杨尚川

# 1401、单词 coveraged 的匹配文本：

1. The file coveraged.js is now a fully working copy of instrument-me.js with embedded coverage tracking. Testable JavaScript

# 1402、单词 pip 的匹配文本：

1. This is available as a native package for most modern Linux distributions or the latest version can be installed directly using pip python package installer: bk-compute-adminguide-grizzly

2. This is because virtualenv, which is necessary for the easy download of pip, is out of the scope of these instructions. Redis in Action

3. This is available as a native package for most Linux distributions, or you can install the latest version using the pip python package installer: bk-admin-guide-cloud-latest

4. This recipe also requires Python and the Python installer pip. Cassandra High Performance Cookbook

5. Install the clients Use pip to install the OpenStack clients on a Mac OS X or Linux system. api-quick-start-onepager

6. Install Castro using easy_install or the pip tool from the command line: Selenium Testing Tools Cookbook

7. Alternatively, install pip and use it to manage client installation: user-guide

8. Solution Install and use Andy McCurdy’s redis-py using pip, easy_install, or from the source code. Redis Cookbook

9. Installing the Tools To install (or upgrade) a package from the PyPI archive with pip, as root: OpenStack Operations Guide

# 1403、单词 graphics2d 的匹配文本：

1. To draw a shape, you first create an object of a class that implements the Shape interface and then call the draw method of the Graphics2D class. Core Java Volume I Fundamentals 9th Edition

2. To draw a shape, first create an object of a class that implements the Shape interface and then call the draw method of the Graphics2D class. Core Java Volume II Advanced Features 9th Edition

3. Finally, we cast the gradient as a Graphics2D object and called the setPaint and fillRect method to paint our gradient across the window. Java 7 New Features Cookbook

4. However, there are cases that can be dealt with better using Graphics2D. Steps in Scala An Introduction to Object-Functional Programming

5. Shown here is the Graphics object cast into a Graphics2D: Java 7 Recipes A Problem-Solution Approach

# 1404、单词 iana 的匹配文本：

1. The central body responsible for allocating blocks of IP addresses is the Internet Corporation for Assigned Names and Numbers (ICANN), building on the work of an earlier organization, the Internet Assigned Numbers Authority (IANA) Java Network Programming and Distributed Computing

2. We’ll discuss this issue and modern attempts to classify and understand these file formats (such as those from the Internet Assigned Numbers Authority, IANA) and the relationships of those frameworks to Tika. Tika in Action

3. If you aim to make a public protocol of any importance, such as FILEMQ, you’re going to want an IANA-registered port. ZeroMQ

4. The x- prefix indicates that this is an experimental name, not one that is sanctioned by IANA, the organization that assigns standard MIME type names. Core Java Volume II Advanced Features 9th Edition

5. The IANA is responsible for handing out permanent multicast addresses as needed. Java Network Programming 4th Edition

6. A Charset represents a character set encoding in defined in the IANA Charset Registry. Java 7 Recipes A Problem-Solution Approach

# 1405、单词 subexpression 的匹配文本：

1. If evaluation of an expression requires evaluation of a subexpression, then abrupt completion of the subexpression always causes the immediate abrupt completion of the expression itself, with the same reason, and all succeeding steps in the normal mode of evaluation are not performed. The Java Language Specification Java SE 7 Edition

2. If a subexpression refers to any local variables (the + operation refers to the local variables  and  introduced by the pattern, similarlyx xs for ), turn the subexpression into a function that accepts these variablesproduct as arguments. Functional Programming in Scala

3. At the same time, a number of performance optimizations are being worked on, such as predicate pushdown and common subexpression elimination. Hadoop：The Definitive Guide 3rd Edition

4. Group subexpression as with ( ), but do not capture the text that matched. Java in a Nutshell 5th Edition

5. Thus, in the expression ((A)(B(C))), the subexpression B(C) is in group 2 Steps in Scala An Introduction to Object-Functional Programming

6. The most basic classes of optimizations are simple identity transformations, constant folding, common subexpression elimination, and inlining of functions. Java Performance

# 1406、单词 rowid 的匹配文本：

1. Instead of splitting data into equal ranges using one column (usually the table’s primary key), OraOop utilizes the concept of rowid. Apache Sqoop Cookbook

2. The _id is a special field that is found on all documents in Mongo, just like ROWID in Oracle. NoSQL Distilled

3. It takes an array of arbitrary strings and returns a single string representing the rowID. Hadoop RealWorld Solutions Cookbook

4. Some databases support ROWID values that describe the location of a row so that it can be retrieved very rapidly. Core Java Volume II Advanced Features 9th Edition

# 1407、单词 specifiers 的匹配文本：

1. In C++, throw specifiers are enforced at runtime, not at compile time. Core Java Volume I Fundamentals 9th Edition

2. These access specifiers determine who can use the definitions that follow. Thinking in Java 4th Edition

3. These precision specifiers are nonstandard, so we suggest that you specify the type you want but not the precision. High Performance MySQL 3rd Edition

4. This is unlike the other key specifiers, which suppress unmentioned keys from being returned. MongoDB The Definitive Guide 2nd Edition

5. Because of the occasional need to use a generic class or interface name without type arguments, type names are distinct from type declaration specifiers. The Java Language Specification Java SE 7 Edition

6. They denote compiler-dependent specifiers for exported functions that come from a dynamically loaded library.) Now, simply copy the function prototype from the header file into the source file and give the implementation code for the function, as shown in Listing 12.3 Core Java Volume II Advanced Features 9th Edition

7. The remaining arguments to printf( ) are values to be converted to strings and substituted into the format string in place of the format specifiers. Java in a Nutshell 5th Edition

# 1408、单词 thd 的匹配文本：

1. Objects of the THD type are thread descriptors, and are critical in the operation of most of the server modules. Understanding MySQL Internals

# 1409、单词 summarizing 的匹配文本：

1. Here is a table summarizing the properties for the timestamp interceptor: Apache Flume Distributed Log Collection for Hadoop

2. And not just pretty graphs, but a snazzy, welldesigned UI to go with them—a UI that is generous with the data, summarizing the status of the entire data center in just a few graphs while still providing quick, easy access to every combination of any individual metrics. Monitoring with Ganglia

3. The reduce task is an ideal place for summarizing data and for doing basic duplicate suppression. Pro Hadoop

4. At the end of section 6.4 you’ll find a table summarizing all the predefined collectors explored in this chapter. Java 8 in Action Lambdas, Streams and Functional-style Programming

5. This differentiates filtering patterns from those in the previous chapter, which was all about summarizing and grouping data by similar fields to get a top-level view of the data. MapReduce Design Patterns

6. In order to prevent lookups into files that do not contain the key, a bloom filter, summarizing the keys in the file, is also stored in each data file and also kept in memory. Cassandra A Decentralized Structured Storage System

7. Summarizing the features, you can say the following about the batch() functions: Both calls. HBase：The Definitive Guide

8. Initially, the Sawzall API did not support writing values to the database, but did allow data filtering, transformation, and summarizing. Cassandra The Definitive Guide

9. Time for action – summarizing the UFO data Now we have the data, let's get an initial summarization of its size and how many records may be incomplete: Hadoop Beginners Guide

10. Start by summarizing the problem and the end result, and then walk through the timeline of events, calling out anything interesting along the way. Hadoop Operations

# 1410、单词 mutexes 的匹配文本：

1. First and foremost, we will only see the true performance difference if the mutexes are under contention, so there must be multiple tasks trying to access the mutexed code sections. Thinking in Java 4th Edition

2. It does have some severe scalability limitations, including mutexes on key caches. High Performance MySQL 3rd Edition

3. Getting a program to do more than one thing at a time has traditionally meant hassling with mutexes, race conditions, lock contention, and the rest of the unpleasant baggage that comes along with multithreading. Programming Scala

4. Like the mutexes known to most programmers, locks are advisory. Chubby - The lock service for loosely-coupled distributed systems

5. The problem was attributed to the inability of LinuxThreads to deal efficiently with frequently acquired and released mutexes, something MySQL server had to do a lot of. Understanding MySQL Internals

# 1411、单词 illustrative 的匹配文本：

1. Though not the most efficient way to do this (performance could be sped up by buffering, for example), it is illustrative of how low-level streams can be read from. Java Network Programming and Distributed Computing

2. On Unix For illustrative purposes, we assume you have installed Java JDK at /opt/ tools/jdk: Performance Testing With JMeter 2.9

3. The list above is meant to be illustrative rather than comprehensive. The Java Virtual Machine Specification Java SE 7 Edition

4. We’ve included more illustrative stories and case studies, which demonstrate the principles in action. High Performance MySQL 3rd Edition

5. The example load test in this chapter is intended as an illustrative example that can be helpful when you are writing your own tests. Scaling CouchDB

6. For illustrative purposes we’ll use the Neo4j database as an example of how a graph database is architected. Graph Databases

7. Using a random sample doesn’t work well in general because join and filter operations tend to remove all random data, leaving an empty result, which is not illustrative of the general data flow. Hadoop：The Definitive Guide 3rd Edition

8. We also tell Hive to use the newline character as the line delimiter, but that’s already the default and we include it here only for illustrative purposes: Hadoop in Action

9. We won’t worry about that here, but for illustrative purposes, we have assumed in the figure that a particular alphanumeric partitioning was used. Programming Hive

10. More illustrative are the follow-up comments to the question about Alexander the Great’s teacher. MongoDB in Action

# 1412、单词 multiquery 的匹配文本：

1. Multiquery Execution Because DUMP is a diagnostic tool, it will always trigger execution. Hadoop：The Definitive Guide 3rd Edition

2. If your script has multiple DUMP/STORE, Pig   script’s multiquery   execution improves efficiency by avoiding redundant evaluations. Hadoop in Action

3. Pig does not use multiquery for any of the multiple-input operators: join, union, Programming Pig

# 1413、单词 arity 的匹配文本：

1. Erlang has the concept of function arity—the number of arguments a function takes. RabbitMQ in Action

2. Generics, annotations, autoboxing and unboxing, enum types, foreach loops, variable arity methods, and static imports are all new to the language as of Autumn 2004 The Java Language Specification Java SE 7 Edition

3. Higher arity tuples work similarly—trycase class experimenting with them on the REPL if you're interested. Functional Programming in Scala

4. To do so, we’ll add a second arity to command that expects to be passed an output map. Functional Programming Patterns in Scala and Clojure

5. Functions are instances of FunctionN types, where N is the arity of the function. Programming Scala

6. The arity property is used to specify the number of subcontexts; in this case, there are two. Hadoop：The Definitive Guide 3rd Edition

7. This interface defines a single method to return the XPathFunction with the specified qualified name and specified arity (number of arguments) Java in a Nutshell 5th Edition

# 1414、单词 disallow 的匹配文本：

1. Starting with version 1.2, the JDK implementors rigged the class loader to explicitly disallow loading of user-defined classes whose package name starts with "java." Core Java Volume I Fundamentals 9th Edition

2. To disallow a call when the type is used with wildcards, use the type parameter in the argument list. Thinking in Java 4th Edition

3. Most security issues that have been reported with MongoDB have been JavaScript-related and it is generally safer to disallow it, if your application allows. MongoDB The Definitive Guide 2nd Edition

4. When set to true this decider will disallow allocating a shard and its replicas on the same physical machine. Mastering ElasticSearch

5. We can use this method to disallow writing to a file by any class that was loaded via a class loader: Java Security 2nd Edition

6. It is possible that future versions of the Java programming language will disallow the use of raw types. The Java Language Specification Java SE 7 Edition

7. One way to overcome this is to disallow write operations to a table, flush its memstores explicitly, and then copy the HDFS files. HBase：The Definitive Guide

8. Atomic instructions introduce overhead, as they enforce memory ordering, potentially destroy CPU caches, and disallow parallel execution. Oracle JRockit The Definitive Guide

9. Some companies allow incoming FTP but disallow outgoing FTP so confidential data cannot be as easily smuggled out of the company. Java Network Programming 4th Edition

10. In this section, we demonstrate subclassing QueryParser to disallow inefficient wildcard and fuzzy queries, custom date-range handling, and morphing phrase queries into SpanNearQuerys instead of PhraseQuerys. Lucene in Action 2nd Edition

# 1415、单词 rescore 的匹配文本：

1. The rescore() method boosts the estimated preference value for mystery novels. Mahout in Action

2. Chapter 2, Power User Query DSL, describes how Apache Lucene scoring works, why ElasticSearch rewrites queries, and how query rescore mechanism works. Mastering ElasticSearch

3. The window_size is the number of top results to rescore, per shard. Elasticsearch The Definitive Guide

# 1416、单词 whiteboard 的匹配文本：

1. Thanks to Agile software development methodology, the card wall (or notice board or whiteboard with index cards) has become popular, and you’ll use it to visualize the work in progress for user stories and backlog, and to determine who is working on what. Scala in Action

2. There is really no better way to explain your ideas to your colleagues than using a whiteboard. ZeroMQ

3. On the whole, Cypher patterns follow very naturally from the way we draw graphs on the whiteboard. Graph Databases

4. We’ll describe in this section how to take advantage of this event system and see that it’s implemented using a common OSGi pattern: the whiteboard pattern. Spring Dynamic Modules in Action

5. The primary advantage of a graph database over RDBMS is that there’s no impedance mismatch; you can store your objects just as you would use them in your application and just as you would draw them on a whiteboard, which makes for straightforward, readily understandable, and quick modeling. Cassandra The Definitive Guide

6. Taking one of these domains, and putting it first on a whiteboard and then into a graph database, is your first step toward realizing the power behind these concepts. Spring Data Modern Data Access for Enterprise Java

# 1417、单词 josh 的匹配文本：

1. Thank you also to Martin Odersky for his endorsement and kind words on the final product that you will read in the foreword, Josh Cough for being a guy I can bounce ideas off when needed, and Peter Simanyi for an email with a very detailed, thorough, complete, and awesome review of the entire book. Scala in Depth

2. Josh and Levi, the founders, asked me to "make it fast, whatever it takes" Netty in Action MEAP V08

3. A special thanks to Josh Kearney for collaborating with me on my first Nova blueprint, as well as technically reviewing this book. Deploying OpenStack

4. Josh Levenberg has been instrumental in revising and extending the user-level MapReduce API with a number of new features based on his experience with using MapReduce and other people’s suggestions for enhancements. MapReduce - Simplied Data Processing on Large Clusters

5. Josh participated in endless language design discussions, chaired several Expert Groups and was a key contributor to the Java platform. The Java Language Specification Java SE 7 Edition

6. Many thanks to Josh Wills, the creator of Crunch, who kindly looked over the chapter that covers that topic. Hadoop in Practice

7. Josh Bloch gives great insight into best practices that really can only be discovered after years of study and experience.” Effective Java 2nd Edition

8. Josh Bloch, a former Sun employee who is now at Google, reviewed the material on enumerated types and annotations. Java in a Nutshell 5th Edition

9. Josh Juneau has been developing software and database systems for several years. Java 7 Recipes A Problem-Solution Approach

10. While on the project home page, look for a link to download a free O’Reilly ebook by Josh Long and Steve Mayzak called Getting Started with Roo [LongMay11] Spring Data Modern Data Access for Enterprise Java

# 1418、单词 fstab 的匹配文本：

1. It is possible to set up a Linux system so that an HDFS is mounted at system start time by updating the system /etc/fstab file with a mount request for an HDFS file system. Pro Hadoop

2. To disable this option, add the noatime,nodiratime mount options to your /etc/fstab; this can sometimes boost performance by as much as 5–10%, depending on the workload and the filesystem (although it might not make much difference in other cases) High Performance MySQL 3rd Edition

3. Configure NFS at HostB and HostC by adding below to /etc/fstab. bk-compute-adminguide-grizzly

4. Create the fstab configuration file using the following command: sudo mkdir -pv /etc/fstab. Hadoop Operations and Cluster Management Cookbook

5. You can do this on Linux by changing atime to noatime in /etc/fstab: MongoDB The Definitive Guide 2nd Edition

6. In fact it depends on whether you added an /etc/fstab entry for that volume. bk-admin-guide-cloud-latest

7. Editing the /etc/fstab file ensures swap will not be reactivated on operating system startup. Cassandra High Performance Cookbook

8. Replace /dev/md1 with the name of your disk device (consult /etc/fstab for device names): Hadoop in Practice

9. Mount options are typically specified in a configuration file called /etc/fstab. HBase：The Definitive Guide

10. This is, conceptually, almost identical to the Linux /etc/ fstab file, except that rather than mapping paths to physical devices, ViewFS maps paths to HDFS namenodes. Hadoop Operations

# 1419、单词 exchanger 的匹配文本：

1. An Exchanger is used when two threads are working on two instances of the. Core Java Volume I Fundamentals 9th Edition

2. If we simply want to exchange data between two threads, we can use the Exchanger class. Programming Concurrency on the JVM

3. An Exchanger is a barrier that swaps objects between two tasks. Thinking in Java 4th Edition

4. The exchanger implements a synchronization tool that does not really have. Java Threads 3rd Edition

5. Exchanger An Exchanger is a utility that allows two threads to rendezvous and exchange values. Java in a Nutshell 5th Edition

6. In more detail, the Exchanger class allows the definition of a synchronization point between two threads. Java 7 Concurrency Cookbook

7. It is convenient to define the helper class Exchanger as an inner class to gain access to the host and the array serving as the shared representation. Concurrent Programming in Java Design Principles and Pattern

# 1420、单词 sockjs 的匹配文本：

1. For example, in an application that must support multiple protocols, such as HTTP or WebSockets, a WebSocket fallback such as SockJS or Flash sockets would require a ChannelHandler for each. Netty in Action MEAP V08

2. Recognizing that WebSocket offers a low-level API, screaming for a higher-level abstraction, Spring 4.0 includes a higher level message-oriented programming model on top of WebSocket that’s based on SockJS and includes STOMP subprotocol support. Spring in Action 4th Edition

# 1421、单词 rrdcached 的匹配文本：

1. In large installations in which there is an IO constraint, rrdcached acts as a buffer between gmetad and the RRD files, as illustrated in Figure 2-7 Monitoring with Ganglia

# 1422、单词 pseudocode 的匹配文本：

1. Assuming MySQL decides to join the tables in the order shown in the query, the following pseudocode shows how MySQL might execute the query: High Performance MySQL 3rd Edition

2. For this reason an implementation of this method often resembles the following pseudocode: Java 8 in Action Lambdas, Streams and Functional-style Programming

3. To keep the discussion as generally applicable as possible, we’ll present first pseudocode for HBase interactions and then show you the snippets from OpenTSDB. HBase in Action

4. Virtually all the standard algorithms are presented along with appropriate data structures, pseudocode, and analysis of running time. Data Structures and Algorithm Analysis in Java 3rd Edition

5. The first job, the pseudocode for which is shown in figure 7.14, calculates the FoFs and counts the number of friends in common. Hadoop in Practice

6. The ZooKeeper website describes several such data structures and protocols in pseudocode. Hadoop：The Definitive Guide 3rd Edition

7. The following pseudocode describes a naive mark and sweep algorithm: Oracle JRockit The Definitive Guide

8. The pseudocode for the first phase, to be distributed over many machines, is. Hadoop in Action

9. We’ll use just enough pseudocode for you to get the idea. Hadoop Operations

10. For example, here is a pseudocode version of the counter class using WHEN: Concurrent Programming in Java Design Principles and Pattern

# 1423、单词 multiline 的匹配文本：

1. This creates a pattern that will match lines starting with "Java," "Java," "JAVA," etc., and attempt a match for each line within a multiline set (matches starting at the beginning of the character sequence and following each line terminator within the character sequence) Thinking in Java 4th Edition

2. Multiline Strings, wrapped by triple double quotes, are helpful if you want to assign wordy text or impose formatting (for example, multiline SQL statements) Gradle in Action

3. Editing Complex Variables The multiline support in the shell is somewhat limited: you cannot edit previous lines, which can be annoying when you realize that the first line has a typo and you’re currently working on line 15 MongoDB The Definitive Guide 2nd Edition

4. Scala also supports a special multiline string literal that’s enclosed in triple quotes (""") Scala in Action

5. If your source data is multiline XML or JSON form, for example, you may want to consider a preprocessing step. Hadoop in Practice

6. Like Java, an if expression may have a multiline code block: Beginning Scala

7. Pig Latin   supports two forms of comments, single-line and multiline. Hadoop in Action

8. Although this style of comment is typically used for multiline comments, it can also be used for single-line comments. Java in a Nutshell 5th Edition

9. In addition, the Pattern object needs to know that we are searching line-by-line, as it also supports searching text while treating line endings simply as any other characters, so we use the MULTILINE flag. Java Performance Tuning 2nd Edition

10. Actually, each previous line of input is shown separately; the CLI does not combine multiline commands and queries into a single history entry. Programming Hive

# 1424、单词 bsd 的匹配文本：

2. SysV/BSD-Style Systems Depending on your operating system, the couchdb daemon script could be installed into a directory called init.d (for SysV-style systems) or rc.d (for BSD-style systems) under. CouchDB The Definitive Guide

3. Other flavors of Unix are not as well supported: proceed with caution if you’re using Solaris or one of the BSD variants. MongoDB The Definitive Guide 2nd Edition

5. Snappy, on the other hand, is BSD-licensed, which makes it easier to bundle with the Hadoop and HBase distributions. HBase in Action

6. With Snappy, released by Google under the BSD License, you have access to the same compression used by Bigtable (where it is called Zippy) HBase：The Definitive Guide

7. This interface defines constants that represent low-level BSD Unix-style socket options and methods that set and query the value of those options. Java in a Nutshell 5th Edition

8. Relatively old operating systems designed in the age of small files and slow networks, such as BSD 4.2, use two-kilobyte buffers. Java Network Programming 4th Edition

9. The downside of this approach is that it is not possible to run operating systems that lack virtio drivers, for example, BSD, Solaris, old Linux, and old Windows. admin-user-guide-trunk

10. In doing so, they discovered that there was no good message broker available that utilized a BSD-style license. ActiveMQ in Action

# 1425、单词 cnf 的匹配文本：

1. You can do this with the open_files_limit server variable in your my.cnf file. High Performance MySQL 3rd Edition

2. First, you have to locate the my.cnf MySQL configuration file, which resides inside MySQL's installation directory. Sonar Code Quality Testing Essentials

3. When you run nova-api the first time, it generates the certificate authority information, including openssl.cnf. bk-admin-guide-cloud-latest

4. By default, other locations are also searched after a successful or unsuccessful attempt to load /etc/my.cnf in the given order: first my.cnf in the directory specified by a compiled-in macro DATADIR, and then .my.cnf (note the initial period) in the home directory of the real (rather than effective) user that started mysqld. Understanding MySQL Internals

# 1426、单词 subclassed 的匹配文本：

1. Because it’s subclassed from AnyRef, you can’t assign null to any value type in Scala: Scala in Action

2. Here we revisit our example from section 14.4 and assume a class Expr, which is subclassed into BinOp and Number: Java 8 in Action Lambdas, Streams and Functional-style Programming

3. The latter permission allows the ObjectInputStream and ObjectOutputStream classes to be subclassed, which would potentially override the readObject( ) and writeObject( ) methods. Java Security 2nd Edition

4. You may also at times want to ensure that an entire class not be subclassed. Programming in Scala 2nd Edition

5. Curiously, our previous example was able to declare a public class that subclassed a protected class without a similar error. Programming Scala

6. The main disadvantage of providing only static factory methods is that classes without public or protected constructors cannot be subclassed. Effective Java 2nd Edition

7. When a class is declared with the final modifier, it means that it cannot be extended or subclassed. Java in a Nutshell 5th Edition

8. Example 12-9 is a simple iterative UDPServer class that can be subclassed to provide specific servers for different protocols. Java Network Programming 4th Edition

9. The HttpServlet class is abstract, so it must be subclassed and then an implementation can be provided for its methods. Java 7 Recipes A Problem-Solution Approach

10. We could also have a method on the CompanyEmployee mapped superclass that we want to apply to all the entities that subclassed it. Pro JPA2

# 1427、单词 mapr 的匹配文本：

1. He has been focused on the Big Data space since 2009, and is both MapR and Cloudera certified. Professional Hadoop Solutions

2. Finally, MapR, which provides a Hadoop distribution, has its own distributed filesystem that supports large numbers of small files. Hadoop in Practice

3. There are Hadoop distributions from the large, established enterprise vendors, including EMC, IBM, Microsoft, and Oracle, as well as from specialist Hadoop companies such as Cloudera, Hortonworks, and MapR. Hadoop：The Definitive Guide 3rd Edition

4. Other developments include HBase running on filesystems other than Apache HDFS, such as MapR. HBase：The Definitive Guide

5. MapR A different type of distribution is offered by MapR Technologies, though the company and distribution are usually referred to simply as MapR. Hadoop Beginners Guide

6. Programming Hive introduces Hive, an essential tool in the Hadoop ecosystem that provides an SQL (Structured Query Language) dialect for querying data stored in the Hadoop Distributed Filesystem (HDFS), other filesystems that integrate with Hadoop, such as MapR-FS and Amazon’s S3 and databases like HBase (the Hadoop database) and Cassandra. Programming Hive

# 1428、单词 weblogs 的匹配文本：

1. Join the Community http://pragprog.com/community Read our weblogs, join our online discussions, participate in our mailing list, interact with our wiki, and benefit from the experience of other Pragmatic Programmers. Programming Concurrency on the JVM

2. A MapReduce job is started, which runs using the weblogs as its input. Hadoop RealWorld Solutions Cookbook

3. For example, in this recipe, if we take the access time from weblogs as the dimension, then we will group the access time by the hour. Hadoop MapReduce Cookbook

5. OnJava.com is a one-stop resource for enterprise Java developers, featuring news, code recipes, interviews, weblogs, and more. Java in a Nutshell 5th Edition

6. You’ll also find links to news, events, articles, weblogs, sample chapters, and code examples. Understanding MySQL Internals

# 1429、单词 european 的匹配文本：

1. Prior to Schoox Inc, he joined a European startup company, OTS SA, which developed administrative and financial software for the Public Sector. Sonar Code Quality Testing Essentials

2. In biotech, financial services, and defense IT, he has helped European and American companies develop coherent strategies for embracing open source search software. Solr 3 Enterprise Search Server

3. Graph Databases, the image of a European octopus, and related trade dress are trademarks of O’Reilly Media, Inc. Graph Databases

4. So Lars started writing critical how-tos and architectural descriptions inbetween jobs and his intraEuropean travels as unofficial HBase European ambassador. HBase：The Definitive Guide

5. The character sets in Table 1.3 are installed only on operating systems that use non-European languages. Core Java Volume II Advanced Features 9th Edition

6. This 8-bit charset is suitable for most Western European languages, including English. Java in a Nutshell 5th Edition

7. However, running the test in a sampling of other locales (European and Asian locales), I find similar relative speedups. Java Performance Tuning 2nd Edition

8. Also freely available is the SnowballAnalyzer family of stemmers, which supports many European languages. Lucene in Action 2nd Edition

9. Colophon The animal on the cover of Programming Hive is a European hornet (Vespa cabro) and its hive. Programming Hive

10. You can use various stemmers for English, and there are ones available for French, German, and most of the European languages. Apache Solr 4 Cookbook

1. This is achieved through the use of the administrative command, asadmin (or as admin.bat in the case of Windows), which is available under the bin directory of the GlassFish installation. Java Performance

# 1431、单词 hql 的匹配文本：

1. We can map HBase tables and columns to a Hive table so that it is possible to perform complex queries over HBase data using HQL. HBase Administration Cookbook

2. Instead, for Hibernate, we use the Hibernate Query Language (HQL) to define our queries. Pro Spring 3

3. In another situation, you want to make sure that an HQL or JPQL query translates to executable SQL and performs what you want. Pro Spring MVC

4. Hive provides a mechanism to project this data into a table definition, and query the data using a SQL-like language called HiveQL (HQL) Professional Hadoop Solutions

5. Create an HQL query that will count values of the favorite_movie column and then order the counts in ascending order: Cassandra High Performance Cookbook

6. Additional features: Hypertable has its own query language called Hypertable Query Language (HQL) Cassandra The Definitive Guide

8. Hive provides an SQL dialect, called Hive Query Language (abbreviated HiveQL or just HQL) for querying data stored in a Hadoop cluster. Programming Hive

9. The query languages of choice have been SQL for JDBC as well as HQL/JPQL for Hibernate/JPA. Spring Data Modern Data Access for Enterprise Java

# 1432、单词 summarization 的匹配文本：

1. Hive is a data warehouse infrastructure built on Hadoop Core that provides data summarization, adhoc querying and analysis of datasets. Pro Hadoop

2. Summarization analytics are all about grouping similar data together and then performing an operation such as calculating a statistic, building an index, or just simply counting. MapReduce Design Patterns

3. HiveQL supports ad-hoc queries, joins, summarization, and so on, by transparently converting them into MapReduce execution. Professional Hadoop Solutions

4. Hive is a data warehouse infrastructure built on top of Hadoop that provides tools to enable easy data summarization, ad hoc querying, and analysis of large data sets stored in Hadoop files. Cassandra High Performance Cookbook

5. Today, we regularly run thousands of jobs on the Hadoop/Hive cluster with hundreds of users for a wide variety of applications starting from simple summarization jobs to business intelligence, machine learning applications and to also support Facebook product features. Hive A Petabyte Scale Data Warehouse Using Hadoop

6. Alternatively, the job statistics summarization tool, shown in figure 6.10, will show minimum, maximum, average, and median values for the input map bytes. Hadoop in Practice

7. Its target users remain data analysts who are comfortable with SQL and who need to do ad hoc queries , summarization , and data analysis on Hadoop-scale data.3 You interact with Hive by issuing queries in a SQL-like language called HiveQL. Hadoop in Action

8. Time for action – summarizing the UFO data Now we have the data, let's get an initial summarization of its size and how many records may be incomplete: Hadoop Beginners Guide

9. Table 4.1 contains a summarization of the connectors with a brief description. ActiveMQ in Action

10. At the moment, our Sawzall-based API does not allow client scripts to write back into Bigtable, but it does allow various forms of data transformation, filtering based on arbitrary expressions, and summarization via a variety of operators. Bigtable - A Distributed Storage System for Structured Data

# 1433、单词 webrick 的匹配文本：

1. That command will start a WEBrick server and run the application on that server. Pro Spring Security

2. In the next chapter, we’ll look at how to scale Puppet beyond the basic Webrick server, using tools like Mongrel and Passenger and allowing you to manage larger numbers of hosts. Pro Puppet

# 1434、单词 bixo 的匹配文本：

1. ACKNOWLEDGMENTSxx Finally, we’d like to acknowledge and thank Ken Krugler and Chris Schneider of Bixo Labs, for contributing the bulk of chapter 15 and for showing us a real-world example of where Tika shines. Tika in Action

2. For example, the web crawler component (using Bixo, a Cascading-based web-crawler toolkit developed by EMI and ShareThis) may run continuously on a small cluster with a companion Hypertable cluster. Hadoop：The Definitive Guide 3rd Edition

# 1435、单词 mpi 的匹配文本：

1. CGMgraph [8] is similar in concept, providing a number of parallel graph algorithms using the Coarse Grained Multicomputer (CGM) model based on MPI. Pregel  -  A System for Large-Scale Graph Processing

2. For example, the output from Example P-1 could be used to autogenerate an MPI machine file that contained the least-loaded machines in the cluster for load-balancing MPI jobs. Monitoring with Ganglia

3. All have downsides: gang scheduling may be needed by some jobs (e.g., MPI programs), but can unnecessarily delay the start of others that can make progress with only a fraction of their requested resources (e.g., MapReduce jobs) Omega - flexible, scalable schedulers for large compute clusters

4. Different from Hadoop, MPI was designed for high performance on both massively parallel machines and on workstation clusters. Hadoop Operations and Cluster Management Cookbook

5. Perhaps some of these issues were due to the fact that many of these distributed schedulers were originally created to support MPI style and HPC application models and running coarse-grained non-elastic workloads. Apache Hadoop YARN Yet Another Resource Negotiator

6. In this model, MapReduce is just another framework and doesn’t look any more special than a custom frameworks such as MPI, streaming, commercial products, or who knows what. MapReduce Design Patterns

7. Acknowledgments We appreciate the detailed and helpful feedback from Remzi Arpaci-Dusseau, Rose Hoberman, Jens Dittrich, and the Sysnets group members at MPI-SWS.We would like to thank Daniel Porto for helping us to set up the PigMix experiments. Incoop MapReduce for Incremental Computations

8. Abstract We present Mesos, a platform for sharing commodity clusters between multiple diverse cluster computing frameworks, such as Hadoop and MPI. Mesos A Platform for Fine-Grained Resource Sharing in the Data Center

9. By contrast, MPI programs have to explicitly manage their own checkpointing and recovery, which gives more control to the programmer but makes them more difficult to write. Hadoop：The Definitive Guide 3rd Edition

10. Early examples of other models being ported to YARN are stream-based processing and a port of the Message Passing Interface (MPI), which is broadly used in scientific computing. Hadoop Beginners Guide

# 1436、单词 simulants 的匹配文本：

1. To keep the clock from moving forward before all simulants are ready, the clock can ping actors at carefully chosen times to make sure they have received and processed all messages for the current time tick. Programming in Scala 2nd Edition

# 1437、单词 representable 的匹配文本：

1. Inexact results are rounded to the nearest representable value, with ties going to the value with a zero least-significant bit. The Java Virtual Machine Specification Java SE 7 Edition

2. Returning it without boxing is trickier in the JVM, of course, because the JVM only provides method-return instructions passing values representable in a 64-bit machine register.) But if you pass a larger value type as an argument (perhaps a large immutable array), then the compiler can instead, transparently to. Java 8 in Action Lambdas, Streams and Functional-style Programming

3. The returned value, Double.NaN, is the IEEE representation for a computation that does not have a representable floating-point value. Programming in Scala 2nd Edition

4. The value must be too large (a positive value of large magnitude or positive infinity), and the result of the first step is the largest representable value of type int or long. The Java Language Specification Java SE 7 Edition

5. The infinity values result when a floating-point computation produces a value that overflows the representable range of a float or double. Java in a Nutshell 5th Edition

# 1438、单词 implementers 的匹配文本：

1. Early on in the history of the Internet, a system was designed that made it easy to distribute new and updated protocol specifications to protocol implementers. Java Network Programming and Distributed Computing

2. You can tackle the same problem (creating an outline of an algorithm and letting implementers plug in some parts) using your favorite lambdas! The different components of the algorithms you want to plug in can be represented by lambda expressions or method references. Java 8 in Action Lambdas, Streams and Functional-style Programming

3. Reliability, failover, and scalability — In the past, implementers of parallel applications struggled to deal with the issue of reliability when it came to moving to a cluster of machines. Professional Hadoop Solutions

4. The trade-off is between the implementers and the clients of an interface. Programming in Scala 2nd Edition

5. Many local systems implementers and consultants also have Puppet, skills should you require assistance. Pro Puppet

6. Protected Visibility Protected visibility is for the benefit of implementers of derived types, who need a little more access to the details of their parent types. Programming Scala

7. InputFormat implementers must fulfill three contracts: first, they describe type information for map input keys and values; next, they specify how the input data should be partitioned; and finally, they indicate the RecordReader instance that should read the data from source. Hadoop in Practice

8. Other implementers may replace this package with one of their own; for instance, one that uses native code to speed up the CPU-intensive key generation and encryption process. Java Network Programming 4th Edition

9. Also, third-party implementers can create resources that will work with the try-with-resources statements by implementing the AutoCloseable interface. Java 7 Recipes A Problem-Solution Approach

10. A client can always depend on the availability of this core API and implementers are always required to support it in its entirety. OpenStack Operations Guide

# 1439、单词 workarounds 的匹配文本：

1. There are some workarounds for TailSource having been removed, but it should be noted that no workaround can eliminate the possibility of data loss under load under these conditions. Apache Flume Distributed Log Collection for Hadoop

2. We have put up a list of frequently asked questions, bugs fixes, and workarounds on a web page at http://horstmann.com/corejava. Core Java Volume I Fundamentals 9th Edition

3. There are a few rough edges with integration we’ll run into, but the workarounds are fairly easy. Programming Concurrency on the JVM

4. We showed a number of workarounds for specific cases; for the general case, you’ll have to use other techniques, such as performing the ALTER on a replica and then promoting it to master. High Performance MySQL 3rd Edition

5. Over the years a lot of “workarounds” were invented to allow real time updates while still using HTTP, but none of them was optimal. Netty in Action MEAP V08

6. Developers, in order to leverage the physical resources, often resorted to clever workarounds to sidestep the limits of the MapReduce API. Apache Hadoop YARN Yet Another Resource Negotiator

7. However, these kinds of products rarely supported the full dynamic nature of the Java language and were unable to graciously handle things like code being replaced at runtime without large workarounds. Oracle JRockit The Definitive Guide

8. My colleague Kirk Pepperdine, who first pointed out the performance problem to me, puts it this way: "I've now got a bitwise-correct but excruciatingly slow program." The potential workarounds to this performance issue are all ugly: using an earlier JDK version, replacing the JDK class with an earlier version, or writing your own class to manage faster alternative floating-point calculations. Java Performance Tuning 2nd Edition

9. Rather, it’s a general problem for all systems that use the IEEE standard for encoding floating-point numbers! However, there are two workarounds we can use in Hive. Programming Hive

10. Due to its requirements for portability and robustness, even simple additions to the code base involve a lot of error checking and handling, and a lot of portability workarounds. Understanding MySQL Internals

# 1440、单词 unmarshaller 的匹配文本：

1. The unmarshaller property specifies the XML unmarshaller to use, which in our case is the Castor’s batchMarshaller bean. Pro Spring 3

2. You’re using the oxm namespace to define a JAXB2 marshaller, which happens to be an unmarshaller too. Spring in Practice

3. Spring OXM provides generic components called marshaller and unmarshaller to convert, respectively, objects to XML, and vice versa, as shown in figure 5.7 Spring Batch in Action

4. This decoupling is achieved by encapsulating the mapping process behind implementations of the Marshaller interface, which maps from an Object to the XML Result, and the Unmarshaller interface, which maps from a Source to the Object representation. Spring Integration in Action

5. While using JAXB for document processing, the Unmarshaller needs to be first created as shown in the following code snippet. Java Performance

# 1441、单词 dublin 的匹配文本：

1. There are too many to name, but all of you in Dublin, Portland, Lisbon, London, Zurich, San Francisco, Mountain View, Dortmund, Stockholm, Hamburg, Frankfurt, Salt Lake City, Blacksburg, San Diego, and Amsterdam: you know who you are—thanks! To my family, friends, and coworkers: thanks you for your support and your patience with me over the last year. CouchDB The Definitive Guide

2. The book introduces you to the world of mining text and binary documents and other information sources like internet media types and Dublin Core metadata. Tika in Action

# 1442、单词 linefeed 的匹配文本：

1. The line is terminated by a line separator sequence, such as a carriage return/linefeed. Java Network Programming and Distributed Computing

2. After each 72-character chunk is written, a carriage return and a linefeed are written onto the output stream. Java Network Programming 4th Edition

3. Text files use \n (linefeed) as the default row delimiter. Programming Hive

# 1443、单词 stderr 的匹配文本：

1. The script is invoked with the additional arguments of the paths to the stdout, stderr, and syslog output files for the task. Pro Hadoop

2. For applications, the default root logger is INFO,console, which logs all messages at level INFO and above the console's stderr. Hadoop Operations and Cluster Management Cookbook

3. For example, the current implementation includes a log aggregation service that will upload data written by the application to stdout and stderr to HDFS once the application completes. Apache Hadoop YARN Yet Another Resource Negotiator

4. Each task records its stdout and stderr information to two files in this directory. Professional Hadoop Solutions

5. Instead, it will write data to stderr in a format that has special meaning. Hadoop RealWorld Solutions Cookbook

6. Depending on the problem, you may find additional useful information in the logs, or in the standard out (stdout) or standard error (stderr) of the task process. Hadoop in Practice

7. MapReduce task logs Users Each tasktracker child process produces a logfile using log4j (called syslog), a file for data sent to standard out (stdout), and a file for standard error (stderr) Hadoop：The Definitive Guide 3rd Edition

8. To view the log messages sent to the console on Windows systems, stderr must be redirected somewhere. Oracle JRockit The Definitive Guide

9. Your MapReduce program can output to STDOUT and STDERR (System.out and System.err in Java) its own logging   messages. Hadoop in Action

10. There is a directory for each task attempt and several files within each; the one to look for is stderr. Hadoop Beginners Guide

# 1444、单词 innotop 的匹配文本：

1. You can query the PROCESSLIST table in the INFORMATION_SCHEMA if your server is new enough, or use innotop with a fast refresh rate and watch the screen for an unusual buildup of queries. High Performance MySQL 3rd Edition

# 1445、单词 regressions 的匹配文本：

1. Fitnesse has a built-in set of acceptance tests, which it uses to check itself for regressions. Jenkins Continuous Integration Cookbook

2. A crucial part of the value proposition of any Continuous Integration environment is to improve the flow of information about the health of your project, be it failing unit tests or regressions in the integration test suite, or other quality related issues such as a drop in code coverage or code quality metrics. Jenkins The Definitive Guide

3. Regressions and failures should fail the build, prompting developers to address the issues in a timely manner. Graph Databases

4. These are functional unit tests that the developers use to verify a release is fully operational and that there are no regressions. HBase：The Definitive Guide

5. Continuous testing against performance regressions is also done as a fundamental part of our QA infrastructure. Oracle JRockit The Definitive Guide

6. In this case, loose coupling can insulate you from causing regressions that in turn cause unhappy service consumers with broken systems. Spring Integration in Action

7. The output of an automated performance testing activity could emit notifications, such as sending e-mail to the application stakeholders notifying them of performance results, such as identified performance regressions, identified performance improvements, or status on how well performance criteria is being met. Java Performance

8. Integration tests are also automated and often run at least daily to ensure that there are no regressions introduced by developers. Pro JPA2

9. It can be used to record workflows so that developers can prevent future regressions of code. Selenium 2 Testing Tools Beginner's Guide

# 1446、单词 wtp 的匹配文本：

1. The plugin named eclipse-wtp builds on top of the eclipse plugin and generates configuration files to be used with Eclipse’s Web Tools Platform (WTP) Gradle in Action

2. We add the Eclipse WTP plugin to the project and also the War or Ear plugin. Gradle Effective Implementation Guide

# 1447、单词 scrollable 的匹配文本：

1. You can see that a spreadsheet is a scrollable table. Programming in Scala 2nd Edition

2. In a scrollable result, you can move forward and backward through a result set and even jump to any position. Core Java Volume II Advanced Features 9th Edition

3. Some have restrictions, such as only supporting update batching with one type of Statement (Oracle batches updates only with PreparedStatement) or one mode of ResultSet (DB2 doesn't batch when used with scrollable ResultSets) Java Performance Tuning 2nd Edition

4. Create a scrollable ResultSet object and then you will have the ability to read the next, first record, last, and previous record. Java 7 Recipes A Problem-Solution Approach

5. More recently, the JDBC specification has taken this even further with the concept of scrollable result sets, which can be navigated forward and backward as required. Pro JPA2

# 1448、单词 checkpointing 的匹配文本：

1. Since all experiments could run in a relatively short time, failure probability was low, and checkpointing was disabled. Pregel  -  A System for Large-Scale Graph Processing

2. This includes storage management, caching, fault-detection, checkpointing, push-based control flow (showcased experimentally later), and container reuse. Apache Hadoop YARN Yet Another Resource Negotiator

3. To minimize the impact of checkpoint creation and the NameNode functioning, checkpointing is performed by the Secondary NameNode daemon, often on a separate machine. Professional Hadoop Solutions

4. Lastly, we turn off checkpointing to tell Giraph that we do not care about backing up the graph state at any superstep. Hadoop RealWorld Solutions Cookbook

5. Apart from doing its job of checkpointing and backing up the metadata, it’s also typically the server you fall back on if the NameNode server goes to lunch and doesn’t come back. HBase in Action

6. The Backup Node is a superset of the Checkpoint Node, also providing that checkpointing mechanism, as well as acting as a NameNode in its own right. Hadoop in Practice

7. By contrast, MPI programs have to explicitly manage their own checkpointing and recovery, which gives more control to the programmer but makes them more difficult to write. Hadoop：The Definitive Guide 3rd Edition

8. Therefore, it’s more appropriate to think of the SNN as a checkpointing server. Hadoop in Action

9. Checkpointing is usually simpler to arrange and is thus often preferable in other situations. Concurrent Programming in Java Design Principles and Pattern

10. The probability of failure in these next generation applications will be far larger than it is today, and restarting entire jobs upon a failure will be unacceptable (failures might be common enough that long-running jobs never finish!) Thus, although Hadoop and HadoopDB pay a performance penalty for runtime scheduling, block-level restart, and frequent checkpointing, such an overhead to achieve robust fault tolerance will become necessary in the future. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads

# 1449、单词 kmeans 的匹配文本：

1. Audio page 147 Robin explains the progression of KMeans clustering iterations. Mahout in Action

2. The iteration time of kmeans is dominated by computation, while logistic regression is less compute-intensive and thus more sensitive to time spent in deserialization and I/O. Resilient Distributed Datasets - A Fault-Tolerant Abstraction for In-Memory Cluster Computing

3. This is common practice for algorithms that have some sort of optimization component, such as kmeans clustering in MapReduce. MapReduce Design Patterns

# 1450、单词 czmq 的匹配文本：

1. Example 3-10 shows the load-balancing broker rewritten to use a higher-level API (CZMQ for the C case) ZeroMQ

# 1451、单词 customizer 的匹配文本：

1. In our example, the customizer is rather spare, containing a single button. Core Java Volume II Advanced Features 9th Edition

# 1452、单词 referentially 的匹配文本：

1. A pure functional program is a single referentially transparent expression. Scala in Action

2. A function is referentially transparent if it always returns the same result value when called with the same argument value. Java 8 in Action Lambdas, Streams and Functional-style Programming

3. Methods like replace are called referentially transparent, which means that for any given input the method call could be replaced by its result without affecting the program’s semantics. Programming in Scala 2nd Edition

4. This is all it means for an expression to be referentially transparent—in any program, the expression can be replaced by its result without changing the meaning of the program. Functional Programming in Scala

5. It is the combination of referentially transparent functions and immutable values that make functional programming compelling as a better way to write concurrent software. Programming Scala

# 1453、单词 japanese 的匹配文本：

1. He has been helping the Japanese Hadoop and HBase community to grow since 2010 HBase Administration Cookbook

2. Unicode grew beyond 65,536 characters, primarily due to the addition of a very large set of ideographs used for Chinese, Japanese, and Korean. Core Java Volume I Fundamentals 9th Edition

3. Each of these calendar systems has a dedicated date class: ThaiBuddhistDate, MinguoDate, JapaneseDate, and HijrahDate. Java 8 in Action Lambdas, Streams and Functional-style Programming

4. Letters and digits may be drawn from the entire Unicode character set, which supports most writing scripts in use in the world today, including the large sets for Chinese, Japanese, and Korean. The Java Language Specification Java SE 7 Edition

5. Java SE also predefines a number of language locales that specify just a language without a location: Locale.CHINESE Locale.ENGLISH Locale.FRENCH Locale.GERMAN Locale.ITALIAN Locale.JAPANESE. Core Java Volume II Advanced Features 9th Edition

6. This means if Japanese script is used before digits, then Japanese digits are displayed. Java 7 New Features Cookbook

7. While most species are resident, others, including the Japanese Paradise flycatcher and the Satin flycatcher, are migratory. Cassandra The Definitive Guide

8. However, a web server that uses PrintStream may well send the files encoded in CP1252 from a U.S.-localized Windows system or SJIS from a Japanese-localized system, whether the client expects or understands those encodings or not. Java Network Programming 4th Edition

9. A JFlex-based1 grammar underlies it, tokenizing with cleverness for the following lexical types: alphanumerics, acronyms, company names, e-mail addresses, computer host names, numbers, words with an interior apostrophe, serial numbers, IP addresses, and CJK (Chinese Japanese Korean) characters. Lucene in Action 2nd Edition

10. The demoComplex() method finds two Japanese symbols in a string: Java 7 Recipes A Problem-Solution Approach

# 1454、单词 solritas 的匹配文本：

1. This is also a demonstration of Solritas, which formats Solr requests using templates based on Apache Velocity. Solr 3 Enterprise Search Server

2. This parameter specifies how all the web pages rendered by Solritas will look like. Solr 3.1 Cookbook

3. As we'll see in section 2.2.5 below, Solr provides an example search UI, called Solritas, to help you get started building your own awesome search application. Solr in action

# 1455、单词 avd 的匹配文本：

1. Use the following steps on a command line to create a new Android Virtual Device (AVD), and use this AVD in the emulator for Android: Selenium Testing Tools Cookbook

2. After following these steps to install and configure your development environment, you will be ready to develop your first Android mobile application and test it using an AVD. Java 7 Recipes A Problem-Solution Approach

# 1456、单词 formatters 的匹配文本：

1. Visit the Jenkins configuration page (http://localhost:8080/configure), and review the markup formatters. Jenkins Continuous Integration Cookbook

2. Also, in the init() method, the custom formatter is registered by calling the setFormatters() method. Pro Spring 3

3. Property editors are the old-style of doing type conversion, whereas converters and formatters are the new way of doing type conversion. Pro Spring MVC

4. All DateTimeFormatters can be used to create a String representing a given date or time in a specific format. Java 8 in Action Lambdas, Streams and Functional-style Programming

5. Hadoop by default loads data from flat files, and it is a responsibility of the MapReduce job to read and parse the data through data formatters. Hadoop MapReduce Cookbook

6. It takes several options: formatters at E (to set where the results of the tests should be printed–on the console and in XML files in our case), the classpath to use for launching the tests F, and the batchtest element specifying the set of tests that should be launched G. Spring Dynamic Modules in Action

7. The NumberFormat type is an abstract class, and the actual formatters belong to one of its subclasses. Core Java Volume II Advanced Features 9th Edition

8. You can create your own formatters by extending the Formatter abstract class. Java 7 Recipes A Problem-Solution Approach

9. The DateTimeFormatter class provides three kinds of formatters to print a date/time value: Java SE 8 for the Really Impatient

1. We'd also like to thank our editorial team at Addison-Wesley, including Karen Gettman, whose initial encouragement and persistence convinced us to take on the project, Mary Hart, Marcy Barnes-Henrie, Melissa Dobson, and Emily Frey. Java Network Programming and Distributed Computing

2. This distribution of tests and their correlation to ROI is best illustrated by the test automation pyramid, introduced by Mike Cohn in his book Succeeding with Agile: Software Development Using Scrum (Addison Wesley, 2009) Gradle in Action

3. Ann Sellers, Greg Doench, and John Fuller at Addison-Wesley were exceedingly patient and ensured that the book materialized, despite the many missed deadlines for this text. The Java Language Specification Java SE 7 Edition

4. Subscribers have access to thousands of books, training videos, and prepublication manuscripts in one fully searchable database from publishers like O’Reilly Media, Prentice Hall Professional, Addison-Wesley. Java EE 7 Essentials

5. I thank the whole team at Addison-Wesley for the their kindness, professionalism, patience, and grace under pressure. Effective Java 2nd Edition

6. Effective Java Programming Guide by Joshua Bloch (Addison Wesley) includes a helpful recipe for constructing efficient hashCode() methods like this one. Java in a Nutshell 5th Edition

7. A good place to start is the classic reference The Art of Computer Programming by Donald Knuth (Addison-Wesley) Java Performance Tuning 2nd Edition

8. Find trusted answers, fast Only Safari lets you search across thousands of best-selling books from the top technology publishers, including Addison-Wesley Professional, Cisco Press, O'Reilly, Prentice Hall, Que, and Sarns. Java Performance

9. Where those designations appear in this book and Addison-Wesley was aware of a trademark claim, the designations have been printed in initial caps or all caps. Concurrent Programming in Java Design Principles and Pattern

10. The continued growth in software engineering maturity today can be seen in the DevOps movement, climaxing with the publication last year of Jez Humble and David Farley’s book Continuous Delivery (AddisonWesley) Building and Testing with Gradle

# 1458、单词 nginx 的匹配文本：

1. Sample configurations for other web servers such as Nginx and Lighttpd are available on the gweb wiki. Monitoring with Ganglia

2. You can also use Nginx, Squid, or Apache in event-driven mode in front of the application. High Performance MySQL 3rd Edition

3. When a traditional web stack uses an HTTP server like Apache or Nginx to pass requests to code, incoming SSL requests have already been decoded at the point when they are received by the application code. Netty in Action MEAP V08

4. We know we are ready to render everything for the current user, so we pass the profile row and the subdomain rows to a render function (which nicely hides all the gnarly nginx config details from our fair reader) CouchDB The Definitive Guide

5. A workaround would be to create an SSL proxy using nginx or Apache and mod_proxy. Beginning CouchDB

6. The dumbproxy is nginx packaged up with a custom proxying module. Scaling CouchDB

7. Adopt Nginx for your web applications to make the most of your infrastructure and serve pages faster than ever. Solr 3.1 Cookbook

8. In production situations, a more robust web server such as Apache or Nginx is necessary to handle the number of client requests. Pro Puppet

# 1459、单词 aliased 的匹配文本：

1. We expect this to return an integer, as the x method on T returns the X type, and this is aliased to Int. Scala in Depth

2. If you create a table with an aliased data type and then examine SHOW CREATE TABLE, you’ll see that MySQL reports the base type, not the alias you used. High Performance MySQL 3rd Edition

3. We also defined an additional field aliased as url_length to be calculated for each selected record. Hadoop RealWorld Solutions Cookbook

4. Finally, note that the stringLists array could be aliased through variables of types other than Object[], and heap pollution could still occur. The Java Language Specification Java SE 7 Edition

5. We can now refer to this resource as File["passwd"] as an aliased short-hand. Pro Puppet

6. Summary This short overview of Nutch necessarily omits many details, such as error handling, logging, URL filtering and normalization, dealing with redirects or other forms of “aliased” pages (such as mirrors), removing duplicate content, calculating PageRank scoring, etc. Hadoop：The Definitive Guide 3rd Edition

7. As can be seen, the user home directory is aliased to. Hadoop Beginners Guide

8. As in SQL, it has been aliased to the identifier e. Pro JPA2

9. This structure is defined in sql/table.h as struct st_table, but then is aliased to TABLE with a typedef in sql/handler.h. Understanding MySQL Internals

# 1460、单词 edt 的匹配文本：

1. When developing Swing GUI applications, it is imperative to understand how to effectively interact with its event dispatching thread (EDT) Java 7 Recipes A Problem-Solution Approach

# 1461、单词 ramdirectory 的匹配文本：

1. Our MergeAgent service decompresses each new index into a Lucene RAMDirectory or FSDirectory (depending on size), merges them to local disk, and sends a  request to the Solr instance hosting the index to make the changed index visible to queries. Hadoop：The Definitive Guide 3rd Edition

2. The other commonly used implementation of Directory is a class called RAMDirectory. Lucene in Action 2nd Edition

3. The reasons may be different—you may want to have a smaller index so that it would fit into the operating system's I/O cache or you want to store your index in RAMDirectory. Apache Solr 4 Cookbook

# 1462、单词 batched 的匹配文本：

1. For efficiency, the results of several calls to publish may be batched up in a single call to process. Core Java Volume I Fundamentals 9th Edition

2. Given that the total number of networks is relatively bounded, if the incoming log records are batched in smaller sizes, this job will run reasonably well and reasonably fast. Pro Hadoop

3. Comet [13] introduces the Batched Stream Processing (BSP), where input data is modeled as a stream, with queries being triggered upon bulk appends to the stream. Incoop MapReduce for Incremental Computations

4. Moreover, if multiple traced requests are batched together, only one of them will appear responsible for the span due to our reliance on a single unique trace id for each trace. Dapper a Large-Scale Distributed Systems Tracing Infrastructure

5. When one of the NameNode’s threads initiates a flush-and-sync operation, all transactions batched at that time are committed together. The Hadoop Distributed File System

6. The batch is too large for each row, so all 20 columns are batched. HBase：The Definitive Guide

7. If files are being batched and then fed to Flume, then a file's contents may have timestamps from the previous hour than when they are being processed. Hadoop Beginners Guide

8. First, the number of messages can be reduced by combining multiple messages into fewer batched messages. Java Performance Tuning 2nd Edition

9. The message consumer has to work twice as hard as the message producer, so optimizing delivery with a MessageListener and using straight-through message processing together with an acknowledgment mode or transactions that allow acknowledgments to be batched can reduce this load. ActiveMQ in Action

10. Many conditional mutations destined for the same tablet server can also be batched together into a single RPC to further reduce the total number of RPCs we send. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications

# 1463、单词 misconfigured 的匹配文本：

1. For instance, one might have misconfigured gmond to the extent that certain nodes are not shown in the web interface. Monitoring with Ganglia

2. But those descriptor files can be misconfigured, and so we may want to override the descriptors ourselves to ensure the dependencies are correct. Gradle Effective Implementation Guide

3. Often, you can find issues here when RegionServers have fallen over, aren’t balanced in terms of the regions and requests they’re serving, or are misconfigured to use less heap than you had planned to give them. HBase in Action

4. A message path is essentially a directed graph (which is typically acyclic, but it may contain loops if servers are misconfigured) Hadoop：The Definitive Guide 3rd Edition

5. This ranges from misconfigured or faulty network interface cards (NICs) to completely oversubscribed switches in the I/O path. HBase：The Definitive Guide

6. If the Management Console tells you that a certain MBean, for instance the Profiling MBean, cannot be found, it may be due to a misconfigured jmxremote.access file. Oracle JRockit The Definitive Guide

7. When run across a cluster, there is a real risk that a misconfigured or ill host will cause its tasks to run significantly slower than the others. Hadoop Beginners Guide

8. Kerberos does not, by definition, afford leniency to misconfigured clients. Hadoop Operations

9. Not only do we have to deal with older protocols such as FTP that predate MIME, but many HTTP servers that should use MIME don’t provide MIME headers at all or lie and provide headers that are incorrect (usually because the server has been misconfigured) Java Network Programming 4th Edition

10. The most common network problems included inadequate bandwidth somewhere along the communication route, and undersized, misconfigured, or incompatible routers, switches, firewalls, and load balancers. Java Performance Tuning 2nd Edition

# 1464、单词 nics 的匹配文本：

1. Certain Broadcom Network Interface Controllers (NICs) are known to cause spikes due to hardware bugs. Monitoring with Ganglia

2. If the switch ports are inexpensive, using bonded network interface cards (NICs) to increase per machine network bandwidth will greatly increase the I/O performance of the cluster. Pro Hadoop

3. Because of the wide variety of NICs, many addressing schemes are used. Java Network Programming and Distributed Computing

4. If you need more bandwidth than that, you can use network trunking: connecting multiple network interface cards (NICs) to get more bandwidth. High Performance MySQL 3rd Edition

5. All VM NICs will be attached to this port group. bk-compute-adminguide-grizzly

6. For the nodes hosting these processes, it’s recommended that you have redundancy at the hardware level for the various components: dual power supplies, bonded network interface cards (NICs), and possibly RAID disks. HBase in Action

7. In between each of the components there are, of course, many networking elements: cables, switches, patch panels, NICs, power supplies, air conditioning, and so on—all of which can fail at inconvenient times. Graph Databases

8. This ranges from misconfigured or faulty network interface cards (NICs) to completely oversubscribed switches in the I/O path. HBase：The Definitive Guide

9. Dual power supplies, bonded network interface cards (NICs), and sometimes even RAID 10 in the case of the namenode storage device, are not uncommon to find in the wild. Hadoop Operations

10. For example, you usually cannot configure NICs for VLANs when PXE booting. OpenStack Operations Guide

1. Metric modules are dynamically loadable shared object files that extend the available metrics gmond is able to collect. Monitoring with Ganglia

2. Using the LoadableComponent class We can implement the objects of the Page Object model using the LoadableComponent class of Selenium WebDriver. Selenium Testing Tools Cookbook

3. The process of validation could unwittingly cause the entire object graph to be loaded into memory! Another case is if validation is occurring on a JPA entity on the client side and the unloaded attributes are not even loadable. Pro JPA2

4. LoadableComponent is a base class that all of the pages need to extend. Selenium 2 Testing Tools Beginner's Guide

# 1466、单词 validators 的匹配文本：

1. This includes HTML validators, link checkers, search engine crawlers, and security tools. Jenkins Continuous Integration Cookbook

2. In addition, custom validators (for example, class-level validators) can be developed and applied using annotation. Pro Spring 3

3. They allow object property creation with built-in validators, getters, setters, and more, and all are very testable: Testable JavaScript

4. This means that Validators will be equivalent to those obtained by first acquiring a Valictory and then invoking the getValidator method on it with no. Java EE 7 Specification

5. Besides these attributes, the job element supports nested elements to configure listeners and validators. Spring Batch in Action

6. The validators themselves are straightforward; they return true if they consider the person valid and false otherwise. Functional Programming Patterns in Scala and Clojure

7. Any custom converters, validators, renderers, if attached for the UI components, are restored in this phase. Java EE 7 Essentials

8. This package is of primary interest to those implementing schema validators and XPath evaluators and should not be required by applications that use schemas or XPath expressions. Java in a Nutshell 5th Edition

9. The Schema class can then be used either to create parsers that are optimized for validating documents based on that schema or to create validators that can validate different XML input sources (SAX, DOM, or Stream) Java Performance

10. Thus, Spring Batch supports the processing of large volumes of data with features such as automatic retries after failure, skipping of records, job restarting from the point of last failure, periodic batch commits to a transactional database, reusable components (such as parsers, mappers, readers, processors, writers, and validators), and workflow definitions. Spring Data Modern Data Access for Enterprise Java

# 1467、单词 jython 的匹配文本：

1. There are additional language constructs that allow the addition of arbitrary Java classes into the namespace of the Jython applications. Pro Hadoop

2. The book includes an introduction to Jython, which allows you to combine Java and Python in a single program (the Jython interpreter is compiled to pure Java bytecodes, so there is nothing special you need to add to accomplish this) Thinking in Java 4th Edition

3. And by installing additional plugins, you can also integrate other build tools, such as Groovy, Gradle, Grails, Jython, MSBuild, Phing, Python, Rake, and Ruby, just to name some of the more well-known tools. Jenkins The Definitive Guide

4. To build the file, download the Jython java installer, run the installer, and select Standalone from the installation menu. Hadoop RealWorld Solutions Cookbook

5. Jython is an implementation of Python on the JVM, and there are entirely unique languages like Clojure and Scala as well. HBase in Action

6. Embedded Pig programs always run in a JVM, so for Python and JavaScript you use the pig command followed by the name of your script, and the appropriate Java scripting engine will be selected (Jython for Python, Rhino for JavaScript) Hadoop：The Definitive Guide 3rd Edition

7. These functions can be written in Java or in scripting languages that can compile down to Java (e.g., Jython) Programming Pig

8. If you prefer a reverse port, you could simply use Jython, a port of the Python language to run on a JVM, Lucene in Action 2nd Edition

9. All are JVM (Java Virtual Machine) libraries that can be used from programming languages like Java, Clojure, Scala, JRuby, Groovy, and Jython, as opposed to tools with their own languages, like Hive and Pig. Programming Hive

10. Not only is Java 7 the most modern, statically typed, object-oriented language available for development, it also enhances the ability to integrate different languages that run on the JVM, such as Jython, Groovy, JRuby, and Scala to name a handful. Java 7 Recipes A Problem-Solution Approach

# 1468、单词 clucene 的匹配文本：

1. At the other end of the spectrum, if you’re coding up a C++ desktop application and you can’t afford a separate server let alone a separate process, choose a native port like CLucene. Lucene in Action 2nd Edition

# 1469、单词 libhdfs 的匹配文本：

1. A Linux i386 version is provided in the distribution in the directory libhdfs. Pro Hadoop

2. Valid program names are: DFSCIOTest: Distributed i/o benchmark of libhdfs. Hadoop Operations and Cluster Management Cookbook

3. You may have to download the Hadoop standard distribution and compile the libhdfs library from the source code, if your operating system is not compatible with the pre-compiled libraries. Hadoop MapReduce Cookbook

4. You can find the generated documentation for the C API in the libhdfs/docs/api directory of the Hadoop distribution. Hadoop：The Definitive Guide 3rd Edition

# 1470、单词 overwriting 的匹配文本：

1. Timestamp: This is used to add a timestamp header, possibly overwriting an existing one. Apache Flume Distributed Log Collection for Hadoop

2. The script also backs up the original /etc/hosts file before overwriting it. HBase Administration Cookbook

3. The single biggest difference between Java and C/C++ is that Java has a pointer model that eliminates the possibility of overwriting memory and corrupting data. Core Java Volume I Fundamentals 9th Edition

4. Of course, their usefulness in most applications is limited—the thought of someone overwriting your page, uploading a rogue servlet, or deleting your Web site is fairly frightening. Java Network Programming and Distributed Computing

5. The massive data storage capabilities of Hadoop enable you to store versions of data sets, as opposed to the traditional approach of overwriting data. Professional Hadoop Solutions

6. That value is always unique, so you’ll never run into the problem of overwriting existing information. HBase in Action

7. Although the data will survive the loss of an individual RAID disk, it may not if the RAID controller fails or is buggy (perhaps overwriting some data), or the entire array is damaged. Hadoop：The Definitive Guide 3rd Edition

8. Code written in C or C++ offers no protection against overwriting memory through invalid pointer usage. Core Java Volume II Advanced Features 9th Edition

9. You should use the HDFS   permission system only to prevent accidental misuse and overwriting of data among trusted users sharing a Hadoop cluster. Hadoop in Action

10. Applications can use temporary files for any purpose without worrying about overwriting files belonging to other applications. Java in a Nutshell 5th Edition

# 1471、单词 wesley 的匹配文本：

1. We'd also like to thank our editorial team at Addison-Wesley, including Karen Gettman, whose initial encouragement and persistence convinced us to take on the project, Mary Hart, Marcy Barnes-Henrie, Melissa Dobson, and Emily Frey. Java Network Programming and Distributed Computing

2. This distribution of tests and their correlation to ROI is best illustrated by the test automation pyramid, introduced by Mike Cohn in his book Succeeding with Agile: Software Development Using Scrum (Addison Wesley, 2009) Gradle in Action

3. Ann Sellers, Greg Doench, and John Fuller at Addison-Wesley were exceedingly patient and ensured that the book materialized, despite the many missed deadlines for this text. The Java Language Specification Java SE 7 Edition

4. Subscribers have access to thousands of books, training videos, and prepublication manuscripts in one fully searchable database from publishers like O’Reilly Media, Prentice Hall Professional, Addison-Wesley. Java EE 7 Essentials

5. I thank the whole team at Addison-Wesley for the their kindness, professionalism, patience, and grace under pressure. Effective Java 2nd Edition

6. Effective Java Programming Guide by Joshua Bloch (Addison Wesley) includes a helpful recipe for constructing efficient hashCode() methods like this one. Java in a Nutshell 5th Edition

7. A good place to start is the classic reference The Art of Computer Programming by Donald Knuth (Addison-Wesley) Java Performance Tuning 2nd Edition

8. Find trusted answers, fast Only Safari lets you search across thousands of best-selling books from the top technology publishers, including Addison-Wesley Professional, Cisco Press, O'Reilly, Prentice Hall, Que, and Sarns. Java Performance

9. Where those designations appear in this book and Addison-Wesley was aware of a trademark claim, the designations have been printed in initial caps or all caps. Concurrent Programming in Java Design Principles and Pattern

10. The continued growth in software engineering maturity today can be seen in the DevOps movement, climaxing with the publication last year of Jez Humble and David Farley’s book Continuous Delivery (AddisonWesley) Building and Testing with Gradle

# 1472、单词 pem 的匹配文本：

1. As an example, on our box, our keypair file named book-test.pem is stored under the .ec2 directory in our home directory and we want to place the results file in /tmp directory. Performance Testing With JMeter 2.9

2. Creating Certificates You can create certificates contained within pem files using these nova client commands, ensuring you have set up your environment variables for the nova client: bk-compute-adminguide-grizzly

3. There you tell openssl that the certificate will be stored in the file cacert.pem in the same directory as the configuration file. RabbitMQ in Action

4. Download and save the private key file (PEM format) in a safe location. Hadoop MapReduce Cookbook

5. The puppet cert command will automatically keep the ca_crl.pem file updated as we issue and revoke new Puppet agent certificates. Pro Puppet

6. You will want to import the public key into the Java keystores of all employees, but it is in the Privacy Enhanced Mail (PEM) format, not the DER format that the keystore accepts easily. Core Java Volume II Advanced Features 9th Edition

7. The filenames for the certificate and the private key are prefixed with cert- and pk-, respectively, and they have the .pem file extension. Hadoop in Action

8. To set the permissions of the MY_KEY.pem file, run the following command: user-guide

9. Master_SSL_CA_Path Pathname to a directory containing trusted SSL CA certificates in pem format. Understanding MySQL Internals

10. The file mykey.pem is the private key which should be saved to a secure location as it allows root access to instances the mykey key is associated with. OpenStack Operations Guide

# 1473、单词 prefixing 的匹配文本：

1. In addition, if the data has more than one categorical word-like or text-like variable, it’s possible to concatenate your variables together, disambiguating them by prefixing them in an unambiguous way. Mahout in Action

2. Per virtual machine statistics are distinguished in Ganglia by prefixing the statistic by the virtual machine name. Monitoring with Ganglia

3. Register it with your component with the method produced by prefixing "add" to your listener name. Thinking in Java 4th Edition

4. Be sure to escape the & character by prefixing it with a backslash. Beginning CouchDB

5. In a different scenario, you might decide to “namespace” the task names by prefixing them with lb or liquibase to keep them from colliding with tasks from other plug-ins, but for our purposes here we can keep the task names short and simple. Gradle Beyond The Basics

6. A single join is implemented as a single MapReduce job, but multiple joins can be performed in less than one MapReduce job per join if the same column is used in the join condition.12 You can see how many MapReduce jobs Hive will use for any particular query by prefixing it with the EXPLAIN keyword: Hadoop：The Definitive Guide 3rd Edition

7. This can be done, for example, by prefixing the row key with a nonsequential prefix. HBase：The Definitive Guide

8. It is possible to use regular expressions in the JRockit Mission Control filter textboxes by prefixing the filter string with "regexp:" Oracle JRockit The Definitive Guide

9. In its simplest form, collecting an experiment profile is as easy as prefixing collect -j on to the java command line used to launch a Java application. Java Performance

10. The single quotes used in the query parameter here have been escaped by prefixing them with an additional single quote. Pro JPA2

# 1474、单词 rgb 的匹配文本：

1. Also include noneditable text fields that show the current RGB values. Thinking in Java 4th Edition

2. Our sample program in Listing 6.32 has three input fields for the RGB values of a color. Core Java Volume II Advanced Features 9th Edition

3. For example, two java.awt.Color objects that both represent black (via RGB value 0) are typically intended to be treated as equivalent. Concurrent Programming in Java Design Principles and Pattern

4. The red, green, and blue (RGB) components will mix colors based a web standard color model. Java 7 Recipes A Problem-Solution Approach

# 1475、单词 snn 的匹配文本：

1. Also included in 2.x are the additions of a Backup Node and Checkpoint Node, which serve as replacements of the SecondaryNameNode (although the SNN still exists) Hadoop in Practice

2. The Secondary NameNode (SNN)   is an assistant daemon for monitoring the state of the cluster HDFS. Hadoop in Action

# 1476、单词 requester 的匹配文本：

1. If jobs have equal priority, the first requester gets the open task slots. Pro Hadoop

2. To take advantage of this filter, the requester must pass a scheduler hint, using different_host as the key and a list of instance uuids as the value. bk-compute-adminguide-grizzly

3. In this case, the requester does not know anything about execution capabilities, or even the number of workers. Professional Hadoop Solutions

4. If it receives a GetSum message, it sends the current value of sum back to the requester using the message send requester ! sum. Programming in Scala 2nd Edition

5. Figure 2.2 Synchronous invocation: the requester suspends execution until it receives an answer. Spring Integration in Action

6. The proxy server would then request the page from the web server and forward the response back to the original requester. Java Network Programming 4th Edition

7. Many HotSpot VM operations are synchronous, that is, the requester blocks until the operation has completed, but some are asynchronous or concurrent, meaning that the requester can proceed in parallel with the VMThread (assuming no safepoint is initiated) Java Performance

# 1477、单词 joinpoint 的匹配文本：

1. Joinpoints: A joinpoint is a well-defined point during the execution of your application. Pro Spring 3

1. Here, we apply join to each subtask and return the sum. Core Java Volume I Fundamentals 9th Edition

2. When a task waits for a subtask to finish, the thread that’s executing the task picks up a new task to run. Programming Concurrency on the JVM

3. The fork/join framework was designed to recursively split a parallelizable task into smaller tasks and then combine the results of each subtask to produce the overall result. Java 8 in Action Lambdas, Streams and Functional-style Programming

4. Getting ready To use the fork/join framework for a task that returns a result for each subtask: Java 7 New Features Cookbook

5. Each subtask should be the only one operating on some small piece of a problem, not only conceptually but also at the level of lower-level resources and memory access patterns. Concurrent Programming in Java Design Principles and Pattern

# 1479、单词 tokenizing 的匹配文本：

1. Instead of simply tokenizing words, we also add a filter that converts the token into lowercase. Mahout in Action

2. With Scanner, the input, tokenizing, and parsing are all ensconced in various different kinds of "next" methods. Thinking in Java 4th Edition

3. Next, it iterates over each record, tokenizing the text into words and “flattening” the words into individual records. Professional Hadoop Solutions

4. In the previous function, I am taking the content field of the document, lowering it, and replacing any nonalphabetical characters with a space, before tokenizing the document into an array of words, split by a single whitespace token. Beginning CouchDB

5. In the Map function, we first replace all the nonalphanumeric characters from the input text value before tokenizing it. Hadoop MapReduce Cookbook

6. A compiler whose frontend reads source code (be it Java, C++, or anything else) usually works by first tokenizing the source code into known constructs and building an Abstract Syntax Tree (AST) Oracle JRockit The Definitive Guide

7. Analysis is the process of: o first, tokenizing a block of text into individual terms suitable for use in an. Elasticsearch The Definitive Guide

8. Regular expressions provide acceptable performance compared with using String searching methods and String character iteration tokenizing techniques. Java Performance Tuning 2nd Edition

9. WhitespaceAnalyzer didn’t lowercase, left in the dash, and did the bare minimum of tokenizing at whitespace boundaries. Lucene in Action 2nd Edition

10. String instances store Unicode character sequences and provide relatively simple operations for finding, replacing, and tokenizing characters using regular expressions. Java 7 Recipes A Problem-Solution Approach

1. If you stick with multicast, though, the entire cluster may share the same configuration file, which means that in practice Ganglia admins have to manage only as many configuration files as there are clusters. Monitoring with Ganglia

2. Parties include business stakeholders, enterprise architects, developers, testers, DBAs, system admins, and network admins. Performance Testing With JMeter 2.9

3. Admins can create and delete design documents despite the existence of this extreme validation function. CouchDB The Definitive Guide

4. For example, running a Job that sends an e-mail to all of the Jenkins admins warning them of the startup event. Jenkins Continuous Integration Cookbook

5. Keeping different kinds of documents in the same collection can be a nightmare for developers and admins. MongoDB The Definitive Guide 2nd Edition

6. Both authors and admins will be able to do this. Pro Spring MVC

8. Puppet (http://www.puppetlabs.com/puppet) is a reaction to these gaps in the tools available to SysAdmins, Operators and Developers. Pro Puppet

10. Chapter 9: Managing Projects and Users: This chapter walks through those userenabling processes that all admins must face to manage users, give them quotas to parcel out resources, and so on. OpenStack Operations Guide

# 1481、单词 xor 的匹配文本：

1. The bitwise EXCLUSIVE OR, or XOR (^), produces a one in the output bit if one or the other input bit is a one, but not both. Thinking in Java 4th Edition

2. The Boolean class now includes the static methods logicalAnd, logicalOr, and logicalXor, to apply the and, or, and xor operations between two booleans. Java 8 in Action Lambdas, Streams and Functional-style Programming

3. Ours will hold the single integer used in XOR encryption: Java Security 2nd Edition

4. In this representation,  is nothing more than a non-strict , andProp Boolean any of the usual  functions ('and', 'or', 'not', 'xor', etc) can be defined for Boolean. Functional Programming in Scala

5. A function could serve this purpose, but the Filter is optimized for this case, and many filters can be grouped by “logical” filters such as And, Or, Xor, and Not, rapidly creating more complex filtering operations. Hadoop：The Definitive Guide 3rd Edition

6. BitComparator Performs a bitwise comparison, providing a BitwiseOp class with AND, OR, and XOR operators. HBase：The Definitive Guide

7. Note that the and, xor, and or operations now have the same first operand as destination, the way x86 requires. Oracle JRockit The Definitive Guide

8. Boolean XOR (^) When used with boolean operands, this operator computes the Exclusive OR (XOR) of its operands. Java in a Nutshell 5th Edition

9. The Sandbox contains an interesting meta-filter in the misc project, contributed by Kelvin Tan, which chains other filters together and performs AND, OR, XOR, and ANDNOT bit operations between them. Lucene in Action 2nd Edition

10. This can be optionally followed by the initial database name, in which case a zero byte terminator is added immediately after the XOR encrypted password, followed by the database name string without a terminating zero byte. Understanding MySQL Internals

# 1482、单词 scarvarez 的匹配文本：

1. That’s all we need to secure the given URL for the Scarvarez family only. Pro Spring Security

# 1483、单词 libzmq 的匹配文本：

1. On any blocking call, libzmq will return -1 if there was an error. ZeroMQ

# 1484、单词 deprecation 的匹配文本：

1. Sadly, that benefit was lost on the deprecation police, and Java SE 5.0 deprecated the show method for windows as well. Core Java Volume I Fundamentals 9th Edition

2. New MapReduce Context APIs and Deprecation of the Old Parameter Passing APIs The core of this change is that a Mapper or a Reducer Context object is passed to the Mapper and Reducer classes, in place of the JobConf, to configure(), and the Reporter and OutputCollector to map() and reduce() Pro Hadoop

3. The reason for deprecation is because the Thread.resume() method has been marked as depre-cated in the Java 2 platform. Java Network Programming and Distributed Computing

4. There’s one direction that’s quite clear: Whenever you want to use readLine( ), you shouldn’t do it with a DataInputStream (this is met with a deprecation message at compile time), but instead use a BufferedReader. Thinking in Java 4th Edition

5. You will get a deprecation warning when you compile code that makes use of these features in Scala 2.8 Programming in Scala 2nd Edition

6. A Java compiler must produce a deprecation warning when a type, method, field, or constructor whose declaration is annotated with the annotation @Deprecated is used (i.e. The Java Language Specification Java SE 7 Edition

7. We recommend routine use of the -deprecation and -unchecked options. Programming Scala

8. If you are using a release after 1.x, you may wish to use the new property names in your configuration files and code to remove deprecation warnings. Hadoop：The Definitive Guide 3rd Edition

9. This however, was a bit too late, and, even today, they are widely used both in legacy code and new applications, despite the deprecation warnings. Oracle JRockit The Definitive Guide

10. When this tag appears, the compiler notes the deprecation in the class file it produces. Java in a Nutshell 5th Edition

# 1485、单词 recv 的匹配文本：

1. Look at each instance of gmond within the same network broadcast domain (since reachability is based on multicast packets), and find the udp_recv_channel block in gmond.conf. Apache Flume Distributed Log Collection for Hadoop

2. If you are not receiving Hadoop metrics after setting the servers property, doublecheck your gmond udp_recv_channel setting in gmond.conf. Monitoring with Ganglia

3. When a ticket retrieval message is received by your app over chan_recv, it looks up the ticket ID contained in the message. RabbitMQ in Action

4. Any other sequence (e.g., sending two messages in a row) will result in a return code of -1 from the send or recv call. ZeroMQ

5. In the recv() method, we're reading all the data available from a client. Java Threads 3rd Edition

6. If this action returns an  successfully, we invoke the  functionIO A recv. Functional Programming in Scala

7. A call to receive the next message m in the input buffer is represented by an event recv(m, pi) Zab High-performance broadcast for primary-backup systems

# 1486、单词 senders 的匹配文本：

1. You have a list of senders’ addresses that you’d like to join. Pro Java 7 NIO.2

2. I’d receive the years in sequence as they arrive, but the senders are concurrent and nonblocking. Programming Concurrency on the JVM

3. If you require something more elaborate, such as multiple senders or attachments, you could modify the code yourself as a programming exercise, or use the JavaMail API covered in Chapter 13; it provides prewritten support for advanced mail features. Java Network Programming and Distributed Computing

4. In the next section, we’ll talk about creating message queues that can be used to send to a single recipient, or to communicate between many senders and receivers. Redis in Action

5. They often depend on DAOs, mail senders, SOAP proxies, and whatnot. Spring in Practice

6. But we also remove any possibility to coordinate senders and receivers. ZeroMQ

7. In the next sections, we focus on other targets like JMS and email senders. Spring Batch in Action

8. If the channel sits with the receiving end, you can let multiple senders sink their messages into the same bundle. Spring Integration in Action

9. The overall idea behind a MOM is that it acts as a message mediator between message senders and message receivers. ActiveMQ in Action

10. Figure 17.4 Like queues, topics decouple message senders from message receivers. Spring in Action 4th Edition

# 1487、单词 misconfiguration 的匹配文本：

1. TcpConn The TcpConn metric module (Table A-5) provides a way to look at TCP network connections in an effort to detect problems or misconfiguration. Monitoring with Ganglia

2. The result of this misconfiguration was that none of the computationally intense work could be run in the map task, and the map method would return immediately with an exception. Pro Hadoop

3. In the case we’re examining, iostat’s output could point to either too much work, or misconfiguration (why are I/O requests queueing so long before reaching the disk, if it’s actually responding quickly?) High Performance MySQL 3rd Edition

4. However, in case of misconfiguration, you should monitor the archive for disc usage. Jenkins Continuous Integration Cookbook

5. Sometimes secondaries can fall behind by minutes, hours, or even days due to load, misconfiguration, network errors, or other issues. MongoDB The Definitive Guide 2nd Edition

6. If portability is an issue, then use the initialization or annotation method; otherwise, use the InitializingBean interface to reduce the amount of configuration your application needs and the chance of errors creeping into your application because of misconfiguration. Pro Spring 3

7. If left unspecified, there would be no text-analysis, which would in all likelihood be a misconfiguration. Solr 3 Enterprise Search Server

8. Common sources of error are either misconfiguration or lack of connectivity from the Hadoop nodes. Hadoop in Practice

9. Tasks may be slow for various reasons, including hardware degradation or software misconfiguration, but the causes may be hard to detect because the tasks still complete successfully, albeit after a longer time than expected. Hadoop：The Definitive Guide 3rd Edition

10. You’ll want to iron out any kinks in DNS resolution, network connectivity, and simple misconfiguration early. Hadoop Operations

# 1488、单词 dereference 的匹配文本：

1. To obtain the current balance, we use the deref() method, which is the Java-side API for the @ prefix we used in Clojure to dereference. Programming Concurrency on the JVM

2. Unlike normal software engineering, the failures of models aren’t usually as dramatic as a null pointer dereference or out-of-memory exception. Mahout in Action

3. The sort command can dereference those relations and sort by the underlying value. The Little Redis Book

4. For each execution, the behavior of reads is influenced by two additional partial orders, the dereference chain dereferences() and the memory chain mc(), which are considered to be part of the execution (and thus, fixed for any particular execution) The Java Language Specification Java SE 7 Edition

5. Assembly or LIR instructions that dereference memory typically annotate their pointers as a value or variable within square brackets. Oracle JRockit The Definitive Guide

6. Therefore, you must prefix every JNI call with (*env)-> to actually dereference the function pointer. Core Java Volume II Advanced Features 9th Edition

7. Note that when recycling container objects, you need to dereference all the elements previously in the container so that you don't prevent them from being garbage-collected. Java Performance Tuning 2nd Edition

8. In addition, the resizing can also impact Collection’s field access time, the time it takes to dereference a field, because a new underlying data store, again typically an array, for the Collection’s underlying data store may be allocated in a location in the JVM heap away from the object references stored within the data store and the other fields of the Collection. Java Performance

9. At this point, you can use the dereference() function to dereference the Owner field to the person["Owner"] field as an argument. The Definitive Guide to MongoDB

10. On a little-endian architecture, the macro is a mere pointer dereference. Understanding MySQL Internals

# 1489、单词 vlans 的匹配文本：

1. It is also possible to use VLANs to separate these networks. bk-compute-adminguide-grizzly

2. Advanced features such as VLANs that can cause overhead are not recommended. Hadoop Operations and Cluster Management Cookbook

3. Competent system administration skills, with advanced knowledge of key areas such as virtualization (perhaps deployed Xen or VMware at their company), storage (usage of iSCSI), and networking (understanding of VLANS and advanced switching) Deploying OpenStack

4. OpenStack Compute creates the Linux networking bridges and VLANs when required. bk-admin-guide-cloud-latest

5. Determined to be” really means that Cassandra has to guess based on an assumption of how your servers are located in different VLANs or subnets. Cassandra The Definitive Guide

6. You should be familiar with concepts such as DHCP, Linux bridges, VLANs, and iptables. OpenStack Operations Guide

# 1490、单词 embeddables 的匹配文本：

1. We also discussed special types of objects called embeddables that are mapped but can exist only within persistent entities. Pro JPA2

2. It will cause the plug-in to consider JPA mapping annotations to discover entities, relationships to other entities, embeddables, etc. Spring Data Modern Data Access for Enterprise Java

# 1491、单词 dynamodb 的匹配文本：

1. DynamoDB presents a key-value interface, and only replicates within a region. Spanner - Google’s Globally-Distributed Database

2. DynamoDB — Amazon DynamoDB is a fully managed NoSQL database that allows scaling up or down an individual table’s request capacity without downtime or performance degradation. Professional Hadoop Solutions

3. Another AWS service with similar support is DynamoDB (at http://aws.amazon.com/ dynamodb), a hosted NoSQL database solution in the cloud. Hadoop Beginners Guide

4. This allows the user to issue queries seamlessly whether the table represents a text file stored in Hadoop or a column family stored in a NoSQL database such as Apache HBase, Apache Cassandra, and Amazon DynamoDB. Programming Hive

# 1492、单词 sortable 的匹配文本：

1. The Sortable type class is defined against the type parameter A. Scala in Depth

2. In this case, the map function is emitting a key of the type SortableBytes, which represents the bucket for the metric and the actual text read from the input source as the value. Storm Blueprints Patterns for Distributed Real-time Computation

3. Let's say, for the sake of argument, that the only information queryable, sortable, and so on is a track's name, when doing a query for tracks. Solr 3 Enterprise Search Server

4. As you can see, our ExampleFieldType class extends the SortableIntField class, which is a class that stores the integer number and allows sorting. Solr 3.1 Cookbook

5. How large can f(N) be for the entire list still to be sortable in O(N) time? Data Structures and Algorithm Analysis in Java 3rd Edition

6. I am sorting a randomized array of Sortable objects, using the same randomized order for each test. Java Performance Tuning 2nd Edition

7. Sorting by a field first requires that you follow the rules for indexing a sortable field, as detailed in section 2.9 Lucene in Action 2nd Edition

# 1493、单词 theming 的匹配文本：

1. Introducing Spring MVC In the Spring Framework, the Spring MVC module provides comprehensive support for the MVC pattern, with support for other features (for example, theming, i18n, validation, type conversion and formatting, and so on) that ease the implementation of the presentation layer. Pro Spring 3

2. It provides interactions, widgets, effects, and theming for building rich Internet applications. Selenium Testing Tools Cookbook

3. We outline how to display reference data in drop-down lists, customize date fields, deal with localization and theming, and we show you how Roo uses Apache Tiles to lay out your user interfaces. Spring Roo in Action

# 1494、单词 mutator 的匹配文本：

1. Methods that change instance fields are called mutator methods, and those that only access instance fields without modifying them are called accessor methods. Core Java Volume I Fundamentals 9th Edition

2. Create a mutator as you would for a single insert and make multiple calls to the addInsertion method. Cassandra High Performance Cookbook

3. Which form should you use? It is considered good style to use () for a mutator method (a method that changes the object state), and to drop the () for an accessor method (a method that does not change the object state) Scala for the Impatient

4. The target type is dictated by the signature of the property mutator being used. Spring Dynamic Modules in Action

5. For example, all accessor methods begin with get, and all mutator methods begin with set. Core Java Volume II Advanced Features 9th Edition

6. If the documentation does not provide a precise description of the state transitions performed by mutator methods, it can be difficult or impossible to use a mutable class reliably. Effective Java 2nd Edition

7. To write data, you just need a Mutator class; to read data, just use a Selector. Cassandra The Definitive Guide

8. Once one of the mutator methods has been called, the WeakHashMap runs through its ReferenceQueue, removing all WeakReference objects from the queue and also removing each WeakReference object as a key in its internal map, thus simultaneously dereferencing the value. Java Performance Tuning 2nd Edition

9. The following code demonstrates the declaration of a private field, followed by accessor and mutator methods that can be used to obtain or set the value of that field from an outside class: Java 7 Recipes A Problem-Solution Approach

# 1495、单词 vetoable 的匹配文本：

1. Here is a Specs object that demonstrates ObservableClicks and VetoableClicks working together. Programming Scala

2. Since the method is vetoable, it calls all registered vetoable change listeners before proceeding to make the change. Core Java Volume II Advanced Features 9th Edition

3. A host component may have a list of listeners to which it sends vetoable change events in the course of a vetoable set method. Concurrent Programming in Java Design Principles and Pattern

# 1496、单词 smalltalk 的匹配文本：

1. The Java programming language has an interesting history, and draws heavily from earlier objectoriented languages such as C++ and Smalltalk. Java Network Programming and Distributed Computing

2. On the other hand, C++, VB, Perl, and other languages like Smalltalk had some of their design efforts focused on the issue of complexity and as a result are remarkably successful in solving certain types of problems. Thinking in Java 4th Edition

3. Introducing Groovy Started by James Strachan in 2003, the main objective of Groovy is to provide an agile and dynamic language for the JVM, with features inspired from other popular scripting languages including Python, Ruby, and Smalltalk. Pro Spring 3

4. Various languages such as Smalltalk and JavaScript have explored this route. Java 8 in Action Lambdas, Streams and Functional-style Programming

5. Alan Kay, the inventor of Smalltalk, remarked that in this way the simplest object has the same construction principle as a full computer: it combines data with. Programming in Scala 2nd Edition

6. Smalltalk captured the essence of object-oriented programming (OOP) as that model of programming entered the mainstream. Programming Scala

7. The launch of the Macintosh in 1984 introduced him to objects via Smalltalk, Object Pascal, and MacApp. Beginning Scala

8. Robust data structures • An efficient, small binary format for RPC calls • Easy integration with dynamically typed languages such as Python, Ruby, Smalltalk, Perl, PHP, and Objective-C Avro has certain advantages that Thrift doesn’t, in particular the fact that static code generation is not required to use RPC for your application, though you can use it for. Cassandra The Definitive Guide

9. If the JDK had taken the "printOn: aStream" paradigm from Smalltalk, the temporary objects used would be significantly reduced. Java Performance Tuning 2nd Edition

10. Products such as Oracle TopLink got their start in the Smalltalk world before making the switch to Java. Pro JPA2

# 1497、单词 prebuilt 的匹配文本：

1. Nevertheless, having prebuilt standard OS packages such as RPMs and DEBs eases installation as well as providing startup/shutdown scripts. Apache Flume Distributed Log Collection for Hadoop

2. HBase ships with its prebuilt hadoop-core and ZooKeeper JAR files. HBase Administration Cookbook

3. In general this method is not recommended as the prebuilt packages are much easier to use. Getting Started with CouchDB

4. There is no prebuilt version of fuse-dfs bundled into the distribution. Pro Hadoop

5. Storm comes with several prebuilt stream groupings, including the following: Professional Hadoop Solutions

6. Maven archetypes are prebuilt project templates that provide basic Maven project scaffolding. HBase in Action

7. Prebuilt versions of the libraries aren’t bundled, so you’ll need to build them yourself. Hadoop in Practice

8. Hadoop comes with prebuilt libhdfs binaries for 32-bit Linux, but for other platforms, you will need to build them yourself using the instructions at http://wiki.apache.org/ hadoop/LibHDFS. Hadoop：The Definitive Guide 3rd Edition

10. HiveQL statements are interpreted and an execution plan of prebuilt map and reduce classes is assembled to perform the MapReduce equivalent of the SQL statement. Hadoop Operations

# 1498、单词 processlist 的匹配文本：

1. This makes it possible to analyze the application quite flexibly by looking at the database server’s query log, and it also makes it easy to know what’s really going on when you look at SHOW PROCESSLIST and see some abusive query running in MySQL. High Performance MySQL 3rd Edition

2. This value shows up in the Id column of SHOW PROCESSLIST output and is used as an argument to the KILL command. Understanding MySQL Internals

# 1499、单词 netstat 的匹配文本：

1. Check whether MySQL is running by entering the following command: sudo netstat -tap | grep mysql. Web Crawling and Data Mining with Apache Nutch

2. Because the TcpConn module relies heavily on the netstat Linux utility to acquire TCP metric data and the fact that gmond is not a multithreaded daemon, the module doesn’t want to cause any delays in the gmond gathering process due to latency in calling an external process utility. Monitoring with Ganglia

3. If you’re interested in other parts of your system, such as the network, you might want to instead use tools such as ifconfig (which shows how many network errors have occurred, among other things) or netstat. High Performance MySQL 3rd Edition

4. System- and network-level information can be seen from Ganglia (figure 10.3) and from several Linux tools such as lsof, top, iostat, netstat, and so on. HBase in Action

5. The operator first restarts the rabbitmq-server service, then uses the netstat command to verify that Port 6163 is bound and listening. Pro Puppet

6. The complete battery usually includes OS utilities such as top, vmstat, sar, iostat, and netstat, but also Hadoop-specific tools such as hadoop dfsadmin, and hadoop fsck. Hadoop Operations

7. Network packet sniffers (both hardware and software types, e.g., netstat) Java Performance Tuning 2nd Edition

8. For example, even though Linux has netstat with its optional sysstat package and Solaris bundles netstat, neither the Linux nor Solaris implementation of netstat reports network utilization. Java Performance

9. A quick way to ensure the HiveServer is running is to use the netstat command to determine if port 10,000 is open and listening for connections: Programming Hive

# 1500、单词 nonterminal 的匹配文本：

1. The definition of a nonterminal is introduced by the name of the nonterminal being defined, followed by a colon. The Java Virtual Machine Specification Java SE 7 Edition

2. Each production has an abstract symbol called a nonterminal as its left-hand side, and a sequence of one or more nonterminal and terminal symbols as its right-hand side. The Java Language Specification Java SE 7 Edition

3. Context-Free Grammar A kind of language grammar for which each nonterminal can be specified as a production without reference to additional context information. Programming Scala

4. These symbols enclose terminal or nonterminal symbols that can be repeated zero or more times. Steps in Scala An Introduction to Object-Functional Programming

# 1501、单词 rdbmses 的匹配文本：

1. Relational database management systems (RDBMSes) have been around since the early 1970s, and have helped countless companies and organizations to implement their solution to given problems. HBase：The Definitive Guide

# 1502、单词 postconditions 的匹配文本：

1. Pre and postauthorization provide formalized support for what are generally termed preconditions and postconditions in a classic, object-oriented design. Spring Security 3.1

2. You can also specify the results the module guarantees to deliver, the postconditions, if the preconditions were satisfied. Programming Scala

3. This also ensures that the postconditions are guaranteed to the caller after a method or constructor invocation returns. Java EE 7 Essentials

4. The doc comment should enumerate all of the method’s preconditions, which are the things that have to be true in order for a client to invoke it, and its postconditions, which are the things that will be true after the invocation has completed successfully. Effective Java 2nd Edition

5. You should use this pattern for debug and trace statements and assertion preconditions, postconditions, and invariants. Java Performance Tuning 2nd Edition

6. In Scala preconditions and postconditions can be asserted with the two forms of the assume method: Steps in Scala An Introduction to Object-Functional Programming

7. Preconditions and postconditions on the effects of operations, such as rules stating that it is impossible to remove water from an empty tank, or to add water to a full tank that is not equipped with an available overflow tank. Concurrent Programming in Java Design Principles and Pattern

# 1503、单词 gmail 的匹配文本：

1. Most of their products, including Search, Gmail, Maps, YouTube, and so on, use AJAX extensively. Performance Testing With JMeter 2.9

2. As proof of its difficulty, only recently has anyone created a truly complex piece of JavaScript (Google, in GMail), and that required excessive dedication and expertise. Thinking in Java 4th Edition

3. Make sure you have a test user account for Gmail. Jenkins Continuous Integration Cookbook

4. All you need to do in this case is to use the Gmail SMTP server, and provide your Gmail username and password in the SMTP Authentication (you also need to use SSL and the non-standard port of 465) Jenkins The Definitive Guide

5. This is not surprising, as Gmail is a single-page web application with lots of JavaScript (like Google Calendar) Testable JavaScript

6. Current day: World-wide traffic Continuous crawl and indexing processes (Caffeine) Seek-heavy, latency-sensitive apps (Gmail) Person-to-person, person-to-group sharing (Docs) Storage Architecture and Challenges

7. However, our core data model is not restricted to our particular RPC framework; we also trace activities such as SMTP sessions in Gmail, HTTP requests from the outside world, and outbound queries to SQL servers. Dapper a Large-Scale Distributed Systems Tracing Infrastructure

8. In the following example, we will locate the GMail link: Selenium Testing Tools Cookbook

9. Windows users: Remember to type a semicolon instead of a colon in the classpath.) At the time of this writing, GMail does not check the veracity of the information—you can supply any sender you like. Core Java Volume II Advanced Features 9th Edition

10. Suppose you want to create a repository method to find all Spitters whose email address is a Gmail address. Spring in Action 4th Edition

# 1504、单词 sshd 的匹配文本：

1. For example, we might want to create a regular user for Hadoop with privileges to run Hadoop commands and to configure system services such as SSHD and FTP. Hadoop Operations and Cluster Management Cookbook

2. Jenkins has its own build-in SSH client, and almost all Unix environments support SSH (usually sshd) out of the box. Jenkins The Definitive Guide

3. Jenkins starts up its own SSHD server by default on a random port. Testable JavaScript

4. Getting ready Ensure that you have Java 1.6, ssh, and sshd installed. Hadoop RealWorld Solutions Cookbook

5. The easiest way to do this is to copy an existing functional sshd_config file and use that. Pro Puppet

6. Note that ssh must be installed and sshd must be running if you want to use the supplied scripts to manage remote Hadoop and HBase daemons. HBase：The Definitive Guide

# 1505、单词 newsgroups 的匹配文本：

1. These two steps, extracting features and choosing the algorithm, go hand in hand in designing and training a classifier, and to help you develop an intuitive sense of the different options, we look at a second step-bystep example using a different learning algorithm, naive Bayes, with the same 20 newsgroups data set. Mahout in Action

2. Online services such as DejaNews (http://www.dejanews.com/usenet/) provide a Web-based interface, but newsgroups can also be accessed via newsreader software that uses NNTP. Java Network Programming and Distributed Computing

3. We use the message ID to identify the duplicated messages that are a result of cross-posting across different newsgroups. Hadoop MapReduce Cookbook

4. This is probably the single most common network programming error, and it is seen daily in programming forums and newsgroups all over the Internet. Fundamental Networking in Java

# 1506、单词 precompiled 的匹配文本：

1. Or you can use a precompiled job JAR from Mahout’s distribution. Mahout in Action

2. Obviously, the C programing language provides the developer with a much lower-level view of the system and the performance that comes with a precompiled. Monitoring with Ganglia

3. To install Redis in OS X without using a compiler, you’ll use a Python utility called Rudix, which installs precompiled binaries for a variety of software. Redis in Action

4. Precompiled binary versions of CouchDB are available via various package managers; for example, you can use aptitude on newer versions of Ubuntu Linux and yum on Fedora Linux. Beginning CouchDB

5. Installing RabbitMQ on Debian Debian and Ubuntu systems provide the Erlang runtime as precompiled binary packages. Pro Puppet

6. We’ve only compiled our own copy rather than running the precompiled version. Hadoop in Action

7. Stored procedures are precompiled SQL code that can be executed by the database server. Java Performance Tuning 2nd Edition

8. There is a distinct advantage in using named queries or parameterized dynamic queries whenever possible, as the JPA provider can skip the compilation stage during runtime and uses the precompiled queries from its cache. Java Performance

9. PreparedStatements send a precompiled SQL statement to the DBMS rather than a String. Java 7 Recipes A Problem-Solution Approach

10. Precompiled binaries are available for each of these platforms at mongodb.org. MongoDB in Action

# 1507、单词 bzip2 的匹配文本：

1. There are arguments for using gzip or bzip2 for their higher compression ratios at the cost of longer compression times, especially if your data is written once but will be read hundreds or thousands of times. Apache Flume Distributed Log Collection for Hadoop

2. We have set it to use the BZip2 codec, which has the highest compression ratio. HBase Administration Cookbook

3. The framework supports the gzip, zip, sometimes LZO, and bzip2 compression codecs. Pro Hadoop

4. For example, if you want very high compression and don’t care about how long it takes, you can use bzip2 instead of gzip. High Performance MySQL 3rd Edition

5. To create a TAR archive with the optional gzip or bzip2 compression, we must use the tarFiles task. Gradle Effective Implementation Guide

6. Since files compressed using the bzip2, gzip, and DEFLATE codecs cannot be split, the whole file must be given as a single input split to the mapper. Hadoop RealWorld Solutions Cookbook

7. Anyone looking for a balance between compression and execution times would have to eliminate bzip2 from the picture. Hadoop in Practice

8. Bzip2’s decompression speed is faster than its compression speed, but it is still slower than the other formats. Hadoop：The Definitive Guide 3rd Edition

9. Use this option if you want to apply a different compression filter, such as bzip2 Java in a Nutshell 5th Edition

10. All recent versions of Hadoop have built-in support for the GZip and BZip2 compression schemes, including native Linux libraries that accelerate compression and decompression for these formats. Programming Hive

# 1508、单词 es2 的匹配文本：

1. To understand how these elements come together, we now examine some illustrative search queries and their corresponding results on ES2 Hadoop in Action

# 1509、单词 conditionals 的匹配文本：

1. We also use simple JavaScript conditionals to ensure that the doc._id is set to be the same as doc.slug for the sake of pretty URLs. CouchDB The Definitive Guide

2. You can query for ranges, set inclusion, inequalities, and more by using $-conditionals. MongoDB The Definitive Guide 2nd Edition 3. Also, regular Java control flow constructs can be used to define computations involving PCollections, including functions, conditionals, and loops. FlumeJava - Easy, Efficient Data-Parallel Pipelines 4. These components are wrapped in a configuration language that includes variables, conditionals, arrays and other features. Pro Puppet 5. In the long run, it should save you from unexpected results in your conditionals. Programming Scala 6. Many of the statements defined by Java, however, are flow-control statements, such as conditionals and loops, that alter this default order of execution in welldefined ways. Java in a Nutshell 5th Edition 7. Pig allows integration of user code wherever possible, so it currently supports user defined field transformation functions, user defined aggregates, and user defined conditionals. Programming Pig 8. On the other hand, casts may appear in the form of conditionals: Steps in Scala An Introduction to Object-Functional Programming 9. Guards may also be considered as special forms of conditionals. Concurrent Programming in Java Design Principles and Pattern 10. At last, you will implement the conditionals that decide whether the layer should display an error or a warning icon by drawing an image onto the Graphics object, as shown here: Java 7 Recipes A Problem-Solution Approach # 1510、单词 hpc 的匹配文本： 1. The HPC-centric admin and engineers who designed it were used to thinking about massive, parallel applications, so even though the designers of other monitoring systems looked at tens of thousands of hosts and saw a problem, it was natural for the Berkeley engineers to see those same hosts as the solution. Monitoring with Ganglia 2. This approach is common in the high-performance computing (HPC) world, where a monolithic scheduler usually runs a. Omega - flexible, scalable schedulers for large compute clusters 3. Perhaps some of these issues were due to the fact that many of these distributed schedulers were originally created to support MPI style and HPC application models and running coarse-grained non-elastic workloads. Apache Hadoop YARN Yet Another Resource Negotiator 4. For precisely this reason, a set of high performance computing extensions to the POSIX I/O interface have been proposed by the high-performance computing (HPC) community [31], a subset of which are implemented by Ceph. Ceph A Scalable, High-Performance Distributed File System 5. For these reasons, HPC schedulers use centralized scheduling, and require jobs to declare the required resources at job submission time. Mesos A Platform for Fine-Grained Resource Sharing in the Data Center 6. Broadly, the approach in HPC is to distribute the work across a cluster of machines, which access a shared filesystem, hosted by a Storage Area Network (SAN) Hadoop：The Definitive Guide 3rd Edition 7. Managing scalability in object storage systems for HPC Linux clusters. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters. 8. Many traditional high-performance computing (HPC) systems have a similar master/worker model, but computation is generally distinct from data storage. Hadoop Operations 9. Dea is currently a software engineer working for BCT-LLC on projects with high performance computing (HPC) architectures. Java 7 Recipes A Problem-Solution Approach # 1511、单词 epel 的匹配文本： 1. You’ll find that some RPM-based distributions ship with Ganglia packages in the base repositories, and others require you to use special-purpose package repositories, such as the Red Hat project’s EPEL (Extra Packages for Enterprise Linux) repository. Monitoring with Ganglia 2. Install the epel repository with the following command: sudo yum install epel-release. Hadoop Operations and Cluster Management Cookbook 3. Next, to get the latest releases of Puppet, you will need to add the EPEL repository (see sidebar) to your host and then install packages from that repository. Pro Puppet # 1512、单词 visualgc 的匹配文本： 1. The following graphical tools can be used to monitor the HotSpot VM: JConsole, VisualGC, and VisualVM. Java Performance # 1513、单词 reordered 的匹配文本： 1. It tolerates delayed or reordered messages and replicas that fail by stopping. Megastore - Providing Scalable, Highly Available Storage for Interactive Services 2. In addition, the memory hierarchy of the architecture on which a virtual machine is run may make it appear as if code is being reordered. JSR-133 Java Memory Model and Thread 3. In addition, the memory hierarchy of the architecture on which a Java Virtual Machine implementation is run may make it appear as if code is being reordered. The Java Language Specification Java SE 7 Edition 4. During runtime, the handler chain is reordered such that logical handlers are executed before the SOAP handlers on an outbound message and SOAP handlers are executed before logical handlers on an inbound message. Java EE 7 Essentials 5. The original memory model allowed volatile and non-volatile writes to be reordered interchangeably. Oracle JRockit The Definitive Guide 6. If the constants are reordered, the numberOfMusicians method will break. Effective Java 2nd Edition 7. It’s important to point out that tasks within a job can always be reordered. Hadoop Operations 8. It’s also possible that one or more packets may be lost or corrupted in transit and need to be retransmitted or that packets arrive out of order and need to be reordered. Java Network Programming 4th Edition 9. It is important to note that the order of the data for all columns is the same and corresponds to the (possibly reordered) rows of the original table. PowerDrill - Processing a Trillion Cells per Mouse Click 10. In other words, not only may concurrent executions be interleaved, but they may also be reordered and otherwise manipulated in an optimized form that bears little resemblance to their source code. Concurrent Programming in Java Design Principles and Pattern # 1514、单词 macintosh 的匹配文本： 1. For example, there is an abstract Window class and implementations of it for UNIX, Windows, and the Macintosh. Core Java Volume I Fundamentals 9th Edition 2. Whether an individual is running a PC, Unix, Macintosh, or Palm handheld computer, the complexities of communication and translation are handled transparently for users by the TCP/IP suite of protocols. Java Network Programming and Distributed Computing 3. For example, the pre-OSX versions of the Macintosh operating system (a reasonably important target for the first versions of Java) did not support multitasking. Thinking in Java 4th Edition 4. For example, the term has been used to describe binary translation tools such as Rosetta on the Macintosh, enabling software compiled for PowerPC to run on Intel hardware. Oracle JRockit The Definitive Guide 5. Java technology resources are not the same as Windows or Macintosh resources. Core Java Volume II Advanced Features 9th Edition 6. The launch of the Macintosh in 1984 introduced him to objects via Smalltalk, Object Pascal, and MacApp. Beginning Scala 7. This means you do not have to create distinct Windows, Macintosh, and Unix versions of your programs, for example. Java in a Nutshell 5th Edition 8. Readers with previous experience in network programming in a Unix, Windows, or Macintosh environment will be pleasantly surprised at how much easier it is to write equivalent programs in Java. Java Network Programming 4th Edition 9. Some older versions of Windows TCP/IP stacks, both those delivered with the OS and others, had performance problems, as did some versions of TCP/IP stacks on the Macintosh OS (up to and including System 7.1) Java Performance Tuning 2nd Edition 10. This book was written and typeset by the author using Adobe FrameMaker, Acrobat, and Distiller on Macintosh and PC platforms, and supplied to the publisher and printer as an Adobe Portable Document Format (PDF) file. Fundamental Networking in Java # 1515、单词 hashtables 的匹配文本： 1. In their optimization they further partition the distributed cache into N partitions, and likewise cache the map tuples into N hashtables, which process provides a more optimal join in the map cleanup method. Hadoop in Practice 2. We have now, with a few clicks, been able to list all the Hashtable instances in the system that contain Hashtables. Oracle JRockit The Definitive Guide 3. Key/Value, or KV stores, are conceptually like hashtables, where values are stored and accessed by an immutable key. A Little Riak Book 4. Collection, Set, List, Map, SortedSet, and SortedMap are all interfaces, but the java.util package also defines various concrete implementations, such as lists based on arrays and linked lists, and maps and sets based on hashtables or binary trees. Java in a Nutshell 5th Edition 5. Here we contextualize Cassandra against a variety of the more popular nonrelational databases, examining documentoriented databases, distributed hashtables, and graph databases, to better understand Cassandra’s offerings. Cassandra The Definitive Guide 6. Most container objects (e.g., Vectors, Hashtables) can be reused rather than created and thrown away. Java Performance Tuning 2nd Edition 7. Much like traditional hashtables, hashes in Redis store several fields and their values inside a specific key. Redis Cookbook # 1516、单词 verbosegc 的匹配文本： 1. You can also use the -verbosegc option with the VM. Java Performance Tuning 2nd Edition # 1517、单词 angela 的匹配文本： 1. But the key can’t be encrypted because Gus doesn’t have the key yet, so Angela has to send the key unencrypted. Java Network Programming 4th Edition 2. To my wife Angela: you have provided me with the love and support that I need to be successful in my career. Java 7 Recipes A Problem-Solution Approach # 1518、单词 queueing 的匹配文本： 1. This includes a shift in concern from throughput to response time, a commitment to understanding the performance of MySQL on new hardware, and a pursuit of new skills like queueing theory that can be used to understand performance. High Performance MySQL 3rd Edition 2. Deadline and completely fair queueing (CFQ) both tend to be good choices. MongoDB The Definitive Guide 2nd Edition 3. Also, classes that integrate with Oracle Advanced Queueing are provided. Pro Spring 3 4. First you obtain a new instance of a QueueingConsumer by passing it the channel object E. RabbitMQ in Action 5. The cloud controller communicates with the internal object store using HTTP, but it communicates with the scheduler, network controller, and volume controller using AMQP (advanced message queueing protocol) bk-admin-guide-cloud-latest 6. The publish-subscribe channel doesn’t support queueing, but it does support asynchronous operation if you provide a task executor that delivers messages to each of. Spring Integration in Action 7. Elite.com includes a queueing subsystem that asynchronously accepts external communications, such as email entries. Java Performance Tuning 2nd Edition 8. Disabling asynchronous dispatch allows messages to be pass the internal queueing and dispatching done by the session, as shown in figure 13.6 ActiveMQ in Action 9. From the point of view of queueing theory this refinement doesn’t change Model A at all: since the first queue is fed directly into the second they constitute one large queue. Fundamental Networking in Java 10. Pub/sub can even be used as a building block of a robust queueing system. Redis Cookbook # 1519、单词 divisor 的匹配文本： 1. If the dividend is an infinity or the divisor is a zero or both, the. The Java Virtual Machine Specification Java SE 7 Edition 2. It’s pointless to test it against a divisor that’s not itself prime! So you can limit the test to only the prime numbers found before the current candidate. Java 8 in Action Lambdas, Streams and Functional-style Programming 3. To normalize in this way, you need to divide the numerator and denominator by their greatest common divisor. Programming in Scala 2nd Edition 4. The binary % operator is said to yield the remainder of its operands from an implied division; the left-hand operand is the dividend and the right-hand operand is the divisor. The Java Language Specification Java SE 7 Edition 5. Euclid’s algorithm (which is over two thousand years old) computes the greatest common divisor of two numbers as gcd(a, b) = a if b is zero, and gcd(b, rem(a, b)) otherwise, where rem is the remainder. Java SE 8 for the Really Impatient 6. The first is the divisor and the second is the expected remainder. MongoDB in Action # 1520、单词 tokenizes 的匹配文本： 1. The custom analyzer tokenizes the text from the input Reader into a stream of tokens. Mahout in Action 2. The map() method tokenizes the line and emits a record for each word of the input record, a Text and the value 1, an IntWritable. Pro Hadoop 3. This analyzer takes a stream of characters and tokenizes it into a stream of tokens, usually with a simple algorithm such as splitting on whitespace. Solr 3 Enterprise Search Server 4. The querying one is straightforward—it just tokenizes the data on the basis of whitespace characters. Solr 3.1 Cookbook 5. The map function tokenizes the line, and for each token (word), emits a key value pair (word, 1) Hadoop MapReduce Cookbook 6. TokenCounterMapper A mapper that tokenizes the input value into words (using Java’s StringTokenizer) and emits each word along with a count of one. Hadoop：The Definitive Guide 3rd Edition 7. We see q that WordCount uses Java’s StringTokenizer in its default setting, which tokenizes based only on whitespaces. Hadoop in Action 8. An analyzer tokenizes text by performing any number of operations on it, which could include extracting words, discarding punctuation, removing accents from characters, lowercasing (also called normalizing), removing common words, reducing words to a root form (stemming), or changing words into the basic form (lemmatization) Lucene in Action 2nd Edition 9. Here is the first Python script that tokenizes lines of text on whitespace (which doesn’t properly handle punctuation, etc.): Programming Hive 10. The querying analyzer is straight; it just tokenizes the data on the basis of whitespace characters. Apache Solr 4 Cookbook # 1521、单词 bigrams 的匹配文本： 1. Instead of creating vectors where dimensions map to single words (unigrams), you could as easily create vectors where dimensions map to bigrams—or even both. Mahout in Action 2. Linear interpolation Linear interpolation is the last smoothing model that takes the values of the lambdas provided in the configuration and uses them to calculate weights of trigrams, bigrams and unigrams. Mastering ElasticSearch 3. We chose 6, because there were six Shakespeare documents, and we wanted to identify significant bigrams around those documents. Hadoop RealWorld Solutions Cookbook 4. We could index both unigrams and bigrams into a single field, but it is cleaner to keep unigrams and bigrams in separate fields which can be queried independently. Elasticsearch The Definitive Guide 5. Both bigrams and trigrams are important in natural language processing. Hadoop in Action 6. The main program repeatedly adds twenty-six bigrams, each consisting of two identical lowercase letters, to a set. Effective Java 2nd Edition # 1522、单词 pdm 的匹配文本： 1. To change the version of PMD that we want to use, we must set the property toolVersion of the PDM plugin. Gradle Effective Implementation Guide 2. They named the project Big Cloud–based Parallel Data Mining (BC-PDM ) and it was architected to achieve four objectives : Hadoop in Action # 1523、单词 multiverse 的匹配文本： 1. But we’re not forced to use Clojure, because there are ways to use STM directly in Java, thanks to nice tools like Multiverse and Akka. Programming Concurrency on the JVM # 1524、单词 tsung 的匹配文本： 1. See Chapter 6 for information about how to perform distributed load testing on your system using Tsung. Scaling CouchDB # 1525、单词 svg 的匹配文本： 1. Flash and Flex support the use of the Web’s most common image formats, and Flex also has the ability to translate scalable vector graphics (SVG) files into SWF resources that can be embedded in Flex clients. Thinking in Java 4th Edition 2. The SVG image can be processed either as a vector image, as a structured XML document, as plain text, or ultimately as a raw sequence of bytes. Tika in Action 3. For example, if you need SVG inside XHTML, you can construct an element like this: Core Java Volume II Advanced Features 9th Edition 4. The application will load an SVG file named clock3.svg and display the contents onto the JavaFX Scene graph: Java 7 Recipes A Problem-Solution Approach # 1526、单词 postprocessing 的匹配文本： 1. As an added bonus, the reduce task is also run as a chain, with a postprocessing map that converts the encoded key formats back into dot-separated octet format. Pro Hadoop 2. While XML is a useful format for postprocessing the results from other tools like Sonar, it’s not convenient to read. Gradle in Action 3. In addition, the AbstractAction class implements the Action interface’s execute() method and provides a doExecute()method for you to place the code you would normally place in the execute() method, and two additional template methods, doPreExecute()and doPostExecute(), which you can override to do pre- and postprocessing. Spring in Practice 4. At some point, you should run some postprocessing that collects the outputs into larger files. MapReduce Design Patterns 5. The Security Interceptor works with a preprocessing step and a postprocessing step. Pro Spring Security 6. The scans pulled down all the data, and postprocessing happened in the client. HBase in Action 7. Let’s move on from application context creation to their postprocessing, which allows you to modify the definitions of Spring beans. Spring Dynamic Modules in Action 8. The only difference between an HDFS import and a Hive import is that the Hive import has a postprocessing step where the Hive table is created and loaded, as shown in figure 2.23 Hadoop in Practice 9. Doing a bit of postprocessing of data from MapReduce is very common, as is feeding it into analysis tools such as R, a spreadsheet, or even a relational database. Hadoop：The Definitive Guide 3rd Edition 10. You can add a postprocessing step after the MapReduce job to complete the computation. Hadoop in Action # 1527、单词 coord 的匹配文本： 1. Coord: It is the coordination factor that is based on the number of terms the. Mastering ElasticSearch 2. These correspond to the four-hour frequency specified for the data-prep-coord Coordinator application. Professional Hadoop Solutions 3. For a coordinate Coord(row, column), it returns a single-element list containing the cell at that coordinate. Programming in Scala 2nd Edition 4. At a high level, the important concepts are demonstrated by the high-level formula – namely, Term Frequency (tf), Inverse Document Frequency (idf), Term Boosts (t.getBoost), the Field Normalization (norm), the Coordination Factor (coord), and the Query Normalization (queryNorm) Solr in action 5. Thus, to create an index on a column in table stores named gps_coord of the type GEOMETRY, use the following syntax: Understanding MySQL Internals # 1528、单词 logins 的匹配文本： 1. You can use a regular HTML form to submit logins to CouchDB. CouchDB The Definitive Guide 2. In this case, users will log into Jenkins using their Unix account logins and passwords. Jenkins The Definitive Guide 3. But what about getting notified when your app is experiencing an unusual number of requests for user logins, all from a single IP? Or perhaps you’d like to allow your customers to be notified when unusual events occur to their data? What you need is for your app to generate alerts, but this opens up a whole new set of questions and adds a lot of complexity to your app. RabbitMQ in Action 4. If you group logins by the hour of the day and perform a count of the number of records in each group, you can plot these counts on a histogram and recognize times when your website is more active. MapReduce Design Patterns 5. Debugging information for RabbitMQ is located in /var/log/rabbitmq, and may contain information about invalid logins if the Stomp username and password are not correct. Pro Puppet 6. Even though we want password-less logins, keys without passphrases are not considered good practice (it’s OK to have an empty passphrase when running a local pseudodistributed cluster, as described in Appendix A), so we specify a passphrase when prompted for one. Hadoop：The Definitive Guide 3rd Edition 7. In general, this setting is good for small column families with few values, such as the passwords of a user table, so that logins can be processed very fast. HBase：The Definitive Guide 8. Data is one of the newer ingredients in these Internet-based systems and typically includes user-activity events corresponding to logins, page visits, clicks, social networking activities such as likes, sharing, and comments, and operational and system metrics. Apache Kafka 9. Management of user names and logins is just one of the issues that require special attention. Core Java Volume II Advanced Features 9th Edition 10. If you create individual logins and access rights for the same user on different databases, then there is no synchronization between those records. The Definitive Guide to MongoDB # 1529、单词 ansi 的匹配文本： 1. It may well work with older versions of MySQL, or even other databases, because it tries to use standard ANSI SQL where possible. Mahout in Action 2. CloudBase: Data Warehousing The CloudBase project, http://cloudbase.sourceforge.net/, provides a high-performance, data warehousing system built on top of MapReduce, with an ANSI SQL API. Pro Hadoop 3. I believe the reason for one of these positions is the distinct benefit seen in going from a poorly typed language like pre-ANSI C to a strong, statically typed language (that is, checked at compile time) like C++ or Java. Thinking in Java 4th Edition 4. Redis is written in ANSI C and works in most POSIX systems, such as Linux, without any external dependencies. MapReduce Design Patterns 5. Drill’s query parser supports full SQL (ANSI SQL:2003), including correlated sub-query, analytics functions, and so on. Professional Hadoop Solutions 6. This format is an ANSI standard for certificates, and while there are PGP and other certificate formats in the world, the X509 format is dominant. Java Security 2nd Edition 7. It makes a stricter goal of ANSI SQL adherence, and interaction is primarily through a JDBC driver, which makes it easier to connect to business intelligence reporting tools. Hadoop in Action 8. Drivers can support other syntaxes, such as the database's stored-procedure syntax, but ANSI SQL must be supported. Java Performance Tuning 2nd Edition 9. However, like most SQL dialects, HiveQL does not conform to the ANSI SQL standard and it differs in various ways from the familiar SQL dialects provided by Oracle, MySQL, and SQL Server. Programming Hive 10. The syntax for joins is similar to the JOIN expressions supported by ANSI SQL. Pro JPA2 # 1530、单词 ietf 的匹配文本： 1. There are thousands of IETF specifications, each solving part of the puzzle. ZeroMQ 2. The bSocket protocol has been standardized by IETF under RFC 6455 Java EE 7 Specification 3. A standard set of tags is defined by the IETF BCP 47 standard. Java 7 New Features Cookbook 4. And the org.ietf.jgss package is of interest to only a very narrow subset of readers. Java in a Nutshell 5th Edition 5. Although there are many standards organizations in the world, the two that produce most of the standards relevant to application layer network programming and protocols are the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C) Java Network Programming 4th Edition # 1531、单词 hcat 的匹配文本： 1. Pig will call getPartitionKeys, and HCatLoader will return two key names, date and colo. Programming Pig 2. HCatalog provides HCatInputFormat to enable MapReduce users to read data stored in Hive’s data warehouse. Programming Hive # 1532、单词 jstat 的匹配文本： 1. Use the jstat command to show the Java Garbage Collection (GC) statistics: HBase Administration Cookbook 2. In this section, we will show two methods of observing and identifying problems with garbage collector: first is turning on logging for garbage collector in ElasticSearch and the second is using the jstat command, which is present in most Java distributions. Mastering ElasticSearch 3. Process ids are used by a number of other Java tools, such as jconsole, jstat, and jmap. Java in a Nutshell 5th Edition 4. Use of jstat, jps and configuring jstatd are covered in Chapter 4 Java Performance # 1533、单词 jstack 的匹配文本： 1. Description jsadebugd is a server process that allows remote invocations of jinfo, jmap, and jstack on a local Java process or core file. Java in a Nutshell 5th Edition 2. A Java process showing high CPU utilization with prstat -mL can be mapped to a Java process and Java thread(s) on Solaris through a sequence of steps using prstat, pstack, and Java 6’s jstack command line tool. Java Performance 3. Solution Use JStack to get a thread dump, and then analyze the thread dump for deadlocks. Java 7 Recipes A Problem-Solution Approach # 1534、单词 unconsumed 的匹配文本： 1. It is also important that throughput and latency remain constant with respect to the volume of unconsumed data as we often have slow or batch-oriented consumers. Building LinkedIn’s Real-time Activity Data1 2. Otherwise, you could end up with a wake-up call in the middle of the night from your monitoring system telling you that your queues are chock full of unconsumed messages. RabbitMQ in Action 3. Both are derived from p.NoSuccess, which contains fields for an error message and the unconsumed input at the point of failure. Programming Scala 4. Prior to 0.8, any unconsumed partition of data within the topic could be lost if the broker failed. Apache Kafka 5. Finally, many messaging systems assume near immediate consumption of messages, so the queue of unconsumed messages is always fairly small. Kafka a Distributed Messaging System for Log Processing # 1535、单词 xss 的匹配文本： 1. There are helpful cheat sheets available on the Internet (http://ha.ckers.org/xss.html) Jenkins Continuous Integration Cookbook 2. One basic requirement with comment engines is to prevent XSS attacks. Spring in Practice 3. Use of SSL (covered in the Appendix) and other network security techniques can mitigate this type of attack, but be aware that there are other techniques, such as cross-site scripting (XSS) that could steal or compromise a remembered user session. Spring Security 3.1 4. Setting thread stack size using -Xss The -Xss flag specifies how much stack each thread should be allocated. Oracle JRockit The Definitive Guide # 1536、单词 jsessionid 的匹配文本： 1. Second is the jsessionid cookie in the first line of the request. Performance Testing With JMeter 2.9 2. For example, if a thread logs in to a Tomcat server, then the unique Jsessionid needs to be stored for each thread. Jenkins Continuous Integration Cookbook 3. Now, delete the JSESSIONID cookie (or close the tab and then all the browser instances), and ensure that access is still granted to the All Events page. Spring Security 3.1 4. The JSESSIONID cookie exists, but the session was already invalidated by the framework. Pro Spring Security 5. A servlet can send an HTTP cookie, named JSESSIONID, to the client for session tracking. Java EE 7 Essentials # 1537、单词 netcat 的匹配文本： 1. The s1 source's type is netcat, which simply opens a socket listening for events (one line of text per event) Apache Flume Distributed Log Collection for Hadoop 2. Indeed, gmetad could easily be replaced by a shell script that used netcat to glean the XML dump from various gmond nodes and then parse and write the data to RRDtool databases via command-line tools. Monitoring with Ganglia 3. On server1, we then start another instance of netcat, sending to the port on which the destination is listening. High Performance MySQL 3rd Edition 4. For this let us fire up the Netcat program, which should be installed if you use a UNIX-like OS or can be installed on windows via the available installer34 Netty in Action MEAP V08 5. In this case, we create a Netcat source which listens on a port for network connections. Hadoop Beginners Guide 6. Some of the more common sources are an Avro RPC source to which applications can speak directly, syslog, a raw netcat-style source, and a source that executes a command and reads from its standard output. Hadoop Operations # 1538、单词 debugged 的匹配文本： 1. In particular, should the value ever turn out wrong, only that method needs to be debugged. Core Java Volume I Fundamentals 9th Edition 2. Once you have implemented, tested, and debugged your Python metric module outside of gmond, you can be confident that your module will perform correctly when loaded by gmond. Monitoring with Ganglia 3. The core issue is to arrange for the JVM of the server or task that is to be debugged to have the additional command-line arguments that enable the Java Platform Debugger Architecture (JPDA) servers. Pro Hadoop 4. Due to the complex state stored for each job, an implementation preserving jobs across restarts was never completely debugged. Apache Hadoop YARN Yet Another Resource Negotiator 5. These abstractions enable an entire pipeline to be initially developed and tested on small in-memory test data, running in a single process, and debugged using standard Java IDEs and debuggers, and then run completely unchanged over large production data. FlumeJava - Easy, Efficient Data-Parallel Pipelines 6. You have substantial amounts of tested and debugged code in another language, and you know how to port it to all desired target platforms. Core Java Volume II Advanced Features 9th Edition 7. After you have developed your MapReduce program and fully debugged it, you may want to start tuning it for performance. Hadoop in Action 8. A colleague debugged a long-running GUI application that was mysteriously dying with an OutOfMemoryError. Effective Java 2nd Edition 9. Once you have carefully tested and debugged your methods, you can be confident that the class will work as expected. Java in a Nutshell 5th Edition 10. Leave code tuning until after the code is functional and debugged. Java Performance Tuning 2nd Edition # 1539、单词 rsyslog 的匹配文本： 1. There is even a Hadoop module for rsyslog, one of the more modern variants of syslog (http://www.rsyslog.com/doc/rsyslog_conf_modules.html/omhdfs.html) Apache Flume Distributed Log Collection for Hadoop 2. This is particularly useful if you want to use rsyslog, which will forward the logs to a remote machine. bk-compute-adminguide-grizzly 3. This is useful if you want to use rsyslog, which forwards the logs to a remote machine. bk-admin-guide-cloud-latest 4. Sending data and running queries by sending JSON objects over HTTP makes it easy for someone to extend anything, from a syslog daemon like rsyslog to a connecting framework like ManifoldCF, to interact with Elasticsearch. Elasticsearch in Action MEAP V07 cHAPTER 1 5. This instructs rsyslog to send all logs to the IP listed. OpenStack Operations Guide # 1540、单词 unencrypted 的匹配文本： 1. For example, for OpenSSH, you can generate an unencrypted key for the user that will own the Hadoop Core server processes. Pro Hadoop 2. If you haven't done this or you are trying to debug a problem image OpenStack can be configured to provide a VNC console, be aware that VNC is an unencrypted protocol so you should be cautious what you type across that link. bk-compute-adminguide-grizzly 3. When deploying in production, use an SSL connection to avoid sending passwords unencrypted over the wire. Jenkins Continuous Integration Cookbook 4. Furthermore, clients and DataNodes transmit data using the Hadoop Data Transfer Protocol, and this is unencrypted as well. Professional Hadoop Solutions 5. Hence, you can't simply send the key over the network without somehow encrypting the key itself; doing so would be tantamount to sending the data itself unencrypted. Java Security 2nd Edition 6. A transport guarantee of NONE allows unencrypted ws:// connections to the WebSocket. Java EE 7 Essentials 7. As the password file contains unencrypted passwords, Java will rely on the file permissions of the underlying operating system to ensure that the file can only be read by the user executing the JVM. Oracle JRockit The Definitive Guide 8. Now if you try to authenticate using an unencrypted password, you’ll see an error like this: Cassandra The Definitive Guide 9. But the key can’t be encrypted because Gus doesn’t have the key yet, so Angela has to send the key unencrypted. Java Network Programming 4th Edition 10. Oh, and OpenStack Object Storage communicates internally with unencrypted, unauthenticated rsync for performance - you do want the private network to be private. OpenStack Operations Guide # 1541、单词 chunked 的匹配文本： 1. Table 8.7 shows the ChunkedInput implementations that are part of Netty. Netty in Action MEAP V08 2. But there is a method of producing incremental content with an HTTP server—sending data using the chunked transfer encoding. Redis in Action 3. If you don’t know the size of the data in advance, you can use chunked transfer encoding instead. Java Network Programming 4th Edition 4. We, therefore, maintain an additional, non-chunked copy of the Rankings table containing the entire 1GB. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads # 1542、单词 petabyte 的匹配文本： 1. It handles more than three billion write and 20 billion read transactions daily and stores nearly a petabyte of primary data across many global datacenters. Megastore - Providing Scalable, Highly Available Storage for Interactive Services 2. Both Google and Yahoo handle applications on the petabyte scale with MapReduce clusters. Pro Hadoop 3. In uncompressed, nonreplicated form the datasets occupy about a petabyte of space. Dremel - Interactive Analysis of WebScale Datasets 4. He worked in the Hadoop/Big Data environment for five years for different companies and projects: petabyte stores, process automation, natural language processing (NLP), data science with data streams from mobile devices, and social media. Professional Hadoop Solutions 5. Our architecture is based on the assumption that systems at the petabyte scale are inherently dynamic: large systems are inevitably built incrementally, node failures are the norm rather than the exception, and the quality and character of workloads are constantly shifting over time. Ceph A Scalable, High-Performance Distributed File System 6. Facebook hosts approximately 10 billion photos, taking up one petabyte of storage. Hadoop：The Definitive Guide 3rd Edition 7. At the petabyte scale, storage systems are necessarily dynamic: they are built incrementally, they grow and contract with the deployment of new storage and decommissioning of old devices, devices fail and recover on a continuous basis, and large amounts of data are created and destroyed. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters. 8. Google Bigtable Bigtable is Google’s internally used custom database, designed to scale into the petabyte range. Cassandra The Definitive Guide 9. Because modern processors have multiple cores it is possible to build a 50-node cluster with a petabyte of storage and still have a CPU core dedicated to process the data stream coming off each individual disk. Hadoop Beginners Guide 10. It is no longer uncommon to hear of companies claiming to load more than a terabyte of structured data per day into their analytical database system and claiming data warehouses of size more than a petabyte [19] HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads # 1543、单词 preprocess 的匹配文本： 1. There are three steps involved in inputting data for the Mahout clustering algorithms: you need to preprocess the data, use that data to create vectors, and save the vectors in SequenceFile format as input for the algorithm. Mahout in Action 2. If you preprocess it, you’ll surely find yourself wishing for the raw data later when you find an anomaly and need more data to understand it. High Performance MySQL 3rd Edition 3. The mapper will preprocess our input values by extracting the XML attributes from each input record: the creation data and the user identifier. MapReduce Design Patterns 4. For the data processing layer, Oozie is used to combine MapReduce jobs to preprocess source data and convert it to the intermediate data. Professional Hadoop Solutions 5. Apart from the ability to implement Java MapReduce programs, Pig, and Hive scripts to preprocess these data, Hadoop also provides several useful tools and features that we can utilize to perform these data preprocessing operations. Hadoop MapReduce Cookbook 6. But using the DBInputFormat classes will give you the added flexibility to transform or preprocess your data in the same MapReduce job that performs the database export. Hadoop in Practice 7. Often, the only way to do that is to preprocess the data with another MapReduce job whose sole purpose is to make the data ready for a map-side join. Hadoop Beginners Guide 8. Pig runs a map-only MapReduce job to preprocess the file and get it ready for loading into the distributed cache. Programming Pig 9. This system uses one table to preprocess data, and a different set of tables for serving client data. Bigtable - A Distributed Storage System for Structured Data 10. The provider will not normally try to translate or preprocess temporal literals. Pro JPA2 # 1544、单词 fitnesse 的匹配文本： 1. You will be shown how to run Fitnesse tests through Jenkins. Jenkins Continuous Integration Cookbook 2. Behaviour-Driven Development and automated Acceptance-Test tools such as easyb, Fitnesse, Concordion are also xUnitfriendly. Jenkins The Definitive Guide # 1545、单词 passwd 的匹配文本： 1. Whether it be reading password data from /etc/passwd on a Unix system or executing the "format c:" command on a Wintel host, such effects could be devastating. Java Network Programming and Distributed Computing 2. Set the nova uid in /etc/passwd to the same number in all hosts (e.g. bk-compute-adminguide-grizzly 3. User names and passwords are stored in a passwd file stored inside the repository's conf directory. Sonar Code Quality Testing Essentials 4. Set the nova uid in /etc/passwd to the same number in all hosts (for example, 112) bk-admin-guide-cloud-latest 5. We don’t need to specify the namevar because the value will be taken from the title, "/etc/passwd" Pro Puppet 6. This can be achieved by passing host and passwd parameters while creating an instance of Castro in the following way: Selenium Testing Tools Cookbook 7. Suppose that an applet (or some other untrusted code running in the sandbox) attempts to read the contents of the file /etc/passwd by passing this filename to the FileInputStream() constructor. Java in a Nutshell 5th Edition 8. The KDC contains a database of principals and their keys, very much like /etc/passwd and some KDC implementations (including MIT Kerberos) support storing this data in centralized systems like LDAP. Hadoop Operations 9. The first line loads the data from the HDFS file, /test/passwd, into the variable named passwd. Spring Data Modern Data Access for Enterprise Java 10. The swift context of an account, or a user account from an identity service such as Active Directory, /etc/passwd, OpenLDAP, keystone, and so on. OpenStack Operations Guide # 1546、单词 aliasing 的匹配文本： 1. This phenomenon is often called aliasing, and it’s a fundamental way that Java works with objects. Thinking in Java 4th Edition 2. While querying, we can also use the aliasing feature and make the indices visible as one index, just as with sharding. Mastering ElasticSearch 3. This is due to the aliasing problems with the C language: Java Threads 3rd Edition 4. This chapter introduces only one language feature that was not explained before: this aliasing, in Section 33.6 Programming in Scala 2nd Edition 5. Furthermore, the fact that Object[] is a supertype of all array types means that unsafe aliasing can occur which leads to heap pollution. The Java Language Specification Java SE 7 Edition 6. Aliasing is useful if you want to give the item a more convenient name or you want to avoid ambiguities with other items in scope that have the same name. Programming Scala 7. You renamed a field, but used Avro’s aliasing capabilities to preserve the old name for. Hadoop in Practice 8. It is generally a bad idea to take any form of aliasing into account. Effective Java 2nd Edition 9. In the paintComponent() method, you will set the background to white, set anti-aliasing on, and set the color of the stroke to be black. Java 7 Recipes A Problem-Solution Approach 10. To understand aliasing a discriminator column, consider the following query that returns data from another EMPLOYEE_STAGE table structured to use single-table inheritance: Pro JPA2 # 1547、单词 codehaus 的匹配文本： 1. The open source project Cargo (http://cargo.codehaus.org/) provides versatile support for web application deployment to a variety of Servlet containers and application servers. Gradle in Action 2. The framework uses Xstream for persisting configuration information as XML (http://xstream.codehaus.org/) and Jelly for the creation of parts of the GUI (http://commons.apache.org/jelly/) Jenkins Continuous Integration Cookbook 3. Configuring Castor XML To support the transformation of the returned contact information into XML format, we will use the Castor XML library (http://castor.codehaus.org) Pro Spring 3 4. A dedicated repository located at http://sonar-plugins.codehaus.org/ hosts the Sonar plugin library. Sonar Code Quality Testing Essentials 5. Note N Jetty (http://jetty.codehaus.org/jetty/ and http://www.eclipse.org/jetty/) is both an HTTP server and a Java Servlet container in the same way as Apache Tomcat. Pro Spring Security 6. More information on the Cassandra maven plugin can be found at http://mojo.codehaus.org/cassandra-maven-plugin/ Cassandra High Performance Cookbook 7. You can get your download package from an automatic installer (like apt -get) or you can download it yourself from http://jetty.codehaus.org/jetty/ Solr 3.1 Cookbook 8. There is also a dependency on ParaNamer that we download from its home page at codehaus.org. Hadoop Beginners Guide 9. One example of this is the use of Woodstox, the open source StAX parser (http://woodstox.codehaus.org/) that outperforms Oracle Java Streaming XML Parser (SJSXP), the default StAX parser within JAXP. Java Performance 10. You can get your download package from an automatic installer (such as, apt-get), or you can download it yourself from http://jetty.codehaus.org/jetty/ Apache Solr 4 Cookbook # 1548、单词 crc 的匹配文本： 1. The ZipEntry object contains an extensive interface that allows you to get and set all the data available on that particular entry in your Zip file: name, compressed and uncompressed sizes, date, CRC checksum, extra field data, comment, compression method, and whether it’s a directory entry. Thinking in Java 4th Edition 2. But if you remove the index on the url column and add an indexed url_crc column to the table, you can use a query like this: High Performance MySQL 3rd Edition 3. Sometimes, we might get a CRC exception when running this command. Hadoop Operations and Cluster Management Cookbook 4. For example, instead of having to deal with things such as CRC checksums, compression methods, and various other details, an application that uses the java.util.zip parser library package included in the standard Java class library can simply use concepts such as ZipFile and ZipEntry, as shown in the following example that outputs the names of all of the entries within a Zip file: Tika in Action 5. The copyToLocal command does a Cyclic Redundancy Check (CRC) to verify that the data copied was unchanged. Hadoop RealWorld Solutions Cookbook 6. Common methods for checking correctness of raw data such as storage devices include Cyclic Redundancy Checks (CRC), which are what HDFS uses internally to maintain block-level integrity. Hadoop in Practice 7. The same effect is possible from the shell by using the -ignoreCrc option with the -get or the equivalent -copyToLocal command. Hadoop：The Definitive Guide 3rd Edition 8. For the get command, the -crc option will copy that hidden checksum file. Hadoop in Action 9. This class implements the Checksum interface and computes a checksum on a stream of data using the CRC-32 algorithm. Java in a Nutshell 5th Edition 10. To avoid log corruption, Kafka stores a CRC for each message in the log. Kafka a Distributed Messaging System for Log Processing # 1549、单词 odersky 的匹配文本： 1. Thank you also to Martin Odersky for his endorsement and kind words on the final product that you will read in the foreword, Josh Cough for being a guy I can bounce ideas off when needed, and Peter Simanyi for an email with a very detailed, thorough, complete, and awesome review of the entire book. Scala in Depth 2. I bought an early electronic version of the Programming in Scala book, by Odersky, Spoon, and Venners, and I was immediately a fan. Programming in Scala 2nd Edition 3. I concurrently thank Martin Odersky and the Scala community for their. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine 4. In Scala, we use a simplified version of a technique introduced in a paper written by Scala’s designer, Martin Odersky. Functional Programming Patterns in Scala and Clojure 5. Its creator, Martin Odersky, participated in the development of Java for years and understands the needs of professional developers. Programming Scala 6. Martin Odersky, the creator of Scala, has identified the following levels of expertise for application programmers and library designers: Scala for the Impatient 7. Martin Odersky’s amazing balance between theory and reality make Scala possible, and the people he has attracted into the community are brilliant. Beginning Scala 8. Scala is a relatively new programming language that was designed by Martin Odersky and released in 2003 Steps in Scala An Introduction to Object-Functional Programming # 1550、单词 ehcache 的匹配文本： 1. The ORM is configured to use Ehcache as cache implementation. Pro Spring MVC 2. The service also uses caching for performance, so you inject an Ehcache-backed cache too G.15 Spring in Practice 3. As you might have suspected, the cache requires the ehcache dependency that we mentioned at the beginning of the chapter. Spring Security 3.1 4. Caching in Guava gives us more power and flexibility than using plain HashMap but is not as robust as EHCache or Memcached. Getting Started with Google Guava 5. For larger systems, this might include distributed caches such as memcached, EHCache, Oracle Coherence, or other related products. Cassandra The Definitive Guide 6. This particular bit of injection can be confusing because both Spring and Ehcache define a CacheManager type. Spring in Action 4th Edition # 1551、单词 mary 的匹配文本： 1. We'd also like to thank our editorial team at Addison-Wesley, including Karen Gettman, whose initial encouragement and persistence convinced us to take on the project, Mary Hart, Marcy Barnes-Henrie, Melissa Dobson, and Emily Frey. Java Network Programming and Distributed Computing 2. It was then converted to HTML by Mary Campione and was made available on our Web site before being expanded into book form. The Java Virtual Machine Specification Java SE 7 Edition 3. Look at the "pri mary" field to see which node is primary and then repeat the connection steps above for that host/port. MongoDB The Definitive Guide 2nd Edition 4. The details switch prints out the most information when running hbck, while sum mary prints out the least. HBase：The Definitive Guide 5. The next query looks for "john" in the name field and "mary" in the tweet field. Elasticsearch The Definitive Guide 6. The output should display the first two names in reverse order: Mary Bob. Java 7 New Features Cookbook 7. The scheduler creates a pool called mary if it doesn’t already exist, because it’s configured to use the value of the property user.name as the pool name. Hadoop Operations 8. Mary had a little lamb its fleece was white as snow and everywhere that Mary went the lamb was sure to go. Programming Pig 9. Special thanks to Mary Tobin who was tasked with managing us—which is somewhat akin to trying to herd cats. The Definitive Guide to MongoDB 10. Richard Dal Porto and Mary Tobin were firm in trying to keep us to a schedule, but understanding when the laws of physics couldn’t be broken. Pro JPA2 # 1552、单词 erb 的匹配文本： 1. In this case, gmond.conf, hsflowd.conf, and gmetad.conf files are all generated using Puppet ERB templates. Monitoring with Ganglia 2. The web.xml.erb in the config folder, including configuration for Spring Security. Pro Spring Security 3. Puppet also leverages the Ruby ERB templating system that allows you to. Storm Blueprints Patterns for Distributed Real-time Computation 4. If you have a couple of configurations, it’s easy enough to maintain multiple files, but what if you have a very large number of differing configurations? We can manage this situation by writing ERB templates and populating the templates with node-specific information. Managing Infrastructure with Puppet 5. In this case, the template function allows us to specify a Ruby ERB template (http://rubydoc.org/stdlib/libdoc/erb/rdoc/), from which we can create the templated content for our configuration file. Pro Puppet 6. Next, make a subdirectory called views, and place a file there called tweets.erb. MongoDB in Action # 1553、单词 openrc 的匹配文本： 1. Creating Credentials The credentials you will use to launch instances, bundle images, and all the other assorted API functions can be sourced in a single file, such as creating one called /creds/openrc. bk-compute-adminguide-grizzly 2. After you install the clients, you must source an openrc file to set required environment variables before you can request OpenStack services through the clients or the APIs. api-quick-start-onepager 3. After you install the clients, you must source an openrc.sh file to set required environment variables before you can request OpenStack services through the clients or the APIs. user-guide 4. This generates a file called openrc.sh, which looks something like this: OpenStack Operations Guide # 1554、单词 gis 的匹配文本： 1. The MyISAM Engine As MySQL’s default storage engine in versions 5.1 and older, MyISAM provides a large list of features, such as full-text indexing, compression, and spatial (GIS) functions. High Performance MySQL 3rd Edition 2. No previous GIS experience is expected, but be prepared to use most of what you’ve learned in the previous chapters. HBase in Action 3. Prior to graduation, she worked for the Center for Agribusiness Excellence at Tarleton, where she used Java in conjunction with GIS software to analyze crop and weather data. Java 7 New Features Cookbook 4. While by no means a full GIS (geographical information system) solution, spatial lucene supports these functions: Lucene in Action 2nd Edition # 1555、单词 fqdn 的匹配文本： 1. Then to configure my new interceptor, use the FQDN for the Builder class as the type: Apache Flume Distributed Log Collection for Hadoop 2. Replace the hostname part of the principal with your host's FQDN: HBase Administration Cookbook 3. Strip domain name from hostname in graphs By default, the gweb interface will display fully qualified domain names (FQDN) in graphs. Monitoring with Ganglia 4. It is not necessarily a hostname, FQDN, or IP address. bk-compute-adminguide-grizzly 5. The 3PAR host constructed by the driver uses just the local hostname, not the fully qualified domain name (FQDN) of the compute host. bk-admin-guide-cloud-latest 6. Here we have a file resource that creates an Apache config file named by the fqdn variable. Managing Infrastructure with Puppet 7. For the moment, this class only contains a Puppet server variable that specifies the fully-qualified domain name (FQDN) of our Puppet master. Pro Puppet 8. Referring back to the webtable example earlier, you may have noted that the key used is the reversed FQDN (the domain name part of the URL), such as org.hbase.www. HBase：The Definitive Guide # 1556、单词 pipelining 的匹配文本： 1. This allows for pipelining--new requests can be sent without waiting for a response from the server. Netty in Action MEAP V08 2. This method of sending multiple commands at once and waiting for all of the replies is generally referred to as pipelining, and has the ability to improve Redis’s performance when executing multiple commands by reducing the number of network round trips that a client needs to wait for. Redis in Action 3. Finally, we minimize latency by pipelining the data transfer over TCP connections. GFS - The Google File System 4. Pipelining— Many stream operations return a stream themselves, allowing operations to be chained and form a larger pipeline. Java 8 in Action Lambdas, Streams and Functional-style Programming 5. This is a technique called “pipelining,” and it works because our DEALER and ROUTER sockets are fully asynchronous. ZeroMQ 6. With pipelining you can send a number of requests without waiting for their responses. The Little Redis Book 7. A similar argument runs in CPU design circles where dynamic rescheduling of instructions to take pipelining into account allows CPUs to process instructions out of order. Java Performance Tuning 2nd Edition 8. Overlapping or pipelining the adjacent stages can reduce latency [10], but straggler shards still set the minimum time to complete the pipeline. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications 9. In addition, pipelining intermediate results between query operators can improve performance, but can result in a large amount of work being lost upon a failure. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads # 1557、单词 facelets 的匹配文本： 1. As of JSF 2, Facelets is the standard technology for all JSF pages. Pro Spring 3 2. Facelets Facelets is the view declaration language (aka view handler) for JSF. Java EE 7 Essentials 3. The pages themselves, known as facelets, are composed of containers and components. Spring Roo in Action # 1558、单词 concatenates 的匹配文本： 1. This statement concatenates the empty string with the string representation of x that is exactly x.toString() Core Java Volume I Fundamentals 9th Edition 2. Using the partial vectors from the Mapper as input, the Reducer simply concatenates them into a full vector, as seen in the following listing. Mahout in Action 3. This is because the Java compiler converts x, y, and z into their String representations and concatenates those strings, instead of adding them together first. Thinking in Java 4th Edition 4. In a nutshell, the flatMap method lets you replace each value of a stream with another stream and then concatenates all the generated streams into a single stream. Java 8 in Action Lambdas, Streams and Functional-style Programming 5. InputFormat and OutputFormat classe concatenates the string forms of th. Hadoop in Practice 6. The processing is explained in the script, but briefly, it unpacks the bzip2 file and then concatenates each station file into a single file for the whole year. Hadoop：The Definitive Guide 3rd Edition 7. When you index a document, Elasticsearch takes the string values of all of its fields and concatenates them into one big string which it indexes as the special _all field. Elasticsearch The Definitive Guide 8. If the list contains strings and the function concatenates two strings, the method returns a string consisting of all the strings in the list in sequence. Effective Java 2nd Edition 9. The + operator concatenates two String objects or one String and one value of some other type, producing a new String object. Java in a Nutshell 5th Edition 10. Many query engines will cache the translated SQL for later use, but this can easily be defeated if the application does not use parameter binding and concatenates parameter values directly into query strings. Pro JPA2 # 1559、单词 classloaders 的匹配文本： 1. If you've defined and used multiple classloaders in your application, Java Threads 3rd Edition 2. Before describing the way OSGi uses classloaders, let’s recap how default classloaders work in Java. Spring Dynamic Modules in Action 3. In application containers, such as a J2EE server, where multiple classloaders are used, special care must be taken so that classes are not dependency injected into some framework and then forgotten about. Oracle JRockit The Definitive Guide 4. Note that classloaders seem to be changed in almost every version of the SDK. Java Performance Tuning 2nd Edition # 1560、单词 lru 的匹配文本： 1. In addition, a LinkedHashMap can be configured in the constructor to use a leastrecently- used (LRU) algorithm based on accesses, so elements that haven’t been accessed (and thus are candidates for removal) appear at the front of the list. Thinking in Java 4th Edition 2. A one-off query such as those issued by mysqldump will typically bring a page into the buffer pool LRU list, read the rows from it, and move on to the next page. High Performance MySQL 3rd Edition 3. Terms lookup filter cache settings As we've mentioned, in order to provide the terms lookup functionalities, ElasticSearch introduced a new type of cache, which uses a fast LRU (Least Recently Used) cache to handle terms caching. Mastering ElasticSearch 4. A cache eviction policy (if any) is least recently used (LRU) Professional Hadoop Solutions 5. You can choose some column families to have a higher priority in the block cache (LRU cache) HBase in Action 6. HBase has an in-memory option per column family and uses its LRU cache‡ to retain blocks for subsequent use. HBase：The Definitive Guide 7. Bear in mind that which SoftReferences are garbage-collected is determined by a leastrecently-used (LRU) calculation on a JVM-wide scale. Getting Started with Google Guava 8. We employ an asynchronous batch lookup technique combined with a local LRU cache in order to improve performance. Tenzing - A SQL Implementation On The MapReduce Framework 9. GlassFish supports three eviction policies: FIFO (first in first out), LRU (least recently used), and NRU (not recently used) Java Performance 10. Moving items between these layers or finally evicting them entirely can be done, e.g., with the well-known LRU cache eviction heuristic. PowerDrill - Processing a Trillion Cells per Mouse Click # 1561、单词 lexicographical 的匹配文本： 1. As the data in HBase is sorted by row key, in lexicographical order, a row belongs to the region that has the closest start/end key of the row key. HBase Administration Cookbook 2. Result is negative, zero, or positive depending on the lexicographical ordering of the String and the argument. Thinking in Java 4th Edition 3. This means that all internal value comparisons and, consequently, sorting, is done in lexicographical order. Professional Hadoop Solutions 4. If using RandomParitioner, the data will not be in a lexicographical order, but it will be in a constant order. Cassandra High Performance Cookbook 5. Accumulo will maintain the sorted order of our geospatial keys using lexicographical byte-order sorting. Hadoop RealWorld Solutions Cookbook 6. Assume that you want to perform a lexicographical comparison that includes both the last and first names, but you can’t do this with the entire byte array because the string lengths are also encoded in the array. Hadoop in Practice 7. In lexicographical sorting, each key is compared on a binary level, byte by byte, from left to right. HBase：The Definitive Guide 8. Terms in the inverted index are sorted in lexicographical order, which is why string ranges use this order. Elasticsearch The Definitive Guide 9. StringValueMax Finds the lexicographical maximum of a sequence of string values. Hadoop in Action 10. When performing range queries, Lucene uses lexicographical values of Fields for ordering. Lucene in Action 2nd Edition # 1562、单词 mdp 的匹配文本： 1. The nice thing about MDP is that it came out of working code, a simpler ancestor protocol (PPP), and a precise set of improvements. ZeroMQ 2. Listing 17.5 Spring MDP that asynchronously receives and processes messages. Spring in Action 4th Edition # 1563、单词 titan 的匹配文本： 1. In this chapter, you will integrate Storm with Titan, a popular graph. Storm Blueprints Patterns for Distributed Real-time Computation # 1564、单词 gemini 的匹配文本： 1. He is currently working for Gemini Mobile Technologies as a Research & Development software engineer. HBase Administration Cookbook 2. SpringSource also introduced the dm Server (now project Gemini in Eclipse) and more importantly, they launched the OSGi Bundle Repository, filling a crucial gap for the acceptance of OSGi in the enterprise. Spring Dynamic Modules in Action 3. In the process, this chapter also provides background information about the Eclipse Gemini Blueprint project, which is the successor to Spring Dynamic Modules. Spring Integration in Action 4. A short-lived partnership with NuSphere to add Gemini, a transactional engine with row-level locking, ended in a lawsuit toward the end of 2001 Understanding MySQL Internals # 1565、单词 jack 的匹配文本： 1. Jill and Jack must check in for their afternoon flight to New York. Spring Integration in Action 2. Jack, a software developer, described his client’s request that he prevent. SQL Antipatterns 3. If Jill has checked out the first book and Jack has checked out the second, and neither is willing to give up the book they have, neither can finish the paper. Java Network Programming 4th Edition 4. But what if we would like to add another user called jack. Apache Solr 4 Cookbook # 1566、单词 preprocessed 的匹配文本： 1. The data set has been preprocessed in a way: no users who produced less than 20 ratings are included. Mahout in Action 2. Links are preprocessed at indexing time using a specially crafted MySQL UDF. High Performance MySQL 3rd Edition 3. Whereas the normal command-line parameters are passed directly and are fully processed by Sqoop, the property parameters are preprocessed before the Sqoop execution and put into a Hadoop configuration object that Sqoop will load and use. Apache Sqoop Cookbook 4. The content of the Text field will be pulled out and preprocessed a bit, and then we’ll count up how many times we see each word. MapReduce Design Patterns 5. Data is preprocessed, grouped, and ingested into permanent data repositories. Professional Hadoop Solutions 6. We don’t expect you to be familiar with GIS or GIS data, so we’ve preprocessed it a bit. HBase in Action 7. Tokenizer specifies how your data will be preprocessed after it is sent to the appropriate field. Solr 3.1 Cookbook 8. It’s generally easier and more efficient to process a smaller number of relatively large files, so the data was preprocessed so that each. Hadoop：The Definitive Guide 3rd Edition 9. Let's consider another use case, where raw clickstreams generated by customers through website usage are captured and preprocessed. Apache Kafka 10. In these cases, the documents should be parsed, or preprocessed, into separate blocks of text representing each field. Lucene in Action 2nd Edition # 1567、单词 decouples 的匹配文本： 1. To avoid imposing a specific choice of file format, Pregel decouples the task of interpreting an input file as a graph from the task of graph computation. Pregel - A System for Large-Scale Graph Processing 2. This decouples the operations from the objects themselves, meaning that you can add new operations without adding methods to the class definitions. Thinking in Java 4th Edition 3. This replication architecture decouples the processes of fetching and replaying events on the replica, which allows them to be asynchronous. High Performance MySQL 3rd Edition 4. The new architecture we introduced decouples the programming model from the resource management infrastructure, and delegates many scheduling functions (e.g., task faulttolerance) to per-application components. Apache Hadoop YARN Yet Another Resource Negotiator 5. Messaging is essentially asynchronous in that it decouples applications by separating the sending and receiving of data. RabbitMQ in Action 6. Ceph decouples data and metadata operations by eliminating file allocation tables and replacing them with generating functions. Ceph A Scalable, High-Performance Distributed File System 7. Information hiding is important for many reasons, most of which stem from the fact that it decouples the modules that comprise a system, allowing them to be developed, tested, optimized, used, understood, and modified in isolation. Effective Java 2nd Edition 8. This approach decouples the application write from the cluster writes, acting as a queue, similar to a messaging system. Hadoop Operations 9. The layer model decouples the application protocols (the main subject of this book) from the physics of the network hardware and the topology of the network connections. Java Network Programming 4th Edition 10. Lucene’s elegant analyzer architecture decouples each of the processes internal to textual analysis, letting you reuse fundamental building blocks to construct custom analyzers. Lucene in Action 2nd Edition # 1568、单词 mmap 的匹配文本： 1. It uses the mmap system call (http://en.wikipedia.org/wiki/ Mmap) for reading and randomly accessing a file for writing. Mastering ElasticSearch 2. The alternative to mmap and mmap_index_only is standard, which uses direct IO. Cassandra High Performance Cookbook 3. For example, on *NIX-style operating systems, pages in memory are allocated differently than on Microsoft Windows, with different system calls (mmap versus VirtualAlloc) Oracle JRockit The Definitive Guide 4. MMapDirectory: Uses memory-mapped I/O when reading the index; best option for installations on 64-bit Windows, Solaris, or Linux operating systems with the Sun JVM. Solr in action 5. Virtual memory, in this context, is the address space of the process, meaning it includes physical memory, secondary storage such as swap, and resources like mmap()ed files. Hadoop Operations 6. The next point is that at the system level, most operating systems support mmap( ) , memcntl( ), and various shared-memory options. Java Performance Tuning 2nd Edition 7. There is also MMapDirectory, which is similar to FSDirectory in that it stores files in the file system. Lucene in Action 2nd Edition 8. Thus, data files are mapped to a system’s virtual memory using the mmap() system call. MongoDB in Action 9. This directory implementation uses virtual memory and a kernel feature called mmap to access index files stored on disk. Apache Solr 4 Cookbook 10. This is not as efficient and convenient as using mmap( ), but it is more robust in case of an I/O error. Understanding MySQL Internals # 1569、单词 backends 的匹配文本： 1. All of the core services that make up Twitter's architecture are built on Finagle, from backends serving user information, tweets, and timelines to front end API endpoints handling HTTP requests. Netty in Action MEAP V08 2. Most support standard backends like LDAP or SQL, as well as Key Value Stores (KVS) bk-compute-adminguide-grizzly 3. The major objective of the project is to provide useful extensions on top of Spring’s core data access functionality to address the needs of Spring developers who are interacting with database backends other than RDBMSs. Pro Spring 3 4. Then you tell HAProxy to use the round-robin algorithm C to distribute the load among the backends (see figure 6.3) RabbitMQ in Action 5. This works great for multiple clients and backends all joining the same party: Testable JavaScript 6. To enable a multi back-end configuration, you must set the enabled_backends flag in the cinder.conf file. bk-admin-guide-cloud-latest 7. Each type has a set of “provider” backends that specify what to do with all of the parameters we’ve given it. Managing Infrastructure with Puppet 8. Several modern databases have swappable backends, and Riak is no different in that respect. A Little Riak Book 9. We compare latency and memory usage of the basic datastructures with other data formats and backends: CSV, record-io (binary format based on protocol buffers [29]), and Dremel (as mentioned in the introduction, Dremel is a high performance column-store developed at Google) PowerDrill - Processing a Trillion Cells per Mouse Click 10. Spring 3.1 gives you some helpers that work with a variety of cache backends to perform these functions for you. Spring Data Modern Data Access for Enterprise Java # 1570、单词 doublewrite 的匹配文本： 1. It keeps its undo log (old row versions), insert buffer, doublewrite buffer (described in an upcoming section), and other internal structures in the tablespace. High Performance MySQL 3rd Edition # 1571、单词 pramod 的匹配文本： 1. NoSQL distilled : a brief guide to the emerging world of polyglot persistence / Pramod J Sadalage, Martin Fowler. NoSQL Distilled # 1572、单词 ext3 的匹配文本： 1. You can use partitioning to avoid some bottlenecks in specific workloads, such as per-index mutexes with InnoDB or per-inode locking with the ext3 filesystem. High Performance MySQL 3rd Edition 2. For example the cloud-init package included in Ubuntu's stock cloud images will format this space as an ext3 filesystem and mount it on / mnt. bk-compute-adminguide-grizzly 3. If ext3 is necessary, there are some hacks around this. MongoDB The Definitive Guide 2nd Edition 4. For example, the cloud-init package included in Ubuntu's stock cloud images format this space as an ext3 file system and mount it on / mnt. bk-admin-guide-cloud-latest 5. Experience with an earlier EBOFS design suggests it will experience significantly lower fragmentation than ext3, but we have not yet evaluated the current implementation on an aged file system. Ceph A Scalable, High-Performance Distributed File System 6. Here are some notes on the more commonly used filesystems: ext3 HBase：The Definitive Guide 7. This is similar to common Linux filesystems such as ext3 Hadoop Operations # 1573、单词 sar 的匹配文本： 1. In addition to these tools, your operating system might provide others, such as mpstat or sar. High Performance MySQL 3rd Edition 2. The next recipe, Using sar to review performance over time. Cassandra High Performance Cookbook 3. There are many fine tools that you can use for this, ranging from sar,1 the built-in Linux utility that collects and reports on system activity, to more sophisticated tools such as Nagios and Ganglia. Hadoop in Practice 4. The complete battery usually includes OS utilities such as top, vmstat, sar, iostat, and netstat, but also Hadoop-specific tools such as hadoop dfsadmin, and hadoop fsck. Hadoop Operations 5. System performance measuring utilities (vmstat, iostat, sar, top on Unix; the task manager and performance monitor on Windows) Java Performance Tuning 2nd Edition 6. When monitoring applications for an extended period of time such as several hours or several days, or in a production environment, many performance engineers and system administrators of Solaris or Linux systems use sar to collect performance statistics. Java Performance # 1574、单词 gigabit 的匹配文本： 1. If you don’t take the time to trace the connections, you might never realize that your total bandwidth from all database servers to all web servers is limited to a gigabit! Each hop adds latency, too. High Performance MySQL 3rd Edition 2. You can provision object stores provisioned with single gigabit or 10 gigabit network interface depending on the expected workload and desired performance. bk-admin-guide-cloud-latest 3. Larger servers may even be able to utilize 10 gigabit Ethernet. Cassandra High Performance Cookbook 4. Gigabit Ethernet Although the hardware specification for your cluster will assuredly be different, Hadoop is designed to use multiple cores and disks, so it will be able to take full advantage of more powerful hardware. Hadoop：The Definitive Guide 3rd Edition 5. As far as networking is concerned, it is recommended that you use a two-port Gigabit Ethernet card—or two channel-bonded cards. HBase：The Definitive Guide 6. Even a gigabit network can be saturated by a hundred. SQL Antipatterns 7. If you need network throughput greater than that provided by a single-gigabit port then, unless your hardware or operating system can present multiple ports as a single device to Hadoop, the only option is to use a 10-gigabit Ethernet device. Hadoop Beginners Guide 8. Speed refers to the rated speed of the networking technology (e.g., Gigabit Ethernet is rated at 1 gigabit per second), and bandwidth refers to the theoretical data capacity. Java Performance 9. We used the same number of clients as tablet servers to ensure that clients were never a bottleneck.) Each machine had two dual-core Opteron 2 GHz chips, enough physical memory to hold the working set of all running processes, and a single gigabit Ethernet link. Bigtable - A Distributed Storage System for Structured Data 10. The servers on each side of a rack interconnect via a 100-Mbps Ethernet switch that has one or two gigabit uplinks to a core gigabit switch that connects all racks together. Web search for a planet the google cluster architecture # 1575、单词 mysqlbinlog 的匹配文本： 1. Also, the mysqlbinlog tool, which we mention throughout the chapter, is most convenient to use with statement-based logging. High Performance MySQL 3rd Edition 2. Used by the replication slave, and in the mysqlbinlog command-line utility. Understanding MySQL Internals # 1576、单词 sslsession 的匹配文本： 1. The Using the ExtendedSSLSession interface recipe uses SSL, and is used to illustrate the use of the ExtendedSSLSession interface and new security features. Java 7 New Features Cookbook 2. Once a connection is established over an SSLSocket, you can use the getSession( ) method to obtain an SSLSession object that provides information about the connection. Java in a Nutshell 5th Edition 3. In the JSSE, sessions are represented by instances of the SSLSession interface; you can use the methods of this interface to check the times the session was created and last accessed, invalidate the session, and get various information about the session: Java Network Programming 4th Edition # 1577、单词 csrf 的匹配文本： 1. Once the nonce feature is turned on, Jenkins avoids CSRF by generating a random one-time number called a nonce that is returned as part of the request. Jenkins Continuous Integration Cookbook 2. It also configures a bean that automatically adds a hidden cross-site request forgery (CSRF) token field on forms using Spring’s form-binding tag library. Spring in Action 4th Edition # 1578、单词 reindex 的匹配文本： 1. You can partition the data in several indexes, as shown in the next section, and reindex only the updated part from scratch on each run of indexer. High Performance MySQL 3rd Edition 2. However, we know that we need to adjust the index fields and in order not to reindex the data we create the index upfront. Mastering ElasticSearch 3. You can load all of the artists through the populate.rb script and then run rake sunspot:reindex, although it will take a long time to complete. Solr 3 Enterprise Search Server 4. CouchDB’s implementation of Map/Reduce is designed to allow views to be updated incrementally, meaning that it will only reindex any documents that have been modified since the last time the index was updated. Beginning CouchDB 5. When updating a document using the index API, we read the original document, make our changes, then reindex the whole document in one go. Elasticsearch The Definitive Guide 6. If you decide to enable this feature after indexing documents, then you will need to need to reindex all documents. Solr in action 7. Rather than reindex documents when specials change, we opt to keep the specials flagged in our (hypothetical) relational database. Lucene in Action 2nd Edition 8. Repairing a Collection’s Indexes If the validation process shows that the indexes are damaged, then you use the reIndex() function to reindex the affected collection. The Definitive Guide to MongoDB 9. Note that if you change the stop word list, it is necessary to reindex the existing tables, which can be done with REPAIR TABLE tbl_name QUICK. Understanding MySQL Internals # 1579、单词 dyna 的匹配文本： 1. Tools such as dynaTrace AJAX Edition and Speed Tracer provide this highly browser-dependent data to be analyzed. Testable JavaScript 2. We can use tools such as dynaTrace and HttpWatch, along with Selenium WebDriver to collect, measure, and monitor client-side performance of web applications. Selenium Testing Tools Cookbook # 1580、单词 zyre 的匹配文本： 1. Quite randomly, one of our old mobile projects was called “Zyre,” and I have the domain names for it. ZeroMQ # 1581、单词 proactively 的匹配文本： 1. Active notification (push) will proactively alert the developers when a build fails, and includes methods such as desktop notifiers, chat, and SMS. Jenkins The Definitive Guide 2. But let’s face it — if we’re honest with ourselves, most of our organizations haven’t been able to proactively manage massive quantities of this data effectively, and we haven’t been able to use this information to our advantage to make better decisions and to do business smarter. Professional Hadoop Solutions 3. If a zone goes down, one of the nodes containing a replica notices and proactively copies data to a handoff location. bk-admin-guide-cloud-latest 4. This entails moving the regions being served by that RegionServer to some other RegionServer proactively rather than having HBase react to a RegionServer going down. HBase in Action 5. It is advisable to run HDFS’s fsck tool regularly (for example, daily) on the whole filesystem to proactively look for missing or corrupt blocks. Hadoop：The Definitive Guide 3rd Edition 6. If the broker has the lead partition shut down, this tool transfers the leadership proactively to other in-sync replicas on another broker. Apache Kafka 7. This avoids the need proactively share map updates with clients: they will learn about them as they interact with the storage cluster. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters. 8. You should proactively archive and delete them to make sure they’re not taking up too much space. Hadoop in Action 9. To proactively test your index for corruption, here are two things to try: Lucene in Action 2nd Edition 10. After months of being the point people for an OpenStack cloud, we also wanted to have a document to hand to our system administrators so they’d know how to operate the cloud on a daily basis — both reactively and proactively. OpenStack Operations Guide # 1582、单词 dereferencing 的匹配文本： 1. This is equivalent to the dereferencing we saw in Clojure using the @ prefix. Programming Concurrency on the JVM 2. We can remove one of the dereferencing queries by embedding class references in the student’s document: MongoDB The Definitive Guide 2nd Edition 3. This method performs a null check every time it dereferences a variable, returning the string “Unknown” if any of the variables traversed in this dereferencing chain is a null value. Java 8 in Action Lambdas, Streams and Functional-style Programming 4. For concision and simplicity in our examples, we often exhibit code fragments that could as easily be C or Pascal code fragments, without class or method definitions, or explicit dereferencing. JSR-133 Java Memory Model and Thread 5. If this parameter dereferencing syntax is familiar to you, then that's because it works the same way in local-params too, as explained in Chapter 4, Searching. Solr 3 Enterprise Search Server 6. For conciseness and simplicity in our examples, we often exhibit code fragments without class or method definitions, or explicit dereferencing. The Java Language Specification Java SE 7 Edition 7. The disadvantage here is that explicit code for dereferencing the guard page has to be inserted in the generated code, contributing to some execution overhead. Oracle JRockit The Definitive Guide 8. However, Java does not prevent you from using excessive amounts of memory nor from cycling through too much memory (e.g., creating and dereferencing many objects) Java Performance Tuning 2nd Edition 9. The trade-off is that it makes dereferencing a part of the identifier a little bit longer in code or in JP QL, although having helper methods, like those in Listing 10-8, can help. Pro JPA2 10. Introduction Making a simple query is not a hard task, but making a complex one, with faceting, local params, parameters dereferencing, and phrase queries can be a challenging task. Apache Solr 4 Cookbook # 1583、单词 seda 的匹配文本： 1. Using tpstats to find bottlenecks Cassandra is written using a SEDA architecture. Cassandra High Performance Cookbook 2. Each of these modules rely on an event driven substrate where the message processing pipeline and the task pipeline are split into multiple stages along the line of the SEDA[20] architecture. Cassandra A Decentralized Structured Storage System 3. Together, the two phases of the mail log MapReduce job and their InputFormat and OutputFormat form a type of staged event-driven architecture (SEDA) Hadoop：The Definitive Guide 3rd Edition 4. Where events are communicated via channels that can act as buffers in periods of high throughput, such a system can be described as having a staged eventdriven architecture (SEDA) Spring Integration in Action 5. Cassandra, however, is different: its concurrency model is based on SEDA, so a single operation may start with one thread, which then hands off the work to another thread, which may hand it off to other threads. Cassandra The Definitive Guide # 1584、单词 dialogs 的匹配文本： 1. We will start this section with the simplest dialogs—modal dialogs with just a single message. Core Java Volume I Fundamentals 9th Edition 2. The following application exercises two forms of JFileChooser dialogs, one for opening and one for saving. Thinking in Java 4th Edition 3. To wrap up, let’s look at one of the embedded dialogs, the create dialog, which lives within the panel just after the list view definition: Spring Roo in Action 4. Clearly they were mindful of the fact that Swing dialogs don’t always come up as snappily as we all would like. Core Java Volume II Advanced Features 9th Edition 5. It is sometimes possible to support multiple policies and let client code decide which one to use — for example via dialogs asking users whether to retry reading from a disk. Concurrent Programming in Java Design Principles and Pattern 6. Of course CSS can be used both for good and for evil (see Figure 4–11), and I hope you will resist the temptation to apply gratuitous background textures to your login dialogs. Java SE 8 for the Really Impatient # 1585、单词 invalidations 的匹配文本： 1. Using a separate table can help you avoid query cache invalidations and lets you use some of the more advanced techniques we show in this section. High Performance MySQL 3rd Edition 2. However, if very frequent events are assumed to be rare, we will instead have to pay the penalty in increased code generation time for reoptimizations or invalidations. Oracle JRockit The Definitive Guide 3. The cache is maintained by a lease mechanism described below, and kept consistent by invalidations sent by the master, which keeps a list of what each client may be caching. Chubby - The lock service for loosely-coupled distributed systems 4. In fact, if ZooKeeper had to manage cache invalidations, it could cause ZooKeeper operations to stall while waiting for a client to acknowledge a cache invalidation request, because write operations would need a confirmation that all cached values had been invalidated. ZooKeeper Distributed Process Coordination # 1586、单词 vectorization 的匹配文本： 1. To get good clustering, you need to understand the techniques of vectorization: the process of representing objects as Vectors. Mahout in Action 2. Loop unrolling enables another optimization called superword, which is a form of vectorization. Java Performance # 1587、单词 xvfb 的匹配文本： 1. It uses an in-memory X server Xvfb (http://en.wikipedia.org/wiki/Xvfb) so that Firefox can be run on an otherwise headless server. Jenkins Continuous Integration Cookbook 2. Using XVFB with Selenium The following section of this book requires that we do this work in Linux as the requirements are only available on that platform. Selenium 2 Testing Tools Beginner's Guide # 1588、单词 webdav 的匹配文本： 1. Chapter 13 shows you how the Apache Jackrabbit content repository, a key component in many content and document management systems, uses Tika to implement full-text search and WebDAV integration. Tika in Action 2. In addition to the standard set of methods supported with corresponding annotations, HttpMethod may be used to build extensions such as WebDAV. Java EE 7 Essentials 3. Table 6-1 lists the standard and experimental response codes you’re most likely to encounter, minus a few used by WebDAV. Java Network Programming 4th Edition 4. Protocols other than file:// require just slightly more configuration in that the protocol and wagon JAR that supplies that connectivity must be explicitly called out as shown for webdav in Example 4-34 Building and Testing with Gradle # 1589、单词 x509 的匹配文本： 1. The x509 certificates used by Keystone must be obtained externally and configured for use with Keystone as described in this section. bk-compute-adminguide-grizzly 2. More information about the x509 extensions can be found at the OpenSSL website: http://www.openssl.org/ RabbitMQ in Action 3. Observe that the <x509> element references our existing userDetailsService configuration. Spring Security 3.1 4. The default Sun security provider has one certificate factory that works with certificates of type X509 Java Security 2nd Edition 5. This generates a zip file with server x509 certificates and a shell script fragment. OpenStack Operations Guide # 1590、单词 toolkits 的匹配文本： 1. Many user interface toolkits provide other common dialogs: to choose a date/time, currency value, font, color, and so on. Core Java Volume I Fundamentals 9th Edition 2. It’s a key component of today’s Web—a powerful, dynamic language with a rich ecosystem of professional-grade development tools, infrastructures, frameworks, and toolkits. Programming Concurrency on the JVM 3. Today, toolkits like jQuery or Dojo make this process easier. Getting Started with CouchDB 4. This situation will certainly improve, and providers of APIs and frameworks will start providing annotations as part of their toolkits. Thinking in Java 4th Edition 5. The MySQL community has also created a wide range of high-quality toolkits with good documentation to supplement these utilities: Percona Toolkit. High Performance MySQL 3rd Edition 6. It uses HDFS as its storage architecture and contains a number of toolkits for log analysis and cluster monitoring. Hadoop Operations and Cluster Management Cookbook 7. In addition, Spring MVC integrates with many common web frameworks and toolkits (for example, Struts, Adobe Flex, GWT, and so on) Pro Spring 3 8. Ease of deployment — This would be the availability of toolkits to manage deployment, version upgrades, patches, and so on. Professional Hadoop Solutions 9. Invoking alien methods from synchronized regions has caused many deadlocks in real systems, such as GUI toolkits. Effective Java 2nd Edition 10. Like most GUI toolkits, Swing uses a single-threaded model in which any GUI renderings are. Java 7 Recipes A Problem-Solution Approach # 1591、单词 centralize 的匹配文本： 1. This tendency to centralize and strictly define the configuration begets a central daemon that sits somewhere on the network and polls every host every so often for status. Monitoring with Ganglia 2. It can help centralize business rules, which can enforce consistent behavior and provide more safety and peace of mind. High Performance MySQL 3rd Edition 3. This abstraction for managing resources will remove duplication from your code and centralize the way you manage and dispose of resources after use, without cluttering the code base with try-finally blocks. Scala in Action 4. Learn to centralize shared functions (and modules) and use them! Testable JavaScript 5. This allows organizations to leverage these already-existing assets stored in LDAP directories or to decouple their configuration from Puppet and centralize it. Pro Puppet 6. We can centralize logic that deals with handling the absence of a value. Functional Programming Patterns in Scala and Clojure 7. Also, there are other systems at Google which collect and centralize information from general-purpose debug logs, and it is not trivial to integrate large volumes of data from these systems and the Dapper repositories. Dapper a Large-Scale Distributed Systems Tracing Infrastructure 8. With this factory, we centralize the creation of objects with some advantages: Java 7 Concurrency Cookbook 9. They also give you a way to centralize and better control the SQL used in an application. Java 7 Recipes A Problem-Solution Approach 10. It is preferable to centralize this logic in a single class than to duplicate the validation logic in each of the class setter methods if there is any possibility of an inheritance hierarchy. Pro JPA2 # 1592、单词 paas 的匹配文本： 1. A quick and easy way to host an application is to use a platform as a service (PaaS), a combination of a deployment platform and a solution stack that in many cases is free of charge. Gradle in Action 2. EC2 offers platform as a service (PaaS), with which we can start up theoretically an unlimited number of servers on the cloud. Hadoop Operations and Cluster Management Cookbook 3. Platform as a service (PaaS): Offers services beyond the infrastructure. Pro Spring MVC 4. Both provide a prepackaged version of Hadoop running in the corresponding cloud (Amazon or Azure) as Platform as a Service (PaaS) Professional Hadoop Solutions 5. Acquia's hosted search product is a great example of Platform as a Service (PaaS), and hosted Solr search is a very common integration approach for many organizations that don't wish to manage their own Java infrastructure or need to customize the behavior of Solr drastically. Solr 3 Enterprise Search Server 6. This isn't the only cloud hosting provider you might want to use, there are many good Platform as a Service (PaaS) providers, and many of them are excellent and also have high levels of automation and availability. Storm Real-Time Processing Cookbook 7. Several PaaS cloud providers can deploy Java-based web applications to the cloud infrastructure, including Heroku, CloudBees, and Cloud Foundry. Spring Roo in Action # 1593、单词 10gen 的匹配文本： 1. Thanks to all of my coworkers at 10gen for sharing your knowledge and advice on MongoDB as well as Eliot Horowitz and Dwight Merriman, for starting the MongoDB project. MongoDB The Definitive Guide 2nd Edition 2. Mars Cheng, who organized the event, arranged for the venue, while 10gen paid for travel and accommodation for Peter Membrey. The Definitive Guide to MongoDB 3. PREFACExvi Through an unlikely turn of events, I started working for 10gen, the company spearheading the development of this open source database. MongoDB in Action 4. The MongoDB Java Driver To access MongoDB from a Java program, you can use the Java driver provided and maintained by 10gen, the company behind MongoDB. Spring Data Modern Data Access for Enterprise Java # 1594、单词 metaphone 的匹配文本： 1. There are at least three notable implementations of a procedure like this: Soundex, Metaphone, and Double Metaphone. Mahout in Action 2. There are four phonetic encoding algorithms to choose from: Caverphone, DoubleMetaphone, Metaphone, RefinedSoundex, and Soundex. Solr 3 Enterprise Search Server 3. This filter uses algorithm named double metaphone to analyze the phonetics of the words. Solr 3.1 Cookbook 4. In this section, we’ll implement an analyzer to convert words to a phonetic root using an implementation of the Metaphone algorithm from the Jakarta Commons Codec project. Lucene in Action 2nd Edition 5. This filter uses an algorithm named double metaphone to analyse the phonetics of the words. Apache Solr 4 Cookbook 6. The other dependency is an API that encodes arbitrary strings first with the Metaphone algorithm, then the Base64 format. Building and Testing with Gradle # 1595、单词 rerunning 的匹配文本： 1. The MapReduce APIs allow developers to focus on the question they’re trying to answer instead of worrying about how to handle machine failures—you’re regretting what you did with that bat now, aren’t you? Because data in the Hadoop filesystem is replicated, Hadoop can automatically handle failures by rerunning the computation on a replica, often without the user even noticing. Monitoring with Ganglia 2. Determining which resource is fully utilized, tuning the appropriate configuration parameters for that resource, and then rerunning the job will allow you to optimize your job’s runtime on your cluster. Pro Hadoop 3. If you started in a console, then hitting Ctrl-C and rerunning the same command you used to start it is the simplest way. CouchDB The Definitive Guide 4. It’ll help you to upgrade your wrapper version later by changing the gradleVersion and rerunning the wrapper task. Gradle in Action 5. It is possible to improve the results by recalculating the cluster centroids in the reducer, splitting any clusters that have customers that are too far apart from each others, and rerunning the GRGPF algorithm with new clusters. Hadoop MapReduce Cookbook 6. You may wonder why you had to delete the stocks directory in HDFS before rerunning the import command. Hadoop in Practice 7. Oozie makes rerunning failed workflows more tractable, since no time is wasted running successful parts of a workflow. Hadoop：The Definitive Guide 3rd Edition 8. Possibly this involves going over a large number of recent source code check-ins, recompiling the application at different changes and rerunning the affected application until the guilty check-in is spotted. Oracle JRockit The Definitive Guide 9. This can be done by rerunning the reindex process, but again filtering on a date field to only match documents that have been added since the last reindex process started. Elasticsearch The Definitive Guide 10. Rerunning the profile on the altered application finds that this method has shifted its percentage time down to just 4% Java Performance Tuning 2nd Edition # 1596、单词 ipad 的匹配文本： 1. My family’s wish list originally contains only one item, an iPad. Programming Concurrency on the JVM 2. Alternatively, you can specify iPhone or iPad to target devices individually. Testable JavaScript 3. The iOS simulator enables you to test your web applications without using an actual device, whether it's an iPhone or any other iOS device, such as iPad or iPod Touch. Selenium Testing Tools Cookbook 4. Unfortunately, the means that searches for “iPad” won’t match our example document as we saw in the previous section. Solr in action 5. A web server doesn’t care whether the client is a Unix workstation, an Android phone, or an iPad, because all clients speak the same HTTP protocol regardless of platform. Java Network Programming 4th Edition 6. We then simply hand that Pageable into the method and make sure we’ve got the iPad back, that we’re the first page, and that there are further pages available. Spring Data Modern Data Access for Enterprise Java 7. Depending on which simulator we start XCode from, we can either have it run against iPhone or iPad. Selenium 2 Testing Tools Beginner's Guide # 1597、单词 subsequence 的匹配文本： 1. Get a Path Subpath You can extract a relative path with the subpath() method, which gets two parameters, the start index and the end index, representing the subsequence of elements: Pro Java 7 NIO.2 2. We can also fetch a subsequence of items based on their scores. Redis in Action 3. BiCount Bigram count measures the prevalence of each subsequence of two items within a given sequence. Incoop MapReduce for Incremental Computations 4. For convenience, the maximum subsequence sum is 0 if all the integers are negative.) Example: Data Structures and Algorithm Analysis in Java 3rd Edition 5. Clients can use this to guarantee that network and server outages cause only a suffix of a sequence of operations to be lost, rather than an arbitrary subsequence, thus allowing complex changes to be marked as committed with a final write. Chubby - The lock service for loosely-coupled distributed systems 6. The lookingAt( ) method is similar: it returns true if the pattern matches the complete region, or if it matches some subsequence at the beginning of the region. Java in a Nutshell 5th Edition 7. That is, the slice is a subsequence of the original buffer that only contains the elements from the current position to the limit. Java Network Programming 4th Edition 8. This means that the length attribute of a datagram which is re-used for multiple receive operations must be reset before the second and subsequence receives; otherwise it continually shrinks to the size of the smallest datagram received so far. Fundamental Networking in Java # 1598、单词 overwrites 的匹配文本： 1. Without the synchronized keyword, each thread overwrites the other and the resulting count is significantly less. Java Network Programming and Distributed Computing 2. This happens because the second run of the report generation overwrites the first one. Gradle in Action 3. It turns out that most of these overwrites came from client retries due to errors or timeouts. GFS - The Google File System 4. Although, technically, updates can be implemented as overwrites, the granularity of such an approach (overwrite will work only on the file level) can be cost-prohibitive in most cases. Professional Hadoop Solutions 5. Previously, only major compactions processed deletes, overwrites, and purging of expired data, which meant that minor compactions resulted in larger HFiles than necessary, which decreases block cache efficiency and penalizes future compactions. Apache Hadoop Goes Realtime at Facebook 6. If you subsequently add another attribute with the same category, it overwrites the first one. Core Java Volume II Advanced Features 9th Edition 7. If this option is not specified, jarsigner overwrites the jarfile specified on the command line. Java in a Nutshell 5th Edition 8. A tombstone is a special marker issued in a delete that overwrites the deleted values, acting as a placeholder. Cassandra The Definitive Guide 9. Here’s a SELECT TRANSFORM query that reads binary data from a src table, streams it through the shell cat command and overwrites the contents of a destination1 table: Programming Hive 10. Knowing this, you will see that the red paint fills the ellipse and therefore overwrites the inner part of the ellipse including some of the inner outline. Java 7 Recipes A Problem-Solution Approach # 1599、单词 ecommerce 的匹配文本： 1. For example, don’t use TPC-H to benchmark an ecommerce system. High Performance MySQL 3rd Edition 2. Jason also converted his mom’s ecommerce website, Bet Ha Bracha, to a CouchApp. CouchDB The Definitive Guide 3. Before starting to query for data, we have to issue the keyspace command use ecommerce; NoSQL Distilled 4. Back then, dinosaurs ruled the earth and search engines with names like Altavista, Lycos, and Excite were used, primarily to find ecommerce portals for pet food on the Internet. Graph Databases 5. For example, in an ecommerce database, both tables Users and Orders. SQL Antipatterns 6. If you were to turn faceting on and facet on the type field using the ecommerce data for this chapter, you would get the results in listing 11.9 Solr in action 7. Consider two customers are attempting to put the same item into their shopping carts on an ecommerce site. Cassandra The Definitive Guide 8. Take, for instance, the problem of recommending products to a visitor of an ecommerce website. Hadoop Operations 9. Often an ecommerce site will boost categories of products that are more profitable, or filter out products presently out of stock (so you don’t see that they are out of stock and then go elsewhere to buy them) Lucene in Action 2nd Edition 10. From the early days of the Internet’s mainstream breakout, the major search engines and ecommerce companies wrestled with ever-growing quantities of data. Programming Hive # 1600、单词 moosefs 的匹配文本： 1. MooseFS (Moose File System) is a shared file system ; it implements the same rough concepts of shared storage solutions - such as Ceph, Lustre or even GlusterFS. bk-compute-adminguide-grizzly 2. This list of open-source file-level shared storage solutions is not exhaustive, other open source solutions exist (MooseFS) OpenStack Operations Guide # 1601、单词 pseudokey 的匹配文本： 1. This type of primary key column is sometimes called a pseudokey. SQL Antipatterns # 1602、单词 gotchas 的匹配文本： 1. Tip The excellent tutorial at http://docs.oracle.com/javase/tutorial/getStarted/cupojava goes into much greater detail about the “gotchas” that beginners can run into. Core Java Volume I Fundamentals 9th Edition 2. Many of the caveats and “gotchas” you will face over time aren’t immediately obvious. CouchDB The Definitive Guide 3. Don’t be turned off by these issues though; there’s good news! Most integrated development environments (IDEs) such as NetBeans and IntelliJ support this refactoring and will automatically ensure these gotchas don’t arise. Java 8 in Action Lambdas, Streams and Functional-style Programming 4. Common MapReduce Design Gotchas Following is a list of some things to watch for and avoid when you design your MapReduce implementation: Professional Hadoop Solutions 5. A few gotchas in the current implementation make some management tasks tricky. HBase in Action 6. In this section we’ll discuss the two issues discovered in the previous code (regular expressions in Java, and lack of code reuse), as well as some other general Java gotchas in MapReduce. Hadoop in Practice 7. There are other NFS gotchas to watch out for, such as synchronizing UIDs and GIDs. Hadoop：The Definitive Guide 3rd Edition 8. This is a valid technique, but there are a few not-so-obvious gotchas. Hadoop Beginners Guide 9. One of the common gotchas is to forget to synchronize clocks between machines. Hadoop Operations 10. Gotchas with Floating-Point Comparisons A common gotcha arises when you compare floating-point numbers of different types (i.e., FLOAT versus DOUBLE) Programming Hive # 1603、单词 shareable 的匹配文本： 1. At least one resource used by the tasks must not be shareable. Thinking in Java 4th Edition 2. Props is an ActorRef configuration object that’s thread-safe and shareable. Scala in Action 3. On Unix systems, if you use ipc endpoints you need to create these with appropriate permissions; otherwise, they may not be shareable between processes running under different user IDs. ZeroMQ 4. Containers must assume connections to be shareable if oyment hint is provided. Java EE 7 Specification 5. Certainly for shared resources pooling will always be an option if the overhead associated with creating a shareable resource is expensive. Java Performance Tuning 2nd Edition # 1604、单词 userid 的匹配文本： 1. This recipe will explore the manipulation of home pages found under the /user/userid directory and configured by the user through the Jenkins /me folder path. Jenkins Continuous Integration Cookbook 2. This regular expression must contain a single matching group, but it can be configured to support the username and DN issuance requirements of your application, for example, if the DNs for your organization's certificates include the email or userid fields, the regular expression can be modified to use these values as the authenticated principal's name. Spring Security 3.1 3. Grab the “UserID” since it is what we are grouping by. MapReduce Design Patterns 4. As we want the shopping carts to be available all the time, across browsers, machines, and sessions, all the shopping information can be put into the value where the key is the userid. NoSQL Distilled 5. Your program could have a single HashMap (or dict, for you Pythonistas) with UserID as the key and summed TimeSpent as the value. HBase in Action 6. After interpolating the string from the userid parameter into your SQL. SQL Antipatterns 7. The mongo console shows the contents of the user collection, enabling you to see what the userid is, while the password is shown as an MD5 hash of the original password you supplied: The Definitive Guide to MongoDB 8. Each user has a unique userid and is assigned a row named by that userid. Bigtable - A Distributed Storage System for Structured Data # 1605、单词 baz 的匹配文本： 1. We then create an instance of type Foo.T labeled baz. Scala in Depth 2. Starting at that root, the interpreter will take the package name and replace each dot with a slash to generate a path name off of the CLASSPATH root (so package foo.bar.baz becomes foo\bar\baz or foo/bar/baz or possibly something else, depending on your operating system) Thinking in Java 4th Edition 3. For example, db.baz returns the baz collection in the current database. MongoDB The Definitive Guide 2nd Edition 4. So if your module implements functions foo, bar, and baz but only exports foo, then bar and baz can’t be called from outside. RabbitMQ in Action 5. Loading sample data for the following keywords: foo, bar, baz. Cassandra High Performance Cookbook 6. We’ve again started with our three dashes and then specified the names of the lists we’re creating: foo and baz. Pro Puppet 7. We can mechanicallybar baz s translate this to the purely functional API: Functional Programming in Scala 8. Scope 1 - Top Level (def foo "first foo") (def bar "first bar") (def baz "first baz") Functional Programming Patterns in Scala and Clojure 9. To define Baz with a constructor that tests name and throws an exception if name is null: Beginning Scala # 1606、单词 hortonworks 的匹配文本： 1. This limitation is eliminated by patches to core Hadoop committed to trunk and branch 1.1 by Hortonworks. Professional Hadoop Solutions 2. Presently, he works at Hortonworks where he leads the integration of Storm. Storm Blueprints Patterns for Distributed Real-time Computation 3. The Hortonworks blog is worth reading; it discusses application and future Hadoop roadmap items: http://hortonworks.com/blog/ Hadoop in Practice 4. There are Hadoop distributions from the large, established enterprise vendors, including EMC, IBM, Microsoft, and Oracle, as well as from specialist Hadoop companies such as Cloudera, Hortonworks, and MapR. Hadoop：The Definitive Guide 3rd Edition 5. Though Doug has now moved on to Cloudera (another prominent startup supporting the Hadoop community) and much of the Yahoo's Hadoop team has been spun off into a startup called Hortonworks, Yahoo remains a major Hadoop contributor. Hadoop Beginners Guide 6. Alan is a member of the Apache Software Foundation and a cofounder of Hortonworks. Programming Pig 7. Note that the bundled Cloudera, MapR, and planned Hortonworks distributions all include a Hive release. Programming Hive # 1607、单词 unset 的匹配文本： 1. It is usually not a good idea to set this variable globally, but some poorly written software installers in Windows do just that.) You can temporarily unset the CLASSPATH environment variable in the current shell window by typing. Core Java Volume I Fundamentals 9th Edition 2. If the hadoop.log.dir system property is unset, a subprocess of the virtual cluster may crash and leave the test case in limbo. Pro Hadoop 3. If the user realizes that he actually doesn’t like reading, he can remove the key altogether with "$unset": MongoDB The Definitive Guide 2nd Edition

4. We unset the HADOOP_CLASSPATH environment variable because we don’t have any third-party dependencies for this job. Hadoop：The Definitive Guide 3rd Edition

5. An increment would assume they are unset and start at 1 again. HBase：The Definitive Guide

6. Furthermore, once an error has occurred, there is no way to unset the flag so further errors can be detected. Java Network Programming 4th Edition

7. Enabled bits mean the document for that position is available to be searched against the query, and unset bits mean the document won’t be considered in the search. Lucene in Action 2nd Edition

8. There is no way to delete or “unset” a DBPROPERTY. Programming Hive

9. It is an arbitrary object which remains associated with the selection key which results from the registration, and which can be set, unset, and retrieved subsequently: Fundamental Networking in Java

10. You can also use \$unset on embedded documents and on arrays. MongoDB in Action

# 1608、单词 sysctl 的匹配文本：

1. Add the following to the /etc/sysctl.conf file, so that the setting will be enabled whenever the system boots: HBase Administration Cookbook

2. For disabling IPv6, open sysctl.conf (which you will find in /etc) and put the following configuration at the end of the file: Web Crawling and Data Mining with Apache Nutch

3. If you will run a much larger number of file descriptors, you may need to alter the per-system limits via changes to fs.file-max in /etc/sysctl.conf. Pro Hadoop

4. How you do this varies from system to system, but in most GNU/Linux systems you can change the values in /etc/sysctl.conf and execute sysctl -p, or use the /proc filesystem by echoing new values into the files found at /proc/sys/net/ High Performance MySQL 3rd Edition

5. In order to make the changes permanent, edit the /etc/sysctl.conf and update the IP forwarding setting : bk-compute-adminguide-grizzly

6. To make the changes permanent, edit the /etc/sysctl.conf file and update the IP forwarding setting: bk-admin-guide-cloud-latest

7. You may also need to edit /etc/sysctl.conf and adjust the fs.file-max value. HBase：The Definitive Guide

8. Kernel parameters should be configured in /etc/sysctl.conf so that settings survive reboots. Hadoop Operations

9. We needed to use sudo, because in order to set that property with the use of the sysctl command we need administration privileges. Apache Solr 4 Cookbook

# 1609、单词 collocated 的匹配文本：

1. This is sometimes appropriate on systems that have a very large number of collocated applications, none of which is very busy. High Performance MySQL 3rd Edition

2. Because access servers are collocated in their own tier, you can scale out read/write access regardless of the storage capacity. bk-admin-guide-cloud-latest

3. Ring 3 is a Cassandra cluster that is physically collocated. Storm Blueprints Patterns for Distributed Real-time Computation

4. RegionServers are typically collocated with HDFS DataNodes (figure 3.7) on the same physical hardware, although that’s not a requirement. HBase in Action

5. In practice, a lot of HBase setups are collocated with Hadoop, to make use of locality using HDFS as well as MapReduce. HBase：The Definitive Guide

6. Local EJBs were added to the EJB specification to address this issue of improving performance among locally collocated EJBs. Java Performance Tuning 2nd Edition

7. This assumption does not completely hold in HadoopDB as some tables are collocated and if partitioned on the same attribute, the join operation can be pushed entirely into the database layer. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads

# 1610、单词 soapui 的匹配文本：

1. Writing test plans with SoapUI SoapUI (http://www.soapui.org/) is a tool that allows the efficient writing of functional, performance, and security tests, mostly for web services. Jenkins Continuous Integration Cookbook

# 1611、单词 architected 的匹配文本：

1. Since 2000, he has architected a number of middle-tier business processes. Pro Hadoop

2. Nova Architecture Nova is architected as a distributed application with many components, but the majority of these are custom-written Python daemons of two varieties: Deploying OpenStack

3. Since the channel concept is specific to the TCP transport, the .NET client was architected to use the more generic term model for the same concept. RabbitMQ in Action

4. Miner architected several large-scale and mission-critical Hadoop deployments with the U.S. MapReduce Design Patterns

5. Upgrading from legacy Lucene A common situation is when you have an existing Java-based web application that was architected prior to Solr becoming the well-known and stable product that it is today. Solr 3 Enterprise Search Server

6. Most of the warts we encountered when we began with the project have been cleaned up, patched, or completely re-architected. HBase in Action

7. For illustrative purposes we’ll use the Neo4j database as an example of how a graph database is architected. Graph Databases

8. Unmesh has architected functional test automation projects using industry standard, in-house and custom test automation frameworks along with leading commercial and open source test automation tools. Selenium Testing Tools Cookbook

9. Robust—Because it is intended to run on commodity hardware, Hadoop is architected with the assumption of frequent hardware malfunctions. Hadoop in Action

10. In a properly architected system, GET requests can be bookmarked and prefetched without concern. Java Network Programming 4th Edition

# 1612、单词 eip 的匹配文本：

1. We can use Heartbeat to associate EIP to the standby master automatically, if the active one is down. HBase Administration Cookbook

2. By implementing the Enterprise Integration Pattern (EIP), Spring Integration can make integrating Spring applications with external systems easy. Pro Spring 3

3. Note that although SI provides ready-made implementations of the various EIP patterns, there are architecturally different approaches to applying those patterns, and SI isn’t prescriptive about it. Spring in Practice

4. The first type of integration project we consider is the information portal (as named in the EIP book) Spring Batch in Action

5. Regarding the EIP book, I probably have one of the most well-worn copies, and it’s always within easy reach at my desk. Spring Integration in Action

6. In this section, we’ll discuss the design details of the course registration use case with EIP patterns and Spring Integration in the mix. Spring Roo in Action

7. This implies that ActiveMQ can be seen not only as a JMS broker, but as a whole development platform as well, especially when you add Enterprise Integration Patterns (EIP) to the mix (as we’ll see in chapter 13) ActiveMQ in Action

# 1613、单词 gcs 的匹配文本：

1. You’ll run into stop-the-world garbage collectors (GCs), and that will bring down your system in no time. HBase in Action

2. Typically, this will lead to the runtime system triggering more and more GCs in order to attempt clean up of the mess, but still isn't able to reclaim enough contiguous space for new objects. Oracle JRockit The Definitive Guide

3. It manages its young generation the same way the Parallel and Serial GCs do. Java Performance

# 1614、单词 reconfig 的匹配文本：

1. Now that the config document is correct, we need to send it to the database using the rs.reconfig helper: MongoDB The Definitive Guide 2nd Edition

2. Once they are in place, we can reconfigure an ensemble using the reconfig operation. ZooKeeper Distributed Process Coordination

3. To modify a replica set’s configuration, there’s a separate command, replSetReconfig, which takes a new configuration document. MongoDB in Action

# 1615、单词 serially 的匹配文本：

1. By default, a single-threaded map runner is used, and the key/value pairs are passed to the Mapper.map() method serially. Pro Hadoop

2. And regardless of whether the replica is acting as a standby to replace the master, it must be powerful enough to perform all the writes that occur on the master, with the extra handicap that it must perform them serially. High Performance MySQL 3rd Edition

3. The added benefit here over serially reading the data set on one node is that the input splits are read in parallel and the reducers use a configurable number of threads to read each mapper’s output. MapReduce Design Patterns

4. Disks on platters are capable of reading and writing fast serially. Cassandra High Performance Cookbook

5. All the subscribers are notified serially, so it's important that any code performed in the event-handling method executes quickly. Getting Started with Google Guava

6. Not only do typical JMS clients need to manually manage their own resources and environment, but they’re usually built for processing messages serially—one at a time (unless they’re specifically built with concurrency in mind) ActiveMQ in Action

7. Note that earlier version of this garbage collector actually performed old collections serially. Java Performance

8. Constructing and managing an object to process a task in parallel, rather than just invoking a method to process it serially, is the main unavoidable overhead associated with taskbased programming compared with sequential solutions. Concurrent Programming in Java Design Principles and Pattern

9. When stream operations run in parallel, the intent is that the same result is returned as if they had run serially. Java SE 8 for the Really Impatient

10. An address association property mapped as a many-to-one mapping could conceivably be overridden to be stored serially as a blob, but this could not only break client access but also spill over to break other areas like JP QL queries that traverse the address. Pro JPA2

# 1616、单词 jdialog 的匹配文本：

1. To implement a dialog box, you extend the JDialog class. Core Java Volume I Fundamentals 9th Edition

2. Each component capable of holding a menu, including JApplet, JFrame, JDialog, and their descendants, has a setJMenuBar( ) method that accepts a JMenuBar (you can have only one JMenuBar on a particular component) Thinking in Java 4th Edition

3. If you use internal frames, you should not use the JDialog class for dialog boxes. Core Java Volume II Advanced Features 9th Edition

4. Solution Create an application with a menu option to prompt the user with a dialog box (JDialog) Java 7 Recipes A Problem-Solution Approach

# 1617、单词 alphabetic 的匹配文本：

1. Listing 9.5 A custom Lucene analyzer that filters non-alphabetic tokens. Mahout in Action

2. We’ll keep it simple and consider words of alphabetic characters and apostrophes (') that are at least two characters long. Redis in Action

3. Fortunately, our data is very predictable, and we hardcode the column value reads based on the alphabetic ordering of our qualifier labels. Hadoop RealWorld Solutions Cookbook

4. These set operations exist in two forms: alphabetic and symbolic. Programming in Scala 2nd Edition

5. Alphabetic range bucketing Solr does not directly support alphabetic range bucketing (A-C, D-F, and so on) Solr 3 Enterprise Search Server

6. Components should consist of lowercase alphabetic characters and, rarely, digits. Effective Java 2nd Edition

7. Lexicographic Ordering Lexicographic ordering is the natural (alphabetic) ordering of the product of two ordered Cartesian sets. Cassandra The Definitive Guide

8. Both relation and field names must start with an alphabetic character, and then they can have zero or more alphabetic, numeric, or _ (underscore) characters. Programming Pig

9. This example uses category as a primary alphabetic sort, with results within category sorted by score; finally, books with equal score within a category are sorted by decreasing publication month: Lucene in Action 2nd Edition

# 1618、单词 img 的匹配文本：

1. The attribute values are the same as for the align attribute of the HTML img tag. Core Java Volume I Fundamentals 9th Edition

2. An image is an .img file that most CD/DVD burner applications can burn directly to writable media. Pro Hadoop

3. In a web application, you accomplish this by putting the filename in the <img> element’s src attribute. High Performance MySQL 3rd Edition

4. The size of the output file, centos.img, is determined by the block size and count. Hadoop Operations and Cluster Management Cookbook

5. Write a Scala program that prints the src attributes of all img tags of a web page. Scala for the Impatient

6. This will cause changes to the underlying hypervisor specific config file and possibly to the contents of the image (in our example system.img) Oracle JRockit The Definitive Guide

7. In the following example, the <img> element is located by using its alt attribute. Selenium Testing Tools Cookbook

8. That way, the parser knows not to look for a img> tag. Core Java Volume II Advanced Features 9th Edition

9. If the IMG elements don’t have HEIGHT and WIDTH attributes, the main thread might have to wait for all the images to load before it can finish by displaying the page. Java Network Programming 4th Edition

10. Additionally, you must set the qemu_img_cmd value in the hyperv configuration section to the full path to an qemu-img command installation. user-guide

# 1619、单词 jdo 的匹配文本：

1. Data model agnostic frameworks such as JDO aren't easy for use cases, where one has to use the complete power of data models in column stores. Web Crawling and Data Mining with Apache Nutch

2. The support for Hibernate, MyBatis, JDO, and JPA makes already simple APIs even simpler, thus easing the burden on developers. Pro Spring 3

3. This layer abstracts the actual persistence framework (e.g., JDBC, JDO, or JPA) Pro Spring MVC

4. Often these objects are backed by a relational database of some type, and you manage them through object relational mapping tools such as Hibernate, JPA, or JDO. Solr 3 Enterprise Search Server

5. Java Data Objects (JDO) was inspired and supported primarily by the object-oriented database (OODB) vendors. Pro JPA2

6. It significantly simplified the implementation of data access layers, regardless of whether JDBC, Hibernate, TopLink, JDO, or iBatis was used as persistence technology. Spring Data Modern Data Access for Enterprise Java

7. Despite a handful of rough spots, such as applets, Enterprise JavaBeans (EJB), Java Data Objects (JDO), and countless logging frameworks, Java has enjoyed a rich and diverse history as the platform on which much enterprise software has been built. Spring in Action 4th Edition

# 1620、单词 charsets 的匹配文本：

1. As a further illustration of this, consider some of the recent discussion within the Tika community regarding character sets (often abbreviated charsets), which are (sometimes numerical) encodings of characters from a particular alphabet, language, or dialect used to ensure interoperability and proper representation of heterogeneous electronic textual formats. Tika in Action

2. To find out which character sets are available in a particular implementation, call the static availableCharsets method. Core Java Volume II Advanced Features 9th Edition

3. Using the Charsets class In Java, there are six standard character sets that are supported on every Java platform. Getting Started with Google Guava

4. For more complex charsets, such as the UTF-8 encoding of Unicode or the EUC-JP charset. Java in a Nutshell 5th Edition

# 1621、单词 ification 的匹配文本：

1. No actual removal from ification occurs, although the feature may be removed from products at. Java EE 7 Specification

2. Some volunteers OSGi-ify standard Java artifacts and make them available, hoping original developers will then include the OSGi-ification process in the build of their frameworks and libraries. Spring Dynamic Modules in Action

# 1622、单词 chuck 的匹配文本：

1. Searching for Files by Glob Pattern Sometimes you may have only partial information about the file you want to search for, such as only its name or extension or perhaps even just a chuck of its name or extension. Pro Java 7 NIO.2

2. The essential part of that CD, the Thinking in C multimedia seminar (created for MindView by Chuck Allison), is now available as a downloadable Flash presentation. Thinking in Java 4th Edition

3. Ian was in a conference, Mikko was getting on a plane, and Chuck was probably in the office, but three hours later, Ian merged the pull request. ZeroMQ

4. However, it's possible for us to specify a chuck size to control the actual storage of the SequenceFile data blocks in the HDFS. Hadoop MapReduce Cookbook

5. Manning’s Hadoop in Action by Chuck Lam contains the necessary prerequisites to understand and apply the techniques covered in this book. Hadoop in Practice

6. About the author Chuck Lam is currently founding a mobile social networking startup called RollCall. Hadoop in Action

7. Perhaps you want to get all of Chuck’s orders that were placed over the web: Spring in Action 4th Edition

# 1623、单词 mdb 的匹配文本：

1. Message-Driven Beans A message-driven bean (MDB) is a container-managed bean that is used to process messages asynchronously. Java EE 7 Essentials

2. Each of these methods is invoked by the EJB container for the purposes of creation and destruction of the MDB. ActiveMQ in Action

3. The type of pools and caches used depends on the type of EJBs—stateless session, stateful session, entity, or MDB. Java Performance

4. The message-driven bean (MDB) is the EJB component for asynchronous messaging. Pro JPA2

5. One of the highlights of the EJB 2 specification was the inclusion of the messagedriven bean (MDB) Spring in Action 4th Edition

# 1624、单词 osi 的匹配文本：

1. The most popular approach to network layering is the Open Systems Interconnection (OSI) model, created by the International Standards Organization (ISO) Java Network Programming and Distributed Computing

2. We encourage hosted plugins to use the same MIT license, to simplify the story for users, but plugins are free to choose their own licenses, so long as it's OSI-approved open-source license. Jenkins Continuous Integration Cookbook

3. If you read the network literature, you’re likely to encounter an alternative seven-layer model called the Open Systems Interconnection (OSI) Reference Model. Java Network Programming 4th Edition

4. Layer-2 network Term used for OSI network architecture for the data link layer. OpenStack Operations Guide

# 1625、单词 invalidates 的匹配文本：

1. Races between validates for earlier writes and invalidates for later writes are protected in the coordinator by always sending the log position associated with the action. Megastore - Providing Scalable, Highly Available Storage for Interactive Services

2. This mistaken assumption about MapReduce affects three of the five benchmarks in the comparison paper (the selection, aggregation, and join tasks) and invalidates the conclusions in the paper about the relative performance of MapReduce and parallel databases. MapReduce a flexible data processing tool

3. However, doing so invalidates the contents of local variable n. The Java Virtual Machine Specification Java SE 7 Edition

4. Dynamic and changing modules are still cached, but since the artifact can become outof-date with respect to their identifiers, Gradle invalidates the cached versions after some period of time. Gradle Beyond The Basics

5. The caching protocol is simple: it invalidates cached data on a change, and never updates it. Chubby - The lock service for loosely-coupled distributed systems

6. It is important to do a pack/unpack cycle on a JAR file before signing it with jarsigner because the pack/unpack cycle reorders some internal elements of a class file and invalidates any digital signatures or checksums in the JAR file manifest. Java in a Nutshell 5th Edition

7. Rack awareness If, however, you do have a multi-rack setup, or another configuration that otherwise invalidates the previous assumptions, you can add the ability for each node to report its rack ID to Hadoop, which will then take this into account when placing replicas. Hadoop Beginners Guide

8. Similarly, closing a selector invalidates all keys in that selector. Java Network Programming 4th Edition

9. If another update that invalidates the user's changes is made by another user, the timestamps will have changed, and the current transaction needs to be rolled back instead of committed. Java Performance Tuning 2nd Edition

10. Once compiled code has been generated it may be invalidated for several reasons, such as class loading that invalidates a CHA optimization or because classes referenced by the code have been unloaded. Java Performance

# 1626、单词 kinit 的匹配文本：

1. After this, the kadmin and kinit commands should be accessible from the command line. Hadoop Operations and Cluster Management Cookbook

2. For Hadoop users, this is done via the kinit command.) The KDC responds with something called a Ticket Granting Ticket (TGT), which is simply a ticket used for requesting tickets to communicate to other servers and services. Professional Hadoop Solutions

3. By running the kinit command, the client would obtain a Kerberos ticket and store it in the filesystem. Hadoop MapReduce Cookbook

4. The authentication step, however, is normally carried out explicitly by the user using the kinit command, which will prompt for a password. Hadoop：The Definitive Guide 3rd Edition

5. To perform the initial authentication and retrieve a TGT from the KDC with MIT Kerberos, use the kinit command; to list cached credentials, use the klist command as in Example 6-2 Hadoop Operations

# 1627、单词 mongorestore 的匹配文本：

1. If you used the --oplog option to dump the database, you must use the -oplogReplay option with mongorestore to get the point-in-time snapshot. MongoDB The Definitive Guide 2nd Edition

2. Then only restore data from those chunks using your backups (and mongorestore) Scaling MongoDB

3. The --drop option tells the mongorestore utility to discard each collection in the database before restoring it. The Definitive Guide to MongoDB

4. For instance, you might be tempted to use mongodump and mongorestore, but these utilities preserve collections and index declarations only. MongoDB in Action

# 1628、单词 searchd 的匹配文本：

1. After creating a new source and index, we run the indexer program to create the initial full-text index data files and then (re)start the searchd daemon to pick up the changes: High Performance MySQL 3rd Edition

# 1629、单词 sdp 的匹配文本：

1. The Sockets Direct Protocol (SDP) is a network protocol, which supports stream connections using InfiniBand (IB) Java 7 New Features Cookbook

2. Solution Make use of the Sockets Direct Protocol (SDP) to bypass TCP, a possible bottleneck in the process. Java 7 Recipes A Problem-Solution Approach

# 1630、单词 benchmarked 的匹配文本：

1. If you benchmarked your systems with real workloads, it would be harder to draw accurate conclusions from the benchmarks. High Performance MySQL 3rd Edition

2. This incurs a great deal of random I/O in the systems that we benchmarked to update the per-message state. Building LinkedIn’s Real-time Activity Data1

3. Other issues Naturally, these are just a few of the possible areas where application performance might need to be benchmarked. Oracle JRockit The Definitive Guide

4. Sam Pullara benchmarked Java’s String classes against Objective-C’s NSString classes and found that Java outperformed native code by a wide margin. Beginning Scala

5. In order to evaluate Tenzing performance against commercial parallel databases, we benchmarked four commonly used analyst queries (see appendix A) against DBMS-X, a leading MPP database appliance with row-major storage. Tenzing - A SQL Implementation On The MapReduce Framework

6. We have “benchmarked” our program by modifying the code snippet presented above as follows: Steps in Scala An Introduction to Object-Functional Programming

7. Specifics of what is being benchmarked are deliberately not included. Java Performance

8. To explore more complex uses of the benchmarked systems, the benchmark includes four more analytical tasks related to log-file analysis and HTML document processing. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads

# 1631、单词 sbin 的匹配文本：

1. The folder contains several .jar files and folders such as bin, sbin, and conf. Hadoop Operations and Cluster Management Cookbook

2. For RabbitMQ they’re created using the rabbitmqctl utility found in the ./sbin/ directory of your RabbitMQ installation. RabbitMQ in Action

3. A quick check is to look for /sbin/mkfs.ext4 on your system. Cassandra High Performance Cookbook

4. The mc-puppetd command may be copied from the plugin directory into the /usr/sbin/ directory on the MCollective client systems. Pro Puppet

5. A full list of ethernet cards can be obtained with “/sbin/ifconfig ." Hadoop in Practice

6. The YARN start-yarn.sh script (in the sbin directory) starts the YARN daemons in the cluster. Hadoop：The Definitive Guide 3rd Edition

7. You’ll notice that the directory includes common directories like bin, sbin, lib, libexec, share, as well as conf directory that contains configuration files. Hadoop Operations

8. The second command (the / sbin/swapoff -a one) disables swapping on all known devices. Apache Solr 4 Cookbook

# 1632、单词 parallelizable 的匹配文本：

1. So, using parallel collections for parallelism requires using the parallelizable operations. Scala in Depth

2. First, not all operations are parallelizable, so switching to parallel collection won’t improve the performance of these operations. Scala in Action

3. The second issue is particularly interesting because you need to keep a mental model that some stream operations are more parallelizable than others. Java 8 in Action Lambdas, Streams and Functional-style Programming

4. Hadoop provides a powerful computational platform, providing highly scalable, parallelizable execution that is wellsuited for the creation of a new generation of powerful data science and enterprise applications. Professional Hadoop Solutions

5. In principle, the evaluation of a when statement is parallelizable, but we have not explored this option yet. Interpreting the Data Parallel Analysis with Sawzall

6. Not all problems are easily parallelizable, but you’ll be surprised by how many are once you start to look. HBase in Action

7. This is not necessarily optimal and there are several ways that have been addressed in research over the years to make faster and more parallelizable variants. Oracle JRockit The Definitive Guide

8. These enhancements are designed to be fully parallelizable to utilize the underlying MapReduce framework. Tenzing - A SQL Implementation On The MapReduce Framework

9. For example, let's suppose our number-crunching application is fully parallelizable to any number of CPUs, and that on a single unutilized CPU it takes 100 seconds. Java Performance Tuning 2nd Edition

10. Fortunately, the search is highly parallelizable by dividing the index into pieces (index shards), each having a randomly chosen subset of documents from the full index. Web search for a planet the google cluster architecture

# 1633、单词 deployable 的匹配文本：

1. You’ll create one based on data taken from a dating site, and then you’ll turn it into a deployable, production-ready web service. Mahout in Action

2. Deployable artifacts often look different by nature, follow custom project requirements, and demand distinct runtime environments. Gradle in Action

3. It is an explicit goal to make Spring applications deployable without changing one line of configuration or code in most cases. Pro Spring MVC

4. One effective strategy is to automate this process in Jenkins in the deployment build job, and then to save both the database snapshot and the deployable binary file as artifacts. Jenkins The Definitive Guide

5. A Smarter Hub: The Event Switch An event switch enhances event-based architectures by making them more modular and more deployable. Testable JavaScript

6. For example, you might want to constrain individual apps to be deployable to specific server farms, but you might not want apps to know about server farms and vice versa. Spring in Practice

7. Take a special note of the scope definitions of JUnit and JMock so as to not include them in your final deployable JAR. Storm Real-Time Processing Cookbook

8. Compile the sources, set up a deployable application, and copy the contents into the Tomcat deployment directory. Java 7 Recipes A Problem-Solution Approach

9. The resulting package will then be deployable into a compliant application server. Pro JPA2

10. One way of doing this is to configure each bean in a separate configuration class (or XML file) and then make a build-time decision (perhaps using Maven profiles) about which to compile into the deployable application. Spring in Action 4th Edition

# 1634、单词 denormalize 的匹配文本：

1. Figure 14.4 To get classifiable data, training examples are constructed from several sources to denormalize everything into a single record that describes what happened. Mahout in Action

2. If you denormalize the data by combining the tables and add an index on (account_type, published), you can write the query without a join. High Performance MySQL 3rd Edition

3. With that sort of data, you want to denormalize as much as you possibly can. CouchDB The Definitive Guide

4. Deciding when to normalize and when to denormalize can be difficult: typically, normalizing makes writes faster and denormalizing makes reads faster. MongoDB The Definitive Guide 2nd Edition

5. To avoid having to process the entire dataset, we could denormalize the storage model by adding backward links. Graph Databases

6. New features increases query complexity; now we have too many joins Denormalize your data to reduce joins. Hadoop：The Definitive Guide 3rd Edition

7. The question is, wouldn’t it be good to trade relational features permanently for performance? You could denormalize (see the next section) the data model and avoid waits and deadlocks by minimizing necessary locking. HBase：The Definitive Guide

8. Performing joins on the client should be a very rare case; you really want to duplicate (denormalize) the data instead. Cassandra The Definitive Guide

9. The second major difference between Lucene and databases is that Lucene requires you to flatten, or denormalize, your content when you index it. Lucene in Action 2nd Edition

10. In this case, because MongoDB doesn’t support joins, we’ve elected to denormalize the parent category names in each child document. MongoDB in Action

# 1635、单词 tunable 的匹配文本：

1. This TCP source has some additional tunable options over the standard TCP syslog source, which you may want to tune. Apache Flume Distributed Log Collection for Hadoop

2. Tunable Items for Cluster and Jobs Hadoop Core is designed for running jobs that have large input data sets and medium to large outputs, running on large sets of dissimilar machines. Pro Hadoop

3. We implement this in a way that is tunable at the application level. Building LinkedIn’s Real-time Activity Data1

4. Using PooledExecutor " A tunable worker thread pool " Main method execute(Runnable r) " Controls for: Scalable IO in Java

5. With Cassandra, which has tunable consistency, writes will use a. Storm Blueprints Patterns for Distributed Real-time Computation

6. Chapter 4, Performance Tuning: Many configuration knobs and tunable settings exist for Cassandra. Cassandra High Performance Cookbook

7. Riak’s solution is based on Amazon Dynamo’s novel approach of a tunable AP system. A Little Riak Book

8. The number of threads is stored in a tunable parameter, numberOfThreads, so that it can be adjusted to fit the VM and network stack. Java Network Programming 4th Edition

9. In extreme cases, the Solaris kernel tunable rechoose_interval can be increased as a means to reduce thread migrations. Java Performance

10. The trade-offs that obtain the performance advantages of worker threads have several additional tunable parameters, usage consequences, and programming obligations that can impact the design and use of worker thread classes (including those contained in the util.concurrent package available from the online supplement) Concurrent Programming in Java Design Principles and Pattern

# 1636、单词 jtable 的匹配文本：

1. On the other hand, the JList class is consistent with the JTree and JTable classes where this generality is useful. Core Java Volume II Advanced Features 9th Edition

2. The component I used in this recipe is a JTable that contains this built-in print() method. Java 7 Recipes A Problem-Solution Approach

# 1637、单词 greenplum 的匹配文本：

1. As scale increases, you’re likely to have to commit to a parallel extraction architecture, such as Hadoop, or a commercially supported system like Aster Data, Vertica, or Greenplum. Mahout in Action

2. The success of MR led to a wide range of third-party implementations (notably open-source Hadoop [15]), and a number of hybrid systems that combine parallel DBMSs with MR, offered by vendors like Aster, Cloudera, Greenplum, and Vertica. Dremel - Interactive Analysis of WebScale Datasets

3. Don would like to thank the support he got from coworkers at Greenplum, who provided slack in my schedule to work on this project, moral support, and technical suggestions. MapReduce Design Patterns

4. Using HDFS in a Greenplum external table Greenplum is a parallel database that distributes data and queries to one or more PostgreSQL instances. Hadoop RealWorld Solutions Cookbook

5. Over time, however, the differences between relational databases and MapReduce systems are likely to blur—both as relational databases start incorporating some of the ideas from MapReduce (such as Aster Data’s and Greenplum’s databases) and, from the other direction, as higher-level query languages built on MapReduce (such as Pig and Hive) make MapReduce systems more approachable for traditional database programmers.5 Hadoop：The Definitive Guide 3rd Edition

6. All of them except Aster Data and Greenplum are open source in some way. Hadoop in Action

7. A number of vendors have such offerings now, including Greenplum, AsterData, Paraccel and Vertica. Tenzing - A SQL Implementation On The MapReduce Framework

8. Venture capitalists are very much aware of this trend, and have funded no fewer than a dozen new companies in recent years that build specialized analytical data management software (e.g., Netezza, Vertica, DATAllegro, Greenplum, Aster Data, Infobright, Kickfire, Dataupia, ParAccel, and Exasol), and continue to fund them, even in pressing economic times [18] HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads

1. Cloud-init is an open source project, and the source code is available on Launchpad. bk-compute-adminguide-grizzly

2. Trunk versions of the code are referred to by their Launchpad commit revision number (or “revno”) Deploying OpenStack

3. You can view existing bugs and report bugs in the Launchpad Bugs area. bk-admin-guide-cloud-latest

5. If you find a bug and can’t fix it or aren’t sure it’s really a doc bug, log a bug at OpenStack Manuals (http://bugs.launchpad.net/openstack-manuals) OpenStack Operations Guide

# 1639、单词 clickable 的匹配文本：

1. Clickable report URLs Navigating to the reports directory and double-clicking the HTML index file can become tedious over time. Gradle in Action

2. By following this REST API you can easily automate tasks that so far have been only possible via a clickable interface. RabbitMQ in Action

3. The results list, which appears below the search panel, is clickable and transfers you to a more detailed screen allowing to resolve the review or to reassign it. Sonar Code Quality Testing Essentials

4. Every job in every list (running, completed, and failed) is “clickable,” which enables you to get additional information about job execution. Professional Hadoop Solutions

5. The facets are typically displayed with clickable links that apply Solr filter queries to a subsequent search. Solr 3 Enterprise Search Server

6. First, let’s introduce a new trait, Clickable, an abstraction for any widget that responds to clicks: Programming Scala

7. If you look closely at the footer of each Roo page in a web browser, you’ll see two clickable links for these themes. Spring Roo in Action

# 1640、单词 overridable 的匹配文本：

1. Overridable—Type classes allow you to override a default implementation through the implicit system. Scala in Depth

2. Constructor calls overridable method To better allow inheritance and provide a healthy framework, free of bugs, calling overridable methods in class constructors is not acceptable and can cause many problems from exceptions to inconsistent object state. Sonar Code Quality Testing Essentials

3. In other words, the class must document its self-use of overridable methods. Effective Java 2nd Edition

4. Optimizing for extensibility entails removing hard-wired decisions and instead allowing them to vary, for example by encapsulating them as overridable methods, supporting callback hooks, or abstracting functionality via interfaces that can be re-implemented in completely different ways by dynamically loaded components. Concurrent Programming in Java Design Principles and Pattern

5. This setting cannot currently be overridden, but the intent is that it be overridable in future releases. Pro JPA2

# 1641、单词 pcollection 的匹配文本：

1. The central class of the FlumeJava library is PCollection, a (possibly huge) immutable bag of elements of type T. FlumeJava - Easy, Efficient Data-Parallel Pipelines

2. As you can see in figure 12.5, the parallelDo methods that you saw on the PCollection interface all take either a PType or PTableType argument, depending on whether the result was a PCollection or PTable. Hadoop in Practice

# 1642、单词 executables 的匹配文本：

1. On Windows, you can use third-party wrapper utilities that turn JAR files into Windows executables. Core Java Volume I Fundamentals 9th Edition

2. Make these two scripts executables by running the following command : bk-compute-adminguide-grizzly

3. You can refresh the servicelevel authorization for the NameNode and JobTracker without restarting the Hadoop daemons using the –refreshServiceAcl command switch on the dsfadmin (for NameNode) and mradmin (for JobTracker) executables. Professional Hadoop Solutions

4. Exec is used to execute arbitrary commands from the agent and it is convenient to have a standard default path set to look for executables: Managing Infrastructure with Puppet

5. Hence, the scripts or the executables for reducer programs should keep track of the last seen key of the input records to demarcate between key groups. Hadoop MapReduce Cookbook

6. Files and directories are installed according to the FHS; configuration files are in /etc/hadoop, logs in /var/log/hadoop, executables are in /usr/bin, and so forth. Hadoop Operations

7. In a similar way, there are products available that precache shared libraries (DLLs) and even executables in memory. Java Performance Tuning 2nd Edition

8. It supports external executables via its stream command and MapReduce JARs via its mapreduce command. Programming Pig

9. For example, the executables that you just extracted and found in the bin directory can’t be executed from anywhere except the bin directory by default. The Definitive Guide to MongoDB

10. To see more on how to create .jar file executables, see recipe 14-22 Java 7 Recipes A Problem-Solution Approach

# 1643、单词 malloc 的匹配文本：

1. Inside the non-Java code, C’s malloc( ) family of functions might be called to allocate storage, and unless you call free( ), that storage will not be released, causing a memory leak. Thinking in Java 4th Edition

2. Internal JVM memory management is, to a large extent, kept off the Java heap and allocated natively in the operating system, through system calls like malloc. Oracle JRockit The Definitive Guide

3. An OutOfMemoryError if the call to malloc fails Finally, to demonstrate how to check for an exception when calling a Java method from a native method, we send the string to the stream, a character at a time, and call ExceptionOccurred after each call. Core Java Volume II Advanced Features 9th Edition

4. Each object creation is roughly as expensive as a malloc in C, or a new in C++, and there is no easy way of creating many objects together, so you cannot take advantage of efficiencies you get using bulk allocation. Java Performance Tuning 2nd Edition

5. People loved the simplicity of the language, the portability of bytecodes, and the safety of garbage collection (versus traditional malloc/free memory management of other systems) Java Performance

6. If you want your allocation to persist past that, use my_malloc( ) Understanding MySQL Internals

# 1644、单词 outliers 的匹配文本：

1. With stacked graphs and a single metric view on every node at a cluster level, outliers will stick out easily. Monitoring with Ganglia

2. We could find the outliers in each grade as follows: MongoDB The Definitive Guide 2nd Edition

3. Finding outliers is an important part of data analysis because these records are typically the most interesting and unique pieces of data in the set. MapReduce Design Patterns

4. Trim Outliers from the Audioscrobbler dataset using Pig and datafu. Hadoop RealWorld Solutions Cookbook

5. There are always outliers that will cause your data to be skewed, and these outliers can significantly impede the progress of your MapReduce jobs. Hadoop in Practice

6. This will work for the majority of users, but there will be outliers that will have magnitudes of emails more in their inbox—so many, in fact, that a single row could outgrow the maximum file/region size and work against the region split facility. HBase：The Definitive Guide

7. Monitoring the network profile of jobs, detecting outliers, and tuning appropriately is usually required. Hadoop Operations

8. These outliers may be caused due to full garbage collections, database check pointing, network glitches, and so on. Java Performance

9. If you see high variance on each run you may want to run the test 3 or more times and discard the outliers (keeping the middle result) Lucene in Action 2nd Edition

10. Outliers are caused by, for example, exponential backoff on conflicts and Bigtable tablet unavailability. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications

# 1645、单词 slas 的匹配文本：

1. We would like to acknowledge a few people who were helpful in bringing this system to production: David DeMaggd was responsible for the operation and rollout of LinkedIn’s Kafka infrastructure, John Fung was responsible for performance and quality testing, Rajappa Iyer and others on the data warehouse team helped with data model definition and conversion of the warehouse to use this pipeline as well as helping define SLAs and monitoring requirements. Building LinkedIn’s Real-time Activity Data1

2. The results of performance testing can verify whether the application will be able to comply with the proposed Service Level Agreements (SLAs) Pro Spring MVC

3. Many applications have Service Level Agreements, or SLAs, which define contractually how well they should perform. Jenkins The Definitive Guide

4. In an automated and auto-recovering environment such as Oozie, a traditional SLA may not be applicable, whereas some specific SLAs can make sense. Professional Hadoop Solutions

5. You don’t want to run MapReduce jobs on the same cluster that serves your low-latency queries, at least not when you expect to maintain OLTP-style service-level agreements (SLAs)! Your online access will suffer. HBase in Action

6. Access is less user-driven, and therefore, SLAs are geared more toward overall runtime, as opposed to per-request latencies. HBase：The Definitive Guide

7. Dynamo was born, as were many of the systems described in this chapter, from the need to honor strict requirements for realizing high performance under continuous growth, meeting service-level agreements (SLAs), remaining available under strenuous load and failures, gracefully handling those failures, and allowing horizontal scale. Cassandra The Definitive Guide

8. What Is Resource Management? In a perfect world, multiple groups of users, each with jobs with different service level agreements (SLAs), would be able to coexist on a shared system, blissfully unaware of one another. Hadoop Operations

# 1646、单词 numer 的匹配文本：

1. Thus, given this code the Scala compiler will generate a class with two Int fields, one for numer and one for denom. Programming in Scala 2nd Edition

# 1647、单词 inefficiencies 的匹配文本：

1. Instead, interfaces afford most of the benefits of multiple inheritance while avoiding the complexities and inefficiencies. Core Java Volume I Fundamentals 9th Edition

2. This module dives a little deeper into how the memory is being used and can help to point out memory inefficiencies. Monitoring with Ganglia

3. This leads to some inefficiencies since all topics would have at least two copies of the data, one for the real-time consumer and one for the batch log aggregation service. Building LinkedIn’s Real-time Activity Data1

4. Giraph leverages the resource management infrastructure of Hadoop and HDFS for data storage, but it works around the inefficiencies of using MapReduce for BSP. Professional Hadoop Solutions

5. Problem You want to determine if a job runs slowly due to inefficiencies in your code. Hadoop in Practice

6. The previous format had inefficiencies in the index strategy, read paths, and internal APIs. Hadoop in Action

7. These VMs may have huge inefficiencies, even in such basic operations as casting between different numeric types, as was the case with one development VM I used. Java Performance Tuning 2nd Edition

8. The SOAP Message Transmission Optimization Mechanism (MTOM) together with XML-binary Optimized Packaging (XOP) were proposed to address the inefficiencies encountered in the transmission of binary data in SOAP documents. Java Performance

9. In addition, our control over Bigtable’s implementation, and the other Google infrastructure upon which Bigtable depends, means that we can remove bottlenecks and inefficiencies as they arise. Bigtable - A Distributed Storage System for Structured Data

10. One of the inefficiencies of Percolator relative to a MapReduce-based system is the number of RPCs sent per work-unit. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications

# 1648、单词 matthew 的匹配文本：

1. In his book Imperfect C++, Matthew Wilson uses an analogy of comparing the compiler to a batman. Scala in Depth

2. Matthew McCullough is an energetic 15 year veteran of enterprise software development, open source education, and co-founder of Ambient Ideas, LLC, a Denver consultancy. Jenkins The Definitive Guide

3. In particular, we owe a thank you to Matthew Sackman and Matthias Radestock, without whom the chapters on clustering and RabbitMQ internals would not have been possible. RabbitMQ in Action

4. Matthew's research interests include search engines, distributed computing, image processing, computer vision, and machine learning. Cassandra High Performance Cookbook

5. Additional thanks go to my friend, Matthew McCullough, for his early contributions to the chapter on Build Hooks. Gradle Beyond The Basics

6. Also thanks are due to Andrew Ryan, Matthew Welty and Paul Tuckfield for doing a lot of work on operations, monitoring and the statistics setup that makes these tasks easy. Apache Hadoop Goes Realtime at Facebook

7. To my children Kaitlyn, Jacob, Matthew, and Zachary: please stop growing up! I love you all so much and enjoy having such wonderful children. Java 7 Recipes A Problem-Solution Approach

8. It goes deeper than this, as explained in this introductory book by Matthew and Tim, but modeling by convention is truly a game changer for enterprise software development. Building and Testing with Gradle

# 1649、单词 contravariance 的匹配文本：

1. If we want to make use of covariance or contravariance, stick to immutable classes, or expose your mutable class in an immutable interface. Scala in Depth

2. In the case of covariance, subtyping can go downward, as you saw in the example of List, but in contravariance it’s the opposite: subtypes go upward. Scala in Action

3. Sometimes covariance and contravariance are mixed in the same type. Programming in Scala 2nd Edition

4. Similarly, you can ask Scala to support contravariance on your types. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine

5. A - prefix on the type symbol is used to indicate contravariance. Programming Scala

6. In this mode, I worry about view bounds, covariance and contravariance, implicit conversions, and so on. Beginning Scala

7. Contravariance of functions Assume we have an object f of type Function1[A,B] Steps in Scala An Introduction to Object-Functional Programming

8. In effect, the contravariance and covariance cancel each other out. Java SE 8 for the Really Impatient

# 1650、单词 flexibly 的匹配文本：

1. In summary, what we require is a scheduler architecture that can accommodate both types of jobs, flexibly support job-specific policies, and also scale to an ever-growing amount of scheduling work. Omega - flexible, scalable schedulers for large compute clusters

2. For example, it has features that let you simulate real users more flexibly, by controlling such parameters as ramp-up time. High Performance MySQL 3rd Edition

3. With these tools in your toolbox, it’s simple to produce the artifacts you need and flexibly react to new requirements for your delivery process. Gradle in Action

4. Producers and consumers of information could now be completely decoupled and flexibly mixed on-the-fly. RabbitMQ in Action

5. A Sawzall program can flexibly specify the mapper part of a MapReduce, as long as the mappers are pure functions. FlumeJava - Easy, Efficient Data-Parallel Pipelines

6. Later, you will see how this simple fact makes it easy to scale flexibly as your. Elasticsearch The Definitive Guide

7. The design allows the intercomponent communication to be based on a local or remote call, which allows components to be placed very flexibly. Java Performance Tuning 2nd Edition

8. In the simplest kind of data file (using text format), fields can be flexibly interpreted as strings, numbers, timestamps, or other kinds of values. Cloudera Impala

9. By convention, we name the non-public version of any method method as doMethod.) Somewhat less flexibly, these methods need not be declared non-public if they are instead designed to be overridden in subclasses. Concurrent Programming in Java Design Principles and Pattern

10. One final note about enumerated types is that they are defined quite flexibly in Java. Pro JPA2

# 1651、单词 cep 的匹配文本：

1. Complex event processing (CEP) systems support holistic processing of data from multiple sources. Professional Hadoop Solutions

2. If you are familiar withcomplex event processing (CEP), you can think of Storm tuples as events. Storm Blueprints Patterns for Distributed Real-time Computation

3. Drools also includes a module called Drools Fusion that essentially supports Complex Event Processing (CEP) Storm Real-Time Processing Cookbook

4. With a large physical network, we might use Complex Event Processing (CEP) to process streams of low-level network events, updating the graph only when the CEP solution raises a significant domain event. Graph Databases

5. Other containers already based on Spring DM, such as Oracle’s CEP product and SpringSource’s dm Server, will almost certainly support Blueprint as they move to the Spring DM 2.0 codebase. Spring Dynamic Modules in Action

6. Real time: Messages produced by the producer threads should be immediately visible to consumer threads; this feature is critical to event-based systems such as Complex Event Processing (CEP) systems. Apache Kafka

7. This style of application design makes it possible to introduce such concepts as complex event processing (CEP) ActiveMQ in Action

# 1652、单词 cmp 的匹配文本：

1. Should you use container-managed persistence (CMP) or bean-managed persistence (BMP)? This is one of the most frequently discussed questions about EJBs. Java Performance Tuning 2nd Edition

2. Container-managed persistence (CMP) allows enterprise developers to define relationships between entity beans. Java Performance

3. Both simultaneous multithreading (SMT) and chip multiprocessor (CMP) architectures target thread-level parallelism and should improve the performance of many of our servers. Web search for a planet the google cluster architecture

4. The term entity beans refers to objects that were created using EJB 2.1-style container-managed persistence (CMP) Pro JPA2

# 1653、单词 cvs 的匹配文本：

1. For example, out of the box you can only configure a build job that pulls the source code from a project hosted on CVS or Subversion and invoke an Ant script. Gradle in Action

2. Jenkins comes with support for Subversion and CVS out of the box, but you will need to install the Jenkins Git plugin to be able to complete the rest of this tutorial. Jenkins The Definitive Guide

3. It is relatively easy to set up (you only have to set it up once!) and has good integration with CVS, Subversion, Git (and other source control systems), and Bugzilla. Testable JavaScript

4. You can obviously easily use whatever version control system suits your environment, for example many people use Subversion or CVS for the same purpose. Pro Puppet

5. This tag is often used in conjunction with the automated version-numbering capabilities of a version control system, such as SCCS, RCS, or CVS. Java in a Nutshell 5th Edition

# 1654、单词 cdata 的匹配文本：

1. If the parameter slowmatch=true is provided, the framework will attempt to exclude recognizing the beginning and ending text if they are within a CDATA block. Pro Hadoop

2. In the example, we see one file with two fields; the identifier and some HTML data nested in the CDATA section. Solr 3.1 Cookbook

3. An NMTOKEN (or name token) is similar to CDATA, but most nonalphanumeric characters and internal whitespace are disallowed, and the parser removes leading and trailing whitespace. Core Java Volume II Advanced Features 9th Edition

4. You can also generate tags, text, cdata, and so on from Scala code: Beginning Scala

5. This interface represents a CDATA section in an XML document. Java in a Nutshell 5th Edition

6. In case it is absolutely necessary to include some XML markup verbatim in another XML document, then one can use a CDATA section. Steps in Scala An Introduction to Object-Functional Programming

7. In the following code, notice hand-coded JavaScript code (inside the CDATA tag) that will position the second, minute, and hour hands of the clock based on the current time of day. Java 7 Recipes A Problem-Solution Approach

8. Query strings can also be expressed as CDATA within the query element. Pro JPA2

9. In the example we see one file with two fields, the identifier and some HTML data nested in the CDATA section. Apache Solr 4 Cookbook

# 1655、单词 monoids 的匹配文本：

1. We choose tomonoid1 start with monoids because they are very simple and because they are ubiquitous. Functional Programming in Scala

# 1656、单词 dto 的匹配文本：

1. Now think about how many times you’ve created a data transfer object (DTO) with only accessors for the purpose of wrapping some data. Scala in Action

2. Domain Objects or Data Transfer Objects? Most of the time you don’t need to rely on DTO for shipping data between different layers. Pro Spring 3

3. The DTO’s fields need to be public in order for data binding to work, so that’s what you do at C. Spring in Practice

4. This will contain the FixMessageDto object that is generated by the Emitter, as shown in the following code: Storm Blueprints Patterns for Distributed Real-time Computation

# 1657、单词 europe 的匹配文本：

1. In the United States, the week starts with Sunday and ends with Saturday, whereas in Europe, the week starts with Monday and ends with Sunday. Core Java Volume I Fundamentals 9th Edition

2. During the 1980s, he specialized in database development in Europe. Pro Hadoop

3. Marc Meurrens put in a great deal of effort to publicize and make the electronic version of the 1st edition of the book available in Europe. Thinking in Java 4th Edition

4. It is now often hard to tell the inhabitant of one continent from another and today the inhabitants of the picturesque towns and villages in the Slovenian Alps or Balkan coastal towns are not readily distinguishable from the residents of other parts of Europe. Gradle in Action

5. For example, an application might store each end-user’s data in its own directory, which would enable user A’s data to have three replicas in Europe, and user B’s data to have five replicas in North America. Spanner - Google’s Globally-Distributed Database

6. It also includes the JVM’s default time zone, CET, which is Central Europe Time in our case. Java 8 in Action Lambdas, Streams and Functional-style Programming

7. He now works for Cloudera as a Solutions Architect to support Hadoop and HBase in and around Europe through technical support, consulting work, and training. HBase：The Definitive Guide

8. This input stream reader assumes the default character encoding used by the host system, such as the ISO 8859-1 encoding in Western Europe. Core Java Volume II Advanced Features 9th Edition

9. These animals are sociable and domesticated easily, and in Europe, a related species was once trained to catch fish for people to eat. Java Network Programming 4th Edition

10. This hornet can be found throughout Europe and much of Asia, adapting its hive-building techniques to different climates when necessary. Programming Hive

# 1658、单词 edu 的匹配文本：

1. This hierarchical structure is broken up by the type of address (either .net, .com, .gov, .edu, .mil, or one of the newer addresses such as .info or .biz) or by the country (.au, .uk, among many others) Java Network Programming and Distributed Computing

2. As a matter of fact, due to the challenges and novelty, of Hadoop cluster performance tuning, the research community has recent projects and publications about learning and tuning the performance of a Hadoop cluster (for example, the starfish project at http://www.cs.duke.edu/starfish/) Hadoop Operations and Cluster Management Cookbook

3. This excellent paper describes the process in more detail: http://dig.cs.illinois.edu/papers/lambda-Refactoring.pdf. Java 8 in Action Lambdas, Streams and Functional-style Programming

4. For recipes in this chapter, we will use the Amazon product co-purchasing network metadata dataset available from http://snap.stanford.edu/data/amazon-meta.html. Hadoop MapReduce Cookbook

5. Metric Association (http://lamar.colostate.edu/~hillger), only three countries in the world have not yet officially adopted the metric system: Liberia, Myanmar (Burma), and the United States of America. Core Java Volume II Advanced Features 9th Edition

6. The name of any package that will be used outside your organization should begin with your organization’s Internet domain name with the top-level domain first, for example, edu.cmu, com.sun, gov.nsa. Effective Java 2nd Edition

7. For example, this fragment connects the channel to rama.poly.edu on port 19: Java Network Programming 4th Edition

8. For example, the JAVAR compiler (http://www.extreme.indiana.edu/hpjava/) is a prototype compiler that automatically parallelizes parts of a Java application to improve performance. Java Performance Tuning 2nd Edition

9. There is also a project to port Hive to Spark, called Shark (http://shark.cs.berkeley.edu/) Programming Hive

10. There are global objects java, javax, javafx, com, org, and edu that yield package and class objects via the dot notation. Java SE 8 for the Really Impatient

# 1659、单词 epochs 的匹配文本：

1. If you were using epochs, you could compute the value for midnight of the last seen date. HBase：The Definitive Guide

2. Map epochs allow communicating parties to agree on what the current distribution of data is, and to determine when their information. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.

3. The use of epochs and counters will become clear when we discuss Zab, the protocol we use to broadcast state updates to servers. ZooKeeper Distributed Process Coordination

4. These steps are necessary to guarantee that once the prospective leader completes Phase 1, none of the followers in Q accept proposals from earlier epochs. Zab High-performance broadcast for primary-backup systems

1. You have a payroll system that processes salaries for full-time employees in the United States and Canada: Scala in Action

2. Now all objects that require an Arm will get Mexico’s version instead of Canada’s without changing any other code. Testable JavaScript

3. Unlike JCE, however, there are still two different versions of JSSE: one for domestic use (use within the United States and Canada) and one for global use. Java Security 2nd Edition

4. Due to its reliability as a heavy draft horse, by the early twentieth century, the Clydesdale was exported to many countries, including Australia, New Zealand, Canada, and the United States. HBase：The Definitive Guide

5. Everyone on the planet, with the exception of the United States and Canada, uses ISO 216 paper sizes. Core Java Volume II Advanced Features 9th Edition

6. These small carnivores are found in all major waterways of the United States and Canada, and in almost every habitat except the tundra and the hot, dry regions of the southwestern United States. Java Network Programming 4th Edition

7. Our HR people often run queries with WHERE clauses that restrict the results to a particular country or to a particular first-level subdivision (e.g., state in the United States or province in Canada) Programming Hive

8. He is employed as an architect at Oracle in Ottawa, Canada, and lives with his wife Darleen, their four kids, and his wife’s dog. Pro JPA2

9. This update tells MongoDB to find a document where the username is smith, and then to set the value of the country property to Canada. MongoDB in Action

10. Joe has designed and deployed several clouds at Cybera, where, as a non-profit, they are building e-infrastructure to support entrepreneurs and local researchers in Alberta, Canada. OpenStack Operations Guide

# 1661、单词 bgsave 的匹配文本：

1. Any Redis client can initiate a snapshot by calling the BGSAVE command. Redis in Action

2. Due to Windows’ limitations, Redis MinGW builds execute operations such as BGSAVE and BGREWRITEAOF in the foreground (thus blocking the Redis process) and Cygwin builds don’t use CoW, which makes background operations very slow, particularly for large database sizes. Redis Cookbook

# 1662、单词 novaclient 的匹配文本：

1. Nova CLI The nova command provided by the OpenStack python-novaclient package is the basic command line utility for users interacting with OpenStack. bk-compute-adminguide-grizzly

2. The OpenStack python-novaclient package provides a basic command line utility, which uses the nova command. bk-admin-guide-cloud-latest

3. OpenStack command-line clients For scripting work, you can use a command-line client like the python-novaclient client. api-quick-start-onepager

4. You can create and manage flavors with the nova flavor-* commands provided by the python-novaclient package. admin-user-guide-trunk

5. For example, the Python bindings for the Compute API are bundled with the python-novaclient package. user-guide

6. View and update Compute quotas for a tenant (project) As an administrative user, you can use the nova quota-* commands, which are provided by the python-novaclient package, to view and update tenant quotas. OpenStack Operations Guide

# 1663、单词 classifiable 的匹配文本：

1. Here we go into the details of feature extraction, including how to preprocess raw data into classifiable data and how to convert classifiable data into vectors that can be used by the Mahout classification algorithms. Mahout in Action

# 1664、单词 mxbean 的匹配文本：

1. Use the getPlatformMXBean method with the MXBean type needed for the application. Java 7 New Features Cookbook

2. This MXBean interface defines methods for determining how many classes are currently loaded in the Java VM, how many have ever been loaded, and how many have ever been unloaded. Java in a Nutshell 5th Edition

# 1665、单词 extents 的匹配文本：

1. To get rid of empty extents and repack collections efficiently, use the compact command: MongoDB The Definitive Guide 2nd Edition

2. Free block extents on disk are binned by size and sorted by location, allowing EBOFS to quickly locate free space near the write position or related data on disk, while also limiting long-term fragmentation. Ceph A Scalable, High-Performance Distributed File System

3. Its features are similar to those of ext4; for example, both have extents (grouping contiguous blocks together, reducing the number of blocks required to maintain per file) and the aforementioned delayed allocation. HBase：The Definitive Guide

4. Our prototype implementation exposes an object interface in which byte extents can be read or written (much like a file), as that was our initial requirement for Ceph. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.

5. Similar to ext4, allocation is extent-based, but its extents are within allocation groups, each of which is responsible for maintaining its own inode table and space. Hadoop Operations

6. Technically, collections are allocated space inside each data file in chunks called extents. MongoDB in Action

# 1666、单词 america 的匹配文本：

1. Long-term investments in science and education benefit us all; in that spirit, all proceeds from the sales of this book will be donated to Scholarship America, a charity that to date has helped 1.7 million students follow their dreams of going to college. Monitoring with Ganglia

2. For example, an application might store each end-user’s data in its own directory, which would enable user A’s data to have three replicas in Europe, and user B’s data to have five replicas in North America. Spanner - Google’s Globally-Distributed Database

3. These small amphibians, only 1–1.5 inches long, can be found on the coastal plains of North America from North Carolina to central Florida and eastern Louisiana. Jenkins The Definitive Guide

4. In a recent study by the Tech America Foundation, it was noted that medical researchers have demonstrated that Big Data analytics can be used to aggregate information from cancer patients to increase treatment efficacy. Professional Hadoop Solutions

5. Java, and Java-related logos, marks and names are trademarks or trademarks of Oracle America, Inc. Java EE 7 Specification

6. Metric Association (http://lamar.colostate.edu/~hillger), only three countries in the world have not yet officially adopted the metric system: Liberia, Myanmar (Burma), and the United States of America. Core Java Volume II Advanced Features 9th Edition

7. For the purposes of this Agreement:  "Independent Implementation" shall mean an tation of the Specification that neither derives from any of Specification Lead's  source code or de materials nor, except with an appropriate and separate license from Specification Lead, ny of Specification Lead's  source code or binary code materials; "Licensor Name Space" shall public class or interface declarations whose names begin with "java", "javax", "com.sun" and le”  or their equivalents in any subsequent naming convention adopted by Oracle America, Inc. Java EE 7 Web Profile Specification

8. ISPs get their IP addresses from one of four regional Internet registries (the registry for North America is ARIN, the American Registry for Internet Numbers), which are in turn assigned IP addresses by the Internet Corporation for Assigned Names and Numbers (ICANN) Java Network Programming 4th Edition

9. If for example you look at a global projection of the Earth on Google maps, and compare it to the spherical projection in Google Earth, you will see Greenland in Google maps rectangular projection about the size of North America, whereas in Google Earth, it's about 1/3 the size. Lucene in Action 2nd Edition

10. The European hornet is the only hornet in North America, introduced to the continent when European settlers migrated to the Americas. Programming Hive

# 1667、单词 vectorizer 的匹配文本：

1. Table 8.2 Important flags for the Mahout dictionary-based vectorizer and their default values. Mahout in Action

# 1668、单词 compositional 的匹配文本：

1. Let’s look at the pros and cons of each compositional method in the following table: Scala in Depth

2. Using algebraic data types such as  and , we can handle errors inOption Either a way that is modular, compositional, and simple to reason about. Functional Programming in Scala

3. Note that in most object-oriented languages, you would express this compositional dependency with member fields, especially if your language doesn’t support mixin composition, like Java. Programming Scala

4. Scala’s compositional rules are very powerful tools for defining very complex class hierarchies and for specifying the rules for composing classes as well as the rules for passing parameters into methods. Beginning Scala

5. The input itself can be as simple as _.isFolder is or it can be the outcome of a more compositional approach, for example. Steps in Scala An Introduction to Object-Functional Programming

6. A compositional approach to layering concurrency control is described in: Concurrent Programming in Java Design Principles and Pattern

# 1669、单词 categorization 的匹配文本：

1. The data was originally collected and labeled by Carnegie Group and Reuters in the course of developing the CONSTRUE text categorization system. Mahout in Action

2. You can achieve categorization by grouping the elements together inside an interface and creating an enumeration based on that interface. Thinking in Java 4th Edition

3. Some of the more popular ML techniques that are relevant to our discussion are collaborative filtering for providing item- and user-based recommendations, clustering (of seen content) based on similarities deduced, and categorization (of unseen content and users) for the purposes of shoe-horning that content and those users into existing clusters. Tika in Action

4. For example, suppose you wanted to move categorization code out of the main Database file and into its own. Programming in Scala 2nd Edition

5. The log type is important for later processing and categorization. Storm Real-Time Processing Cookbook

6. Here, each data entry includes an ID, title, categorization, similar items to this item, and information about users who has brought the item. Hadoop MapReduce Cookbook

7. Type A categorization of allowed states and operations on those states, including transformations from one state to another. Programming Scala

8. The LIMIT operator defies categorization because it’s certainly not a read/write operator but it’s not a true relational operator either. Hadoop in Action

9. The Dewey decimal system for categorizing items in a library collection is a classic example of a hierarchical categorization scheme. Lucene in Action 2nd Edition

# 1670、单词 nonfinal 的匹配文本：

1. When we have a nonfinal (mutable) field, each time a thread changes the value, we have to consider whether we have to put the change back to the memory or leave it in the registers/cache. Programming Concurrency on the JVM

2. Scala can’t optimize every tail recursion—it can optimize functions but not nonfinal methods. Scala in Action

3. This technique should be considered for every nonfinal public class that has a finalizer. Effective Java 2nd Edition

4. The visible initial default values of nonfinal fields are zero for scalars and null for references. Concurrent Programming in Java Design Principles and Pattern

# 1671、单词 jls 的匹配文本：

1. The technical specification, conveniently available as an electronic document: http://java.sun.com/docs/books/jls. Thinking in Java 4th Edition

2. More information about where you can use annotations in your code can be found here: http://docs.oracle.com/javase/specs/jls/se8/html/jls-9.html#jls-9.7.4 Java 8 in Action Lambdas, Streams and Functional-style Programming

3. The existing chapters of the JLS and JVMS specify semantics that are at odds with optimizations performed by many existing JVMs. JSR-133 Java Memory Model and Thread

4. For the most part, this book uses technical terms as they are defined in The Java Language Specification, Third Edition [JLS] Effective Java 2nd Edition

5. Specification ("JLS") and the published API documentation should be consulted for more detailed and authoritative descriptions. Concurrent Programming in Java Design Principles and Pattern

# 1672、单词 ified 的匹配文本：

1. When the tests are complete, we create a

with a specific ID and dump the JSON-ified version of all the messages and results in there. Testable JavaScript

2. The Deployer binds the persistence references to container-managed entity managers for persistence contexts of ified type and configured in accordance with their persistence unit, as d in the Java Persistence specification. Java EE 7 Specification

3. Don’t worry about these gory details, because the Spring DM distribution contains the OSGi-ified versions of all these log libraries. Spring Dynamic Modules in Action

# 1673、单词 decrements 的匹配文本：

1. It decrements this counter each time a FileSize message is received with the size for a directory. Programming Concurrency on the JVM

2. The thread decrements the entry count of the monitor associated with objectref. The Java Virtual Machine Specification Java SE 7 Edition

3. MyISAM’s index files contain a counter that MyISAM increments when the table is opened and decrements when it is closed. High Performance MySQL 3rd Edition

4. A dequeue method decrements the pointer and uses its previous value as a key for retrieving the data. Professional Hadoop Solutions

5. Usually, standard instructions such as increments and decrements can be made atomic on most architectures. Oracle JRockit The Definitive Guide

6. Similarly, the -- operator decrements its single numeric operand, which must be a variable, an element of an array, or a field of an object, by one. Java in a Nutshell 5th Edition

7. The hardlink decrements the reference count on the data on disk, and after all clusters have copied and deleted their respective pending hardlinks, the data is removed from the local disk. Hadoop Operations

8. You may be surprised to see steady decrements in the free memory available to your application when you were not expecting any change. Java Performance Tuning 2nd Edition

9. In this recipe, you have developed an application that increments and decrements the balance of a class that simulates a bank account. Java 7 Concurrency Cookbook

10. As each of the two threads finish executing, they call the CountDownLatch’s countDown() method, which decrements the latch’s value by one. Java 7 Recipes A Problem-Solution Approach

# 1674、单词 lat 的匹配文本：

1. That’s why we still need the filters on lat and lon, to discard the results that shouldn’t be included. High Performance MySQL 3rd Edition

2. The getZOrderedCurve() method takes lat and lon strings as arguments. Hadoop RealWorld Solutions Cookbook

3. The principle field type in Solr for geospatial is LatLonType, which stores a single latitude-longitude pair. Solr 3 Enterprise Search Server

4. The expression int(loc.lat) converts loc.lat, a float, to an integer, thereby truncating it to the degree and making it suitable as an index value. Interpreting the Data Parallel Analysis with Sawzall

5. Each document contains one or more fields, each of which is modeled as a particular field type: string, tokenized text, boolean, date-time, lat/long, etc. Solr in action

6. Other missing types include XML, image, and geolocation (the lat-long variety) Hadoop in Action

7. It's based on the solr.LatLonType class which is specially designed for spatial search and is defined by a single attribute – subFieldSuffix. Apache Solr 4 Cookbook

# 1675、单词 millis 的匹配文本：

1. The Ganglia reporting variable is gcTimeMillis() and is visible in the main reporting page for Ganglia, as shown in Figure 6-4 Pro Hadoop

2. The gc count metric is the number of garbage collections, and the gc time millis is the accumulated time spent in garbage collection since the last poll. HBase：The Definitive Guide

3. The setMillisToPopup is your estimation of the time the dialog box needs to pop up. Core Java Volume II Advanced Features 9th Edition

4. Its value was obtained using the getTimeInMillis method executed against an instance of the Calendar class. Java 7 New Features Cookbook

5. Unlike currentTimeMillis( ), the nanoTime() does not return a time relative to any defined. Java in a Nutshell 5th Edition

6. This value is set by the RpcTimeoutIn Millis element (rpc_timeout_in_ms in YAML) Cassandra The Definitive Guide

7. The value of this header uses the standard Java millis time value. ActiveMQ in Action

8. The current time in milliseconds can be obtained from a Calendar object by calling the getTimeInMillis() method against it. Java 7 Recipes A Problem-Solution Approach

9. You can get the length of a Duration in conventional units by calling toNanos, toMillis, toSeconds, toMinutes, toHours, or toDays. Java SE 8 for the Really Impatient

10. The millis field indicates that this query takes more than 14 seconds, and there’s an obvious reason for this. MongoDB in Action

# 1676、单词 enricher 的匹配文本：

1. Figure 5.3 shows how the content enricher collaborates with a repository to convert a simple string to a domain object. Spring Integration in Action

# 1677、单词 mmodule 的匹配文本：

1. The mmodule structure defines everything that gmond needs to know about a module in order for gmond to be able to load the module, initialize it, and call each of the callback functions. Monitoring with Ganglia

# 1678、单词 multilingual 的匹配文本：

1. The characters in the basic multilingual plane are represented as 16-bit values, called code units. Core Java Volume I Fundamentals 9th Edition

2. It’s not uncommon to face projects that use client-side languages like JavaScript that communicate with a mixed, multilingual backend like Java, Groovy, and Scala, which in turn calls off to a C++ legacy application. Gradle in Action

3. We'll look at multilingual data handling, configuring transaction log, and dive even deeper into how ElasticSearch caches work. Mastering ElasticSearch

4. To implement such a multilingual document database, you need a language detection tool like the one shown in figure 7.1 Tika in Action

5. There are some "ICU" Unicode classes for multilingual support, a Chinese stemmer, and a Polish stemmer. Solr 3 Enterprise Search Server

6. Handling multiple languages in a single index There are many examples where multilingual applications and multilingual searches are mandatory—for example, libraries having books in multiple languages. Solr 3.1 Cookbook

7. Multilingual support FIELD COLLAPSING / GROUPING Although Solr requires a flat, denormalized document, Solr allows you to treat multiple documents as a group based on some common property shared by all documents in a group. Solr in action

8. It defines several constant Attribute keys that are commonly used with multilingual text and input methods. Java in a Nutshell 5th Edition

1. In addition non-daemon software related to R (including Rhipe and RHadoop) needs to be installed. Hadoop in Practice

# 1680、单词 pki 的匹配文本：

1. When generating files with the keystone-mange pki_setup command, your best option is to run as the pki user. bk-compute-adminguide-grizzly

2. It is beyond the scope of this book to go deeper into the internals of the SSL protocol or the PKI (Public Key Infrastructure), but for this to work you need to supply tomcat with a keystore, which contains a private/public key pair and a certificate for that public key. Pro Spring MVC

3. Such a setup is often referred to as public key infrastructure or PKI. RabbitMQ in Action

4. Enterprise Security Integration Most businesses have all sorts of security infrastructure in their enterprises, ranging from Public Key Infrastructure (PKI) components for authentication, Active Directory instances, Security Token Services, Attribute Services, and Policy Servers used for authenticating users, providing authorization credentials, and making and enforcing access control decisions. Professional Hadoop Solutions

5. Debug PKI middleware If you receive an Invalid OpenStack Identity Credentials message when you talk to an OpenStack service, it might be caused by the changeover from UUID tokens to PKI tokens in the Grizzly release. bk-admin-guide-cloud-latest

6. If the Openstack cloud is configured to use public-key infrastructure (PKI) tokens, the Python script output looks something like this: user-guide

# 1681、单词 segmented 的匹配文本：

1. These lines are segmented into lists of new immutable strings representing input fields. Mahout in Action

2. MariaDB offers a segmented key cache that avoids this problem. High Performance MySQL 3rd Edition

3. Figure 5.3 shows how a buffer is segmented into three areas by the two pointers. Netty in Action MEAP V08

4. Consider having an algorithm that uses segmented collections instead of a. Java Threads 3rd Edition

5. Production networks typically have network silos where your Hadoop clusters are segmented away from other production applications. Hadoop in Practice

6. Second, the application was segmented into stages: one for parsing, one for rules, and a final stage for binning/collating the data, all via the SubAssembly base class described earlier. Hadoop：The Definitive Guide 3rd Edition

7. More specifically, they wanted to know how their users are segmented, the characteristics and differences of each segment, and to classify each user for targeted marketing. Hadoop in Action

8. Locking is required for updates to a ConcurrentHashMap, but the internal data structure is segmented so that only the segment being updated is locked, and reads and writes can proceed concurrently in other segments. Java in a Nutshell 5th Edition

9. Assuming you've worked out what the maximum heap size should be, then growing the JVM memory can be considered as pure overhead, requiring multiple system calls and resulting in segmented system memory allocation. Java Performance Tuning 2nd Edition

10. Finally, those tokens are added to the index in a segmented architecture. Lucene in Action 2nd Edition

# 1682、单词 hlist 的匹配文本：

1. This HList trait is a marker trait for constructing HLists. Scala in Depth

# 1683、单词 alan 的匹配文本：

1. In an email exchange, Alan Kay discusses the meaning of OOP. Programming Concurrency on the JVM

2. Alan Kay summarized five basic characteristics of Smalltalk, the first successful objectoriented language and one of the languages upon which Java is based. Thinking in Java 4th Edition

3. Baron dedicates this edition to the memory of Alan Rimm-Kaufman, whose great love and encouragement are never forgotten. High Performance MySQL 3rd Edition

4. Alan has a degree, two Master's, and a teaching qualification. Jenkins Continuous Integration Cookbook

5. The success of this campaign was greatly due to the work of Alan Turing, who with his colleagues broke the German encryption algorithm known as Enigma. Java Security 2nd Edition

6. Alan Kay, the inventor of Smalltalk, remarked that in this way the simplest object has the same construction principle as a full computer: it combines data with. Programming in Scala 2nd Edition

7. Scott Hassan and Alan Steremberg have been critical to the development of Google. The anatomy of a large-scale hypertextual Web search engine

8. For a more detailed guide, see Programming Pig by Alan Gates (O’Reilly, 2011) Hadoop：The Definitive Guide 3rd Edition

9. If so, turn to one of the many books on the topic; we recommend Learning SQL by Alan Beaulieu (O’Reilly, 2005) or the opinionated classic, A Guide to the SQL Standard, Fourth Edition, by C. Core Java Volume II Advanced Features 9th Edition

10. About the Author Alan Gates is an original member of the engineering team that took Pig from a Yahoo! Labs research project to a successful Apache open source project. Programming Pig

# 1684、单词 resizes 的匹配文本：

1. However, in a professional application, you should check the resolution of the user’s screen and write code that resizes the frames accordingly: A window that looks nice on a laptop screen will look like a postage stamp on a high-resolution screen. Core Java Volume I Fundamentals 9th Edition

2. The advantage of tmpfs is that it resizes the actual memory usage for the RAM disk, based on utilization. Monitoring with Ganglia

3. Notice that you don’t have to specify (or think about) the size of the Map because it resizes itself automatically. Thinking in Java 4th Edition

4. If you update this variable (even if you set it to its current value), MySQL immediately deletes all cached queries, resizes the cache to the specified size, and reinitializes the cache’s memory. High Performance MySQL 3rd Edition

5. This speeds up resizes down considerably since large runs of zeros won't have to be rsynced. bk-compute-adminguide-grizzly

6. When the JVM adaptively resizes the young generation space, the screen area associated with the young generation spaces updates accordingly. Java Performance

7. Solution Create an application that allows the user to view text with the ability to word wrap when the user resizes the window. Java 7 Recipes A Problem-Solution Approach

# 1685、单词 assignable 的匹配文本：

1. Subtype rules for the reference types in the Java programming language are specified recursively with isJavaAssignable. The Java Virtual Machine Specification Java SE 7 Edition

2. The count( ) method gets the Class of its argument, and uses isAssignableFrom( ) to perform a runtime check to verify that the object that you’ve passed actually belongs to the hierarchy of interest. Thinking in Java 4th Edition

3. The previous tag tells Spring to scan the package as specified but omit the classes that were assignable to the type as specified in the expression (can be either a class or an interface) Pro Spring 3

4. The run-time type of the exception is BlewIt which is not assignable to a variable of type RuntimeException, but is assignable to a variable of type BlewIt, so the output of the example is: The Java Language Specification Java SE 7 Edition

5. EventBus will call the registered subscriber handler methods, taking arguments that are assignable to the event object type. Getting Started with Google Guava

6. It has a single method, is, which takes an implicit Manifest as a parameter and tests to see whether the class of in is assignable from the class contained by the Manifest and accessed using the erasure method. Beginning Scala

7. The type of each expression must be assignable to the element type of the array, of course. Java in a Nutshell 5th Edition

8. Their methods are intrinsically stateless — they do not rely on any assignable fields of any object. Concurrent Programming in Java Design Principles and Pattern

9. Now that you’ve annotated CDPlayer’s constructor with @Autowired, you can be assured that Spring will automatically inject it with a bean assignable to CompactDisc. Spring in Action 4th Edition

1. Core to that are relational databases (e.g., Oracle, MySQL, SQL Server, Teradata, and Netezza) that have been used for decades to serve and store huge amounts of data across all industries. Apache Sqoop Cookbook

2. This is clearly highlighted by the balance sheets of companies like Oracle, Vertica, Teradata, and others. HBase in Action

3. As well as the built-in Sqoop connectors, various third-party connectors are available for data stores, ranging from enterprise data warehouses (including Netezza, Teradata, and Oracle) to NoSQL stores (such as Couchbase) Hadoop：The Definitive Guide 3rd Edition

4. One of the key aims of Tenzing has been to have performance comparable to traditional MPP database systems such as Teradata, Netezza and Vertica. Tenzing - A SQL Implementation On The MapReduce Framework

5. Free connectors exist for Teradata, Netezza, SQL Server, and Oracle (from Quest Software), and are available for download from their respective company websites. Hadoop Operations

# 1687、单词 sut 的匹配文本：

1. Capturing System Performance and Status It is important to capture as much information about the system under test (SUT) as possible while the benchmark runs. High Performance MySQL 3rd Edition

2. A typical setup requires a System Under Test (SUT), consisting of network infrastructure, application servers, and a database server, all residing on different machines. Oracle JRockit The Definitive Guide

3. One important aspect to consider is defining the boundaries of the system under test (SUT, commonly pronounced as “sut”) Java Performance

# 1688、单词 monotonically 的匹配文本：

1. Since the instruction list has monotonically increasing offsets, the merge of the two lists is not defined unless every stack map frame offset has a corresponding instruction offset and the stack map frames are in monotonically increasing order. The Java Virtual Machine Specification Java SE 7 Edition

2. This arrangement allows the metadata concerning what has been consumed from a particular partition by a given consumer group to be a simple eight-byte monotonically increasing message id recording the last message in that partition that has been acknowledged. Building LinkedIn’s Real-time Activity Data1

3. Each database has a single .ns file and several data files, which have monotonically increasing numeric extensions. MongoDB The Definitive Guide 2nd Edition

4. Spanner depends on the following monotonicity invariant: within each Paxos group, Spanner assigns timestamps to Paxos writes in monotonically increasing order, even across leaders. Spanner - Google’s Globally-Distributed Database

5. You can mitigate any congestion in a single region brought on by monotonically increasing keys by randomizing the key values so that they are not in sorted order. Professional Hadoop Solutions

6. As a specific case, assume that the Map function generates k key-value pairs from a single input record, and that the Combine function monotonically reduces the number of key-value pairs. Incoop MapReduce for Incremental Computations

7. In fact, you’ll always be writing to the end of a table, because timestamps are monotonically increasing in nature. HBase in Action

8. If a znode is created with the sequential flag set, then the value of a monotonically increasing counter (maintained by the parent znode) is appended to its name. Hadoop：The Definitive Guide 3rd Edition

9. If each thread can complete the increment( ) method in its entirety without the other thread executing, then all is fine, and the counter monotonically increases. Java Performance Tuning 2nd Edition

10. All values are totals since the start of monitoring and hence will increase monotonically. Java Performance

# 1689、单词 denom 的匹配文本：

1. Thus, given this code the Scala compiler will generate a class with two Int fields, one for numer and one for denom. Programming in Scala 2nd Edition

# 1690、单词 uima 的匹配文本：

1. Projects such as Apache UIMA and Mahout provide open source tools for such applications, and Tika can be used to easily extend the scope of the applications from plain text to any kind of digital documents. Tika in Action

2. Instead of using UIMA in this way, consider performing this processing external to Solr and cache the results to avoid re-computation as you adjust your indexing process. Solr 3 Enterprise Search Server

# 1691、单词 autoconfiguration 的匹配文本：

1. But this autoconfiguration of the fabric by the app is going to cause problems this morning because Rolf had a late night of quashing the final bugs in Dog Walker 10.0 and made a typo. RabbitMQ in Action

2. Command-line interface (CLI)—Spring Boot’s CLI takes advantage of the Groovy programming language along with autoconfiguration to further simplify Spring application development. Spring in Action 4th Edition

# 1692、单词 couchdbkit 的匹配文本：

1. Developing in Python with Couchdbkit A number of CouchDB libraries are available for the Python programming language, and in this section you will use the Couchdbkit library to connect to CouchDB from your Python applications. Beginning CouchDB

# 1693、单词 keepalive 的匹配文本：

1. SO_KEEPALIVE: This option’s value it is a boolean indicating if the connection should be kept alive or not. Pro Java 7 NIO.2

2. The keepalive socket option is controversial; its use is a topic that some developers feel very strongly about. Java Network Programming and Distributed Computing

3. Depending on if keepalive is used close the Channel after the write completes. Netty in Action MEAP V08

4. While a client transaction remains open, it sends keepalive messages to prevent participant leaders from timing out its transaction. Spanner - Google’s Globally-Distributed Database

5. The session has a heartbeat keepalive mechanism that, once it fails to report, is declared lost by ZooKeeper and the associated ephemeral nodes are deleted. HBase：The Definitive Guide

6. The keepalive protocol enables a client to determine if its server has crashed without closing the socket and vice versa. Java in a Nutshell 5th Edition

7. These methods turn SO_KEEPALIVE on and off and determine its current state: Java Network Programming 4th Edition

8. With the failover protocol, the ActiveMQ client will instantiate a periodic keepalive protocol, so that it can detect whether the broker is no longer reachable (connection or broker lost) ActiveMQ in Action

9. Similarly, a special keepalive can be sent to inform one stage that another still exists. Concurrent Programming in Java Design Principles and Pattern

# 1694、单词 commutative 的匹配文本：

1. There are no guarantees about which (if any) messages are combined, the groupings presented to the combiner, or the order of combining, so combiners should only be enabled for commutative and associative operations. Pregel  -  A System for Large-Scale Graph Processing

2. In some cases, there is significant repetition in the intermediate keys produced by each map task, and the userspecified Reduce function is commutative and associative. MapReduce - Simplied Data Processing on Large Clusters

3. For Reducers that first combine all the values with a given key using an associative, commutative operation, a separate userdefined Combiner function can be specified to perform partial combining of values associated with a given key during the Map phase. FlumeJava - Easy, Efficient Data-Parallel Pipelines

4. Due to the associative and commutative properties, a combiner can be used to vastly cut down on the number of intermediate key/value pairs that need to be shuffled to the reducers. MapReduce Design Patterns

5. First, if the querying operations are commutative across records, the order in which the records are processed is unimportant. Interpreting the Data Parallel Analysis with Sawzall

6. It is important to understand the commutative versus associative nature of your data model, together with any other concerns that are in your streams and inherent models before designing your topology. Storm Real-Time Processing Cookbook

7. However, the combiner only works with commutative and associative functions. Hadoop MapReduce Cookbook

8. Multiplication is a commutative operation if the operand expressions have no side effects. The Java Language Specification Java SE 7 Edition

9. Commutative property—Recall from basic math that the commutative property means the order of operation is irrelevant. Hadoop in Action

10. This strategy applies whenever the accumulation step is commutative and associative with respect to results, so tasks can be processed in any order. Concurrent Programming in Java Design Principles and Pattern

# 1695、单词 smartphones 的匹配文本：

1. In the cloud, virtualized GPUs will provide thin clients such as smartphones and tablets and access to a high-performance graphics experience. Monitoring with Ganglia

2. HTTP/HTTPS15 is one of the most used protocols these days, and with the success of smartphones it gets more attention with each passing day. Netty in Action MEAP V08

3. With the same amount of configuration, you can connect most modern smartphones and tablets to the calendar. Jenkins Continuous Integration Cookbook

4. One of the strong points of a real-time notification service like Notifo is that notification messages can be sent to the same users on different devices: smartphones and desk top clients, in particular. Jenkins The Definitive Guide

5. The majority of “smartphones” send probes regularly when the device is active and is running a geographical application (such as maps, navigation, traffic reports, and so on) Professional Hadoop Solutions

6. Introduction With the increasing adoption of Smartphones and tablets, mobile applications have taken a center stage. Selenium Testing Tools Cookbook

7. Along with our increasingly interconnected world caused by the web and shrinking, cheaper computers (like smartphones), this has catalyzed an exponential growth of data, and a demand for more predictability and speed by savvier users. A Little Riak Book

8. The goal of JavaFX is to be used across many types of devices such as mobile devices, smartphones, TVs, tablet computers, and desktops. Java 7 Recipes A Problem-Solution Approach

9. Home users are expected to migrate away from PCs to tablets and smartphones. Java SE 8 for the Really Impatient

10. Working with Android Android devices are becoming commonplace with owners of smartphones and tablets. Selenium 2 Testing Tools Beginner's Guide

# 1696、单词 handlerton 的匹配文本：

1. This module is actually an abstract class named handler and a structure called a handlerton. Understanding MySQL Internals

# 1697、单词 whitelist 的匹配文本：

1. It can run multiple simultaneous proxies, set upload and download speeds, blacklist and whitelist sites, and even add custom DNS. Testable JavaScript

2. You use these @InitBinder methods to whitelist the form fields: Spring in Practice

3. Additionally, you might proxy Solr requests to ensure the parameters meet a whitelist, to include their values. Solr 3 Enterprise Search Server

4. For example, you might have public access to one of your containers, but what you really want to restrict it to is a set of IPs based on a whitelist. OpenStack Operations Guide

# 1698、单词 zkcli 的匹配文本：

1. We use this to get the list of online region servers by invoking the hbase zkcli ls command. HBase Administration Cookbook

2. When you run the zkCli.sh command for the first time and if you see stack traces as follows: Web Crawling and Data Mining with Apache Nutch

3. Verify ZooKeeper configuration with the following command: zkCli.sh -server master:2181 Hadoop Operations and Cluster Management Cookbook

4. To do this, we use the zkServer and zkCli tools that come with the ZooKeeper distribution under bin/ ZooKeeper Distributed Process Coordination

5. We used the zkcli.sh script provided with the standard Solr 4.0 distribution and placedit  in the cloud-scripts directory by default. Apache Solr 4 Cookbook

# 1699、单词 refactorings 的匹配文本：

1. Automated testing is an essential instrument for ensuring the correctness of your application’s functionality, and is a direct enabler for effective refactorings. Gradle in Action

2. Selecting Books and Delivery Options We have to repeat the refactorings we performed in the previous part for our selecting books view state. Pro Spring MVC

3. We describe three simple refactorings that use lambdas, method references, and streams, which you can apply to your code to improve its readability: Java 8 in Action Lambdas, Streams and Functional-style Programming

4. Among the most important of these benefits are verifiable properties of program abstractions, safe refactorings, and better documentation. Programming in Scala 2nd Edition

5. It can reverseengineer an existing database schema into its XML change log, and track the version of that change log against running instances of the database scheme to determine whether any new database refactorings must be applied. Gradle Beyond The Basics

6. Migrations provide a structured, step-wise approach to applying a set of database refactorings to a database so that it can be responsibly evolved to meet the changing needs of the applications that use it. Graph Databases

7. At the time of this writing, all the Scala plugins for these IDEs support syntax highlighting, project management, limited support for automated refactorings, etc. Programming Scala

8. These two kinds of tunings and refactorings are often equally challenging to carry out, but have opposite effects. Concurrent Programming in Java Design Principles and Pattern

# 1700、单词 subinterfaces 的匹配文本：

1. Other frameworks for data structures consider a map as a collection of pairs, or as a collection of values indexed by the keys.) However, you can obtain views of the map—objects that implement the Collection interface or one of its subinterfaces. Core Java Volume I Fundamentals 9th Edition

2. Note that a variable is not guaranteed to always refer to a subtype of its declared type, but only to subclasses or subinterfaces of the declared type. The Java Language Specification Java SE 7 Edition

3. It is composed of objects whose classes implement the Node interface and its various subinterfaces. Core Java Volume II Advanced Features 9th Edition

4. These subinterfaces may impose membership restrictions or ordering constraints on the elements of the collection but still provide the same basic methods. Java in a Nutshell 5th Edition

5. One or both of the arguments implement the Observable interface or one of its subinterfaces. Java SE 8 for the Really Impatient

6. The Collection interface is very general and allows for a multitude of Collection subinterfaces and implementation classes. Pro JPA2

1、A Little Riak Book
2、ActiveMQ in Action
3、Apache Flume Distributed Log Collection for Hadoop
5、Apache Hadoop YARN Yet Another Resource Negotiator
6、Apache Kafka
7、Apache Solr 4 Cookbook
8、Apache Sqoop Cookbook
9、Beginning CouchDB
10、Beginning Scala
11、Bigtable - A Distributed Storage System for Structured Data
14、Cassandra A Decentralized Structured Storage System
15、Cassandra High Performance Cookbook
16、Cassandra The Definitive Guide
17、Ceph A Scalable, High-Performance Distributed File System
18、Chubby - The lock service for loosely-coupled distributed systems
19、Cloudera Impala
20、Concurrent Programming in Java Design Principles and Pattern
21、Core Java Volume I Fundamentals 9th Edition
22、Core Java Volume II Advanced Features 9th Edition
23、CouchDB The Definitive Guide
24、Dapper a Large-Scale Distributed Systems Tracing Infrastructure
25、Data Structures and Algorithm Analysis in Java 3rd Edition
26、Deploying OpenStack
27、Dremel - Interactive Analysis of WebScale Datasets
28、Effective Java 2nd Edition
29、Elasticsearch The Definitive Guide
30、Elasticsearch in Action MEAP V07 cHAPTER 1
31、FlumeJava - Easy, Efficient Data-Parallel Pipelines
32、Functional Programming Patterns in Scala and Clojure
33、Functional Programming in Scala
34、Fundamental Networking in Java
35、GFS - The Google File System
36、Getting Started with CouchDB
41、Graph Databases
43、HBase in Action
44、HBase：The Definitive Guide
48、Hadoop Operations and Cluster Management Cookbook
52、HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
54、High Performance MySQL 3rd Edition
55、Hive A Petabyte Scale Data Warehouse Using Hadoop
56、Incoop MapReduce for Incremental Computations
57、Interpreting the Data Parallel Analysis with Sawzall
58、JSR-133 Java Memory Model and Thread
59、Java 7 Concurrency Cookbook
60、Java 7 New Features Cookbook
61、Java 7 Recipes A Problem-Solution Approach
62、Java 8 in Action Lambdas, Streams and Functional-style Programming
63、Java EE 7 Essentials
64、Java EE 7 Specification
65、Java EE 7 Web Profile Specification
66、Java Network Programming 4th Edition
67、Java Network Programming and Distributed Computing
68、Java Performance
69、Java Performance Tuning 2nd Edition
70、Java SE 8 for the Really Impatient
71、Java Security 2nd Edition
73、Java in a Nutshell 5th Edition
74、Jenkins Continuous Integration Cookbook
75、Jenkins The Definitive Guide
76、Kafka a Distributed Messaging System for Log Processing
77、Lucene in Action 2nd Edition
78、Mahout in Action
79、Managing Infrastructure with Puppet
80、MapReduce - Simplied Data Processing on Large Clusters
81、MapReduce Design Patterns
82、MapReduce a flexible data processing tool
83、Mastering ElasticSearch
84、Megastore - Providing Scalable, Highly Available Storage for Interactive Services
85、Mesos A Platform for Fine-Grained Resource Sharing in the Data Center
86、MongoDB The Definitive Guide 2nd Edition
87、MongoDB in Action
88、Monitoring with Ganglia
89、Netty in Action MEAP V08
90、NoSQL Distilled
91、Omega - flexible, scalable schedulers for large compute clusters
92、OpenStack Operations Guide
93、Oracle JRockit The Definitive Guide
94、Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications
95、Performance Testing With JMeter 2.9
96、PowerDrill - Processing a Trillion Cells per Mouse Click
97、Pregel  -  A System for Large-Scale Graph Processing
99、Pro JPA2
100、Pro Java 7 NIO.2
101、Pro Puppet
102、Pro Spring 3
103、Pro Spring MVC
104、Pro Spring Security
106、Programming Concurrency on the JVM
107、Programming Hive
108、Programming Pig
109、Programming Scala
110、Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine
111、Programming in Scala 2nd Edition
112、RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.
113、RabbitMQ in Action
114、Redis Cookbook
115、Redis in Action
116、Resilient Distributed Datasets - A Fault-Tolerant Abstraction for In-Memory Cluster Computing
117、SQL Antipatterns
118、Scala for the Impatient
119、Scala in Action
120、Scala in Depth
121、Scalable IO in Java
122、Scaling CouchDB
123、Scaling MongoDB
124、Selenium 2 Testing Tools Beginner's Guide
125、Selenium Testing Tools Cookbook
126、Solr 3 Enterprise Search Server
127、Solr 3.1 Cookbook
128、Solr in action
129、Sonar Code Quality Testing Essentials
131、Spring Batch in Action
132、Spring Data Modern Data Access for Enterprise Java
133、Spring Dynamic Modules in Action
134、Spring Integration in Action
135、Spring Roo in Action
136、Spring Security 3.1
137、Spring in Action 4th Edition
138、Spring in Practice
139、Steps in Scala An Introduction to Object-Functional Programming
140、Storage Architecture and Challenges
141、Storm Blueprints Patterns for Distributed Real-time Computation
142、Storm Real-Time Processing Cookbook
143、Tenzing - A SQL Implementation On The MapReduce Framework
144、Testable JavaScript
145、The Definitive Guide to MongoDB
147、The Java Language Specification Java SE 7 Edition
148、The Java Virtual Machine Specification Java SE 7 Edition
149、The Little Redis Book
150、The anatomy of a large-scale hypertextual Web search engine
151、Thinking in Java 4th Edition
152、Tika in Action
153、Understanding MySQL Internals
154、Web Crawling and Data Mining with Apache Nutch
155、Web search for a planet the google cluster architecture
156、Zab High-performance broadcast for primary-backup systems
157、ZeroMQ
158、ZooKeeper Distributed Process Coordination
160、api-quick-start-onepager
163、user-guide

### 杨尚川

Java8全新打造，英语学习supertool

superword是一个Java实现的英文单词分析软件，主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。Clean code、Fluent style、Java8 feature: Lambdas, Streams and...

2015/03/29
427
0

Superword is a Java open source project dedicated in the study of English words analysis and auxiliary reading, including but not limited to, spelling similarity, definition sim......

2015/02/18
2.2K
0
2000个软件开发领域的高频特殊词及精选例句（二）

superword是一个Java实现的英文单词分析软件，主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。 276、单词 tokenizer 的匹配文本： Analysis is done by the anal...

2015/03/19
807
1

2006/09/14
0
0

Lilian_Lee
2017/10/10
0
0

【0918】正则介绍_grep

【0918】正则介绍_grep 9.1 正则介绍_grep上 9.2 grep中 9.3 grep下 一、正则介绍 正则是一串有规律的字符串，它使用单个字符串来描述或匹配一系列符合某个语法规则的字符串。 二、grep工具 ...

19分钟前
4
0

1. 网页加载速度更快 在网站中使用CDN技术最直接的一个好处就是它可以加快网页的加载速度。首先，CDN加速的内容分发是基于服务器缓存的，由于CDN中缓存了不少数据，它能够给用户提供更快的页...

56分钟前
8
0

symbiochina88

4
0

SOM-TL437xF是一款广州创龙基于TI AM437x ARM Cortex-A9 + Xilinx Spartan-6 FPGA芯片设计的核心板，采用沉金无铅工艺的10层板设计，适用于高速数据采集和处理系统、汽车导航、工业自动化等领...

Tronlong创龙

4
0

好程序员Java学习路线分享MyBatis之线程优化，我们的项目存在大量用户同时访问的情况，那么就会出现大量线程并发访问数据库，这样会带来线程同步问题，本章我们将讨论MyBatis的线程同步问...

6
0