner's Guide



1378、单词 inferencer 的匹配文本:


  1. First, we changed the result variable to a val and let the type inferencer determine the type. Scala in Depth


  2. This is due to a limitation in Scala’s type inferencer, which fails to infer the correct type of the list automatically. Programming in Scala 2nd Edition


  3. If a block of code returns a value of type Any unexpectedly, chances are good that the type inferencer couldn’t figure out what type to return, so it chose the most generic type possible. Programming Scala


  4. For the most part, the type inferencer will calculate the type parameters so you don’t have to explicitly pass them. Beginning Scala



1379、单词 whois 的匹配文本:


  1. The WHOIS protocol allows users to look up information about a domain name (such as awl.com, or microsoft.com) Java Network Programming and Distributed Computing


  2. It shows you how to write network clients that interact with TCP servers of all kinds including whois, dict, and HTTP. Java Network Programming 4th Edition



1380、单词 untyped 的匹配文本:


  1. The subsequent call to actorOf() turns the regular object that extends from UntypedActor into an Akka actor. Programming Concurrency on the JVM


  2. Another downside to sending actors directly in the Scala standard library is that actors are untyped. Scala in Depth


  3. The Java Virtual Machine has a large complement of instructions that manipulate the contents of the operand stack as untyped values. The Java Virtual Machine Specification Java SE 7 Edition


  4. In practice, many applications end up using a mix of typed and untyped validations. CouchDB The Definitive Guide


  5. The following listing shows how to declare multiple, untyped parameters for a closure. Gradle in Action


  6. The class is called UntypedActor because Akka includes the concept of a TypedActor. Scala in Action


  7. In addition, the values flowing through a Cascading pipeline are special untyped “tuple” values, and Cascading operations focus on transforms over tuples; in contrast, a FlumeJava pipeline computes over arbitrary Java objects using arbitrary Java computations. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  8. Here's a very simple query executor, which uses  as theMap[String,Any] (untyped) row representation: Functional Programming in Scala


  9. You can see your fields, and the default Pig types for untyped fields, bytearray. Hadoop in Practice


  10. As TypedQuery extends Query, a strongly typed query can always be treated as an untyped version, though not vice versa. Pro JPA2



1381、单词 subelements 的匹配文本:


  1. To get the element’s children (which may be subelements, text, comments, or other nodes), use the getChildNodes method. Core Java Volume II Advanced Features 9th Edition


  2. If one wants to print subelements of a particular element, one can use the following idiom: Steps in Scala An Introduction to Object-Functional Programming


  3. These annotations mark the root element of the schema file and all other subelements. Java 7 Recipes A Problem-Solution Approach


  4. The subelements of entity-mappings can be categorized into four main scoping and functional groups: persistence unit defaults, mapping files defaults, queries and generators, and managed classes and mappings. Pro JPA2



1382、单词 cogroup 的匹配文本:


  1. The COGROUP method in Pig does a great job of bringing data together while preserving the original structure. MapReduce Design Patterns


  2. Problem How do you group tuples together in Pig and apply aggregate functions on them? Solution Use the GROUP and COGROUP operators, and learn how they relate to JOIN and FLATTEN. Hadoop in Practice


  3. The COGROUP statement is similar to JOIN, but instead creates a nested set of output tuples. Hadoop:The Definitive Guide 3rd Edition


  4. Afterward we’ll go into more details on the more complex operators such as COGROUP and FOREACH. Hadoop in Action


  5. Another way to think of cogroup is as the first half of a join. Programming Pig



1383、单词 unbuffered 的匹配文本:


  1. In this chapter, you will see at work methods for buffered and unbuffered streams, leaving coverage of the methods for channels for the next chapters, in which you will see the real power of NIO. Pro Java 7 NIO.2


  2. The remaining FilterlnputStream classes modify the way an InputStream behaves internally: whether it’s buffered or unbuffered, whether it keeps track of the lines it’s reading (allowing you to ask for line numbers or set the line number), and whether you can push back a single character. Thinking in Java 4th Edition


  3. You can also specify this when connecting, which will make every statement unbuffered: High Performance MySQL 3rd Edition


  4. The first argument is the underlying stream from which unbuffered data will be read or to which buffered data will be written. Java Network Programming 4th Edition


  5. One application I know of had a severe disk I/O problem caused by using unbuffered streams (all disk I/O was done byte by byte, which led to awful performance) Java Performance Tuning 2nd Edition



1384、单词 durations 的匹配文本:


  1. Cloud service vendors provide the ability to spin up clusters of almost arbitrary size and capacities for short to long durations. Pro Hadoop


  2. In addition to these explicit locks, queries acquire implicit locks on tables for their durations. High Performance MySQL 3rd Edition


  3. For the purpose of this analysis, we consider two distributions of the task durations: Mesos A Platform for Fine-Grained Resource Sharing in the Data Center


  4. Finally, these numbers are typically reported for different time durations by the ad networks. Hadoop:The Definitive Guide 3rd Edition


  5. The design should include reference to scalability both for users and for data/object volumes, the amount of distribution possible for the application depending on the required level of messaging between distributed components, and the transaction mechanisms and modes (pessimistic, optimistic, required locks, durations of transactions and locks held) Java Performance Tuning 2nd Edition


  6. Applications that can benefit from the Parallel GC are those that require high throughput and have pause time requirements that can be met by the worst-case stop-the-world induced full garbage collection durations along with being run on machines with more than one processor. Java Performance


  7. When all threads perform approximately the same actions for approximately the same durations, creating only as many tasks as CPUs, or perhaps a small multiple of the number of CPUs, can work well. Concurrent Programming in Java Design Principles and Pattern


  8. By obtaining the marked durations (in milliseconds) from the previous recipe you will create media marker events at points into the video. Java 7 Recipes A Problem-Solution Approach


  9. Durations require more than a long value for their internal storage. Java SE 8 for the Really Impatient


  10. In practice, stateful session beans do not add a significant amount of overhead to an operation, even when used for short durations. Pro JPA2



1385、单词 infrastructures 的匹配文本:


  1. It’s a key component of today’s Web—a powerful, dynamic language with a rich ecosystem of professional-grade development tools, infrastructures, frameworks, and toolkits. Programming Concurrency on the JVM


  2. Conclusion Even in this world of disposable and fully automated infrastructures, node- and clusterlevel metrics matter a great deal. Monitoring with Ganglia


  3. Since Internet packets are being transmitted across a public network, composed of a diverse range of network infrastructures, it is likely that packets will become lost at some point in a connection. Java Network Programming and Distributed Computing


  4. Not only is it highly configurable, it also strives to be as compatible as possible with existing dependency management infrastructures (like Maven and Ivy) Gradle in Action


  5. Introduction In this chapter, we will discuss the security of Jenkins, taking into account that it can live in a rich variety of infrastructures. Jenkins Continuous Integration Cookbook


  6. Another class of related technologies comes from the world of cloud infrastructures such as EC2, Azure, Eucalyptus and VMWare offerings. Apache Hadoop YARN Yet Another Resource Negotiator


  7. Hadoop and Hive at Facebook Hadoop can be used to form core backend batch and near real-time computing infrastructures. Hadoop:The Definitive Guide 3rd Edition


  8. Since it is not trivial to program against each of the APIs providing dynamic cluster infrastructures, it would be useful to abstract the provisioning part and, once the cluster is operational, simply launch the MapReduce jobs the same way you would on a local, static cluster. HBase:The Definitive Guide


  9. At the same time, other trends have changed how software and systems are deployed, using cloud resources alongside or even in preference to more traditional infrastructures. Hadoop Beginners Guide


  10. I occasionally use proprietary communications for testing purposes and for comparison against other communications infrastructures, as I have done in this chapter. Java Performance Tuning 2nd Edition



1386、单词 dept 的匹配文本:


  1. ManyToOne is mapped to the DEPT_ID foreign key column and can be customized. Java EE 7 Essentials


  2. Consider the table Employee with fields emp id, ldap user, name, dept id, and salary. Tenzing - A SQL Implementation On The MapReduce Framework


  3. The EMPLOYEE table has a foreign key column named DEPT_ID that references the DEPARTMENT table. Pro JPA2



1387、单词 james 的匹配文本:


  1. Naughton and James Gosling (a Sun Fellow and all-around computer wizard), wanted to design a small computer language that could be used for consumer devices like cable TV switchboxes. Core Java Volume I Fundamentals 9th Edition


  2. Thanks, as well, to James Phillips and Bob Wiederhold at Couchbase for supporting me while I developed this book. Getting Started with CouchDB


  3. The virtual machine that evolved into the Java Virtual Machine was originally designed by James Gosling in 1992 to support the Oak programming language. The Java Virtual Machine Specification Java SE 7 Edition


  4. Thanks to the readers that have helped me clarify concepts by submitting comments, including James Watson, Howard Lovatt, Michael Barker, and others, in particular those who helped with generics. Thinking in Java 4th Edition


  5. The first person I showed the draft to was David James, the organizer of the Washington DC–area Groovy user group. Gradle in Action


  6. I would like to thank my parents James and Patricia Owens, for their support and introducing me to technology at a young age. Hadoop RealWorld Solutions Cookbook


  7. Finally, I must offer my thanks to James for all his patience and support and for putting up with my continual state of distraction during phases of this process. Java Security 2nd Edition


  8. Finally, I'd like to thank my coauthors, James Gosling, Bill Joy, and Guy Steele for inviting me to participate in this work. The Java Language Specification Java SE 7 Edition


  9. James Gosling, fellow and vice president, Sun Microsystems, Inc., and inventor of the Java programming language. Effective Java 2nd Edition


  10. Next, Example 7-8 shows the same configuration, but now user james is limited to only three concurrent jobs, no matter what pool he uses. Hadoop Operations



1388、单词 col 的匹配文本:


  1. A HBase Bloom Filter is a space-efficient mechanism to test whether a StoreFile contains a specific row or row-col cell. HBase Administration Cookbook


  2. The Matrix class takes an array of double values and provides two similar methods: row and col. Scala in Depth


  3. If MySQL knows col can never be NULL, it can also optimize a COUNT(col) expression by converting it to COUNT(*) internally. High Performance MySQL 3rd Edition


  4. However, you can create collections with "_id" indexes by setting the autoIndexId option to false when calling createCol lection. MongoDB The Definitive Guide 2nd Edition


  5. All of the needed parameters except for the colVal are specified by the users at the start of the program. Cassandra High Performance Cookbook


  6. The map() function splits each incoming line's value and extracts the string located at col_ pos. Hadoop RealWorld Solutions Cookbook


  7. Recall that a FileCol lection is a lazy specification of files that when queried (i.e., when the actual files are asked for), turns that specification into a concrete list of files. Gradle Beyond The Basics


  8. The usual way of writing output from map and reduce tasks is by using the OutputCol lector to collect key-value pairs. Hadoop:The Definitive Guide 3rd Edition


  9. NEXT_COL Skip the remainder of the current column, proceeding to the next. HBase:The Definitive Guide


  10. Wait, zero?? There is a bug when trying to use count(DISTINCT col) when col is a partition column. Programming Hive



1389、单词 dba 的匹配文本:


  1. Why? Because there’s so much data in your clusters now that altering the schema will take a long time and involve a lot of precious DBA time. MongoDB The Definitive Guide 2nd Edition


  2. Other similar commands let you generate an SQL script (if you need to submit it to your local DBA for approval, for example), or rollback to a previous version of the schema. Jenkins The Definitive Guide


  3. You could implement the implies( ) method such that if the name is "DBA," it implies every other DBPrincipal: Java Security 2nd Edition


  4. First, you need to make sure that you don’t run with too many map tasks, because bombarding your database with thousands of concurrent reads will probably bring the DBA knocking on your door. Hadoop in Practice


  5. The scaling of an RDBMS usually involves breaking Codd’s rules, loosening ACID restrictions, forgetting conventional DBA wisdom, and on the way losing most of the desirable properties that made relational databases so convenient in the first place. Hadoop:The Definitive Guide 3rd Edition


  6. This use case is supported by allowing the schema generation to occur into DDL scripts, which can then be further tuned by a DBA. Java EE 7 Essentials


  7. This is why Hive is so important to Hadoop, whether you are a DBA or a Java developer. Programming Hive


  8. This is normally a privileged operation that is often restricted to the DBA. Pro JPA2


  9. MongoDB’s design philosophy dictates that memory management is better handled by the operating system than by a DBA or application developer. MongoDB in Action


  10. Parallel databases can achieve especially high performance when administered by a highly skilled DBA who can carefully design, deploy, tune, and maintain the system, but recent advances in automating these tasks and bundling the software into appliance (pre-tuned and pre-configured) offerings have given many parallel databases high performance out of the box. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



1390、单词 navigates 的匹配文本:


  1. For example, let’s make the title of a book a link that navigates to a book’s details page that shows an image of and some information about the book. Pro Spring MVC


  2. Garbage collection is a background process that navigates the objects in memory to determine which are no longer reachable. Cassandra High Performance Cookbook


  3. The withPrefix method navigates through the tree, creating sub-maps as necessary if some prefix of characters is not yet contained as a path in the tree. Programming in Scala 2nd Edition


  4. Thereafter, the client navigates the ZooKeeper hierarchy to learn cluster attributes such as server locations.4 Regionserver slave nodes are listed in the HBase conf/regionservers file as you would list datanodes and tasktrackers in the Hadoop conf/slaves file. Hadoop:The Definitive Guide 3rd Edition


  5. Then, the test code navigates through the application, executing the steps needed for the test case using the variables loaded with data values. Selenium Testing Tools Cookbook


  6. Most of them have the capability to capture the key clicks as a user navigates the Web site, and this can later be replayed to simulate the interaction. Java Performance


  7. Requery each time the user navigates to a new page. Lucene in Action 2nd Edition


  8. The only problem is that all your code is spread across a couple of pages, and clicking certain actions (e.g., submitting a post) currently navigates you away from the page, which is undesirable behavior. The Definitive Guide to MongoDB


  9. In order to display the department name for the employee, the JSP expression navigates to the Department entity from the Employee entity. Pro JPA2


  10. For leveraging the connectedness of the products, a custom (annotated) query navigates from a start (or root) category, via the next zero through five relationships, to the products connected to this subtree. Spring Data Modern Data Access for Enterprise Java



1391、单词 celsius 的匹配文本:


  1. The first line in the body of this class defines a var, celsius, which will contain the temperature in degrees Celsius. Programming in Scala 2nd Edition


  2. For instance, we can convert temperatures from Fahrenheit to Celsius by applying the formula. Data Structures and Algorithm Analysis in Java 3rd Edition


  3. Suppose we would like to write a program that prompts the user for a temperature in degrees fahrenheit, then converts this value to celsius and echoes it to the user. Functional Programming in Scala


  4. For example, each scale constant could have a method that took a double value and normalized it to Celsius. Effective Java 2nd Edition


  5. The following example is a bash shell script that converts degrees in Celsius to degrees in Fahrenheit: Programming Hive



1392、单词 flashcache 的匹配文本:


  1. Using Flashcache Although there are many opportunities to make tradeoffs between flash storage, hard disks, and RAM, these don’t have to be treated as single-component tiers in the storage hierarchy. High Performance MySQL 3rd Edition



1393、单词 datum 的匹配文本:


  1. Each line contained one datum: user ID, item ID, and preference value. Mahout in Action


  2. For a given dataset, specifically, for each datum within a dataset, there exist certain classes of fields: Storm Real-Time Processing Cookbook


  3. There are two important objects here: the DatumWriter and the Encoder. Hadoop:The Definitive Guide 3rd Edition


  4. When Avro reads from a datafile, each individual element is called a datum and each datum will follow the structure defined in the schema. Hadoop Beginners Guide


  5. Any sequence of bytes of the right length can be interpreted as a primitive datum. Java Network Programming 4th Edition


  6. Otherwise, read on to see how to insert your first datum. MongoDB in Action



1394、单词 selinux 的匹配文本:


  1. SELinux and Firewall If you are new to Ganglia and feel that you have followed all the installation instructions to the letter, but for some reason you are not getting any graphs on the web frontend, you might want to check whether your OS has SELinux enabled by default. Monitoring with Ganglia


  2. There are some network parameters that you might need to change, and you might wish to tweak a number of other things (such as disabling SELinux), but those changes are a matter of preference. High Performance MySQL 3rd Edition


  3. For example, we need to configure users, groups, and system security, such as firewalls and SELinux. Hadoop Operations and Cluster Management Cookbook


  4. SELinux troubles often when you use Fedora/RHEL-based packages and you choose configuration options that do not match the standard policy. bk-admin-guide-cloud-latest


  5. It might also mean configuring any NAT firewall between nodes to allow direct connections, or disabling SELinux or configuring it to allow mysqld to listen to sockets at unprivileged ports. high-availability-guide



1395、单词 gpl 的匹配文本:


  1. If you see logs such as "Could not load native gpl library", there is an issue with the LZO installation. HBase Administration Cookbook


  2. Everyone is given a patent grant to use and modify Java, subject to the GPL, but only on desktop and server platforms. Core Java Volume I Fundamentals 9th Edition


  3. MySQL remains GPL-licensed and open source, with the full source code (except for commercially licensed plugins, of course) available to the community. High Performance MySQL 3rd Edition


  4. This is free software, and you are welcome to modify and redistribute it under the GPL v2 license. Deploying OpenStack


  5. Soon after IBM got involved, CouchDB’s license was changed to use the Apache License rather than the restrictive and cumbersome GNU General Public License (GPL) Beginning CouchDB


  6. At one time LZO/LZOP came bundled with Hadoop, but they have since been removed due to GPL licensing restrictions. Hadoop in Practice


  7. As of this writing, CloudBase has a less active developer community than Pig or Hive, and its GPL license is more restrictive than the Apache license. Hadoop in Action


  8. To download LZO, go to http://code.google.com/a/apache-extras.org/p/hadoop-gpl-com pression and click on the Downloads tab. Programming Pig


  9. Some users might have licensing issues (due to Cygwin’s use of the GPL) Redis Cookbook


  10. This is free software, and you are welcome to modify and redistribute it under the GPL license. Understanding MySQL Internals



1396、单词 resizable 的匹配文本:


  1. What kind of list can you pass? According to the documentation, the list must be modifiable but need not be resizable. Core Java Volume I Fundamentals 9th Edition


  2. They only have resizable containers with significantly more functionality than C/C++/Javastyle arrays. Thinking in Java 4th Edition


  3. Your library contains a Resizable interface that defines many methods a simple resizable shape must support: setHeight, setWidth, getHeight, getWidth, and setAbsoluteSize. Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. You could make the spreadsheet resizable, so that the number of rows and columns can be changed interactively. Programming in Scala 2nd Edition


  5. However, if a frame is in the maximum state, you first need to set it to be resizable by calling setMaximum(false) Core Java Volume II Advanced Features 9th Edition


  6. You’ll notice the call to super() where you will pass in Booleans to the super class to set the JInternalFrame object to be resizable, closable, maximizable, and iconifiable. Java 7 Recipes A Problem-Solution Approach



1397、单词 tabular 的匹配文本:


  1. There is a tabular printout of the numeric metadata, including statistics such as the standard deviation.9 This is followed by a histogram of the response times. High Performance MySQL 3rd Edition


  2. Its name conjured up a tabular structure which it realized with sparse columns and no schema. NoSQL Distilled


  3. As you can see in Figure 7-1, CouchDB does not store data in a tabular, structured way but rather as individual, self-contained documents. Beginning CouchDB


  4. We were blown away by the idea that it might be possible to replace the tabular SQL semantic with a graph-centric model that would be much easier for developers to work with when navigating connected data. Graph Databases


  5. Unstructured text works well when you’re working with scalar or tabular data. Hadoop in Practice


  6. Primitive values as well as collections, arrays, composite data, and tabular data can be viewed. Oracle JRockit The Definitive Guide


  7. A table is a GUI component that can be used to display data in a tabular form (for example, think of a spreadsheet, which is the archetypal application that displays data in a tabular form) Steps in Scala An Introduction to Object-Functional Programming


  8. Solaris and Linux also offer a tabular view of CPU utilization for each virtual processor using the command line tool mpstat. Java Performance


  9. Even with SQL text relegated to property files or other application metadata, there comes a point when working with JDBC not only feels wrong but also simply becomes a cumbersome exercise in taking tabular row and column data and continuously having to convert it back and forth into objects. Pro JPA2


  10. If the distinction between a tabular and object representation of data is new to you, then you probably have a lot of questions. MongoDB in Action



1398、单词 lightbulb 的匹配文本:


  1. Tip Often, an Eclipse error report is accompanied by a lightbulb icon. Core Java Volume I Fundamentals 9th Edition


  2. For example, to define an interface for a remote lightbulb system (a high-tech version of the traditional on-off switch for a networked world), we could define an interface such as the following: Java Network Programming and Distributed Computing


  3. Click the yellow lightbulb to resolve the namespace prefix-URI mapping for h: Java EE 7 Essentials



1399、单词 npm 的匹配文本:


  1. If you exclusively work with JavaScript, this problem can be tackled by using the node package manager (NPM) Gradle in Action


  2. The following code will install the jscheckstyle package: % sudo npm install jscheckstyle -g. Testable JavaScript


  3. Discussion For this recipe, we’ll assume that you have a recent installation of Node.js, as well as npm in order to install the necessary node libraries to support the chat system (Socket.IO and Redis) Redis Cookbook



1400、单词 subtrees 的匹配文本:


  1. When possible, it examines all potential combinations of subtrees, beginning with all one-table plans. High Performance MySQL 3rd Edition


  2. Working with Subtrees As we grow the number of clients, the size of our shared store will also grow. ZeroMQ


  3. Figure 2: Ceph dynamically maps subtrees of the directory hierarchy to metadata servers based on the current workload. Ceph A Scalable, High-Performance Distributed File System


  4. This means that a functional update creates between one and five nodes that each contain up to 32 elements or subtrees. Programming in Scala 2nd Edition


  5. Figure 4.11 shows that a binary tree consists of a root and two subtrees, TL and TR, both of which could possibly be empty. Data Structures and Algorithm Analysis in Java 3rd Edition


  6. We do not have enough space to do the trace view justice, but it is characterized by a global time line (seen at the top) and the ability to expand and collapse subtrees interactively. Dapper a Large-Scale Distributed Systems Tracing Infrastructure


  7. For example, HIR lends itself well to value numbering in expression trees, substituting two equivalent subtrees of an expression with one subtree and a temporary variable assignment. Oracle JRockit The Definitive Guide


  8. Click on the circle icons (the handles) to open up the subtrees. Core Java Volume II Advanced Features 9th Edition


  9. This package contains Source and Result implementations that work with DOM document trees and subtrees. Java in a Nutshell 5th Edition


  10. As you might expect, it is also possible to check only subtrees of the filesystem by providing a path other than the root. Hadoop Operations



涉及文献数目:166
1、A Java ForkJoin Framework
2、A Little Riak Book
3、ActiveMQ in Action
4、Apache Flume Distributed Log Collection for Hadoop
5、Apache Hadoop Goes Realtime at Facebook
6、Apache Hadoop YARN Yet Another Resource Negotiator
7、Apache Kafka
8、Apache Solr 4 Cookbook
9、Beginning CouchDB
10、Beginning Scala
11、Bigtable - A Distributed Storage System for Structured Data
12、Building and Testing with Gradle
13、Cassandra A Decentralized Structured Storage System
14、Cassandra High Performance Cookbook
15、Cassandra The Definitive Guide
16、Ceph A Scalable, High-Performance Distributed File System
17、Chubby - The lock service for loosely-coupled distributed systems
18、Cloudera Impala
19、Concurrent Programming in Java Design Principles and Pattern
20、Core Java Volume I Fundamentals 9th Edition
21、Core Java Volume II Advanced Features 9th Edition
22、CouchDB The Definitive Guide
23、Dapper a Large-Scale Distributed Systems Tracing Infrastructure
24、Data Structures and Algorithm Analysis in Java 3rd Edition
25、Deploying OpenStack
26、Dremel - Interactive Analysis of WebScale Datasets
27、Effective Java 2nd Edition
28、Elasticsearch The Definitive Guide
29、Elasticsearch in Action MEAP V07 cHAPTER 1
30、FlumeJava - Easy, Efficient Data-Parallel Pipelines
31、Functional Programming Patterns in Scala and Clojure
32、Functional Programming in Scala
33、Fundamental Networking in Java
34、Getting Started with CouchDB
35、Getting Started with Google Guava
36、Getting Started with Storm
37、Gradle Beyond The Basics
38、Gradle Effective Implementation Guide
39、Gradle in Action
40、Graph Databases
41、HBase Administration Cookbook
42、HBase in Action
43、HBase:The Definitive Guide
44、HDFS scalability the limits to growth
45、Hadoop Beginners Guide
46、Hadoop MapReduce Cookbook
47、Hadoop Operations
48、Hadoop Operations and Cluster Management Cookbook
49、Hadoop RealWorld Solutions Cookbook
50、Hadoop in Action
51、Hadoop in Practice
52、HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
53、Hadoop:The Definitive Guide 3rd Edition
54、High Performance MySQL 3rd Edition
55、Hive A Petabyte Scale Data Warehouse Using Hadoop
56、Incoop MapReduce for Incremental Computations
57、Interpreting the Data Parallel Analysis with Sawzall
58、Introduction to Tajo
59、JSR-133 Java Memory Model and Thread
60、Java 7 Concurrency Cookbook
61、Java 7 New Features Cookbook
62、Java 7 Recipes A Problem-Solution Approach
63、Java 8 in Action Lambdas, Streams and Functional-style Programming
64、Java EE 7 Essentials
65、Java EE 7 Specification
66、Java Network Programming 4th Edition
67、Java Network Programming and Distributed Computing
68、Java Performance
69、Java Performance Tuning 2nd Edition
70、Java SE 8 for the Really Impatient
71、Java Security 2nd Edition
72、Java Threads 3rd Edition
73、Java in a Nutshell 5th Edition
74、Jenkins Continuous Integration Cookbook
75、Jenkins The Definitive Guide
76、Kafka a Distributed Messaging System for Log Processing
77、Lucene in Action 2nd Edition
78、Mahout in Action
79、Managing Infrastructure with Puppet
80、MapReduce - Simplied Data Processing on Large Clusters
81、MapReduce Design Patterns
82、MapReduce a flexible data processing tool
83、MapReduce and Parallel DBMSs Friends or Foes
84、Mastering ElasticSearch
85、Megastore - Providing Scalable, Highly Available Storage for Interactive Services
86、Mesos A Platform for Fine-Grained Resource Sharing in the Data Center
87、MongoDB The Definitive Guide 2nd Edition
88、MongoDB in Action
89、Monitoring with Ganglia
90、Namenode High Availability
91、Netty in Action MEAP V08
92、NoSQL Distilled
93、Omega - flexible, scalable schedulers for large compute clusters
94、OpenStack Operations Guide
95、Oracle JRockit The Definitive Guide
96、Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications
97、Performance Testing With JMeter 2.9
98、PowerDrill - Processing a Trillion Cells per Mouse Click
99、Pregel  -  A System for Large-Scale Graph Processing
100、Pro Hadoop
101、Pro JPA2
102、Pro Java 7 NIO.2
103、Pro Puppet
104、Pro Spring 3
105、Pro Spring MVC
106、Pro Spring Security
107、Professional Hadoop Solutions
108、Programming Concurrency on the JVM
109、Programming Hive
110、Programming Pig
111、Programming Scala
112、Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine
113、Programming in Scala 2nd Edition
114、RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.
115、RCFile A Fast and Space-efficient Data Placement Structure in MapReduce-based Warehouse Systems
116、RabbitMQ in Action
117、Redis Cookbook
118、Redis in Action
119、SQL Antipatterns
120、Scala for the Impatient
121、Scala in Action
122、Scala in Depth
123、Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr
124、Scaling CouchDB
125、Scaling MongoDB
126、Selenium 2 Testing Tools Beginner's Guide
127、Selenium Testing Tools Cookbook
128、Solr 3 Enterprise Search Server
129、Solr 3.1 Cookbook
130、Solr in action
131、Sonar Code Quality Testing Essentials
132、Spanner - Google’s Globally-Distributed Database
133、Spring Batch in Action
134、Spring Data Modern Data Access for Enterprise Java
135、Spring Dynamic Modules in Action
136、Spring Integration in Action
137、Spring Roo in Action
138、Spring Security 3.1
139、Spring in Action 4th Edition
140、Spring in Practice
141、Steps in Scala An Introduction to Object-Functional Programming
142、Storage Architecture and Challenges
143、Storm Blueprints Patterns for Distributed Real-time Computation
144、Storm Real-Time Processing Cookbook
145、Tajo A Distributed Data Warehouse System on Large Clusters
146、Tenzing - A SQL Implementation On The MapReduce Framework
147、Testable JavaScript
148、The Definitive Guide to MongoDB
149、The Hadoop Distributed File System
150、The Java Language Specification Java SE 7 Edition
151、The Java Virtual Machine Specification Java SE 7 Edition
152、The Little Redis Book
153、The anatomy of a large-scale hypertextual Web search engine
154、Thinking in Java 4th Edition
155、Tika in Action
156、Understanding MySQL Internals
157、Web Crawling and Data Mining with Apache Nutch
158、Web search for a planet the google cluster architecture
159、ZeroMQ
160、ZooKeeper Distributed Process Coordination
161、admin-user-guide-trunk
162、api-quick-start-onepager
163、bk-admin-guide-cloud-latest
164、bk-compute-adminguide-grizzly
165、high-availability-guide
166、user-guide

© 著作权归作者所有

杨尚川

杨尚川

粉丝 1103
博文 220
码字总数 1624053
作品 12
东城
架构师
私信 提问
Java8全新打造,英语学习supertool

superword是一个Java实现的英文单词分析软件,主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。Clean code、Fluent style、Java8 feature: Lambdas, Streams and...

杨尚川
2015/03/29
427
0
英文单词分析软件--superword

Superword is a Java open source project dedicated in the study of English words analysis and auxiliary reading, including but not limited to, spelling similarity, definition sim......

杨尚川
2015/02/18
2.2K
0
2000个软件开发领域的高频特殊词及精选例句(二)

superword是一个Java实现的英文单词分析软件,主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。 276、单词 tokenizer 的匹配文本: Analysis is done by the anal...

杨尚川
2015/03/19
807
1
动词短语(Phrasal Verb)

动词短语(Phrasal Verb)是英语的重要组成部分,在口语和书面语中都被大量使用。本文对动词短语做一些简单的讨论。 一、什么是动词短语? 动词短语由动词加一个或两个小品词(particle)构成...

阮一峰
2006/09/14
0
0
有道词典 纯净版 - imsoft.cnblogs

软件名称:有道词典 软件版本:5.4 正式版(5.4.46.5554) 软件主页:http://cidian.youdao.com/ 软件定制:飞扬时空 更新日期:2013年8月26日 软件简介: 有道词典是一款免费的全能翻译软件...

imzdx
2014/04/17
0
0

没有更多内容

加载失败,请刷新页面

加载更多

Rabbit MQ 延迟消息发送

为什么使用延迟消息? 不同于同步消息,有些业务场景下希望可以实现延迟一定时间再消费消息。 典型的场景有微信、支付宝等第三方支付回调接口,会在用户支付后3秒、5秒、30秒等等时间后向应用...

兜兜毛毛
7分钟前
2
0
【0918】正则介绍_grep

【0918】正则介绍_grep 9.1 正则介绍_grep上 9.2 grep中 9.3 grep下 一、正则介绍 正则是一串有规律的字符串,它使用单个字符串来描述或匹配一系列符合某个语法规则的字符串。 二、grep工具 ...

飞翔的竹蜻蜓
37分钟前
4
0
为什么要在网站中应用CDN加速?

1. 网页加载速度更快 在网站中使用CDN技术最直接的一个好处就是它可以加快网页的加载速度。首先,CDN加速的内容分发是基于服务器缓存的,由于CDN中缓存了不少数据,它能够给用户提供更快的页...

云漫网络Ruan
今天
8
0
亚玛芬体育(Amer Sports)和信必优正式启动合作开发Movesense创新

亚玛芬体育和信必优正式启动合作开发Movesense创新,作为亚玛芬体育的完美技术搭档,信必优利用Movesense传感器技术为第三方开发移动应用和服务。 Movesense基于传感器技术和开放的API,测量...

symbiochina88
今天
4
0
创龙TI AM437x ARM Cortex-A9 + Xilinx Spartan-6 FPGA核心板规格书

SOM-TL437xF是一款广州创龙基于TI AM437x ARM Cortex-A9 + Xilinx Spartan-6 FPGA芯片设计的核心板,采用沉金无铅工艺的10层板设计,适用于高速数据采集和处理系统、汽车导航、工业自动化等领...

Tronlong创龙
今天
5
0

没有更多内容

加载失败,请刷新页面

加载更多

返回顶部
顶部