文档章节

2000个软件开发领域的高频特殊词及精选例句(七)

杨尚川
 杨尚川
发布于 2015/03/20 23:43
字数 47926
阅读 158
收藏 0

superword是一个Java实现的英文单词分析软件,主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。

1701、单词 jpql 的匹配文本:


  1. You will learn how to implement the various database operations using JPA’s EntityManager interface and JPQL (which is similar to HQL) Pro Spring 3


  2. In another situation, you want to make sure that an HQL or JPQL query translates to executable SQL and performs what you want. Pro Spring MVC


  3. In most cases, object-oriented queries (such as JPQL) are more concise than their SQL counterparts. Spring in Practice


  4. A simple JPQL statement to query all the Student entities and retrieve the results looks like: Java EE 7 Essentials


  5. The query languages of choice have been SQL for JDBC as well as HQL/JPQL for Hibernate/JPA. Spring Data Modern Data Access for Enterprise Java



1702、单词 rhel 的匹配文本:


  1. You'd be hard pressed to find such a company using the bleeding-edge Linux kernel rather than something like Red Hat Enterprise Linux (RHEL), CentOS, Ubuntu LTS, or any of the other distributions that aim for is stability and compatibility. Apache Flume Distributed Log Collection for Hadoop


  2. The installation process is documented in the OpenStack Install Guide, for either Ubuntu or RHEL/CentOS/Fedora. bk-compute-adminguide-grizzly


  3. Complete instructions and links to the development repositories can be found via the RHEL Packaging page on the OpenStack wiki or by going to their build page directly at http://yum.griddynamics.net/ Deploying OpenStack


  4. SELinux troubles often when you use Fedora/RHEL-based packages and you choose configuration options that do not match the standard policy. bk-admin-guide-cloud-latest


  5. There have been successful deployments on both Red Hat-based (Red Hat Enterprise Linux [RHEL], CentOS) and Debian-based (Ubuntu and so on) flavors of Linux. HBase in Action


  6. If you don’t already have the GCC compiler installed, you can install it with the following command (on RHEL-based Linux systems): Hadoop in Practice


  7. It mirrors RHEL in terms of functionality, features, and package release levels as it is using the source code packages Red Hat provides for its own enterprise product to create CentOS-branded counterparts. HBase:The Definitive Guide


  8. On Fedora / RHEL RabbitMQ is packaged on both distros: high-availability-guide


  9. Worse, some versions of CentOS and RHEL configure things this way by default! This is extremely dangerous because datanodes communicate to the namenode that they’re. Hadoop Operations


  10. The cloud-init package version 0.7.1 works with Ubuntu and Fedora-based images, such as RHEL. user-guide



1703、单词 parametric 的匹配文本:


  1. But the key difference between an interface and a type class is that with interface your focus is on subtype polymorphism, and with a type class your focus is on parametric polymorphism. Scala in Action


  2. In Section 10.6 you’ll find out about parametric fields, which provide a shorthand for writing the same code. Programming in Scala 2nd Edition


  3. Faceting in the context of the user experience is often referred to as faceted navigation, but also faceted search, faceted browsing, guided navigation, or parametric search. Solr 3 Enterprise Search Server


  4. Parametric polymorphism achieves uniformity by using the idea of type parameters, nevertheless, this is not the only way to achieve uniformity and in this respect parametric polymorphism is a special case of universal polymorphism. Steps in Scala An Introduction to Object-Functional Programming


  5. Third, you will be drawing a quadratic parametric curve using the (QuadCurve2D) class. Java 7 Recipes A Problem-Solution Approach



1704、单词 distributive 的匹配文本:


  1. It’s important that if you have a combiner, the function is distributive. Hadoop in Practice


  2. In creating a Hadoop program for computing maximum, we take advantage of the distributive property   of maximum. Hadoop in Action


  3. Distributive operations such as summation, addition, and similar are usually safe, but, as shown previously, ensure the reduce logic isn't making implicit assumptions that might break this property. Hadoop Beginners Guide


  4. Calculations that can be decomposed into any number of steps, such as sum, are called distributive. Programming Pig



1705、单词 function1 的匹配文本:


  1. For this example, that means that the variance annotation is defined on the Function1 class rather than requiring it on every method that used the class. Scala in Depth


  2. A good example of contravariance in action is the Function1 trait defined in Scala: Scala in Action


  3. The previous code is syntactic sugar for declaring an anonymous class of type scala.Function1 (a function of one parameter), which provides the implementation of the method apply: Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. If the declared type is just Function1, or is missing, the function literal is instead translated to a complete function. Programming in Scala 2nd Edition


  5. To compose two functions  and , youcompose Function1 f g. Functional Programming in Scala


  6. The second test, usingFilterKeys, requires a Function1 object, which has an apply method that takes one argument. Programming Scala


  7. In addition to Function1’s apply method, PartialFunction has an isDefinedAt method so that you can test to see whether a pattern matches a given value. Beginning Scala


  8. Contravariance of functions Assume we have an object f of type Function1[A,B] Steps in Scala An Introduction to Object-Functional Programming



1706、单词 nunit 的匹配文本:


  1. There is even specific support for NUnit testing in .NET or compilation to other languages. Jenkins Continuous Integration Cookbook


  2. For C# applications, the NUnit testing framework proposes similar functionalities to those provided by JUnit, as does Test::Unit for Ruby. Jenkins The Definitive Guide


  3. We will also create data driven tests for .NET bindings using NUnit and MSTest. Selenium Testing Tools Cookbook



1707、单词 abc 的匹配文本:


  1. The String "abc" could have a method append( ) that creates a new String object containing "abc" concatenated with the contents of mango. Thinking in Java 4th Edition


  2. What do we do? Let’s start by thinking of names as a sorted sequence of strings like abc, abca, abcb, ... Redis in Action


  3. What the stupid backoff model will do is use the ab bigram model, because the abc doesn't exist and of course the ab bigram model will be given a discount equal to the value of the discount property. Mastering ElasticSearch


  4. Note that the second argument to getOrElseUpdate is “by-name,” so the computation of f("abc") above is only performed if getOrElseUpdate requires the value of its second argument, which is precisely if its first argument is not found in the cache map. Programming in Scala 2nd Edition


  5. For example, token ABC-EFG would be split to ABC and EFG. Solr 3.1 Cookbook


  6. A subtle point is that the expression a-b-c will be converted to ab-c- and not abc-- Data Structures and Algorithm Analysis in Java 3rd Edition


  7. Lastly, the example tries to find row abc, which sorts before the rows the put example added, using the row- prefix, and therefore does not exist, nor matches any previous row keys. HBase:The Definitive Guide


  8. Prioritizing subsections (e.g., the compression component must be completed but can use an alternative compression algorithm, the graphics types XYZ must be supported but the graphics types ABC may be dropped until later, etc.) Java Performance Tuning 2nd Edition


  9. The query abc xyz will be interpreted as either abc OR xyz or abc AND xyz, based on the implicit operator setting. Lucene in Action 2nd Edition


  10. For example, token ABC-EFG would be split into ABC and EFG. Apache Solr 4 Cookbook



1708、单词 i18n 的匹配文本:


  1. Moreover, we finished with an in-depth look at some additional features offered by the ApplicationContext including i18n, event publication, and resource access. Pro Spring 3


  2. We will have the jumps term indexed in the title.org field and the jump term indexed in the title.i18n field. Mastering ElasticSearch


  3. We’ll create an i18n add-on to provide a Norwegian translation of the Roo scaffold labels. Spring Roo in Action



1709、单词 conformance 的匹配文本:


  1. You can then use objects of these implementing classes whenever conformance to the interface is required. Core Java Volume I Fundamentals 9th Edition


  2. The rules of variance govern the type conformance of types with parameters. Scala in Depth


  3. For this reason, it is often desirable to relax consistency at the expense of strict standards conformance in situations where applications do not rely on it. Ceph A Scalable, High-Performance Distributed File System


  4. The difference is that the automated tests are written in a format that looks more like a requirements (or behavioral) specification and less like a test of the code’s conformance to the requirements. Programming Scala


  5. All OSGi standards also require a reference implementation (RI) and a technology compatibility kit (TCK), which is a suite of tests to check the conformance of any implementation. Spring Dynamic Modules in Action


  6. Furthermore, a number of third-party companies specialize in producing drivers with better standards conformance, support for more platforms, better performance, or, in some cases, simply better reliability than the drivers provided by the database vendors. Core Java Volume II Advanced Features 9th Edition


  7. In general, relation <:, which is termed the conformance relation, must satisfy the following properties. Steps in Scala An Introduction to Object-Functional Programming


  8. When even simple methods such as updating an account balance or printing "Hello, world" require dozens of lines of awkward, error-prone code to conform to design policies, it is time to take some kind of remedial action: Simplify or reduce the number of policies; or create tools that help automate code generation and/or check for conformance; or create domain-specific languages that enforce a given discipline; or create frameworks and utility libraries that reduce the need for so much support code to be written inside each method. Concurrent Programming in Java Design Principles and Pattern



1710、单词 asc 的匹配文本:


  1. You can also add an optional DESC or ASC keyword right after the GROUP BY clause to order the results in the desired direction by the clause’s columns. High Performance MySQL 3rd Edition


  2. Generate GNU Privacy Guard (GPG) signatures for all artifacts you wish to publish (shown in figure 14.7 with the file extension .asc) Gradle in Action


  3. Each field must be followed by the order in which the data should be sorted—asc, which tells Solr to sort in the ascending order and desc, which tells Solr to sort in the descending order. Solr 3.1 Cookbook


  4. Once again, you would make use of implicit sorting by prefixing the values with an index ID—for example, idx-subject-desc, idx-to-asc, and so on. HBase:The Definitive Guide


  5. You can specify any columns you wish and specify whether or not the columns are ascending using the ASC keyword (the default) or descending using the DESC keyword. Programming Hive


  6. Each of the attributes can be optionally followed by an ASC or DESC keyword to define whether the attribute should be ordered in ascending or descending order. Pro JPA2


  7. Each field must be followed by the order in which the data should be sorted; asc which tells Solr to sort the data in the ascending order, and desc which tells Solr to sort in the descending order. Apache Solr 4 Cookbook



1711、单词 implementor 的匹配文本:


  1. You wouldn’t want a library implementor to ponder whether to call x.equals(y) or y.equals(x) when locating an element in a data structure. Core Java Volume I Fundamentals 9th Edition


  2. If you’re adept at any of those languages, you should appreciate the thorough documentation of gmond’s internals included herein, written by the implementor of gmond’s modular interface. Monitoring with Ganglia


  3. For example, the memory layout of run-time data areas, the garbage-collection algorithm used, and any internal optimization of the Java Virtual Machine instructions (for example, translating them into machine code) are left to the discretion of the implementor. The Java Virtual Machine Specification Java SE 7 Edition


  4. However, it is up to the implementor of the engine class to make sure that this happens correctly; it is better to be sure your code will work by always initializing your key generator. Java Security 2nd Edition


  5. This provides a great deal of freedom for the implementor to perform a myriad of code transformations, including the reordering of actions and removal of unnecessary synchronization. The Java Language Specification Java SE 7 Edition


  6. If a subclass implementor overrides a superclass finalizer but forgets to invoke it, the superclass finalizer will never be invoked. Effective Java 2nd Edition


  7. If later on in the execution of the program a subclass that overrides that method is requested to be loaded, then as part of the loading process the compiled code that assumed there was only one implementor is thrown out. Java Performance


  8. For a framework implementor, the story is not quite as simple. Java SE 8 for the Really Impatient



1712、单词 awk 的匹配文本:


  1. Regular expressions Regular expressions have long been integral to standard Unix utilities like sed and awk, and languages like Python and Perl (some would argue that they are the predominant reason for Perl’s success) Thinking in Java 4th Edition


  2. Each sample begins with a distinctive timestamp line, so you can search through the files for samples related to specific times, and you can write little awk and sed scripts easily. High Performance MySQL 3rd Edition


  3. For example, later in this chapter we’ll discuss post-processing of output, which may be very natural to do with sed or awk, but less natural to do in Java. MapReduce Design Patterns


  4. Run iostat at five-second intervals for three intervals; use awk to limit the columns displayed: Cassandra High Performance Cookbook


  5. Even today, there are large Awk programs in use for mining telephone logs. Interpreting the Data Parallel Analysis with Sawzall


  6. You can write a simple awk script to convert the GroupLens data into CSV form: Hadoop in Practice


  7. The script loops through the compressed year files, first printing the year, and then processing each file using awk. Hadoop:The Definitive Guide 3rd Edition


  8. The pattern matcher can be Awk, Perl, Java regular expressions, or any pattern matcher you prefer. Java Performance Tuning 2nd Edition


  9. Finding the maximum survived bytes can be simplified by writing an awk or perl script to process the data or by pulling the data into a spreadsheet. Java Performance


  10. The text file format is convenient for sharing data with other tools, such as Pig, Unix text tools like grep, sed, and awk, etc. Programming Hive



1713、单词 bea 的匹配文本:


  1. Then I visited the URL http://localhost:8080/spring_security_login and logged in with the username bea and the password scarvarez. Pro Spring Security


  2. Com above, aged be in a bea manage manage tainer. Java EE 7 Specification


  3. It turned out that Interface 21, BEA, and Oracle were considering creating support for OSGi in the Spring Framework. Spring Dynamic Modules in Action


  4. In February 2002, BEA Systems acquired Appeal Virtual Machines, letting nervous venture capitalists sleep at night, and finally securing us the resources that we needed for a proper research and development lab. Oracle JRockit The Definitive Guide


  5. However, in their book J2EE Performance Testing with BEA WebLogic Server (Expert Press), Peter Zadrozny, Philip Aston, and Ted Osborne state that there is no real difference in performance between these two options, as long as the beans are explicitly removed from the container when the session expires.[2] The beans are removed automatically by binding the session to a session listener that calls ejbRemove( ) when the session terminates. Java Performance Tuning 2nd Edition



1714、单词 rollbacks 的匹配文本:


  1. For example, if you see too many rollbacks, you’ll know something is likely to be wrong. High Performance MySQL 3rd Edition


  2. In a production environment, you may have to deal with clustered and distributed server infrastructures, zero-downtime release rollouts, and automated rollbacks to the previous release. Gradle in Action


  3. Rollbacks The election process described in the previous section means that if a primary does a write and goes down before the secondaries have a chance to replicate it, the next primary elected may not have the write. MongoDB The Definitive Guide 2nd Edition


  4. Declarative transaction management stands in contrast to programmatic transaction management, where you code up all the logic to create new transactions, bind sessions and connections to them, write if/else logic to decide which exceptions trigger rollbacks, commit the transaction, clean everything up, and so forth. Spring in Practice


  5. Following that, we have the rollbacks and optimizes statistics, which tell us about the number of rollback and optimize operations since the Solr startup. Solr 3.1 Cookbook


  6. You can configure Spring’s transactional support to customize this behavior by setting which exceptions trigger commits and rollbacks. Spring Batch in Action


  7. Even though the patch framework fully supports patch version control and rollbacks, an implicit safety mechanism in patching machine images is apparent given that an image is just a couple of files on disk: backing up the image is just a matter of copying the files somewhere. Oracle JRockit The Definitive Guide


  8. Due to the cost associated with transaction rollbacks, optimistic locking may not be the best option for highly concurrent applications where the data is modified frequently. Java Performance


  9. There are two complementary styles for maintaining state representations that can be used in rollbacks: Concurrent Programming in Java Design Principles and Pattern


  10. The details of transaction logging, row or page locks, implementing the isolation levels, commits and rollbacks, and other critical components of transaction implementations vary greatly from storage engine to storage engine. Understanding MySQL Internals



1715、单词 href 的匹配文本:


  1. The href attribute must specify the name of this file. Thinking in Java 4th Edition


  2. Note  You might wonder why we don’t embed

    inside the href attribute directly, instead of working with a variable. Pro Spring MVC


  3. In HTML files, you can create tags with an href attribute, a hyperlink pointing at related content from the origin HTML file. Tika in Action


  4. If the XML file defined by the href attribute isn't found, then the xi:fallback included file is returned. Solr 3 Enterprise Search Server


  5. It simply overrides the startElement method of the handler to check for links with name a and an attribute with name href. Core Java Volume II Advanced Features 9th Edition


  6. The JNLP file had to have a relative path in the href attribute and the codebase should not be specified. Java 7 New Features Cookbook


  7. The codebase and href are optional in Java 6 and above. Java 7 Recipes A Problem-Solution Approach


  8. It basically consists of two attributes: a relation type (rel) and a hypertext reference (href) Spring Data Modern Data Access for Enterprise Java


  9. When the href value is a placeholder that matches a parameter specified by

    , the parameter is inserted into the placeholder’s spot. Spring in Action 4th Edition


  10. Another example of this is if you were trying to find an element according to its href. Selenium 2 Testing Tools Beginner's Guide



1716、单词 gora 的匹配文本:


  1. Put the following configuration into the ivy.xml file: <!-- Uncomment this to use HBase as Gora backend. Web Crawling and Data Mining with Apache Nutch


  2. The original content is cached in Apache Gora (http://incubator.apache.org/gora/), a new Apache Incubator podling responsible for data storage and object-relational mapping. Tika in Action


  3. Apache Nutch integrates Apache Gora to add support for different backend data stores. Hadoop MapReduce Cookbook



1717、单词 edismax 的匹配文本:


  1. Prefer dismax for user queries For processing queries from users, I highly recommend using dismax or edismax, which is described later in the chapter. Solr 3 Enterprise Search Server


  2. The query shown in this recipe, but using edismax, would look like this: Solr 3.1 Cookbook


  3. The more complex query is created by the edismax query parser, which is enabled by the defType parameter under defaults. Solr in action


  4. The following is the query shown in this task, but by using edismax, it would look like the following: Apache Solr 4 Cookbook



1718、单词 webapps 的匹配文本:


  1. In fact, it can be dropped into Tomcat’s webapps/ directory without further modification to produce a working web-based instance of your recommender. Mahout in Action


  2. So, this WAR file will be deployed into Apache Tomcat when Apache Tomcat starts for the first time, and it will create the directory called solr-4.3.0 inside the webapps directory, which is called an application of Apache Solr. Web Crawling and Data Mining with Apache Nutch


  3. To create a new SOAP-based web service, you can drop a text file in the webapps/ sakai-axis directory with the extension .jws. Jenkins Continuous Integration Cookbook


  4. Alternatively, if you are familiar with Java application servers such as Tomcat, you can simply deploy the Jenkins WAR file to your application server—with Tomcat, for example, you could simply place the jenkins.war file in Tomcat’s webapps directory. Jenkins The Definitive Guide


  5. I’ve implemented all kinds of workers/clients and the broker in Ruby, because that is the main language we use for development, but also some PHP clients to connect to the bus from existing PHP webapps. ZeroMQ


  6. The third step is to deploy the Solr web application by simply copying the solr.war file to the webapps directory of Jetty. Solr 3.1 Cookbook


  7. Expand the WAR file in the Tomcat webapps/limo webapps directory. Lucene in Action 2nd Edition


  8. Create a single application named SimpleServlet by making that directory under Tomcat/webapps. Java 7 Recipes A Problem-Solution Approach



1719、单词 rpms 的匹配文本:


  1. Nevertheless, having prebuilt standard OS packages such as RPMs and DEBs eases installation as well as providing startup/shutdown scripts. Apache Flume Distributed Log Collection for Hadoop


  2. Instructions for installing these RPMs and configuring them with a kickstart script are available at the Mirantis blog. Deploying OpenStack


  3. If you installed RabbitMQ from packages specific to your OS (say, RPMs), it’s a good idea to use the start/stop init.d scripts installed by the package. RabbitMQ in Action


  4. Installing the Dashboard Package The Dashboard is available in package form as RPMs (Red Hat, et al) and DEBs (Debian and Ubuntu, et al) from the Puppet Labs package repositories. Pro Puppet


  5. RedHat uses packages called RPMs for installation, and Yum as a package installer that can fetch RPMs from remote Yum repositories. Hadoop in Practice


  6. The Apache Bigtop project (http://incubator.apache.org/bigtop/) runs interoperability tests on stacks of Hadoop components and provides Linux packages (RPMs and Debian packages) for easy installation. Hadoop:The Definitive Guide 3rd Edition


  7. Cloudera makes the distribution available in a number of different formats: source and binary tar files, RPMs, Debian packages, VMware images, and scripts for running CDH in the cloud. HBase:The Definitive Guide


  8. Apache Hadoop Apache Hadoop is available for download directly from the Apache Software Foundation (ASF) at http://hadoop.apache.org and is available as tarballs, RPMs, and Debs. Hadoop Operations


  9. Currently the most popular of these is Cloudera, which produces RPMs for Red Hat–based systems and packages for use with APT on Debian systems. Programming Pig


  10. NEW-RPMS Used by the distribution build scripts to hold new RPMs. Understanding MySQL Internals



1720、单词 varray 的匹配文本:


  1. The database you are working with includes some VARRAY columns that need to be populated by your application. Java 7 Recipes A Problem-Solution Approach



1721、单词 recomputed 的匹配文本:


  1. If the component is a container, the positions and sizes of its components are recomputed. Core Java Volume I Fundamentals 9th Edition


  2. In fact, because the result is the same for all anonymous users, the set of recommendations can be stored and recomputed periodically instead of upon every request. Mahout in Action


  3. For even more query plan stability, and for faster system warmups, you can use a system table to store index statistics so they are stable across server restarts and don’t need to be recomputed when InnoDB opens the table for the first time after booting up. High Performance MySQL 3rd Edition


  4. Note that the output has to be recomputed if either of the input wires changes. Programming in Scala 2nd Edition


  5. Again, the first five random integers won’t be recomputed, they’ll be pulled from a memoized cache: Functional Programming Patterns in Scala and Clojure


  6. In that case, the recipient of the forged message and the recomputed fingerprint would never know that the message has been altered. Core Java Volume II Advanced Features 9th Edition


  7. The gravity could be recomputed from the mass and radius each time it was used by the surfaceWeight method, which takes an object’s mass and returns its weight on the planet represented by the constant. Effective Java 2nd Edition


  8. SpellChecker does not return the distance between each suggestion and the original user’s term, though you could simply recomputed that by calling the getDistance method on the StringDistance you are using. Lucene in Action 2nd Edition


  9. Because a query with rand() is nondeterministic, the result of rand() is recomputed for each row. Programming Hive


  10. The conditional value is recomputed whenever an observable value changes. Java SE 8 for the Really Impatient



1722、单词 httpd 的匹配文本:


  1. To enable, edit the httpd.conf file and uncomment the line that loads the php5_module. Monitoring with Ganglia


  2. The Ganglia web interface is generally installed on the host(s) running the gmetad servers, and in coordination with the host’s httpd provides a graphical view of the cluster information. Pro Hadoop


  3. When Keystone is executed in apache-httpd it is possible to use external authentication methods different from the authentication provided by the identity store backend. bk-compute-adminguide-grizzly


  4. We suggest you read up on VPNs and setting up CouchDB behind an HTTP proxy (like Apache httpd’s mod_proxy, nginx, or varnish) that will handle SSL for you. CouchDB The Definitive Guide


  5. Start the httpd daemon with the following command: sudo service httpd start. Hadoop Operations and Cluster Management Cookbook


  6. In your httpd.conf file (often in the /etc/httpf/conf directory), you should have the following line: Jenkins The Definitive Guide


  7. After the file is created, the content creator may publish the file on an Apache HTTPD web server, where it will be available for downstream users to acquire. Tika in Action


  8. One change you may want to make is the bind_address option in the httpd section. Beginning CouchDB


  9. Pig can be extended by user-defined functions (UDFs) that encapsulate commonly used functionality such as algorithms or support for reading and writing well-known data formats such as Apache HTTPD logfiles. Spring Data Modern Data Access for Enterprise Java


  10. Dashboard The OpenStack Dashboard is implemented as a Python web application that runs in Apache httpd. OpenStack Operations Guide



1723、单词 pseudorandom 的匹配文本:


  1. Randomized algorithms can be made deterministic by seeding a pseudorandom number generator deterministically based on the superstep and the partition. Pregel  -  A System for Large-Scale Graph Processing


  2. The pseudorandom method does not guarantee that all possible path candidates will be tried; only that no more than the count of path candidate elements will be tried (as of Hadoop 0.19.0) Pro Hadoop


  3. The idea was that you could influence the pseudorandom number generator by concentrating hard enough, and thereby control the game. CouchDB The Definitive Guide


  4. We will use random in place of pseudorandom in the rest of this section. Data Structures and Algorithm Analysis in Java 3rd Edition


  5. This allows us to create, say, an infinitely long string of pseudorandom numbers of which we realize only a portion. Functional Programming Patterns in Scala and Clojure


  6. A GUID is a pseudorandom number of 128 bits (usually represented by. SQL Antipatterns


  7. To write a version of the random method that corrects these three flaws, you’d have to know a fair amount about pseudorandom number generators, number theory, and two’s complement arithmetic. Effective Java 2nd Edition


  8. Although SecureRandom defines public constructors, the preferred technique for obtaining a SecureRandom object is to call one of the static getInstance( ) factory methods, specifying the desired pseudorandom number-generation algorithm, and, optionally, the desired provider of that algorithm. Java in a Nutshell 5th Edition



1724、单词 gpu 的匹配文本:


  1. The GPU/CPU hybrid architecture is desirable for its overall performance, high performance per watt, and ease of programming. Monitoring with Ganglia


  2. For example, you may want to allow users to request compute hosts that have SSD drives if they need access to faster disk I/O, or access to compute hosts that have GPU cards to take advantage of GPU-accelerated code. bk-compute-adminguide-grizzly


  3. Can be used to implement things like special resources (e.g., flavors that can only run on compute nodes with GPU hardware) bk-admin-guide-cloud-latest


  4. For example, a graphical processor unit (GPU) is mandatory if a framework cannot run without access to GPU. Mesos A Platform for Fine-Grained Resource Sharing in the Data Center


  5. Can be used to implement things like special resources (such as flavors that can only run on compute nodes with GPU hardware) OpenStack Operations Guide



1725、单词 applicat 的匹配文本:


  1. The JAF API provides a framework for handling data in different MIME types, originat JAF AP applicat. Java EE 7 Specification



1726、单词 guration 的匹配文本:


  1. A Solr core is nothing but the running instance of a Solr index along with its confi guration. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr


  2. Along the way, you’ll explore Springbased approaches to domain-specifi c challenges like CRM, confi guration management, and site reliability. Spring in Practice


  3. And it uses Spring’s familiar programming model to simplify confi guration and implementation, so it’ll be comfortably familiar to most Java developers. Spring Batch in Action


  4. Along the way, you’ll learn to handle data access and web-based components, and explore topics like unit testing and confi guration in OSGi. Spring Dynamic Modules in Action



1727、单词 htm 的匹配文本:


  1. The IDL documentation is available from the OMG Web site, at http://www.omg.org/technology/documents/formal/java_language_mapping_to_omg_idl.htm. Java Network Programming and Distributed Computing


  2. The second script iterates through instances of slave objects (http://javadoc.jenkins-ci.org/hudson/slaves/SlaveComputer.htm) Jenkins Continuous Integration Cookbook


  3. Listing 4-8 shows how to use a bean name and map it to the /index.htm url. Pro Spring MVC



1728、单词 guid 的匹配文本:


  1. Use GUID values You can generate globally unique values with the UUID() function. High Performance MySQL 3rd Edition


  2. You are free to choose any string to be the ID, but for best results we recommend a UUID (or GUID), i.e., a Universally (or Globally) Unique IDentifier. CouchDB The Definitive Guide


  3. The returned string is a GUID (a long random string of letters and numbers) that is needed to pass to other methods as evidence of authentication. Jenkins Continuous Integration Cookbook


  4. For applications that use a GUID or UUID primary key (which occurs more frequently due to more efficient support in modern databases), this can be a significant limitation. Spring Security 3.1


  5. For this example, let’s assume that every user is identified by a globally unique identifier (GUID), which is assigned to a user once he or she registers with the system. Professional Hadoop Solutions


  6. Another approach is to create a GUID, a large random number that’s guaranteed to be unique. NoSQL Distilled


  7. In this test, a unique GUID is created and assigned as a title to the browser window. Selenium Testing Tools Cookbook


  8. A GUID is a pseudorandom number of 128 bits (usually represented by. SQL Antipatterns


  9. Let’s create a method that generates a random String that will serve as a globally unique identifier (GUID): Beginning Scala


  10. So what should search be? Hopefully, the search field can be something useful your application can use for querying, possibly user info (as in the example above), a filename field, a GUID, etc. Scaling MongoDB



1729、单词 jpg 的匹配文本:


  1. If the user should choose a JPEG image file, the extension can be either .jpg or .jpeg. Core Java Volume I Fundamentals 9th Edition


  2. Keeping in mind that the preceding code just deleted the rafa_1.jpg file, the following code will return false: Pro Java 7 NIO.2


  3. This command will build the application into an SWF file which you can view in your browser, but the book’s code distribution file contains no MP3 files or JPG files, so you won’t see anything but the framework when you run the application. Thinking in Java 4th Edition


  4. For example, say you stored a MIME type (like text/html or image/jpg) for each document and now you want to find all documents that are images according to the MIME type. CouchDB The Definitive Guide


  5. Other formats that are supported include extracting metadata from images such as JPG, GIF, and PNG, as well as from various audio formats such as MP3, MIDI, and Wave audio. Solr 3 Enterprise Search Server


  6. In this code, header.jpg is bundled in the standard resources directory. Java EE 7 Essentials


  7. For example, if your app lets users upload photos to their profiles, then there’s a good chance half the files you receive will be called photo.jpg or me.png. The Definitive Guide to MongoDB


  8. Java can currently load .jpg, .gif, and .png image formats. Java 7 Recipes A Problem-Solution Approach


  9. Next, you open the original image file, canyon.jpg, for reading. MongoDB in Action



1730、单词 sunspot 的匹配文本:


  1. If you plan to use a Solr integration framework that handles indexing data, such as Sunspot for Ruby on Rails, then you can follow the documentation for that framework and skip this chapter for now. Solr 3 Enterprise Search Server


  2. For example, some years ago, the summer students at the National Solar Observatory in Sunspot, New Mexico, made it appear that the party one of the scientists was throwing after the annual volleyball match between the staff and the students was in fact a victory party for the. Java Network Programming 4th Edition



1731、单词 dofn 的匹配文本:


  1. FlumeJava includes subclasses of DoFn, e.g., MapFn and FilterFn, that provide simpler interfaces in special cases. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  2. All the parallelDo methods take a DoFn implementation, which performs the actual operation on the collection in MapReduce. Hadoop in Practice



1732、单词 elvis 的匹配文本:


  1. The private constructor is called only once, to initialize the public static final field Elvis.INSTANCE. Effective Java 2nd Edition


  2. Note that because the user Elvis Presley has a space in his username, a backslash must be used to escape the space. Cassandra The Definitive Guide


  3. This expression is commonly referred to as the Elvis operator. Spring in Action 4th Edition



1733、单词 presplit 的匹配文本:


  1. We will cover how to presplit tables in Chapter 9, Advanced Configurations and Tuning. HBase Administration Cookbook


  2. Finally, splits.txt is used to help presplit our newly created acled table. Hadoop RealWorld Solutions Cookbook


  3. Tables can also be presplit at the time of table creation. HBase in Action


  4. The createTable() method of the administrative API, as well as the shell’s create command, both take a list of split keys, which can be used to presplit a table when it is. HBase:The Definitive Guide



1734、单词 referrer 的匹配文本:


  1. That’s where they must be coming from.” A quick referrer check reveals that indeed many of the new customers are coming from a single site. CouchDB The Definitive Guide


  2. The target URL can be configured using either a request parameter or the referrer header from the request. Pro Spring Security


  3. As of JRockit Mission Control 4.0.0, there is a menu alternative for letting JRockit automatically look for the path back to the root referrer. Oracle JRockit The Definitive Guide


  4. Some of the attributes of interest include, but are not limited to, the request rate, user agent, client IP address, request type, path, response status, response length, response time, referrer, and/or specific request or response headers. Java Performance


  5. David Funk contributed three use cases on in-site referrer identification, sessionization, and counting unique visitors. Programming Hive



1735、单词 preprocessor 的匹配文本:


  1. The preprocessor then checks the resulting parse tree for additional semantics that the parser can’t resolve. High Performance MySQL 3rd Edition


  2. You can see the substitutions that the preprocessor made by executing Pig with the -dryrun option. Hadoop:The Definitive Guide 3rd Edition


  3. There can only be one active preprocessor in use at any given time. Oracle JRockit The Definitive Guide


  4. Another solution is to write a mapper as a preprocessor that filters all records that look like metadata. Hadoop in Action


  5. It is possible to write preprocessors to automatically achieve many of the optimizations you can get with optimizing compilers; in fact, you can think of an optimizing compiler as a preprocessor together with a basic compiler (though in many cases it is better described as a postprocessor and recompiler) Java Performance Tuning 2nd Edition


  6. When using parameter substitution, all parameters in your script must be resolved after the preprocessor is finished. Programming Pig


  7. What appears to be a function could in reality be a preprocessor macro. Understanding MySQL Internals



1736、单词 symlink 的匹配文本:


  1. A link can be set up either as a hard link (sometimes spelled hardlink) or as a symbolic link (also called symlink or softlink) Pro Java 7 NIO.2


  2. Verify that the symlink from /etc/rcX.d exists for the run-level. Monitoring with Ganglia


  3. This flag is often used to pass  addCacheFile() with the executable to be used for the mapper,  symlink combiner, or reducer to the tasks. Pro Hadoop


  4. In order to support AMI type images, you need to set up /boot/guest symlink/ directory in Dom0 bk-compute-adminguide-grizzly


  5. As root, untar the tarball into /usr/local/lib and create a symlink from /usr/ local/hbase to the newly created directory. HBase in Action


  6. Hadoop also supports creating symlinks to the DistributedCache files in the working directory of the computation by adding a fragment with the desired symlink name to the URI. Hadoop MapReduce Cookbook


  7. The remaining distributed cache API method on Job is createSymlink(), which creates symbolic links for all the files for the current job when they are localized on the task node. Hadoop:The Definitive Guide 3rd Edition


  8. We moved it to the desired location, uncompressed it, and created a convenience symlink to the location. Hadoop Beginners Guide


  9. The simplest way to relocate conf is to move the directory where you want it and create a symlink to the new location: Hadoop Operations


  10. Then create a symlink between the journal directory and the auxiliary volume. MongoDB in Action



1737、单词 pcs 的匹配文本:


  1. Each cluster consists of thousands of commodity PCs organized into racks with high intra-rack bandwidth. Pregel  -  A System for Large-Scale Graph Processing


  2. The requirements for small, tight, and platform-neutral code led the team to resurrect the model that some Pascal implementations tried in the early days of PCs. Core Java Volume I Fundamentals 9th Edition


  3. It is estimated that more people will be accessing the Web from smartphones than from desktop PCs by the time you are reading this book. Monitoring with Ganglia


  4. The major contributions of this work are a simple and powerful interface that enables automatic parallelization and distribution of large-scale computations, combined with an implementation of this interface that achieves high performance on large clusters of commodity PCs. MapReduce - Simplied Data Processing on Large Clusters


  5. But what does that mean? For starters, we are not talking about desktop PCs, but server-grade machines. HBase:The Definitive Guide


  6. You can find it running everywhere: on super computers, servers, set top boxes, PCs, phones, tablets, routers, and robots. Spring Roo in Action


  7. For example, a machine with four times the power of a standard PC costs a lot more than putting four such PCs in a cluster. Hadoop in Action


  8. By the 1980s, not only were graphical terminals available, but PCs were also invented and terminal emulation software quickly became common. ActiveMQ in Action


  9. Combining more than 15,000 commodity-class PCs with fault-tolerant software creates a solution that is more cost-effective than a comparable system built out of a smaller number of high-end servers. Web search for a planet the google cluster architecture


  10. Home users are expected to migrate away from PCs to tablets and smartphones. Java SE 8 for the Really Impatient



1738、单词 const 的匹配文本:


  1. C++ Note const is a reserved Java keyword, but it is not currently used for anything. Core Java Volume I Fundamentals 9th Edition


  2. C++ is the best example of this, as it has a rich set of variable styles, such as volatile, const, pointers, and references. Scala in Depth


  3. The tag item, above, determines which item of the union is to be used: const_value_index. The Java Virtual Machine Specification Java SE 7 Edition


  4. Because the query optimizer has a known quantity (the value in the WHERE clause) to use in the lookup, this table’s ref type is const. High Performance MySQL 3rd Edition


  5. Keyword: one of abstract   continue   for          new         switch assert     default    if           package     synchronized boolean    do         goto         private     this break      double     implements   protected   throw byte       else       import       public      throws case       enum       instanceof   return      transient catch      extends    int          short       try char       final      interface    static      void class      finally    long         strictfp    volatile const      float      native       super       while. The Java Language Specification Java SE 7 Edition


  6. Suppose that our  were a type constructor  that takes any type to M ConstInt , so that  throws away its type argument  and just gives us Int ConstInt[A] A :Int. Functional Programming in Scala


  7. Since Java strings are meant to be immutable, it is very important that you treat the const seriously and do not try to write into this character array. Core Java Volume II Advanced Features 9th Edition


  8. Note that const and goto are reserved but aren’t actually used in the language. Java in a Nutshell 5th Edition


  9. The path is a parameter of the call of type const char* ZooKeeper Distributed Process Coordination


  10. A call to remove_const( ) to remove constants from ORDER BY and GROUP BY expressions. Understanding MySQL Internals



1739、单词 ambari 的匹配文本:


  1. Next, we will introduce Hadoop-specific monitoring systems Ambari and Chukwa. Hadoop Operations and Cluster Management Cookbook


  2. Ambari — This is a project aimed at simplifying Hadoop management by providing support for provisioning, managing, and monitoring Hadoop clusters. Professional Hadoop Solutions



1740、单词 rds 的匹配文本:


  1. In our experience, most of them are using the Amazon Web Services (AWS) platform: specifically Amazon’s Elastic Compute Cloud (EC2), Elastic Block Store (EBS) volumes, and, to a lesser extent, the Relational Database Service (RDS) High Performance MySQL 3rd Edition


  2. Currently supported preconditions include successful completion of a bash script, existence of data, reaching of a specific time or a time interval relative to another event, and existence of an S3 object or DynamoDB or RDS table. Professional Hadoop Solutions


  3. Considering RDS There is another AWS service that we've not mentioned before that does deserve an introduction now. Hadoop Beginners Guide


  4. You can use the Amazon RDS (Relational Data Service), which is based on MySQL, or another, in-house database server as a metastore. Programming Hive



1741、单词 jonathan 的匹配文本:


  1. The actual browser was built by Patrick Naughton and Jonathan Payne and evolved into the HotJava browser. Core Java Volume I Fundamentals 9th Edition


  2. Jonathan Wilcox, Esq., has sifted through my corporate structure and turned over every possible rock that might hide scorpions, and frog-marched us through the process of putting everything straight, legally. Thinking in Java 4th Edition


  3. I probably wouldn’t have done that without the spike initiated by Jonathan Bodner, a long-term acquaintance, whom I deeply admire for his technical insight. Gradle in Action


  4. I'd like to thank my beautiful wife Wendy, and my twin sons Christopher and Jonathan, for their love and patience while I research and review. Hadoop RealWorld Solutions Cookbook


  5. After several years of experience with the language, and significant contributions by Ed Frank, Patrick Naughton, Jonathan Payne, and Chris Warth it was retargeted to the Internet, renamed, and substantially revised to be the language specified here. The Java Language Specification Java SE 7 Edition


  6. Jonathan Seidman, the primary technical editor, did a great job reviewing the. Hadoop in Practice


  7. Learning Java, by Pat Niemeyer and Jonathan Knudsen This book is a comprehensive tutorial introduction to Java, with an emphasis on client-side Java programming. Java in a Nutshell 5th Edition


  8. Shortly thereafter, the committers, led by Apache Cassandra Project Chair Jonathan Ellis, released version 0.3 of Cassandra, and have steadily made minor releases since that time. Cassandra The Definitive Guide


  9. For more information, we encourage you to read Camel in Action (Claus Ibsen and Jonathan Anstey), available from Manning Publications. ActiveMQ in Action


  10. I especially thank Jonathan Gennick for the continued support of my work and for providing the guidance to produce useful content for our readers. Java 7 Recipes A Problem-Solution Approach



1742、单词 sakila 的匹配文本:


  1. Here’s an example of profiling a view included with the Sakila sample database:10 High Performance MySQL 3rd Edition



1743、单词 javakey 的匹配文本:


  1. Java 1.1 comes with a key management system that is based upon the javakey utility. Java Security 2nd Edition


  2. In this release, the javakey program manages keys and digitally signs JAR files of Java code. Java in a Nutshell 5th Edition



1744、单词 embeds 的匹配文本:


  1. Scala takes this further and embeds them into the language. Scala in Depth


  2. For example, mod_sflow embeds sFlow instrumentation in the Apache web server. Monitoring with Ganglia


  3. Nearly every logging system we are familiar with rolls over to a new log file periodically and embeds the rollover time in the name of each log file. MapReduce a flexible data processing tool


  4. The get() method of a future task that embeds a callable task returns whatever is. Java Threads 3rd Edition


  5. We will create a test on a page which embeds the  tag within a frame. &amp;lt;span style=&amp;quot;text-decoration:underline;&amp;quot;&amp;gt;&amp;lt;em&amp;gt;Selenium Testing Tools Cookbook&amp;lt;/em&amp;gt;&amp;lt;/span&amp;gt;


  6. In addition, the execution engine embeds the Sawzall [19] language so that any built-in Sawzall function can be used. Tenzing - A SQL Implementation On The MapReduce Framework


  7. This figure demonstrates that clients connecting to the broker from within the application that embeds the broker will use the VM transport, whereas external applications connect to that embedded broker using the TCP connector, just as they would in the case of any standalone broker. ActiveMQ in Action


  8. The version of LIMO that we used embeds Lucene 2.0; if you need to use a newer version of Lucene than LIMO embeds, replace the Lucene JAR in WEB-INF/lib by removing the existing file and adding a newer one. Lucene in Action 2nd Edition


  9. The first column embeds the Navigation menu, while the second column embeds the posts overview (posts.php): The Definitive Guide to MongoDB


  10. Complex Embedded Objects In Chapter 4, we looked at embedding objects within entities, and how an embedded object becomes part of, and dependent upon, the entity that embeds it. Pro JPA2



1745、单词 multimap 的匹配文本:


  1. The PTable is a multimap, which means that the same key can occur multiple times with different values:4 Hadoop in Practice


  2. ArrayListMultimap ArrayListMulitmap is a map that uses ArrayList to store the values for the given key. Getting Started with Google Guava



1746、单词 sonatype 的匹配文本:


  1. If you’re eager to learn about it, feel free to directly jump to chapter 14, which talks about how to set up and use open source and commercial repository managers like Sonatype Nexus and JFrog’s Artifactory. Gradle in Action


  2. That is not Jenkins but a Maven repository or a repository manager such as Artifactory (http://www.jfrog.com/products.php), Apache Archiva (http://archiva.apache.org/) or Nexus (http://nexus.sonatype.org/) Jenkins Continuous Integration Cookbook


  3. Automated test generation using ScalaCheck resolvers ++= Seq( "Sonatype Snapshots" at "http://oss.sonatype.org/content/repositories/ Scala in Action


  4. Juven Xu is a software engineer from China who works for Sonatype. Jenkins The Definitive Guide


  5. Sonatype’s Nexus and JFrog’s Artifactory are two examples of products that can be used to deploy Maven-style binary repositories internally. Gradle Beyond The Basics


  6. Nexus (http://nexus.sonatype.org/) is a powerful and open source implementation of a repository manager. Spring Dynamic Modules in Action


  7. For more information about Nexus and to discover more about its features, see: http://nexus.sonatype.org/ ActiveMQ in Action



1747、单词 decremented 的匹配文本:


  1. The value of this field is decremented every time it is routed by a gateway, and when it reaches zero the datagram is discarded. Java Network Programming and Distributed Computing


  2. Since the score is both incremented and decremented, the user is not given. Java Threads 3rd Edition


  3. While the queue is not empty, a vertex v is removed, and all vertices adjacent to v have their indegrees decremented. Data Structures and Algorithm Analysis in Java 3rd Edition


  4. The queue count is updated again, decremented by 1 in this case. Java EE 7 Essentials


  5. When the buttons are clicked, the text field value is incremented or decremented (see Figure 6.38) Core Java Volume II Advanced Features 9th Edition


  6. The indentionLevel variable was incremented and decremented as each subdirectory was visited. Java 7 New Features Cookbook


  7. When used before the operand, it decrements the operand and returns the decremented value. Java in a Nutshell 5th Edition


  8. Each time the packet passes through a router, its TTL field is decremented by at least one; some routers may decrement the TTL by two or more. Java Network Programming 4th Edition


  9. When the consumer finishes the execution of the take() operation, the counter is decremented again. Java 7 Concurrency Cookbook


  10. If a dec message is received but the count cannot be decremented because it is already at MIN, the thread is blocked, resuming sometime later if and when the count becomes greater than MIN via an inc message invoked by some method running in some other thread. Concurrent Programming in Java Design Principles and Pattern



1748、单词 uis 的匹配文本:


  1. My company uses this to check the availability of Hadoop Web UIs. Apache Flume Distributed Log Collection for Hadoop


  2. In particular, the NameNode and the JobTracker use Jetty to provide web servers for their web UIs. Pro Hadoop


  3. Configuring web UI authentication By default, Hadoop users and administrators can access the web UIs of the Hadoop daemons without requiring any authentication. Hadoop Operations and Cluster Management Cookbook


  4. It doesn’t involve producing flashy UIs with cool effects, and it doesn’t require you to make brilliant designs either (don’t get us wrong, testing requires good design, but it is mostly repetitive and not as engaging as production code can be) Pro Spring MVC


  5. In the following sections we’ll describe how to integrate Spring DM with various web technologies and frameworks to create web UIs or expose web services. Spring Dynamic Modules in Action


  6. In YARN, the resource manager web UI displays all the running applications with links to the web UIs of their respective application masters, each of which displays further details on the MapReduce job, including its progress. Hadoop:The Definitive Guide 3rd Edition


  7. Another option to either temporarily change the level, or when you have made changes to the properties file and want to delay the restart, use the web-based UIs and their loglevel page. HBase:The Definitive Guide


  8. The JobTracker and TaskTracker UIs provide many other links and metrics. Hadoop in Action


  9. Another thing to acknowledge is that if you are developing a game, media player, or the usual enterprise application, JavaFX will not only assist in developing richer UIs but. Java 7 Recipes A Problem-Solution Approach



1749、单词 drupal 的匹配文本:


  1. So, if a company has Drupal-based e-commerce site, they can integrate Apache Solr application and provide its rich faceted search to the user. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr


  2. Other publications in which Michael has been involved include Mobile Web Development and Drupal for Education and E-Learning, both of which he acted as technical reviewer for. Jenkins Continuous Integration Cookbook


  3. He is also a well-known speaker who delivers talks on Drupal, Open Source, PHP, Moodle, and so on, along with organizing and delivering TechTalks in Drupal meetups and Drupal Camps in Mumbai, India. Mastering ElasticSearch


  4. Drupal options Drupal is a very successful open source Content Management System (CMS) that has been used for building everything from the WhiteHouse.gov site to political campaigns and university websites. Solr 3 Enterprise Search Server



1750、单词 colophon 的匹配文本:


  1. Colophon The animal on the cover of Monitoring with Ganglia is a Porpita pacifica, which is found in the tropical Pacific. Monitoring with Ganglia


  2. Colophon The animal on the cover of High Performance MySQL is a sparrow hawk (Accipiter nisus), a small woodland member of the falcon family found in Eurasia and North Africa. High Performance MySQL 3rd Edition


  3. Colophon The animal on the cover of CouchDB: The Definitive Guide is a Pomeranian dog (Canis familiaris), a small variety of the generally larger German Spitz breed, named for the Baltic region of Pomerania (today spilt between northeastern Germany and northern Poland) where it was first bred. CouchDB The Definitive Guide


  4. Colophon The animal on the cover of MongoDB: The Definitive Guide, Second Edition is a mongoose lemur, a member of a highly diverse group of primates endemic to Madagascar. MongoDB The Definitive Guide 2nd Edition


  5. Colophon The animal on the cover of Jenkins: The Definitive Guide is an ornate chorus frog (Pseudacris ornata) Jenkins The Definitive Guide


  6. Colophon The animal on the cover of Gradle Beyond the Basics is a Belgian shepherd dog (Tervuren) Gradle Beyond The Basics


  7. Colophon The animals on the cover of Java EE 7 Essentials are Asiatic glassfish (members of the family Ambassidae) Java EE 7 Essentials


  8. Colophon The animal on the cover of Programming Hive is a European hornet (Vespa cabro) and its hive. Programming Hive


  9. Colophon The animal on the cover of Building and Testing with Gradle, first edition, is a bush wren. Building and Testing with Gradle


  10. Colophon The animal on the cover of Understanding MySQL Internals is a banded broadbill (Eurylaimus javanicus) Understanding MySQL Internals



1751、单词 1990s 的匹配文本:


  1. He has studied graphic design in New York, in the late 1990s. HBase Administration Cookbook


  2. In the 1990s, he moved to the United States, where he focused on client/server applications. Pro Hadoop


  3. In the early 1990s a team at Sun Microsystems began work on a language for the embedded systems market. Java Network Programming and Distributed Computing


  4. In the 1990s, threaded programs began to exploit the growing number of computers. Java Threads 3rd Edition


  5. The impedance mismatch is a major source of frustration to application developers, and in the 1990s many people believed that it would lead to relational databases being replaced with databases that replicate the in-memory data structures to disk. NoSQL Distilled


  6. He dabbled with web development in the late 1990s and was an expert in HTML, CSS, and JavaScript by the time he finished school. Beginning CouchDB


  7. Since the late 1990s, IBM, Apache, and others have been instrumental in producing high-quality Java libraries for XML processing. Core Java Volume II Advanced Features 9th Edition


  8. When Tim Berners-Lee first worked on the Web in the early 1990s, it was for the purpose of exchanging scientific documents between PhDs at a physics laboratory. Cassandra The Definitive Guide


  9. Back in the good old days of the Net, circa the early 1990s, we didn’t have the Web and HTTP and graphical browsers. Java Network Programming 4th Edition


  10. Some time in the 1990s, TcX customers began to push for an SQL interface to their data. Understanding MySQL Internals



1752、单词 appendable 的匹配文本:


  1. The Joiner class can be used with classes that implement the Appendable interface. Getting Started with Google Guava


  2. Appendable is a Java 5.0 interface that represents an object that can have a char or a CharSequence appended to it. Java in a Nutshell 5th Edition



1753、单词 interprocess 的匹配文本:


  1. However, shared variables make communication between threads more efficient and easier to program than interprocess communication. Core Java Volume I Fundamentals 9th Edition


  2. One camp of developers believes actors should really be used for interprocess communication, like in Erlang. Programming Concurrency on the JVM


  3. Serialization appears in two quite distinct areas of distributed data processing: for interprocess communication and for persistent storage. Hadoop:The Definitive Guide 3rd Edition


  4. Nevertheless, by supporting JMS, Spring Integration provides a bridge between its simple, lightweight intraprocess messaging and the interprocess messaging that JMS enables across many MOM providers. Spring Integration in Action


  5. These byte-stream classes are used for serializing and deserializing the internal state of objects for storage or interprocess communication. Java in a Nutshell 5th Edition


  6. Event correlation When none of these steps reveal anything interesting, follow the series of events that led to the failure, which usually involves intermachine, interprocess event correlation. Hadoop Operations


  7. Specifically, if local procedure calls have an average time overhead of one unit, a local interprocess call incurs an overhead of about 100 units. Java Performance Tuning 2nd Edition


  8. Processes are generally not allowed to access one another's storage locations (although there are usually some exceptions), and must instead communicate via interprocess communication facilities such as pipes. Concurrent Programming in Java Design Principles and Pattern



1754、单词 enqueued 的匹配文本:


  1. The other half are enqueued and run as soon as threads become available. Programming Concurrency on the JVM


  2. Our schedulers process one request at a time, so a busy scheduler will cause enqueued jobs to be delayed. Omega - flexible, scalable schedulers for large compute clusters


  3. One alternative approach is called active objects or actors.26  The reason the objects are called "active" is that each object maintains its own worker thread and message queue, and all requests to that object are enqueued, to be run one at a time. Thinking in Java 4th Edition


  4. Any subsequent requests on the connection will occur after the enqueued operation is processed. MongoDB The Definitive Guide 2nd Edition


  5. Implement an appropriate shutdown hook to ensure that if a job is killed for any reason, queue elements are restored (enqueued back to the queue) Professional Hadoop Solutions


  6. Enqueued Messages The second approach is to connect your spouts to a queue system that will receive the messages from the message emitters and will leave the messages available for consumption by the spouts. Getting Started with Storm


  7. The flush queue size (IV) is the number of enqueued regions that are being flushed next. HBase:The Definitive Guide


  8. If all goes well, the delayEvents channel should have a message enqueued whose payload is actually a FlightDelayEvent instance. Spring Integration in Action


  9. A Reference object is enqueued on its ReferenceQueue at some point after the garbage collector determines that the referent object has become appropriately unreachable. Java in a Nutshell 5th Edition


  10. When a compilation is requested it is enqueued in a list that is monitored by one or more compiler threads. Java Performance



1755、单词 mtom 的匹配文本:


  1. The SOAP Message Transmission Optimization Mechanism (MTOM) together with XML-binary Optimized Packaging (XOP) were proposed to address the inefficiencies encountered in the transmission of binary data in SOAP documents. Java Performance



1756、单词 xtra 的匹配文本:


  1. They have also contributed directly to that improvement via XtraDB and XtraBackup. High Performance MySQL 3rd Edition



1757、单词 omits 的匹配文本:


  1. Java omits many rarely used, poorly understood, confusing features of C++ that, in our experience, bring more grief than benefit. Core Java Volume I Fundamentals 9th Edition


  2. Do not use equals in path extension: If checked, omits the use of = when capturing the rewrite URL. Performance Testing With JMeter 2.9


  3. In addition to that, we need to specify the search type: we switch to the scan mode that omits sorting and fetching documents, so the first query returns only the number of documents found and the scroll identifier which can be used in the second query. Mastering ElasticSearch


  4. However, nothing prevents me from having two public keys with different DNs (I might have one for personal use that omits references to my place of employment) Java Security 2nd Edition


  5. The alternative containing the optional symbol actually specifies two right-hand sides, one that omits the optional element and one that includes it. The Java Language Specification Java SE 7 Edition


  6. Summary This short overview of Nutch necessarily omits many details, such as error handling, logging, URL filtering and normalization, dealing with redirects or other forms of “aliased” pages (such as mirrors), removing duplicate content, calculating PageRank scoring, etc. Hadoop:The Definitive Guide 3rd Edition


  7. Adding the WhileMatchFilter for the second scan shows its behavior to stop the entire scan operation, once the wrapped filter omits a row or column. HBase:The Definitive Guide


  8. This is incorrect, as it omits consideration of the replication factor and the need for temporary space. Hadoop Beginners Guide


  9. Passing null for this argument omits the scheme, thus creating a relative URI. Java Network Programming 4th Edition


  10. Each port takes some and omits some of the concepts from Lucene, but they all mimic its architecture. Lucene in Action 2nd Edition



1758、单词 jarsigner 的匹配文本:


  1. Java code can be signed, which entails obtaining digital certificates and running the jarsigner (or equivalent) tool. Java Security 2nd Edition


  2. She then uses the jarsigner tool to add the signature to the file. Core Java Volume II Advanced Features 9th Edition


  3. Description jarsigner adds a digital signature to the specified jarfile, or, if the -verify option is specified, it verifies the digital signature or signatures already attached to the JAR file. Java in a Nutshell 5th Edition



1759、单词 readahead 的匹配文本:


  1. While visiting a conference, I learned that one performance bottleneck was the Linux kernel readahead ability. Monitoring with Ganglia


  2. Disabling read-ahead Readahead optimizes device access by noticing and predicting read patterns, and requesting data from the device when it believes that it will be needed in the future. High Performance MySQL 3rd Edition


  3. If your readahead is set appropriately and your virtual machine just won’t use all the memory it should, you may just have to switch virtual machines. MongoDB The Definitive Guide 2nd Edition


  4. For example, disk hardware caches almost always apply a readahead algorithm: the cache is filled with the next block of data after the one just read. Java Performance Tuning 2nd Edition



1760、单词 steve 的匹配文本:


  1. Steve Hoffman has 30 years of software development experience and holds a B.S. Apache Flume Distributed Log Collection for Hadoop


  2. One of the perks of writing this book was getting to know Steve Peter, who endured the first draft of this book as the initial development editor. Programming Concurrency on the JVM


  3. Along with them, Steve Morris, James Harvey, and Sergey Kolychev put up with my seemingly constant experimentation on the Yahoo! Finance MySQL servers, even when it interrupted their important work. High Performance MySQL 3rd Edition


  4. Read all about improving client experience with proper use of HTTP from Steve Souders, web performance guru. CouchDB The Definitive Guide


  5. Steve Wilson, and Tim Cramer for supporting us in our work over the past six years. Java Threads 3rd Edition


  6. Although I was intrigued at first blush, I owe my deeper exploration and enthusiasm for the language to two individuals: David Pollak, creator of the Lift web framework, and Steve Jenson, a former colleague at Twitter and generally brilliant programmer. Programming in Scala 2nd Edition


  7. Finally, Steve Anglin and the Apress team have been a total pleasure to work with, and they carry on Gary’s vision of Apress as the author’s publisher. Beginning Scala


  8. Currently the best way to measure the component parts of Web Services seems to be to explicitly add logging points (see, for example, Steve Souza's Java Application Monitor at http://www.JavaPerformanceTuning.com/tools/jamon/index.shtml) Java Performance Tuning 2nd Edition


  9. Thanks especially to Jos Marlowe and Steve Heller for providing opportunities to work collaboratively on fun and exciting research and development projects. Concurrent Programming in Java Design Principles and Pattern


  10. I also would like to thank Steve Anglin for believing in my abilities to author books on the Java technology for Apress. Java 7 Recipes A Problem-Solution Approach



1761、单词 autowarm 的匹配文本:


  1. You can also reduce the amount of time auto-warming takes by reducing the autowarmCount and removing the newSearch query. Solr 3 Enterprise Search Server


  2. As you can see, I tend to use the same number of entries for size and initialSize, and half of those values for the autowarmCount. Solr 3.1 Cookbook


  3. Every Solr cache supports an autowarmCount attribute that indicates either the maximum number of objects or a percentage of the old cache size to auto-warm. Solr in action


  4. As you can see, I tend to use the same number of entries for size and initialSize, and half of those values for autowarmCount. Apache Solr 4 Cookbook



1762、单词 zeromq 的匹配文本:


  1. Certain advanced features such as sFlow, zeromq, and Graphite support may belie the use of gmetad and/or gweb; see Chapter 3 for details.) Monitoring with Ganglia


  2. However, the node name must be valid within an AMQP key, and if using ZeroMQ, a valid hostname, FQDN, or IP address. bk-compute-adminguide-grizzly


  3. Options like ActiveMQ, ZeroMQ, and Apache Qpid all providing different open source approaches to message queuing. RabbitMQ in Action


  4. ZeroMQ, the image of a fourhorn sculpin, and related trade dress are trademarks of O’Reilly Media, Inc. ZeroMQ


  5. ZeroMQ is an available option in the configuration file, but has not been tested and should be considered experimental. bk-admin-guide-cloud-latest


  6. Underneath, Storm makes use of zeromq (0mq, zeromq), an advanced, embeddable networking library that provides wonderful features that make Storm possible. Getting Started with Storm


  7. The choice of RabbitMQ over other AMQP compatible options that are gaining support in OpenStack, such as ZeroMQ and Qpid is due to its ease of use with Ubuntu and significant testing in production. OpenStack Operations Guide



1763、单词 billy 的匹配文本:


  1. Here's an example choosing the dismax parser along with two local-params and a query string of "billy corgan": Solr 3 Enterprise Search Server


  2. The relationships are key here in establishing the semantic context: namely, that Billy follows Harry, and that Harry, in turn, follows Billy. Graph Databases


  3. After all, you’re just posting to mom what little Billy ate for breakfast, and if it gets lost, it doesn’t really matter. Cassandra The Definitive Guide



1764、单词 sarah 的匹配文本:


  1. I’m deeply grateful to my wife Sarah for her unending support and optimism. Gradle in Action


  2. If Sarah is interested in Java, graphs, and REST, Ben in graphs and REST, and Charlie in graphs, cars, and medicine, then there is a likely tie between Sarah and Ben based on their mutual interest in graphs and REST, and another tie between Sarah and Charlie based on their mutual interest in graphs, with the tie between Sarah and Ben stronger than the one between Sarah and Charlie (two shared interests versus one) Graph Databases


  3. He lives with his wife Sarah and his son Kaydyn, and is desperately trying (and sadly failing) to come to grips with Mandarin and Cantonese. The Definitive Guide to MongoDB


  4. This book is dedicated to my wife, Sarah, and my. Understanding MySQL Internals



1765、单词 puppetd 的匹配文本:


  1. If you would like some control over the sequence and timing of the Puppet runs, you can use the MCollective puppetd agent and forgo the polling behavior of the agent daemon. Managing Infrastructure with Puppet


  2. You first need to enable reporting on our Puppet clients by setting the report option in the [puppetd] section of the puppet.conf file to true. Pro Puppet



1766、单词 repr 的匹配文本:


  1. We’ve dropped the hashCode early exit in our code, as checking the repr member is just as performant in our particular class. Scala in Depth


  2. The type parameter, Elem, stands for the element type of the traversable whereas the type parameter Repr stands for its representation. Programming in Scala 2nd Edition


  3. Not because the constructor is erroneous, but we need the a and b instances to have a repr method, in order for the repr method of ReprPlusD to compile: Steps in Scala An Introduction to Object-Functional Programming



1767、单词 debuggers 的匹配文本:


  1. This is extremely useful for systems that need to analyze objects at runtime, such as Java GUI builders, smart debuggers, pluggable components, and object databases. Core Java Volume I Fundamentals 9th Edition


  2. Table 7-3 describes the parameters to the JPDA debugging agent, agentlib:jdwp, that must be enabled in the task JVM to allow connections from debuggers. Pro Hadoop


  3. There are some exceptions: debuggers, profilers, and just-in-time code generators can each require access to elements of the Java Virtual Machine that are normally considered to be “under the hood.” Where appropriate, Oracle works with other Java Virtual Machine implementors and with tool vendors to develop common interfaces to the Java Virtual Machine for use by such tools, and to promote those interfaces across the industry. The Java Virtual Machine Specification Java SE 7 Edition


  4. As a result, they were used to doing it the C way, ignoring errors in code and using debuggers to track down problems. Thinking in Java 4th Edition


  5. Tools for working with JavaScript, debuggers, test harnesses, IDE support, and more began to emerge. Testable JavaScript


  6. These abstractions enable an entire pipeline to be initially developed and tested on small in-memory test data, running in a single process, and debugged using standard Java IDEs and debuggers, and then run completely unchanged over large production data. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  7. The greatest help comes from visualization aids and debuggers that can untangle thread and lock dependencies. Oracle JRockit The Definitive Guide


  8. Building a general-purpose language and all the associated tools, such as IDEs and debuggers, is a considerable undertaking; also, there is no lack of such languages already. Programming Pig


  9. To achieve this goal, it is essential to use an IDE that integrates under one common interface several tools (compilers and debuggers) that facilitate the development of applications. Java 7 Concurrency Cookbook



1768、单词 incr 的匹配文本:


  1. The DML group includes the commands count, delete, deleteall, get, get_counter, incr, put, scan, and truncate. HBase Administration Cookbook


  2. Use memcached There’s an incr() function in the memcached API that can increment a number atomically and return the result. High Performance MySQL 3rd Edition


  3. To post an article, we first create an article ID by incrementing a counter with INCR. Redis in Action


  4. As a more concrete example I give you the incr, incrby, decr and decrby commands. The Little Redis Book


  5. Group name: dml Commands: count, delete, deleteall, get, get_counter, incr, put, scan, truncate. HBase in Action


  6. Every call to incr returns the new value of the counter. HBase:The Definitive Guide


  7. You call incrCounter() with the name of the counter and the amount to increment. Hadoop in Action


  8. On a visit to a given page, a simple INCR command would update the counter in Redis: INCR visits:635:totals. Redis Cookbook



1769、单词 spnego 的匹配文本:


  1. Web UI authentication is implemented with the HTTP SPNEGO protocol. Hadoop Operations and Cluster Management Cookbook


  2. When Hadoop security is implemented to utilize Kerberos, users authenticate to the edge of the cluster via Kerberos RPC, and web consoles utilize HTTP SPNEGO Kerberos authentication. Professional Hadoop Solutions



1770、单词 unauthenticated 的匹配文本:


  1. So even though this link is not available for an unauthenticated user, one can simply start it by copy/pasting the name of the flow in the browser’s address bar, and the page will load. Pro Spring MVC


  2. It needs this so it can redirect unauthenticated users to the login page when they attempt to access a protected resource. Spring in Practice


  3. Typically, a software system will be divided into two high-level realms, such as unauthenticated (or anonymous) and authenticated, as shown in the following screenshot: Spring Security 3.1


  4. Applications are encouraged to use the Run As capability in cases where component may be unauthenticated and needs to call EJB components. Java EE 7 Specification


  5. If a client sends an unauthenticated opening handshake request for a WebSocket that is protected by the security mechanism, a 401 (Unauthorized) response to the opening handshake request is returned and the WebSocket connection is not initialized. Java EE 7 Essentials


  6. For example, the following code fragment has the effect of enabling anonymous, unauthenticated connections on the SSLServerSocket server. Java Network Programming 4th Edition


  7. Oh, and OpenStack Object Storage communicates internally with unencrypted, unauthenticated rsync for performance - you do want the private network to be private. OpenStack Operations Guide



1771、单词 codebases 的匹配文本:


  1. One of these, from my own codebases, was an Executor that would schedule tasks on the Abstract Windows Toolkit (AWT)-rendering thread. Scala in Depth


  2. Having an IDE might not interest you because of powerful editing tools like Emacs and TextMate, but having refactoring support is great when working on large codebases. Scala in Action


  3. A word about how we’re using Spring Modules JCR Spring Modules is a defunct project that includes several useful Spring-style libraries for integrating with various noncore APIs and codebases, including Ehcache, OSCache, Lucene, and JCR. Spring in Practice


  4. In order for the applet to be able to talk to the stock quote server, both codebases must contain the appropriate socket permissions.[1] Java Security 2nd Edition


  5. This makes them ideal to run alongside existing Java codebases. Functional Programming Patterns in Scala and Clojure


  6. This section only discusses the source code provided with Kafka codebases for Hadoop; no other third-party solution for Kafka and Hadoop integrations is discussed. Apache Kafka


  7. This policy is less liberal than granting all permissions to all codebases but is more liberal than a policy that grants the minimal permissions to run the jstatd server. Java Performance



1772、单词 ipod 的匹配文本:


  1. This will search for exactly "ask hn" and, optionally, "ipod" MongoDB The Definitive Guide 2nd Edition


  2. This means that if either i-pod (one token) or i then pod (two tokens) are found in the incoming token stream to this filter, then they are replaced with ipod. Solr 3 Enterprise Search Server


  3. The iOS simulator enables you to test your web applications without using an actual device, whether it's an iPhone or any other iOS device, such as iPad or iPod Touch. Selenium Testing Tools Cookbook


  4. Intuitively, the ordering makes sense because the query term "iPod" occurs three times in the first document listed, twice in the name and once in the features; it only occurs once in. Solr in action


  5. The English language has about one million words, a size that fits comfortably into an iPod, but our word counting program will deal with many unique words not found in any standard English dictionary. Hadoop in Action


  6. As expected, the iPod dock is returned from the method call. Spring Data Modern Data Access for Enterprise Java


  7. Working with iOS iPhones and iPod Touches are such commonplace these days. Selenium 2 Testing Tools Beginner's Guide



1773、单词 ipv6 的匹配文本:


  1. For disabling IPv6, open sysctl.conf (which you will find in /etc) and put the following configuration at the end of the file: Web Crawling and Data Mining with Apache Nutch


  2. Ganglia will not allow IPv6=>IPv4 mapping (for portability and security reasons) Monitoring with Ganglia


  3. IPv4/IPv6 dual stack mode works with VlanManager and FlatDHCPManager networking modes. bk-compute-adminguide-grizzly


  4. In IPv6, broadcast doesn’t work at all: you always have to use multicast. ZeroMQ


  5. Currently, there are no errors provided if you configure IPv6 addresses via the API. bk-admin-guide-cloud-latest


  6. If you’re set on using localhost, disabling IPv6 will also fix this issue. Beginning CouchDB


  7. The java.net package supports IPv6 Internet addresses, provided the host operating system does. Core Java Volume II Advanced Features 9th Edition


  8. An IPv6 address is normally written as eight blocks of four hexadecimal digits separated by colons. Java Network Programming 4th Edition



1774、单词 uninstall 的匹配文本:


  1. Finally, if you need to uninstall the Jenkins service, you can do one of two things. Jenkins The Definitive Guide


  2. You’ll learn how to enable plugins and, in case you don’t need their functionality anymore, you’ll also see how to uninstall them. RabbitMQ in Action


  3. Run as a service on Windows To install or uninstall the Windows service, simply execute one of the following scripts as administrator respectively: Sonar Code Quality Testing Essentials


  4. Uninstall nova-network and reboot any physical nodes that have been running nova-network before using them to run Networking. bk-admin-guide-cloud-latest


  5. To remove the nova client, run the following command: $ sudo pip uninstall python-novaclient. api-quick-start-onepager


  6. To uninstall the package we would change the value of this attribute to absent. Pro Puppet


  7. The action attribute supports five values that are the equivalent of the methods of the Bundle interface: install, start, update, stop, and uninstall. Spring Dynamic Modules in Action


  8. As the add-on developer, you may wish to provide a remove command so that you can clean up after yourself before developers uninstall your add-on. Spring Roo in Action


  9. The installUI and uninstallUI methods were concerned with performing any initialization required to perform decoration. Java 7 New Features Cookbook


  10. Caution  If you have previously installed an older version of setuptools, then you will need to uninstall that version using your system’s Add/Remove Programs feature before installing the newer version. The Definitive Guide to MongoDB



1775、单词 invalidating 的匹配文本:


  1. Changes to method names can then be made, without invalidating previously serialized objects. Java Network Programming and Distributed Computing


  2. Even a 30% hit rate can be very helpful, because the work saved by not executing queries could be much more (per query) than the overhead of invalidating entries and storing results in the cache. High Performance MySQL 3rd Edition


  3. Using JMS in this case would be overkill, because the process of invalidating the product’s entry in the cache is quick and is not business critical. Pro Spring 3


  4. You can easily fix this by invalidating the output and force a re-execution of your tests by adding the following snippet to your Gradle file: Jenkins The Definitive Guide


  5. This allows you to easily add new nodes without invalidating the existing vector stamps. NoSQL Distilled


  6. The last parameter (the autowarmCount parameter) says how many entries should be copied when Solr is invalidating caches (for example, after a commit operation) Solr 3.1 Cookbook


  7. Our first example demonstrates how to specify invalidating a cache entry after loading it into the cache: Getting Started with Google Guava


  8. By now, you should know that objects cannot just be moved from the old cache to the new cache because the underlying index has changed, thus invalidating cached objects like filters. Solr in action


  9. Nor did we cover issues such as Avro's ability to support schema evolution that, for example, allows new fields to be added to recent records without invalidating old datums or breaking existing clients. Hadoop Beginners Guide


  10. It’s also important to use the -norandkey option to ktadd, otherwise each time you export the key, it changes, invalidating all previously created keytabs containing that key. Hadoop Operations



1776、单词 suffixes 的匹配文本:


  1. About the Domain Name System (DNS) and domain name suffixes (such as .com) Java Network Programming and Distributed Computing


  2. Of course, there are probably several ways, many that I have never imagined, but the one I alluded to utilizes suffixes. Testable JavaScript


  3. Actions IDs for the particular Coordinator application contain suffixes that show the order of action start. Professional Hadoop Solutions


  4. The drop and take operations generalize tail and init in that they return arbitrary prefixes or suffixes of a list. Programming in Scala 2nd Edition


  5. For a given , tails unfold Stream returns the  of suffixes of the input sequence, starting with thetails Stream. Functional Programming in Scala


  6. In the sample program in Listing 7.7, we want to find all file suffixes of all available readers so that we can use them in a file filter. Core Java Volume II Advanced Features 9th Edition


  7. All command line options that require a numerical value that controls the size of some attribute in kilobytes, megabytes, or gigabytes accept the following suffixes: g, m, k. Java Performance


  8. Both JavaScript files allow customization with features like debug mode to alert you to what is happening, modifier field suffixes, specifying whether to submit the form upon construction, and more. Lucene in Action 2nd Edition


  9. A series of file suffixes are passed to the endsWith() method to determine what type of file is represented by the filename variable. Java 7 Recipes A Problem-Solution Approach


  10. For the numeric option values, K, M, or G suffixes can be used to indicate kilobytes, megabytes, or gigabytes. Understanding MySQL Internals



1777、单词 aes 的匹配文本:


  1. To achieve this, a splittable Advanced Encryption Standard (AES) codec implementation is being introduced to Hadoop, allowing distributed data to be encrypted and decrypted from disk. Professional Hadoop Solutions


  2. Anti-Entropy Repair, also called Anti-Entropy Service or AES, is a process where nodes compare their data and ensure data is replicated properly and up-to-date. Cassandra High Performance Cookbook


  3. A far better alternative is its successor, the Advanced Encryption Standard (AES) Core Java Volume II Advanced Features 9th Edition


  4. For Java to support AES-256, an additional JCE policy file must be installed on all machines in the cluster as well as any client machines that wish to connect to it. Hadoop Operations


  5. Besides key lengths, there’s an important difference between DES/AES and RC4-based ciphers. Java Network Programming 4th Edition



1778、单词 walkthrough 的匹配文本:


  1. Here, we’ll walkthrough a simple cluster configuration, using the minimum HDFS setup necessary to bring up the cluster. Pro Hadoop


  2. There are basic configuration decisions to make, and the OpenStack Install Guide covers a basic walkthrough. bk-compute-adminguide-grizzly


  3. The following figure shows this amount of abstraction, followed by a walkthrough of the details. Professional Hadoop Solutions


  4. Walkthrough of a Sample Application PURPOSE: In this section, you will download the sample application to be used in this hands-on lab. Java EE 7 Essentials


  5. A walkthrough of method generation in JRockit Let us now take a look at what happens on the road from bytecode to native code in the JRockit JIT compiler. Oracle JRockit The Definitive Guide


  6. So, first the code, and then a walkthrough of the code: Beginning Scala


  7. We'll do a more detailed walkthrough of the mechanics of MapReduce in the next section, but for now let's look at the preceding code and think of how it realizes the key/value transformations we talked about earlier. Hadoop Beginners Guide


  8. If the incident involved multiple systems, have the person with the most knowledge of each system handle that part of the walkthrough. Hadoop Operations


  9. See the next section for a walkthrough of a simple MapReduce program. Programming Pig


  10. Think of the following walkthrough as a practical introduction to MongoDB. MongoDB in Action



1779、单词 avl 的匹配文本:


  1. Below, we will sketch one of the oldest forms of balanced search trees, the AVL tree. Data Structures and Algorithm Analysis in Java 3rd Edition



1780、单词 outputted 的匹配文本:


  1. On some operating systems, the outputted file URL in the console is clickable, which opens the HTML report in your primary browser: Gradle in Action


  2. The plugin uses a number of these methods to discover the information that is later outputted to a properties file. Jenkins Continuous Integration Cookbook


  3. Because the method getName returns a String, the stream outputted by the map method is of type Stream

    Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. Some documents like Microsoft Excel spreadsheets contain such binary data that needs to be rendered to text when outputted by Tika. Tika in Action


  5. The classes, and whatever parameters we set (which you could also place in the database in another table), are then returned and outputted as the required YAML data. Pro Puppet


  6. The MapReduce framework will take care of calling your reducer once per unique key outputted by the mappers, along with a list of document IDs. Hadoop in Practice


  7. With multiple  reducers, we need some way to determine the appropriate one to send a (key/value) pair outputted by a mapper. Hadoop in Action



1781、单词 netflix 的匹配文本:


  1. Netflix similarly recommends DVDs that may be of interest, and famously offered a $1,000,000 prize to researchers who could improve the quality of their recommendations. Mahout in Action


  2. Consider Netflix in Amazon EC2, which has potentially thousands of machines disappearing and appearing on the network in minutes but can refresh the host list on the poller only so often. Monitoring with Ganglia


  3. One of the most publicized examples of differential privacy happened at Netflix. Professional Hadoop Solutions


  4. It is a mature product powering search for public sites such as CNET, Zappos, and Netflix, as well as countless other government and corporate intranet sites. Solr 3 Enterprise Search Server


  5. Consider how Google displays advertisements relevant to our web surfing, or how Amazon or Netflix recommend new products or titles that often match well to our tastes and interests. Hadoop Beginners Guide


  6. One of these customers was Netflix, a rather public and large-scale customer of the service. Hadoop Operations


  7. The Curator components were originally implemented and contributed by Netflix, and it has recently been promoted to a top-level project of the Apache Software Foundation. ZooKeeper Distributed Process Coordination



1782、单词 sourcing 的匹配文本:


  1. The five remaining recipes look at sourcing user data from a persistent store. Spring in Practice


  2. Event sourcing is an approach to persistence that concentrates on persisting all the changes to a persistent state, rather than persisting the current application state itself. NoSQL Distilled


  3. CouchDB has many dependencies, but fortunately you do not need to worry about sourcing all of these because MacPorts will automatically download and install them for you prior to installing CouchDB. Beginning CouchDB


  4. A key success factor for any stream processing or analytics effort is a deep understanding of the actual data and sourcing data can often be difficult. Storm Real-Time Processing Cookbook


  5. We have contributed back to open source, both in the form of contributions to some core components of Hadoop as well as by open-sourcing Hive, which is now a Hadoop top-level project. Hadoop:The Definitive Guide 3rd Edition


  6. FlockDB In April 2010, Twitter announced that they were open-sourcing to GitHub their new graph database called FlockDB. Cassandra The Definitive Guide


  7. Sourcing and storing data is one half of the equation. Hadoop Operations


  8. We’re all more than grateful for Doug Cutting’s generosity for open-sourcing Lucene itself. Lucene in Action 2nd Edition



1783、单词 dbs 的匹配文本:


  1. Imagine CouchDB installed on phones and other mobile devices that can synchronize data with centrally hosted CouchDBs when they are on a network. CouchDB The Definitive Guide


  2. As a non-admin user, though, test_user is not able to list all the available databases using the show dbs helper. MongoDB The Definitive Guide 2nd Edition


  3. The simplest example of this is the _all_dbs resource, which simply returns a JSON array with the names of all the databases stored on the CouchDB server. Beginning CouchDB


  4. I tend to include triplestores and object DBs as specialized variants. A Little Riak Book


  5. Mongo: Initiates a connection to the database and provides database server commands such as connect(), close(), listDBs(), selectDBs(), and selectCollection() The Definitive Guide to MongoDB


  6. You can now use the show dbs command to inspect all database, currently available on this instance. Spring Data Modern Data Access for Enterprise Java



1784、单词 dvd 的匹配文本:


  1. For example, if you store information about your CD and DVD collection in a single database, you may want to exchange only the CD records with another database. Getting Started with CouchDB


  2. Note A live disk is a CD or DVD that boots as a running instance, not requiring any changes to the local machine’s hard disk. Pro Hadoop


  3. If you ever need to distribute a CD-ROM- or DVD-ROM-based application that uses MySQL data files, consider using MyISAM or compressed MyISAM tables, which can easily be isolated and copied to other media. High Performance MySQL 3rd Edition


  4. For example, we can burn the downloaded operating system ISO image onto a DVD optical disk and then boot and install the operating system using this DVD. Hadoop Operations and Cluster Management Cookbook


  5. Figure 4.3 illustrates the difference between a stream and a collection applied to our DVD vs. Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. You can probably think of a few existing ones that either ship movies to you on DVD or Blu-ray, or that stream movies over the internet to one of a number of powerful computing devices such as a computer, video game system, or specialized hardware The information landscape. Tika in Action


  7. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. Professional Hadoop Solutions


  8. You can install the tools from your Mac OS X installation CDs/DVD, or alternatively you can download them from the Apple Developer Connection web site. Beginning CouchDB


  9. This is because several of the movies contained duplicate documents corresponding with different movie formats (DVD, Blue-ray, and even VHS), so the duplicate documents with the same product name were were collapsed out. Solr in action


  10. For example, assume you want to search for a DVD within your collection that is older than 1995 The Definitive Guide to MongoDB



1785、单词 invokedynamic 的匹配文本:


  1. The call site object was bound to a specific lexical occurrence of the invokedynamic instruction by the Java Virtual Machine as a result of running a bootstrap method before the first execution of the instruction. The Java Virtual Machine Specification Java SE 7 Edition


  2. The creation of an extra class has been replaced with an invokedynamic instruction. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. The only new bytecode value that has been assigned throughout the history of the Java Virtual Machine specification is 0xba—previously reserved, but about to be used for the new operation invokedynamic. Oracle JRockit The Definitive Guide



1786、单词 stylesheets 的匹配文本:


  1. Most of the textual content on the internet, such as in web pages, blogs, wikis, chats, or discussion forums, is delivered as a complex collection of markup, stylesheets, and scripts, not pure text. Mahout in Action


  2. Of course, we might also need images, stylesheets, or scripts. CouchDB The Definitive Guide


  3. You can cheaply generate a corporate look and feel by adding your own stylesheets and JavaScript. Jenkins Continuous Integration Cookbook


  4. One project contains the shared business layer, while the other has the images, stylesheets, and other, similar files. Pro Spring MVC


  5. This is an area where meta information about the page is placed, including stylesheets, JavaScript, base links, and other global page information. Tika in Action


  6. Normally, if stylesheets and image directories need to be accessed in the servlet, you need to manually extract them in the root of the web application. Java EE 7 Essentials


  7. You’ll configure another command, jquery UI setup, to install the UI library as well as assets such as stylesheets and graphics. Spring Roo in Action


  8. A tutorial on XSLT stylesheets is beyond the scope of this book, but the following code (which contains only six key lines) shows how you can apply such a stylesheet (which is an XML document itself) to another XML document and write the resulting document to a stream: Java in a Nutshell 5th Edition


  9. It also doesn’t provide a MIME type for CSS stylesheets (.css) Java Network Programming 4th Edition


  10. As it is, DispatcherServlet is mapped as the default servlet for the application and will handle all requests, including requests for static resources, such as images and stylesheets (which is probably not what you want in most cases) Spring in Action 4th Edition



1787、单词 hardcode 的匹配文本:


  1. To make it easy to track this change, we will put the text inside a file and not hardcode it as a string. Core Java Volume I Fundamentals 9th Edition


  2. For now, hardcode the limits for each phase inside the Story class: Scala in Action


  3. It may not be the best idea to actually hardcode information into the Java code itself, but instead have a rarely-changing configuration file that can be found by your formats. MapReduce Design Patterns


  4. Fortunately, our data is very predictable, and we hardcode the column value reads based on the alphabetic ordering of our qualifier labels. Hadoop RealWorld Solutions Cookbook


  5. We could certainly hardcode something, but it would be better to propagate this dependency out: Functional Programming in Scala


  6. Note that every ShapeVisitor trait has methods that hardcode information about every Shape derived type. Programming Scala


  7. You hardcode the fact that th user’s file is the smaller fil. Hadoop in Practice


  8. We could of course hardcode this into the mapper but that does not seem right. Hadoop Beginners Guide


  9. In this particular situation, you can make one further improvement, which is to compile the values at implementation and hardcode them in: Java Performance Tuning 2nd Edition


  10. This could be that your test needs to pick a date that is on the page and use it later so that you do not need to hardcode values into your test. Selenium 2 Testing Tools Beginner's Guide



1788、单词 writables 的匹配文本:


  1. Other writables used in this chapter are very similar to this and are omitted for brevity. MapReduce Design Patterns


  2. As you can see from the example in Listing 13-10, Crunch enables the developer to explicitly use more of the low-level Java Hadoop APIs (see, for example, the use of Writables) Professional Hadoop Solutions


  3. Pig works well with Hadoop’s built-in scalar Writables such as Text and IntWritable, but doesn’t have support for custom Writables. Hadoop in Practice


  4. Hadoop uses its own serialization format, Writables, which is certainly compact and fast, but not so easy to extend or use from languages other than Java. Hadoop:The Definitive Guide 3rd Edition


  5. The key and value’s ability to be cloned and serialized is provided by them being implemented as Writables. Hadoop in Action


  6. Have a go hero – playing with Writables Write a class that exercises the NullWritable and ObjectWritable classes in the same way as it does in the previous examples. Hadoop Beginners Guide


  7. Here, persistable means the return value can only be built up in terms of Java primitives, arrays, primitive wrappers (e.g., Double), Hadoop Writables, Lists, and Maps. Programming Hive



1789、单词 fowler 的匹配文本:


  1. According to Fowler, most of this stuff is unnecessary, so he cuts through to the essentials. Thinking in Java 4th Edition


  2. Special thanks also to Chad Fowler for contributing the foreword and for endorsing my work. Scala in Action


  3. This behavior, the injection of dependencies at runtime, leads to IoC being renamed by Martin Fowler to the much more descriptive Dependency Injection (DI) Pro Spring 3


  4. There are many industry-standard books about modeling and refactoring code and the various patterns that can be used to factor and refactor your code—however, there are two “bibles” in the field: Refactoring: Improving the Design of Existing Code, by Martin Fowler (Addison-Wesley), and Code Complete: A Practical Handbook of Software Construction, by Steve McConnell (Microsoft Press) Testable JavaScript


  5. NoSQL distilled : a brief guide to the emerging world of polyglot persistence / Pramod J Sadalage, Martin Fowler. NoSQL Distilled


  6. In this blog, Martin Fowler discusses the term command query separation. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


  7. In their book Connected, social scientists Nicholas Christakis and James Fowler show how, despite knowing nothing about an individual, we can better predict that person’s behavior by understanding who he is connected to, than we can by accumulating facts about him.1 Graph Databases


  8. If you want to learn more about the common pitfalls that too-strict layering can lead to, we recommend Martin Fowler’s article about the anemic domain model (http://www.martinfowler. Spring Dynamic Modules in Action


  9. The name of this design comes from Martin Fowler’s book Patterns of. SQL Antipatterns


  10. Note For more on painting using Java’s Swing, see the web article Painting in AWT and Swing, by Amy Fowler at http://java.sun.com/products/jfc/tsc/articles/painting (Oracle Corporation, 1999) Java 7 Recipes A Problem-Solution Approach



1790、单词 gdb 的匹配文本:


  1. For wait analysis, we often use GDB stack traces.14 Threads that are stuck in a particular spot inside of MySQL for a long time tend to have the same stack trace. High Performance MySQL 3rd Edition


  2. Preparing the System to Run MySQL in a Debugger To fully enjoy the study of MySQL internals, and to be able to execute the examples in the subsequent sections of this chapter, you must have gdb (http://www.gnu.org/ software/gdb/) installed on your system, and be present in your PATH. Understanding MySQL Internals



1791、单词 denormalizing 的匹配文本:


  1. In our website example, for instance, instead of denormalizing fully you can store account_type in both the user and message tables. High Performance MySQL 3rd Edition


  2. Deciding when to normalize and when to denormalize can be difficult: typically, normalizing makes writes faster and denormalizing makes reads faster. MongoDB The Definitive Guide 2nd Edition


  3. If instead you group the data by post so that the comments are colocated with the posts and the edit revisions (i.e., denormalizing the tables), this type of analysis will be much easier and more intuitive. MapReduce Design Patterns


  4. A problem with denormalizing one-to-many data comes into play when multiple fields from the other entity are brought in, and you need to search on more than one of those fields at once. Solr 3 Enterprise Search Server


  5. If you expect your users to change their names frequently, denormalizing may not be a good idea. HBase in Action


  6. Learning to trust our graph database is important when learning to structure our graphs without denormalizing them. Graph Databases


  7. We started to divide items up into several one-to-one link tables to store other information, separating static fields from dynamic ones, grouping fields based on how they were queried, and denormalizing everything along the way. Hadoop:The Definitive Guide 3rd Edition


  8. Then, you often need to find a way to get rid of your joins, which means denormalizing the data, which means maintaining multiple copies of data and seriously disrupting your design, both in the database and in your application. Cassandra The Definitive Guide


  9. Denormalizing data permits it to be scanned from or written to large, contiguous sections of disk drives, which optimizes I/O performance. Programming Hive


  10. Another way to gauge the fit for NoSQL is to look at whether you find yourself denormalizing your data for performance reasons, and no longer benefit from some of the advantages of a relational system, such as consistency and redundancy checks. Redis Cookbook



1792、单词 gni 的匹配文本:


  1. We will use the World Bank's Human Development Report (HDR) data by country that shows Gross National Income (GNI) per capita, by countries. Hadoop MapReduce Cookbook



1793、单词 granularities 的匹配文本:


  1. Given reasonable base task granularities, the cost of constructing and managing a thread can be greater than the computation time of the task itself. A Java ForkJoin Framework


  2. Its storage engines can implement their own locking policies and lock granularities. High Performance MySQL 3rd Edition


  3. This adaptive approach allows Ceph to encompass a broad spectrum of partition granularities, capturing the benefits of both coarse and fine partitions in the specific circumstances and portions of the file system where those strategies are most effective. Ceph A Scalable, High-Performance Distributed File System


  4. The main problem is the mismatch between the allocation granularities of these solutions and of existing frameworks. Mesos A Platform for Fine-Grained Resource Sharing in the Data Center


  5. Using the Dapper platform, the service dependencies team is thus able to automatically infer dependencies on named resources at various service granularities. Dapper a Large-Scale Distributed Systems Tracing Infrastructure


  6. For each node or group of nodes we track hundreds or thousands of different metrics, and engineers will ask to plot them over time at various granularities. Apache Hadoop Goes Realtime at Facebook


  7. The values of this type represent time granularities or units: seconds, milliseconds, microseconds, and nanoseconds. Java in a Nutshell 5th Edition


  8. Priorities 0–4—These priorities are finer granularities of the normal priority. ActiveMQ in Action


  9. A good strategy for time-range partitioning, for example, is to determine the approximate size of your data accumulation over different granularities of time, and start with the granularity that results in “modest” growth in the number of partitions over time, while each partition contains files at least on the order of the filesystem block size or multiples thereof. Programming Hive


  10. A timed wait may resume an arbitrary amount of time after the requested bound due to thread contention, scheduling policies, and timer granularities. Concurrent Programming in Java Design Principles and Pattern



1794、单词 impedance 的匹配文本:


  1. It allows accessing the data without a time-consuming loading phase, which is a major impedance to database usage in analytical data processing [13], where it is often possible to run dozens of MR analyses before a DBMS is able to load the data and execute a single query. Dremel - Interactive Analysis of WebScale Datasets


  2. The primary function of ORM is to resolve the so-called impedance mismatch between working with Java objects and working with databases. Spring in Practice


  3. For application developers, the biggest frustration has been what’s commonly called the impedance mismatch: the difference between the relational model and the in-memory data structures. NoSQL Distilled


  4. In terms of expressivity, graph databases reduce the impedance mismatch between analysis and implementation that has plagued relational database implementations for many years. Graph Databases


  5. An interesting term to describe this issue is impedance match, which describes the need to find the ideal solution for a given problem. HBase:The Definitive Guide


  6. Object Databases The purpose of an object database is to avoid the object-relational impedance mismatch that occurs when trying to use a relational database under an application written in an object-oriented programming language. Cassandra The Definitive Guide


  7. The Impedance Mismatch Advocates of object-relational mapping often describe the difference between the object model and the relational model as the impedance mismatch between the two. Pro JPA2



1795、单词 slaveof 的匹配文本:


  1. Though a variety of options control behavior of the slave itself, only one option is really necessary to enable slaving: slaveof. Redis in Action


  2. To configure a slave you use either the slaveof configuration setting or the slaveof command (instances running without this configuration are or can be masters) The Little Redis Book


  3. You can configure replication on the configuration file before starting a server or by connecting to a running server and using the SLAVEOF command. Redis Cookbook



1796、单词 jason 的匹配文本:


  1. Type lambdas were discovered and popularized by Jason Zaugg, one of the core contributors to the Scalaz framework. Scala in Depth


  2. JaSOn Venner is a software developer with more than 20 years of experience developing highly scaled, high-performance systems. Pro Hadoop


  3. Jason Davies swapped out the backend of the Ely Service website with CouchDB, without changing anything visible to the user. CouchDB The Definitive Guide


  4. My (Jason’s) situation was that my company needed a way to take the spam reportings we received from our customers and process them out-of-band from our main stream of incoming messages. RabbitMQ in Action


  5. FrameMaker 5.5.6 with a format conversion tool created by Erik Ray, Jason McIntosh, Java Threads 3rd Edition


  6. Acknowledgments I would like to extend my thanks to my team of excellent tech editors who contributed ably to the quality of this book: Jason Porter, Spencer Allain, Darin Pope, and Rod Hilton. Gradle Beyond The Basics


  7. There’s a lot to Kerberos, so here we only cover enough to use it in the context of Hadoop, referring readers who want more background to Kerberos: The Definitive Guide by Jason Garman (O’Reilly, 2003) Hadoop:The Definitive Guide 3rd Edition


  8. Sun has contributed a servlet compression filter to the examples supplied with the Tomcat application server, and a JavaWorld article [4] by Jason Hunter describes the filter in more detail. Java Performance Tuning 2nd Edition


  9. But I encourage you to dig deeper into AMQP by reading the specification and other materials at www.amqp.org or by reading RabbitMQ in Action by Alvaro Videla and Jason J.W. Spring in Action 4th Edition


  10. Jason Huggins saw this issue too and wanted to make sure that a system he was working on would work on multiple operating systems and browsers. Selenium 2 Testing Tools Beginner's Guide



1797、单词 enumerates 的匹配文本:


  1. The compiler enumerates all methods called f in the class C and all accessible methods called f in the superclasses of C. Core Java Volume I Fundamentals 9th Edition


  2. Enumeration entries() returns an Enumeration object that enumerates the ZipEntry objects that describe the entries of the ZipFile. Core Java Volume II Advanced Features 9th Edition


  3. One way to do this would be to create a query which enumerates all of the possible variations: Solr in action


  4. This means that the Iterator returned by the inherited iterator( ) method always enumerates the elements of the set in the order which they were inserted. Java in a Nutshell 5th Edition


  5. FuzzyQuery enumerates all terms in an index to find terms within the allowable threshold. Lucene in Action 2nd Edition


  6. The following query enumerates the phone numbers for all employees: Pro JPA2


  7. The enum method does the other thing – it enumerates all the terms in the field that we want to calculate faceting on, and intersects the documents that match the query with the documents that match the enumerated terms. Apache Solr 4 Cookbook


  8. In simple terms, persistence.xml enumerates one or more persistent classes along with any additional configuration such as data sources and XMLbased mapping files. Spring in Action 4th Edition



1798、单词 serverside 的匹配文本:


  1. If your pages are dynamic, you can pregenerate parts of the pages and use a technique such as serverside includes to build the final pages. High Performance MySQL 3rd Edition


  2. Or you can explicitly store your nested structures using JSON or some other serialization library of your choice (Lua scripting, covered in chapter 11, supports serverside manipulation of JSON and MessagePack encoded data) Redis in Action


  3. Atomic conditional operations (including atomic compare and set) allow executing a serverside update, guarded by a check and atomic compare and delete (executing a server-side guarded Delete) Professional Hadoop Solutions


  4. It also shows you how to develop applications that are housed entirely in the database itself, in addition to using Python, Django, and Ruby to interact with CouchDB from a traditional serverside application. Beginning CouchDB


  5. This filter instructs the server to short-circuit when running serverside, doing no more than verifying a row has an entry before returning. Hadoop:The Definitive Guide 3rd Edition


  6. They also cause additional RPCs to occur, which will be slower than a single, serverside operation. HBase:The Definitive Guide


  7. Currently, no browser natively supports XForms, though plug-ins are available for Firefox, and libraries exist to allow serverside translation of XForms into XHTML. Cassandra The Definitive Guide


  8. Communicating with Server-Side Programs Through GET The URL class makes it easy for Java applets and applications to communicate with serverside programs such as CGIs, servlets, PHP pages, and others that use the GET method. Java Network Programming 4th Edition


  9. Scripting languages covered in previous sections are mostly used for creating serverside software and internet applications on Unix-like systems. ActiveMQ in Action


  10. Along the way, you’ve also learned enough to use the serverside commands whenever the going gets a little more complicated. The Definitive Guide to MongoDB



1799、单词 doas 的匹配文本:


  1. The program executes a method call (the doAs( ) or doAsPrivileged( ) method), passing in the user login object and the code that should be executed on behalf of that user. Java Security 2nd Edition


  2. Use the static doAs or doAsPrivileged method to start a new PrivilegedAction whose run method executes the code. Core Java Volume II Advanced Features 9th Edition


  3. Once an authenticated Subject has been obtained from a LoginContext, an application can call the doAs( ) method to run code using the permissions granted to that Subject combined with the permissions granted to the code itself. Java in a Nutshell 5th Edition



1800、单词 newsgroup 的匹配文本:


  1. Disclaimer 56 Possible cue due to newsgroup paranoia level, rare Drop. Mahout in Action


  2. A folder represents a collection of messages, such as a mailbox or a newsgroup. Java Network Programming and Distributed Computing


  3. Although there’s some hierarchy to the newsgroup names indicated by the period between netscape and devs-java, it’s not encoded as part of the URI. Java Network Programming 4th Edition


  4. These Address objects are generic because the Address object can represent Internet or newsgroup addresses. Java 7 Recipes A Problem-Solution Approach



1801、单词 startkey 的匹配文本:


  1. Note that the startkey value has to be a JSON value, in this case a quoted string. Getting Started with CouchDB


  2. The startkey and endkey parameters specify an inclusive range on which we can search. CouchDB The Definitive Guide


  3. You can then use the startkey and endkey URI parameters to define which country you want to look up values for. Beginning CouchDB


  4. When skipping a large number of rows, CouchDB still needs to scan the entire B-tree index, starting from the startkey and startkey_docid (if specified) Scaling CouchDB



1802、单词 redundantly 的匹配文本:


  1. In denormalization, data that could be less redundantly stored in separate tables connected by keys is joined together so that each record is self-contained without any references to external data, such as user profile tables or product description tables. Mahout in Action


  2. You can avoid this by adding LIMIT 20 redundantly to each query inside the UNION: High Performance MySQL 3rd Edition


  3. We will allow that item to compare redundantly (if it is an L then it loses again, if it is a W then it wins again), and its value can be easily adjusted if needed, based on the other item in the comparison (an L can be lowered as needed; a W can be raised as needed) Data Structures and Algorithm Analysis in Java 3rd Edition


  4. It is permitted to redundantly specify any or all of these modifiers for such fields. The Java Language Specification Java SE 7 Edition


  5. In general, SATA drives are recommended over SAS since they are more cost-effective, and since the nodes are all redundantly storing replicas of the data across multiple servers, you can safely use the more affordable disks. HBase:The Definitive Guide


  6. The type parameters appear redundantly on the left- and right-hand sides of variable declarations: Effective Java 2nd Edition


  7. In the future, we plan to add built-in replication in Kafka to redundantly store each message on multiple brokers. Kafka a Distributed Messaging System for Log Processing


  8. Instead, any queues in the application are distributed, redundantly copied, and monitored so that any queue failure results in only a small performance degradation at worst. Java Performance Tuning 2nd Edition


  9. Normalization of data is a database practice that attempts to remove redundantly stored data. Pro JPA2


  10. Tasks that are taking a long time to complete on slow nodes get redundantly executed on other nodes that have completed their assigned tasks. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



1803、单词 hprof 的匹配文本:


  1. Solution Use HPROF in combination with a number of MapReduce job methods such as setProfileEnabled to profile your tasks. Hadoop in Practice


  2. The mechanism for retrieving profile output is HPROF-specific, so if you use another profiler, you will need to manually retrieve the profiler’s output from tasktrackers for analysis. Hadoop:The Definitive Guide 3rd Edition


  3. The heap dump format used by JRockit is the same as produced by the Java Virtual Machine Tool Interface (JVMTI) based heap profiler HPROF, included with the JDK. Oracle JRockit The Definitive Guide


  4. But the dump Heap operation writes the heap’s current state to a file that’s encoded in the HPROF binary format for heap and CPU profiling. Cassandra The Definitive Guide


  5. This option produces a profile data file called java.hprof.txt (java.prof before 1.2) Java Performance Tuning 2nd Edition


  6. Agent libraries (hprof, jdi), if any are being used, are initialized and started. Java Performance



1804、单词 jbod 的匹配文本:


  1. We recommend JBOD or RAID0 for the DataNode disks, because you don't need the redundancy of RAID, as HDFS ensures its data redundancy using replication between nodes. HBase Administration Cookbook


  2. Just a Bunch Of Disks (JBOD) can be used because Cassandra allows multiple data directories. Cassandra High Performance Cookbook


  3. Furthermore, RAID striping (RAID 0), which is commonly used to increase performance, turns out to be slower than the JBOD (Just a Bunch Of Disks) configuration used by HDFS, which round-robins HDFS blocks between all disks. Hadoop:The Definitive Guide 3rd Edition


  4. There’s been some discussion in the Hadoop forums about whether one should configure multiple hard drives in a DataNode as RAID or JBOD. Hadoop in Action


  5. When provisioning, there are two options for namenode device management: use the namenode’s ability to write data to multiple JBOD devices, or write to a RAID device. Hadoop Operations



1805、单词 faulting 的匹配文本:


  1. Since the whole point is to avoid instantiating RMI servers and instead to activate them as required, a faulting remote reference is registered in its place. Java Network Programming and Distributed Computing


  2. It means that the exception handler is expected to do something to rectify the situation, and then the faulting method is retried, presuming success the second time. Thinking in Java 4th Edition


  3. When the user-supplied map and reduce operators are deterministic functions of their input values, our distributed implementation produces the same output as would have been produced by a non-faulting sequential execution of the entire program. MapReduce - Simplied Data Processing on Large Clusters


  4. A system that is page faulting hundreds of times a minute. MongoDB The Definitive Guide 2nd Edition


  5. It gives you tons of information about what’s going on with a server, from load to page faulting to number of connections open. Scaling MongoDB



1806、单词 noop 的匹配文本:


  1. The noop scheduler is appropriate for devices that do their own scheduling behind the scenes, such as hardware RAID controllers and SANs, and dead line is fine both for RAID controllers and disks that are directly attached. High Performance MySQL 3rd Edition


  2. There are a couple of situations where the noop scheduler (a contraction of “no-op” is the best choice): if you’re in a virtualized environment, use the noop scheduler. MongoDB The Definitive Guide 2nd Edition


  3. This will tell the agent to run without daemonizing into the background (--test) and without actually modifying anything (--noop) Managing Infrastructure with Puppet


  4. You can, however, model transactions in a “noop,” or no operation mode, that allows you to test the execution of your changes without making any actual changes. Pro Puppet


  5. The keyword tokenizer is the NOOP tokenizer, the tokenizer which does nothing. Elasticsearch The Definitive Guide


  6. It then invokes the continuation and sends the response to the browser (either JavaScript containing commands to perform the diffs or a Noop) Beginning Scala


  7. Android in particular treats the setTrafficClass() method as a noop. Java Network Programming 4th Edition



1807、单词 pde 的匹配文本:


  1. Tools (such as Eclipse PDE, Bnd, and Bundlor) can help you easily and efficiently manage the manifest file, and they can easily be integrated with building tools like Ant or Maven. Spring Dynamic Modules in Action


  2. It also contained a set of Plug-in Development Environment (PDE) plug-ins that allows the development of custom plug-ins for the JRockit Mission Control Console. Oracle JRockit The Definitive Guide



1808、单词 internationalized 的匹配文本:


  1. You will be told immediately that your content is not internationalized. Jenkins Continuous Integration Cookbook


  2. The ApplicationContext interface provides a useful set of additional functionality, including internationalized message provision, resource loading, and event publishing. Pro Spring 3


  3. Applications almost always need to be internationalized, and so converting from one set of units to another set is a problem that comes up repeatedly. Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. In this chapter, we will show you how to write internationalized Java programs and how to localize dates, times, numbers, text, and GUIs. Core Java Volume II Advanced Features 9th Edition


  5. The features permeate the Java platform, making it easier to write internationalized programs with Java than it is with any other environment. Java in a Nutshell 5th Edition


  6. If you don’t hexadecimally encode non-ASCII characters like this, but just include them directly, then instead of a URI you have an IRI (an Internationalized Resource Identifier) Java Network Programming 4th Edition


  7. But in many cases, internationalized Strings form a specific subset of String usage in an application, mainly in the user interface, and that subset of Strings rarely causes bottlenecks. Java Performance Tuning 2nd Edition


  8. This chapter describes only some of the most frequent and common tasks that programmers must perform when developing internationalized applications. Java 7 Recipes A Problem-Solution Approach



1809、单词 kadmin 的匹配文本:


  1. Quit the kadmin.local console and test the authentication for the test user by obtaining a Kerberos ticket: HBase Administration Cookbook


  2. After this, the kadmin and kinit commands should be accessible from the command line. Hadoop Operations and Cluster Management Cookbook


  3. Although this book is geared toward developers and isn’t necessarily for administrators, it is helpful to know that the kadmin tool is used for adding Kerberos principals and their keytab files. Professional Hadoop Solutions


  4. Also tricky is that the -norandkey option to ktadd works only when using kad min.local (rather than kadmin) Hadoop Operations



1810、单词 subdocument 的匹配文本:


  1. We want to move the "friends" and "enemies" fields to a "relationships" subdocument. MongoDB The Definitive Guide 2nd Edition


  2. However, if we used a subdocument that was indexed as an object type, we could simplify the query to the following one: Mastering ElasticSearch


  3. The benefit of this approach is that you can make an index on multiple keys (as in the previous example, where you indexed an entire subdocument) The Definitive Guide to MongoDB


  4. Note that you use the same dot notation regardless of whether a field points to a subdocument or to an array of sub-documents. MongoDB in Action



1811、单词 truncating 的匹配文本:


  1. In addition, it provides methods for locking files, truncating files, and getting file sizes, but keep in mind that, unlike a synchronous FileChannel channel, this type of channel does not maintain a global file position (current position) or offset. Pro Java 7 NIO.2


  2. The only additional cost is that of truncating the values of int operations to valid ranges. The Java Virtual Machine Specification Java SE 7 Edition


  3. For example, the filtering, extracting, and truncating steps could be merged into a single pass and stop as soon as three dishes are found. Java 8 in Action Lambdas, Streams and Functional-style Programming


  4. It is possible to drop individual keys, column families, and keyspaces, as well as truncating column families through the Thrift API. Cassandra High Performance Cookbook


  5. The expression int(loc.lat) converts loc.lat, a float, to an integer, thereby truncating it to the degree and making it suitable as an index value. Interpreting the Data Parallel Analysis with Sawzall


  6. By truncating characters from the end of the hash, you get a less precise geohash and a correspondingly less precise selection of the map. HBase in Action


  7. The IEEE 754 remainder operation computes the remainder from a rounding division, not a truncating division, and so its behavior is not analogous to that of the usual integer remainder operator. The Java Language Specification Java SE 7 Edition


  8. Use length( ) to return the length of the buffer, and use setLength( ) to set the length of the buffer, truncating it or filling it with null characters (’\u0000’) as necessary. Java in a Nutshell 5th Edition


  9. We have been truncating the dfsadmin output for space reasons; in particular, we have been omitting the reported information for each node. Hadoop Beginners Guide


  10. Truncating the file doesn’t work because the JVM will continue to write to the open file descriptor until the daemon is restarted. Hadoop Operations



1812、单词 jdk1 的匹配文本:


  1. Note The setup procedure offers a default for the installation directory that contains the JDK version number, such as jdk1.7.0 Core Java Volume I Fundamentals 9th Edition


  2. Readers with previous input/output (I/O) stream experience may choose to skim through this section, but will likely benefit from a revised look at the topic, as changes to streams were introduced in JDK1.1 to deal with text-based reading and writing. Java Network Programming and Distributed Computing


  3. In our case, we are installing into the directory jdk1.7.0 Java 7 Recipes A Problem-Solution Approach



1813、单词 dtds 的匹配文本:


  1. You can use various forms of XML schema definitions (DTDs, XML Schema, RelaxNG) to check document formats, run queries with XPath and XQuery, and perform transformations with XSLT. NoSQL Distilled


  2. All products are required to support these DTDs and schemas as well as the s specified in this version of the specification. Java EE 7 Specification


  3. DTDs are an important mechanism to ensure the correctness of a document, but they are not required. Core Java Volume II Advanced Features 9th Edition


  4. Although Spring provides the ability to do this now, such features weren’t available when ActiveMQ was created (Spring only supported DTDs at the time) ActiveMQ in Action


  5. Even though Web services are based on XML schema and do not support DTDs, processing of DTDbased XML documents are widely used and hence discussed here for completeness. Java Performance



1814、单词 dtos 的匹配文本:


  1. To take advantage of the new web service, the help desk app will find it useful to have data transfer objects (DTOs) for data binding. Spring in Practice



1815、单词 pascal 的匹配文本:


  1. More than forty years ago, both Niklaus Wirth’s original implementation of Pascal and the UCSD Pascal system used the same technique. Core Java Volume I Fundamentals 9th Edition


  2. Many early languages such as C, Fortran, and Pascal are imperative. Scala in Depth


  3. Older languages such as C, Pascal, and Basic are procedural languages. Java Network Programming and Distributed Computing


  4. It is reasonably common to implement a programming language using a virtual machine; the best-known virtual machine may be the P-Code machine of UCSD Pascal. The Java Virtual Machine Specification Java SE 7 Edition


  5. Changing to a new language and tool chain is often too painful for just a single feature, but newcomers will eventually displace existing languages, unless they evolve fast enough to keep up (older readers are often able to quote a range of such languages in which they’ve previously coded but whose popularity has since waned—Ada, Algol, COBOL, Pascal, Delphi, and SNOBOL, to name but a few) Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. For concision and simplicity in our examples, we often exhibit code fragments that could as easily be C or Pascal code fragments, without class or method definitions, or explicit dereferencing. JSR-133 Java Memory Model and Thread


  7. Finally, tuples represent arbitrary groupings of data, like a C struct or Pascal record. Interpreting the Data Parallel Analysis with Sawzall


  8. When explicit type information for variables is written in the code, these type annotations follow the colon after the item name (i.e., Pascal-like syntax) Programming Scala


  9. Prior to working with JRockit, Bengt has been responsible for several products in Java (for example, the Appear Context Engine) and in Component Pascal (for example, the BlackBox Component Builder) Oracle JRockit The Definitive Guide


  10. The launch of the Macintosh in 1984 introduced him to objects via Smalltalk, Object Pascal, and MacApp. Beginning Scala



1816、单词 memstores 的匹配文本:


  1. Note that the data in the memstores is already sorted by keys matching exactly what HFiles represent on disk, so no sorting or other special processing has to be performed. HBase:The Definitive Guide



1817、单词 transactor 的匹配文本:


  1. Let’s create a transactor first in Java and then in Scala. Programming Concurrency on the JVM


  2. Classes obeying the Transactor interface can also employ arbitrary sharing of references among participants. Concurrent Programming in Java Design Principles and Pattern



1818、单词 tccl 的匹配文本:


  1. Luckily, Java provides a thread context classloader (TCCL) that allows the classloading of an implementation to delegate classloading to the caller, and vice versa, without having to specify an Import-Package declaration. Spring Dynamic Modules in Action



1819、单词 restartable 的匹配文本:


  1. If you do rely on interruptible I/O, be aware that the I/O in question is not restartable: Java Threads 3rd Edition


  2. Let’s focus here on the restartable, incrementer, and job-repository attributes. Spring Batch in Action



1820、单词 backoff 的匹配文本:


  1. Setting this value too low means giving less time to the channel to drain and unlike some of the sinks we saw, there is not an option for exponential backoff. Apache Flume Distributed Log Collection for Hadoop


  2. Where RETRY_BACKOFF is a retry back off multiplier table, which has the following definition: HBase Administration Cookbook


  3. Incremental resource acquisition can lead to deadlock if no backoff mechanism is provided, while hoarding reduces cluster utilization and can also cause deadlock. Omega - flexible, scalable schedulers for large compute clusters


  4. Stupid backoff Stupid backoff is the default smoothing model used by the ElasticSearch phrase suggester. Mastering ElasticSearch


  5. The worker uses a reconnect strategy similar to the one we designed for the Lazy Pirate client, with two major differences: it does an exponential backoff, and it retries indefinitely (whereas the client retries a few times before reporting a failure) ZeroMQ


  6. The reducer may repeatedly reattempt a transfer within this time if it fails (using exponential backoff) Hadoop:The Definitive Guide 3rd Edition


  7. How long to backoff for between retries when connecting to RabbitMQ: high-availability-guide


  8. In this example, if Commit() returns false, the transaction has conflicted (in this case, because two URLs with the same content hash were processed simultaneously) and should be retried after a backoff. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



1821、单词 scaffolded 的匹配文本:


  1. We show you how you can customize the scaffolded web views, and how to modify the way fields are displayed. Spring Roo in Action



1822、单词 tlb 的匹配文本:


  1. In order for a CPU to map a virtual page to the actual physical page in memory, a cache called the Translation Lookaside Buffer (TLB) is used to speed things up. Oracle JRockit The Definitive Guide


  2. It can also be used with other CPU counters such as TLB (translation look-aside buffer) misses and instruction count. Java Performance



1823、单词 lookupswitch 的匹配文本:


  1. Compilation of switch statements uses the tableswitch and lookupswitch instructions. The Java Virtual Machine Specification Java SE 7 Edition


  2. It contains either a "tableswitch" bytecode identifier or a "lookupswitch" bytecode identifier. Java Performance Tuning 2nd Edition



1824、单词 userdefined 的匹配文本:


  1. The text UserDefined tells the framework that this is a userdefined class. Pro Hadoop


  2. In addition to scanning for predefined primitive types, you can also scan for your own userdefined patterns, which is helpful when scanning more complex data. Thinking in Java 4th Edition


  3. For Reducers that first combine all the values with a given key using an associative, commutative operation, a separate userdefined Combiner function can be specified to perform partial combining of values associated with a given key during the Map phase. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  4. This is because there are no userdefined tables in this HBase instance. HBase in Action


  5. In addition to simple textual annotations, Dapper also supports a map of key-value annotations that give developers more tracing power, such as maintaining counters, logging binary messages, and transporting arbitrary userdefined data along with a traced request within a process. Dapper a Large-Scale Distributed Systems Tracing Infrastructure


  6. Hadoop creates one map task for each split, which runs the userdefined map function for each record in the split. Hadoop:The Definitive Guide 3rd Edition


  7. Triggers With the Management Console, rules can be built that trigger when a certain userdefined condition occurs. Oracle JRockit The Definitive Guide


  8. Provide all the required SQL features to the analysts to minimize the learning curve, while also supporting more advanced functionality such as complex userdefined functions, prediction and mining. Tenzing - A SQL Implementation On The MapReduce Framework


  9. In addition to userdefined Servlets, the container has two built-in Servlets, the DefaultServlet and the JspServlet. Java Performance


  10. The parallel databases should theoretically be able to use a userdefined function, F, to parse the contents of each document and. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



1825、单词 preinstalled 的匹配文本:


  1. While many of its features are preinstalled with the core product, it can be extended by plugins. Gradle in Action


  2. Modern Android or IOS mobile devices have preinstalled applications for both these services, lowering the barrier to adoption. Jenkins Continuous Integration Cookbook


  3. The predefined Amazon and public AMI images are useful starting points for your permanent virtual machines, but for the purposes of implementing a dynamic EC2-based cloud, you need to define your own AMI with the essential tools (Java, build tools, SCM configuration and so forth) preinstalled. Jenkins The Definitive Guide


  4. Since PHP is popular, you shouldn’t have problems there and chances are that your operating system already comes with PHP preinstalled. RabbitMQ in Action


  5. Since Sonar version 2.12, JaCoCo is preinstalled and you can activate it from the administration settings screen (key value: jacoco) Sonar Code Quality Testing Essentials


  6. To make this install even simpler, you can use plenty of preconfigured public Amazon Machine Image (AMI) images containing a preinstalled instance of Hadoop. Professional Hadoop Solutions


  7. Most of these packages (Perl, gcc, GNU make, and so on) are preinstalled on most Linux distributions. Beginning CouchDB


  8. On its hard disk is a preinstalled version of WebLogic Server good to go, and all the user needs to do is plug the machine into a power outlet, attach a network cable, and start it up. Oracle JRockit The Definitive Guide


  9. On Linux, GZip extraction utilities should be preinstalled; on Windows, you’ll need to get a program such as WinZip, which is commercial, or something like 7-Zip, which is freeware. Cassandra The Definitive Guide


  10. The tools just mentioned will be preinstalled by default on most Linux distributions. Understanding MySQL Internals



1826、单词 startups 的匹配文本:


  1. Formerly an academic, I have subsequently been involved in a number of startups, and I have applied machine learning to all of these practical application settings. Mahout in Action


  2. Now suppose you’re back in the high-flying days of Internet startups and you’ve been given a big pile of venture funding for your Amazing Idea. Thinking in Java 4th Edition


  3. Firebase and Urban Airship are among the startups using Netty, the former Firebase for long-lived HTTP connections, the latter for all kinds of push notifications. Netty in Action MEAP V08


  4. In many large web companies and startups, Hadoop clusters are the common place where operational data are stored and processed. Apache Hadoop YARN Yet Another Resource Negotiator


  5. Vendor lock-in has kept prices and margins high, and commercial MQ software out of reach of the startups and Web 2.0 companies that are abounding today. RabbitMQ in Action


  6. Since the launch of the first Hadoop-centered company, Cloudera, in 2008, dozens of Hadoop-based startups have attracted hundreds of millions of dollars in venture capital investment. Professional Hadoop Solutions


  7. Vineet Daniel is a Systems Architect and has worked at various startups and managed high traffic web applications. Cassandra High Performance Cookbook


  8. From startups to the Fortune 500, smart companies are betting on data-driven insight, seizing the opportunities that are emerging from the convergence of four powerful trends: Scaling CouchDB


  9. Hadoop was not created in a vacuum; instead, it exists due to the explosion in the amount of data being created and consumed and a shift that sees this data deluge arrive at small startups and not just huge multinationals. Hadoop Beginners Guide


  10. Look at mapping filesystems into memory for speedier startups and accesses. Java Performance Tuning 2nd Edition



1827、单词 jmapi 的匹配文本:


  1. The commands that JRCMD can execute are commonly referred to as the JRockit Diagnostic Commands, as that is what they are called when accessed through the JRockit Management API (JMAPI) or the custom JRockit JMX MBeans (JMXMAPI) Oracle JRockit The Definitive Guide



1828、单词 connectionless 的匹配文本:


  1. Since UDP is a connectionless network protocol, you cannot just by default read and write to a DatagramChannel like you do from other channels—later, you will see how to set up a connection over UDP. Pro Java 7 NIO.2


  2. Some applications will instead choose to use a connectionless form of communication. Java Network Programming and Distributed Computing


  3. Unified API for multiple transport types—blocking and nonblocking Simple but powerful threading model True connectionless datagram socket support Chaining of logics to support reuse. Netty in Action MEAP V08


  4. Common bulk command sends documents by HTTP protocol and UDP bulk sends these using connectionless datagram protocol. Mastering ElasticSearch


  5. The unreliable, packet-based, connectionless nature of UDP means that the server at most has to wait for the local buffer to clear. Java Network Programming 4th Edition


  6. A connectionless TCP server (such as a web server) performs the following process: Java Performance Tuning 2nd Edition


  7. On the contrary, UDP is a connectionless protocol, so it can’t make such guarantees. ActiveMQ in Action



1829、单词 superset 的匹配文本:


  1. The set of all employees contains the set of all managers, and this is said to be a superset of the set of managers. Core Java Volume I Fundamentals 9th Edition


  2. The HTTP operation records contain a superset of the attributes in the widely supported Combined Logfile Format (CLF) commonly used in web server logging. Monitoring with Ganglia


  3. This may indicate that it has been cached locally or read from a third-party copy, and may represent a subset or superset of fields. Java Network Programming and Distributed Computing


  4. That is, the derived class is a superset of the base class. Thinking in Java 4th Edition


  5. MariaDB is a superset of stock MySQL, so existing applications should keep working with no changes, just as with Percona Server. High Performance MySQL 3rd Edition


  6. The Backup Node is a superset of the Checkpoint Node, also providing that checkpointing mechanism, as well as acting as a NameNode in its own right. Hadoop in Practice


  7. The case of a profile that is a superset of the platform is asier to picture.) To help with this process, this section attempts to shed how one should go from the definition of the Web Profile to figuring out. Java EE 7 Web Profile Specification


  8. The row cache caches complete rows (all of their columns), so it is a superset of the key cache. Cassandra The Definitive Guide


  9. The peer connector is a utility transport that is a superset of a VM connector that creates a peer-to-peer network of embedded brokers. ActiveMQ in Action


  10. Stateful session beans offer a superset of the functionality available in stateless session beans. Pro JPA2



1830、单词 bitmask 的匹配文本:


  1. The describeContents method returns a bitmask that tells the Android platform the types of data that are contained in the parcel, in case any need special treatment. Scala in Depth


  2. The MASK column here represents a bitmask, which is used to grant permission assigned to the stated SID on the object in question. Spring Security 3.1


  3. Figure 7.5 Column qualifiers store the final precision of the timestamp as well as a bitmask. HBase in Action


  4. There are two versions of this method: both take a Selector object and a bitmask that specifies the set of channel operations that are to be “selected” on that channel. Java in a Nutshell 5th Edition



1831、单词 datetime 的匹配文本:


  1. For example, a DATETIME and a TIMESTAMP column can store the same kind of data: date and time, to a precision of one second. High Performance MySQL 3rd Edition


  2. Discussion The incremental mode lastmodified requires a column holding a date value (suitable types are date, time, datetime, and timestamp) containing information as to when each row was last updated. Apache Sqoop Cookbook


  3. Keep that in mind if you are cutting and pasting this code: #!/usr/bin/python import sys from datetime import datetime, timedelta. Hadoop RealWorld Solutions Cookbook


  4. We are working on a number of key features, such as support for order by and having clause supports, more aggregate functions, more built-in functions, a datetime data type, and so on. Hadoop:The Definitive Guide 3rd Edition


  5. Roo may also have problems converting these formats into a value supported by the date picker held in the field:datetime form field. Spring Roo in Action


  6. The DATE and DATETIME types in particular are not currently implemented though they do exist as identified Hive issues; so hopefully, they will be added in the future. Hadoop Beginners Guide


  7. Datetimes The BSON datetime type is used to store temporal values. MongoDB in Action


  8. It is possible to examine only portions of a binary log using the arguments --start-position, --stop-position, --start-datetime, and --stop-datetime. Understanding MySQL Internals



1832、单词 sslserver 的匹配文本:


  1. As before, the server socket is actually an instance of the SSLServerSocket class, and the bulk of the program logic is still provided by the SSLSimpleServer class. Java Security 2nd Edition


  2. It defines the SSLSocket and SSLServerSocket subclasses of the java.net socket and server socket. Java in a Nutshell 5th Edition


  3. Like SSLSocket, SSLServerSocket provides methods to choose cipher suites, manage sessions, and establish whether clients are required to authenticate themselves. Java Network Programming 4th Edition



1833、单词 jmap 的匹配文本:


  1. You can use the jmap utility to get a heap dump that shows you every object on the heap. Core Java Volume I Fundamentals 9th Edition


  2. Description jmap prints memory usage information for a local or remote Java process or a Java core file. Java in a Nutshell 5th Edition


  3. You can also get a heap dump file on a running process without the graphical interface using the jmap tool that ships with the JDK. Cassandra The Definitive Guide


  4. Java 5’s jmap command places the heap dump in a file named heap.bin in the directory where the jmap command was executed. Java Performance


  5. The most well-known is JMap, which will get a memory dump from the application specified by the process ID (PID) Java 7 Recipes A Problem-Solution Approach



1834、单词 wsgi 的匹配文本:


  1. Authentication is handled through configurable WSGI middleware (which will usually be Keystone) bk-compute-adminguide-grizzly


  2. Swift authentication can be implemented through WSGI middleware or as a separate system. Deploying OpenStack


  3. Enable data collection by defining a stats_monitoring filter and including it at the beginning of any desired WSGI pipelines: bk-admin-guide-cloud-latest


  4. StaticWeb WSGI middleware component of swift that serves container data as a static web page. OpenStack Operations Guide



1835、单词 modularize 的匹配文本:


  1. This will change in chapter 6 when you modularize the To Do application into a multiproject build. Gradle in Action


  2. This is part of the effort to modularize Scala’s language features. Scala in Action


  3. Using this functionality, it is much easier to modularize your application and provide different, user-selectable implementations of key pieces of application logic. Pro Spring 3


  4. It enables you to modularize things like transaction management or performance logging, features that span multiple types and objects (crosscutting concerns) Pro Spring MVC


  5. We now turn to currying: a technique that can help you modularize functions and reuse code. Java 8 in Action Lambdas, Streams and Functional-style Programming


  6. This section focuses on advanced Spring Batch configurations that leverage the Spring Expression Language (SpEL), modularize configurations with inheritance, and use listeners. Spring Batch in Action


  7. It seeks to modularize these concerns, yet enable the fine-grained “mixing” of their behaviors with other concerns, including the core domain logic of the application, either at build or runtime. Programming Scala


  8. As with any application of AOP, the goal is to modularize the functionality so you don’t mix cross-cutting concerns, such as messaging, with the core business logic. Spring Integration in Action


  9. Finally, we will look at how to use macros and modules to modularize your scripts. Programming Pig


  10. Figure 4.1 Aspects modularize crosscutting concerns, applying logic that spans multiple application objects. Spring in Action 4th Edition



1836、单词 dryad 的匹配文本:


  1. DryadLINQ: The DryadLINQ system provides a wider range of operators than MapReduce over the more general Dryad runtime, but these are all bulk operators that correspond directly to RDD transformations available in Spark (map, groupByKey, join, etc) Resilient Distributed Datasets - A Fault-Tolerant Abstraction for In-Memory Cluster Computing


  2. We thank Dennis Fetterly and Sergiy Matusevych for providing some of the experimental results on Dryad and REEF, and Mayank Bansal for helping with 2.1.0 MapReduce benchmarks. Apache Hadoop YARN Yet Another Resource Negotiator


  3. Compile to Dryad data flow plan (DAG), and executed by the runtime job manager. MapReduce and Parallel DBMSs Friends or Foes


  4. The Dryad [11] system implements a general-purpose dataparallel execution engine. FlumeJava - Easy, Efficient Data-Parallel Pipelines


  5. An elastic framework (e.g., Hadoop, Dryad) can scale its resources up and down, i.e., it can start using slots as soon as it acquires them and release slots as soon its task finish. Mesos A Platform for Fine-Grained Resource Sharing in the Data Center


  6. DryadInc [31] attacks the same problem by reusing identical portions of the computation from previous runs and allowing the user to specify a merge function that combines new input with previous iterations’ outputs. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



1837、单词 rfcs 的匹配文本:


  1. Set to Invalid if the payload didn't conform to the RFCs. Apache Flume Distributed Log Collection for Hadoop


  2. Most of the popular Internet protocols in use today are published as RFCs. Java Network Programming and Distributed Computing


  3. They reflect the common standard objects according to the LDAP RFCs. bk-compute-adminguide-grizzly


  4. Because the IANA MIME specification and the aforementioned RFCs were forward-looking, they defined a mechanism procedurally for adding additional media types as they’re created—we desired this same flexibility for Tika’s MIME repository. Tika in Action


  5. It comes from RFCs anyone can use and improve, made by hundreds or thousands of smart, but not uniquely smart, individuals. ZeroMQ


  6. RFCs range from informational documents of general interest to detailed specifications of standard Internet protocols such as FTP. Java Network Programming 4th Edition


  7. The RFCs mentioned in this section are summarized in Table 3.5 Fundamental Networking in Java



1838、单词 gradlew 的匹配文本:


  1. For *nix systems, this is the shell script gradlew; for Windows operating systems, it’s gradlew.bat. Gradle in Action


  2. After the execution of the task, we have two script files: gradlew.bat and gradlew in the root of our project directory. Gradle Effective Implementation Guide


  3. Building the Sample Application To build the sample, cd into the SAMPLE_ROOT directory and execute the gradlew script. Pro Spring MVC


  4. You can see that in the top directory there is a file named gradlew. Pro Spring Security



1839、单词 treemap 的匹配文本:


  1. The treemap gadget To better grasp the usefulness of the treemap gadget, add a few more projects into your Sonar installation: Sonar Code Quality Testing Essentials



1840、单词 transitioning 的匹配文本:


  1. This causes a period during which the device is transitioning to a steady state (stage B), and finally the device enters a steady state (stage C) High Performance MySQL 3rd Edition


  2. To help with the ease of transitioning to more servers, I recommend running one Redis server for every separate part of your application—one for logging, one for statistics, one for caching, one for cookies, and so forth. Redis in Action


  3. This system was an improvement over XML, however during the process of rolling out the system we found that even these improvements were not sufficient in fully transitioning ownership of data format off a centralized team or in preventing unexpected incompatibilities with data consumers. Building LinkedIn’s Real-time Activity Data1


  4. We will cover the end state in detail in the next chapter; for now, it is sufficient to know that transitioning to the end state terminates the flow. Pro Spring MVC


  5. When transitioning to next, information is bound to accountForm and validated. Spring in Practice


  6. In the event of a failover, the standby ensures that it has read all of the changes before transitioning to the active state. Professional Hadoop Solutions


  7. This book is good for those who have dabbled a bit in Clojure or Scala but are not really comfortable with it; the ideal audience is seasoned OO programmers looking to adopt a functional style, as it gives those programmers a guide for transitioning away from the patterns they are comfortable with. Functional Programming Patterns in Scala and Clojure


  8. As we saw, the resolution is performed immediately prior to the bundle transitioning to the resolved state. Spring Dynamic Modules in Action


  9. This discrepancy may actually reflect the fact that stewardship of the Mac OS X Java port is transitioning from Apple to Oracle as of Java 1.7 Programming Hive


  10. One of the most challenging things about developing software is transitioning an application from one environment to another. Spring in Action 4th Edition



1841、单词 rootwrap 的匹配文本:


  1. A generic sudoers entry lets the nova user run nova-rootwrap as root. bk-compute-adminguide-grizzly


  2. A generic sudoers entry lets the Compute user run nova-rootwrap as root. bk-admin-guide-cloud-latest



1842、单词 hiverc 的匹配文本:


  1. In practice, this means you need to add the JAR file and either define the function at the beginning of each script, or create a .hiverc file in your home directory containing these commands, and the UDF will be running automatically at the beginning of each Hive session. Hadoop:The Definitive Guide 3rd Edition


  2. The .hiverc File The last CLI option we’ll discuss is the -i file option, which lets you specify a file of commands for the CLI to run as it starts, before showing you the prompt. Programming Hive



1843、单词 autogenerated 的匹配文本:


  1. Beware of Autogenerated Schemas We’ve covered the most important data type considerations (some with serious and others with more minor performance implications), but we haven’t yet told you about the evils of autogenerated schemas. High Performance MySQL 3rd Edition


  2. Even if you specify a “pretty” name for the collection, MongoDB will use the autogenerated collection name for intermediate steps of the MapReduce. MongoDB The Definitive Guide 2nd Edition


  3. The id values in the output might be different for you because they’re autogenerated by MongoDB. Scala in Action


  4. In larger environments, these dummy test files should be autogenerated by comparing what the HTML glue code includes with all the code in your application and determining where the gaps are. Testable JavaScript


  5. A modal dialog box will appear asking you to enter a unique ID of the document or to leave the field empty to get an autogenerated ID (Figure 5-8) Beginning CouchDB


  6. Each autogenerated class has several overloaded methods named parse() that operate on the data represented as Text, CharSequence, char[], or other common types. Hadoop:The Definitive Guide 3rd Edition


  7. How can I reuse an autogenerated identity value after I roll back. SQL Antipatterns


  8. The Java bindings don’t have to be autogenerated from the xjc command. Java 7 Recipes A Problem-Solution Approach


  9. For the case where the keys are autogenerated, you would use the executeWithKey(…) method. Spring Data Modern Data Access for Enterprise Java


  10. Each storage engine gets a location at a fixed offset in that array, specified by an autogenerated value that is placed in the slot member of the handlerton. Understanding MySQL Internals



1844、单词 pcie 的匹配文本:


  1. Solid-state storage (SSDs and PCIe cards) presents special challenges for benchmarking, which we address in Chapter 9 High Performance MySQL 3rd Edition



1845、单词 multiprocessors 的匹配文本:


  1. In addition to incremental improvements, future work on this framework may include construction of useful applications (as opposed to demos and tests), subsequent evaluations under production program loads, measurements on different JVMs, and development of extensions geared for use with clusters of multiprocessors. A Java ForkJoin Framework


  2. The Java programming language specifies a memory model for sharedmemory multiprocessors that supports high-performance implementations. The Java Language Specification Java SE 7 Edition


  3. By deploying many small multiprocessors, we contain the effect of faults to smaller pieces of the system. Web search for a planet the google cluster architecture


  4. On JVM implementations that employ pre-emptive scheduling policies, especially those on multiprocessors, it is possible and even desirable that the scheduler will simply ignore this hint provided by yield. Concurrent Programming in Java Design Principles and Pattern



1846、单词 nargs 的匹配文本:


  1. The operand stack will be interpreted as containing a reference to the target of the call site object, followed by nargs argument values, where the number, type, and order of the values must be consistent with the method descriptor in the call site specifier. The Java Virtual Machine Specification Java SE 7 Edition



1847、单词 american 的匹配文本:


  1. Brasil Open At Forefront Of Green Movement The Brasil Open, the second stop of the four-tournament Latin American swing, is held in an area renowned for its lush natural beauty and stunning beaches. Pro Java 7 NIO.2


  2. In biotech, financial services, and defense IT, he has helped European and American companies develop coherent strategies for embracing open source search software. Solr 3 Enterprise Search Server


  3. Gary is French, but don’t worry, he’s also American and has been living in the U.S. Spring Batch in Action


  4. The field represents the value, in cents, of an American coin. The Java Language Specification Java SE 7 Edition


  5. If, for example, we wanted to use it to count how many American artists there are in a recording artists database, we’d extract all the artist records and discard the nonAmerican ones in the map phase, and then count the remaining records in the reduce phase. Graph Databases


  6. Here we use a pattern match to pick apart the sixth American president: Functional Programming Patterns in Scala and Clojure


  7. Suppose you prepare an invoice for an American customer in which some amounts are in dollars and others are in Euros. Core Java Volume II Advanced Features 9th Edition


  8. Here is a unit test demonstrating the use of the MapJoiner method (my apologies for the obvious American Football reference, NFC East Division to be specific): Getting Started with Google Guava


  9. Consider the following flags that describe options that can apply to an American-style espresso drink: Java in a Nutshell 5th Edition


  10. Java Network Programming, the image of a North American river otter, and related trade dress are trademarks of O’Reilly Media, Inc. Java Network Programming 4th Edition



1848、单词 monitorenter 的匹配文本:


  1. A monitorenter instruction is type safe iff one can validly pop a type matching reference off the incoming operand stack yielding the outgoing type state. The Java Virtual Machine Specification Java SE 7 Edition


  2. Note, however, that the Java virtual machine provides separate monitorenter and monitorexit instructions that implement the lock and unlock actions. JSR-133 Java Memory Model and Thread


  3. Another example would be the need to associate monitorenter bytecodes with their corresponding monitorexit(s), the need for which is explained in great detail in Chapter 4 Oracle JRockit The Definitive Guide



1849、单词 btree 的匹配文本:


  1. Figure 5-1 shows an abstract representation of a BTree index, which corresponds roughly to how InnoDB’s indexes work. High Performance MySQL 3rd Edition


  2. Conversely, most queries that use an index use a BtreeCursor (some special types of indexes, such as geospatial indexes, use their own type of cursor) MongoDB The Definitive Guide 2nd Edition


  3. The BTree indexes hold references to the messages in the data logs that are indexed by their message ID. ActiveMQ in Action


  4. You can see that the query is now using a BtreeCursor driven by the Tags_1 index. The Definitive Guide to MongoDB


  5. You can see from the cursor field that you’re using a BtreeCursor on the index named close_1 MongoDB in Action


  6. In contrast, a regular Btree index can only be used to look up records based on the entire value or at least a prefix of the key. Understanding MySQL Internals



1850、单词 lowlevel 的匹配文本:


  1. Provided you don't try to read from an output stream, or write to an input stream, you can safely attach any "filter" stream (a stream that filters data in some fashion, such as processing it or converting it from bytes into a different form) to any lowlevel stream (such as a file or network stream) Java Network Programming and Distributed Computing


  2. This is a rather bold statement, but some languages have no fixed-sized, lowlevel arrays at all. Thinking in Java 4th Edition


  3. In other cases, you may need to perform a lowlevel operation that is most easily done with an OS-level command. Jenkins The Definitive Guide


  4. With all the power that MapReduce provides, it is a fairly lowlevel model, and it can often be challenging to implement for new Hadoop developers. Professional Hadoop Solutions


  5. All columns in a column family are stored together in the same lowlevel storage file, called an HFile. HBase:The Definitive Guide


  6. This allows the application developer to focus on the business logic and not worry about lowlevel transaction and state management details, remoting, concurrency, multithreading, connection pooling, or other complex low-level APIs. Java EE 7 Essentials


  7. The high-level consumer API provides an abstraction over the lowlevel implementation of the consumer API, whereas the simple consumer API provides more control to the consumer by allowing it to override its default low-level implementation. Apache Kafka


  8. The first step is to examine your choice of algorithms: no amount of lowlevel optimization can make up for a poor choice of algorithm. Effective Java 2nd Edition


  9. But if you reduce the high-level I/O operations, the lowlevel ones are generally reduced by the same proportion. Java Performance Tuning 2nd Edition


  10. When using lowlevel binding, you would use a derived NumberBinding class such as a DoubleBinding class. Java 7 Recipes A Problem-Solution Approach



1851、单词 amy 的匹配文本:


  1. Then, the values are printed in sorted order: Amy Bob Carl. Core Java Volume I Fundamentals 9th Edition


  2. Most of all, we would like to thank Amy Fong, whose thoroughness and invaluable suggestions, including questions that the inquisitive reader might have about TCP/IP and Java, helped shape the book that you are reading today. Java Network Programming and Distributed Computing


  3. I couldn’t have done it without my wife, Amy, who helps me think about the big picture; without the patience and support of my coauthors and O’Reilly; nor without the help of everyone who helped us hammer out book content details on the mailing lists. CouchDB The Definitive Guide


  4. For a detailed examination of dealing with dangling pages, as well as advanced PageRank practices, see Google’s PageRank and Beyond by Amy N. Hadoop in Practice


  5. Let’s assume that Amy the administrator is setting up the ZooKeeper service. ZooKeeper Distributed Process Coordination


  6. Note For more on painting using Java’s Swing, see the web article Painting in AWT and Swing, by Amy Fowler at http://java.sun.com/products/jfc/tsc/articles/painting (Oracle Corporation, 1999) Java 7 Recipes A Problem-Solution Approach



1852、单词 policytool 的匹配文本:


  1. It provides instructions for end users and administrators on how to set up Java security policies (including the use of policytool) and introduces the concepts by which these policies are implemented. Java Security 2nd Edition


  2. The JDK comes with a rudimentary tool, called policytool, that you can use to edit policy files (see Figure 9.8) Core Java Volume II Advanced Features 9th Edition


  3. Policies can be configured by a system administrator by editing a text file or using the policytool program, described in Chapter 8 Java in a Nutshell 5th Edition



1853、单词 zinterstore 的匹配文本:


  1. Redis has a command called ZINTERSTORE, which, when provided with SETs and ZSETs, will find those entries that are in all of the SETs and ZSETs, combining their scores in a few different ways (items in SETs are considered to have scores equal to 1) Redis in Action


  2. Whenever you have two or more commands that must both be applied before anyone else tries to access the data they change (as we do here with ZINTERSTORE followed by ZREVRANGE), the potential for a race condition exists. Redis Cookbook



1854、单词 cpa 的匹配文本:


  1. Cost per action, or CPA, ads are paid a sometimes varying rate based on actions performed on the ad-destination site. Redis in Action


  2. A ColoredPoint can be assigned to a Point; therefore, the value of cpa can be assigned to pa. The Java Language Specification Java SE 7 Edition


  3. The CPA waits for conditions to be met and then checks permissions. Spring Dynamic Modules in Action



1855、单词 chmod 的匹配文本:


  1. Run the following command if you see a Permission denied message: chmod +x bin/nutch. Web Crawling and Data Mining with Apache Nutch


  2. Execute the command chmod og-rwx ~/.ssh on each machine in the cluster. Pro Hadoop


  3. Set the sticky bit on HDFS directory to prevent the directories or files from being deleted by unauthorized users with the following command: sudo -u hdfs hadoop fs -chmod 1777 /tmp. Hadoop Operations and Cluster Management Cookbook


  4. Use the chmod command to change its permissions so that the service (POSIX) user can write to it. bk-admin-guide-cloud-latest


  5. You should ensure that this binary is owned by root and has the setuid bit set (with chmod +s) Hadoop:The Definitive Guide 3rd Edition


  6. You can change permission settings and ownership using bin/hadoop fs -chmod, -chown, and -chgrp. Hadoop in Action


  7. We used the -chmod option to hadoop fs, which we have not seen before. Hadoop Beginners Guide


  8. In keeping with the filesystem metaphor, ZooKeeper offers a shell where administrators can execute commands to perform the equivalent of the chmod and chown commands. Hadoop Operations


  9. A number of the commands come directly from Unix shells and will operate in ways that are familiar: chgrp, chmod, chown, cp, du, ls, mkdir, mv, rm, and stat. Programming Pig


  10. In either case, you can solve the problem by opening up permissions in the data directory using chmod or chown. MongoDB in Action



1856、单词 hollywood 的匹配文本:


  1. We’ll create an actor...how about a HollywoodActor that’ll respond to requests to play different roles? Programming Concurrency on the JVM


  2. IoC is often described as following the Hollywood principle: Don’t call us, we’ll call you.8 From the preceding description of dependency injection, you can see how well this applies. Spring Integration in Action



1857、单词 webhdfs 的匹配文本:


  1. In addition, if you’re looking for lower-level HDFS ingress and egress options‚ take a look at appendix B where I cover using tools such as WebHDFS and Hoop. Hadoop in Practice


  2. WebHDFS is intended as a replacement for HFTP and HSFTP. Hadoop:The Definitive Guide 3rd Edition


  3. By using the embedded web server in each daemon, WebHDFS clients must be able to communicate with each node of the cluster, just like native Java clients. Hadoop Operations


  4. The webhdfs scheme is very useful because it provides an HTTPbased protocol to communicate with HDFS that does not require the client (our application) and the HDFS server to use the exact same version (down to the minor point release) of the HDFS libraries. Spring Data Modern Data Access for Enterprise Java



1858、单词 hashmap 的匹配文本:


  1. Also, often data is not a simple list but more complex, like a tree or a hashmap, which can be implemented using trees. Programming Concurrency on the JVM


  2. The store method (Example 5-23) stores the key-value message into a hashmap, unless the key and value are both null. ZeroMQ


  3. Because of the "optimistic" nature of the concurrent hashmap, the. Java Threads 3rd Edition


  4. They act like large, distributed hashmap data structures that store and retrieve opaque values by key. Graph Databases



1859、单词 bigtop 的匹配文本:


  1. Today this is less of an issue since the Apache Bigtop project started (http://bigtop.apache.org/) Apache Flume Distributed Log Collection for Hadoop


  2. Another tool you might want to give a try is Apache Bigtop, which can be found at the following location: HBase Administration Cookbook


  3. Bigtop provides repositories that can be easily added into your system in order to find and install the dependencies. Apache Sqoop Cookbook


  4. The Apache Bigtop project (http://incubator.apache.org/bigtop/) runs interoperability tests on stacks of Hadoop components and provides Linux packages (RPMs and Debian packages) for easy installation. Hadoop:The Definitive Guide 3rd Edition


  5. Apache Bigtop Newer versions of Hadoop are based on a new project called Apache Bigtop. Hadoop Operations



1860、单词 casperjs 的匹配文本:


  1. Built on top of PhantomJS, CasperJS provides similar functionality as Selenium but in a completely headless environment. Testable JavaScript



1861、单词 pageview 的匹配文本:


  1. Imagine that we need to store a pageview counter in Elasticsearch. Elasticsearch The Definitive Guide


  2. For instance, losing a few pageview events occasionally is certainly not the end of the world. Kafka a Distributed Messaging System for Log Processing


  3. Now, we can convert each pageview’s URL to the appropriate class. Programming Hive



1862、单词 qpid 的匹配文本:


  1. This is usually implemented with RabbitMQ today, but could be any AMPQ message queue (such as Apache Qpid), or Zero MQ. bk-compute-adminguide-grizzly


  2. Options like ActiveMQ, ZeroMQ, and Apache Qpid all providing different open source approaches to message queuing. RabbitMQ in Action


  3. Usually implemented with RabbitMQ, but could be any AMPQ message queue, such as Apache Qpid or Zero MQ. bk-admin-guide-cloud-latest


  4. The choice of RabbitMQ over other AMQP compatible options that are gaining support in OpenStack, such as ZeroMQ and Qpid is due to its ease of use with Ubuntu and significant testing in production. OpenStack Operations Guide



1863、单词 catalina 的匹配文本:


  1. Tomcat, for example, places compiled JSP pages in the CATALINA_BASE/work directory. Jenkins The Definitive Guide


  2. Now we can start the servlet container by running the following command: bin/catalina.sh start. Solr 3.1 Cookbook


  3. Another facet of Tomcat configuration is the configuration of its Servlet container, also known by the name Catalina. Spring Dynamic Modules in Action


  4. Passing the run argument to the catalina.sh script will cause Tomcat to start up so that its output will appear in the terminal. ActiveMQ in Action


  5. Now we can start the servlet container, by running the following command: bin/catalina.sh start. Apache Solr 4 Cookbook



1864、单词 constraining 的匹配文本:


  1. Statically typed languages are more constraining than dynamically typed languages, and some force you to provide additional type information when you declare or call a function. Scala in Action


  2. If you don’t care about which element is returned, use findAny because it’s less constraining when using parallel streams. Java 8 in Action Lambdas, Streams and Functional-style Programming


  3. Constraining Matches We constrain graph matches using the WHERE clause. Graph Databases


  4. Scope A defined boundary of visibility, constraining what types and their members are visible within it. Programming Scala


  5. The input to a job is specified as a collection of paths, which offers great flexibility in constraining the input to a job. Hadoop:The Definitive Guide 3rd Edition


  6. There is a lot of similar functionality compared to the Get class: you may limit the data returned by the scan in setting the column families to specific ones using addFamily(), or, even more constraining, to only include certain columns with the addColumn() call. HBase:The Definitive Guide


  7. Locks are the de facto mechanism for constraining access to a critical section of code to one thread at a time. Oracle JRockit The Definitive Guide


  8. Here we’re searching for all the books (see setUp() in listing 5.6) but constraining the search using a filter for a category which contains a single book. Lucene in Action 2nd Edition


  9. Constraining Query Matches The min() and max() functions enable you to constrain query matches to only those that have index keys between the min and max keys specified. The Definitive Guide to MongoDB


  10. Protocols constraining when and how messages (operation requests) are processed. Concurrent Programming in Java Design Principles and Pattern



1865、单词 prolog 的匹配文本:


  1. A fixed width font is used for Java Virtual Machine data types, exceptions, errors, class file structures, Prolog code, and Java code fragments. The Java Virtual Machine Specification Java SE 7 Edition


  2. Project:2 Specialized languages like Prolog use backward chaining in order to solve problems like this. Thinking in Java 4th Edition


  3. In fact, it is common practice to do it in this way in programming courses teaching Prolog and/or functional programming languages. Steps in Scala An Introduction to Object-Functional Programming


  4. It should produce a subdirectory, prolog, that has many files. Lucene in Action 2nd Edition



1866、单词 serializers 的匹配文本:


  1. We will also cover event serializers, which specify how Flume Events are translated into output more suitable for the sink. Apache Flume Distributed Log Collection for Hadoop


  2. And to hand-optimize your most critical data flows, you need to cheat and to know and exploit facts about your data, which is something general- purpose serializers cannot do. ZeroMQ


  3. The tables created in the manner describe above are serialized and deserialized using default serializers and deserializers already present in Hive. Hive A Petabyte Scale Data Warehouse Using Hadoop


  4. Custom serializers and deserializers, if supported, ted in the same way as message handlers. Java EE 7 Specification


  5. Hadoop comes with four serializers: Avro, Java, Tether (for binary data contained within a TetherData class), and Writable10 (the default serializer) Hadoop in Practice


  6. In addition to several types of serializers being available, there are multiple implementations within each type. Java Performance


  7. To use these serializers to make it easy to do type conversion when working with Redis, set the keySerializer and valueSerializer properties of the template like in the snippet of JavaConfig code shown in Example 8-8 Spring Data Modern Data Access for Enterprise Java


  8. Spring Data Redis comes with several such serializers, including these: Spring in Action 4th Edition



1867、单词 sflowtool 的匹配文本:


  1. The sflowtool command is similar to tcpdump, decoding and printing the contents of network packets. Monitoring with Ganglia



1868、单词 asynchbase 的匹配文本:


  1. After that, you’ll explore asynchbase, an alternative Java client library that is designed for asynchronous interaction. HBase in Action



1869、单词 roman 的匹配文本:


  1. The area has a rich history and you can come across many castles, churches, and ruins that date back to medieval and even Roman times. Mahout in Action


  2. Case-affecting operations are only guaranteed to work on characters from the Roman alphabet. MongoDB The Definitive Guide 2nd Edition


  3. Finally, a few nonterminal symbols are described by a descriptive phrase in roman type in cases where it would be impractical to list all the alternatives. The Java Language Specification Java SE 7 Edition


  4. The illustrations were obtained from a helpful librarian at the Ethnographic Museum in Split, Croatia, located in the Roman core of the medieval center of the town, amid the ruins of Emperor Diocletian’s retirement palace built circa AD 304 Spring Dynamic Modules in Action


  5. It is situated in northern Dalmatia, an area rich in Roman and Venetian history. Hadoop in Practice


  6. Our example will convert a List[Char] of Roman numerals to their Arabic numeral equivalent. Beginning Scala


  7. The illustrations were obtained from a helpful librarian at the Ethnographic Museum in Split, itself situated in the Roman core of the medieval center of the town: the ruins of Emperor Diocletian’s retirement palace from around AD 304 Hadoop in Action


  8. This is the result of using the Castellar font, which is an all-capital letter font patterned after the letters used on a Roman column dedicated to Augustus. Java 7 New Features Cookbook



1870、单词 subarray 的匹配文本:


  1. Using array slicing, indicated by : notation in array indices, it tests whether two arrays share a common subarray of three or more elements: Interpreting the Data Parallel Analysis with Sawzall


  2. Internal method that merges two sorted halves of a subarray. Data Structures and Algorithm Analysis in Java 3rd Edition


  3. Any subarray smaller than this threshold was solved using iteration. Java 7 New Features Cookbook


  4. The five versions of the write( ) method write a single character, a character array or subarray, or a string or substring to the destination of the stream. Java in a Nutshell 5th Edition


  5. The second attempts to fill the specified subarray of input, starting at offset and continuing for length bytes. Java Network Programming 4th Edition



1871、单词 ith 的匹配文本:


  1. For example, if a is an array of integers, then a[i] is the ith integer in the array. Core Java Volume I Fundamentals 9th Edition


  2. You can refer to the ith captured group later in the expression with \i. Thinking in Java 4th Edition


  3. As we cycle through i going from 0 to max, we start with lat and print the ith character, followed by the ith character of lon. Hadoop RealWorld Solutions Cookbook


  4. In addition, most of le who helped with the previous version continued to help with this version, ith Jon Ellis and Ram Jeyaraman. Java EE 7 Specification


  5. The first statement, println(args(i)), prints out the ith command line argument. Programming in Scala 2nd Edition


  6. Let Ti be the number of trees after the ith insertion. Data Structures and Algorithm Analysis in Java 3rd Edition


  7. For example, if s is a string, then s(i) is the ith character of the string. Scala for the Impatient


  8. The expression A(i)(j) refers to the jth element of the ith array. Steps in Scala An Introduction to Object-Functional Programming


  9. The sample standard deviation can be calculated using the following formula where s is the sample standard deviation, n is the number of observations in the sample, x is the ith observation, and x is the average. Java Performance



1872、单词 jcp 的匹配文本:


  1. To prove the point: The Java date library is a bit muddled, and a major redesign is underway; see http://jcp.org/en/jsr/detail?id=310.) Core Java Volume I Fundamentals 9th Edition


  2. Widespread DI practice also influenced the development of the Java Community Process (JCP) led by Sun Microsystems (acquired by Oracle in 2009) Pro Spring 3


  3. We’ll start by briefly describing the key features of Apache Jackrabbit and the Content Repository for Java technology (JCR) API (http://www.jcp.org/en/jsr/ detail?id=170) that it implements. Tika in Action


  4. The executi Expression Language specification is available at http://jcp.org/en/ ail?id=341 Java EE 7 Specification


  5. The JCP process defines three key deliverables for any JSR: Specification. Java EE 7 Essentials


  6. Bruce Snyder is a co-founder of Apache Geronimo, a committer for ActiveMQ, Camel, and ServiceMix, and a member of various JCP expert groups. ActiveMQ in Action



1873、单词 jdb 的匹配文本:


  1. You can enable some options so that the task JVM runs with the Java debug agent enabled, and connect to the task via your IDE or jdb. Hadoop in Practice


  2. I wrote a Scala program and compiled it with -g:vars (put all the symbols in the class file), started the program under jdb (the Java Debugger) and set a break point. Beginning Scala


  3. For example, if you’re using jdb , you can attach it to the JVM via. Hadoop in Action


  4. When jdb is invoked with the name of a Java class, it starts another copy of the java interpreter, using any interpreter options specified on the command line. Java in a Nutshell 5th Edition



1874、单词 jon 的匹配文本:


  1. In our example, the Jon Spectre node detected the client connection from the node named, Hayden, Alex. Mastering ElasticSearch


  2. NoSQL—RabbitMQ has also been integrated with some NoSQL databases; most notable is the work by Jon Brisbin, who’s been working on bridging RabbitMQ with Riak. RabbitMQ in Action


  3. Jon Lentz is a Software Engineer on the core processing team at comScore, Inc., an online audience measurement and analytics company. Hadoop RealWorld Solutions Cookbook


  4. In addition, most of le who helped with the previous version continued to help with this version, ith Jon Ellis and Ram Jeyaraman. Java EE 7 Specification


  5. Therefore, your expected results would have Joe as the first FoF recommendation, followed by Dee, and then Jon. Hadoop in Practice


  6. Jon Gray   and Erik Holstad   at Streamy.com designed and implemented a brand-new read implementation by adding new delete semantics and restructuring the internal key formats. Hadoop in Action


  7. The documentation of the javax.crypto package and its subpackages was also reviewed by Jon Eaves. Java in a Nutshell 5th Edition


  8. Jon Bentley once discovered that eliminating code from some simple loops can actually slow them down.[4] If a change does not improve performance, you should revert to the previous version. Java Performance Tuning 2nd Edition


  9. Finally, I would like to thank Tim and Jon for jumping in at a crucial moment and helping out; the publication of this book would not have been possible without your help. The Definitive Guide to MongoDB


  10. Jon has been piloting an OpenStack cloud as a senior technical architect at the MIT Computer Science and Artificial Intelligence Lab for his researchers to have as much computing power as they need. OpenStack Operations Guide



1875、单词 simulant 的匹配文本:


  1. It makes sense, then, to define a trait Simulant that can be mixed into any class to make it a simulated object. Programming in Scala 2nd Edition



1876、单词 xbean 的匹配文本:


  1. The XBean library E included in the Maven application build file in the previous listing allows you to run the ActiveMQ messaging broker by referencing an XML configuration file located in the classpath. Spring Roo in Action


  2. The example will locate the activemq.xml file in the classpath using the xbean: protocol. ActiveMQ in Action



1877、单词 deselect 的匹配文本:


  1. By clicking on the star icon, you can select/ deselect your favorite projects. Jenkins Continuous Integration Cookbook


  2. The test will verify the selection and then deselect the options by calling various deselection methods, namely by visible text, by value, and by index, respectively. Selenium Testing Tools Cookbook



1878、单词 loukides 的匹配文本:


  1. O’Reilly, including, but not limited to, Mike Loukides, Julie Steele, and Melanie Yarbrough, who gave me the opportunity and helped me turn the raw text into a good looking book. Getting Started with CouchDB


  2. I’d like to thank Michael Loukides, Meghan Blanchette, and the awesome team at O’Reilly for making this book a reality. Monitoring with Ganglia


  3. Mike Loukides, this book’s editor, and the rest of the team at O’Reilly Media were very responsive and helpful. Scaling CouchDB


  4. I am grateful to my editor, Mike Loukides, and his colleagues at O’Reilly for their help in the preparation of this book. Hadoop:The Definitive Guide 3rd Edition


  5. Mike Loukides provided high-level direction and guidance for the first edition of the book. Java in a Nutshell 5th Edition


  6. Thanks to my editor, Mike Loukides, for being a charming conversationalist at dinner in San Francisco. Cassandra The Definitive Guide


  7. My editor, Mike Loukides, got things rolling, and provided many helpful comments along the way that substantially improved the book. Java Network Programming 4th Edition


  8. I am also very grateful to Mike Loukides and Kirk Pepperdine for the enormously helpful assistance I received from them while writing this book. Java Performance Tuning 2nd Edition


  9. I suggested to my previous editor at O’Reilly, Mike Loukides, that a Hive book was needed by the community. Programming Hive


  10. Thanks to Mike Loukides for his confidence in Gradle as a technology and his help in publishing this book under O’Reilly’s name. Building and Testing with Gradle



1879、单词 monty 的匹配文本:


  1. Oracle, as well as all of the ex-MySQLers, wherever you are, and especially to SkySQL and Monty Program. High Performance MySQL 3rd Edition


  2. Working under the adverse conditions of little computational resources, and perhaps building on his God-given talent, Monty developed a habit and ability to write very efficient code naturally. Understanding MySQL Internals



1880、单词 bootstrapped 的匹配文本:


  1. You configured your build to provide a source set for different types of tests, provided new test tasks, fully integrated them into the build lifecycle, and even bootstrapped the test environment where needed. Gradle in Action


  2. Note that within each method, Spring will pass in an instance of the TestContext class so the method can access the underlying testing ApplicationContext bootstrapped by the Spring Framework. Pro Spring 3


  3. After it has bootstrapped and joined the cluster, it can be put in any seed list for any node, including itself. Cassandra High Performance Cookbook


  4. Essentially, each tree is trained on a bootstrapped sample of the original dataset, and each time a leaf is split, only a randomly chosen subset of the dimensions are considered for splitting. Storm Real-Time Processing Cookbook


  5. The Spring Framework and Spring DM use Commons Logging as their log library, but logging must be bootstrapped from a custom log factory. Spring Dynamic Modules in Action


  6. Several of us started to work alongside our studies and a certain percentage of our earnings was put away so that the business could be bootstrapped into a full-time occupation when everyone was out of university. Oracle JRockit The Definitive Guide


  7. The server starts up with a call to the initServer method of this class, upon which the server registers the SEDA verb handlers, makes some determinations about its state (such as whether it was bootstrapped or not, and what its partitioner is), and registers itself as an MBean with the JMX server. Cassandra The Definitive Guide


  8. The standby namenode needs to be bootstrapped with a copy of the metadata information from the primary namenode. Hadoop Operations


  9. The context will invoke the listener later, which will cause the Application Context to be bootstrapped in turn. Spring Data Modern Data Access for Enterprise Java


  10. The deployment was fully automated: Cobbler deployed the OS on the bare metal, bootstrapped it, and Puppet took over from there. OpenStack Operations Guide



1881、单词 subobject 的匹配文本:


  1. But if the object contains references to subobjects, then copying the field gives you another reference to the same subobject, Core Java Volume I Fundamentals 9th Edition


  2. When you create an object of the derived class, it contains within it a subobject of the base class. Thinking in Java 4th Edition


  3. The "loc" field can be called anything, but the field names within its subobject are specified by GeoJSON and cannot be changed. MongoDB The Definitive Guide 2nd Edition


  4. They are defined in the subobject Nil and the subclass :: Programming in Scala 2nd Edition


  5. A document for which you want to add geospatial information must contain either a subobject or an array where the first two elements contain the x and y coordinates (or y,x), as in the following example: The Definitive Guide to MongoDB



1882、单词 mnt 的匹配文本:


  1. The mount point for the file system is /mnt/hdfs, and the arguments after the /mnt/hdfs are passed to the FUSE subsystem. Pro Hadoop


  2. For example the cloud-init package included in Ubuntu's stock cloud images will format this space as an ext3 filesystem and mount it on / mnt. bk-compute-adminguide-grizzly


  3. We will use directory ~/mnt as the mount point for ISO images. Hadoop Operations and Cluster Management Cookbook


  4. For example, the cloud-init package included in Ubuntu's stock cloud images format this space as an ext3 file system and mount it on / mnt. bk-admin-guide-cloud-latest


  5. On an Amazon EC2 instance, you should probably use /mnt/tmp, so that the folder is not created on the system root partition, which is quite small. The Definitive Guide to MongoDB


  6. Consider the example where you want to take a snapshot of a persistent block storage volume, detected by the guest operating system as /dev/vdb and mounted on /mnt. OpenStack Operations Guide



1883、单词 slf4j 的匹配文本:


  1. Gradle provides a logger implementation based on the logging library SLF4J. Gradle in Action


  2. The logger object is an instance of a Gradle-specific extension of the SLF4J Logger interface. Gradle Effective Implementation Guide


  3. Make sure that you download the distribution that matches the version of SLF4J packaged with Solr or upgrade Solr's versions. Solr 3 Enterprise Search Server


  4. For this, you’ll use the logging library SLF4J, the same logging library used by asynchbase. HBase in Action


  5. As you may know, Solr is a Java web application that uses SLF4J API for logging. Solr 3.1 Cookbook


  6. The retry listener uses the SLF4J logging framework to log the exception the operation throws. Spring Batch in Action


  7. All bundles can be found in the Spring DM distribution except for one, the NOP SLF4J implementation. Spring Dynamic Modules in Action


  8. Use SLF4J, along with the Java Logging API to implement your logging solution. Java 7 Recipes A Problem-Solution Approach



1884、单词 nms 的匹配文本:


  1. The RM forwards the exit status of finished containers, as reported by the NMs, to the responsible AMs. Apache Hadoop YARN Yet Another Resource Negotiator


  2. Typically, Network Management Systems (NMS) use time series data to store system performance information. Cassandra High Performance Cookbook


  3. We’ll dig into the NMS API by writing a stock portfolio consumer in C# and showing how you can run it on the Mono platform. ActiveMQ in Action



1885、单词 hierarchically 的匹配文本:


  1. Modules are usually organized hierarchically and can define dependencies on each other. Gradle in Action


  2. By choosing the appropriate prefixes, this operation enables you to browse keys hierarchically, similar to browsing directories within a filesystem. Professional Hadoop Solutions


  3. We solve this problem by performing an additional Contraction phase, where Reduce tasks are combined hierarchically in a tree-like fashion; this both controls the task size and ensures that no long dependencies between tasks arise, since all paths in the tree will be of logarithmic length. Incoop MapReduce for Incremental Computations


  4. Imagine that logfiles are stored in a directory structure organized hierarchically by date. Hadoop:The Definitive Guide 3rd Edition


  5. The copying is done hierarchically in breadth first manner, which increases cache locality (objects that reference each other should be stored close to each other in memory for maximum cache efficiency) Oracle JRockit The Definitive Guide


  6. If you already have data that are hierarchically organized, you might not want to build a duplicate tree and worry about keeping both trees synchronized. Core Java Volume II Advanced Features 9th Edition


  7. Like files in a traditional filesystem, ZNodes can store arbitrary bytes, have access control lists associated with them, and can be organized hierarchically. Hadoop Operations


  8. Class loaders are defined hierarchically and each class loader has a delegation parent. Java Performance


  9. Non first normal form relations to represent hierarchically organized data. PowerDrill - Processing a Trillion Cells per Mouse Click


  10. We’ll see that they have important performance benefits, and they can help organize data in a logical fashion, such as hierarchically. Programming Hive



1886、单词 lite 的匹配文本:


  1. LiteDeviceResolver looks for clues such as the use of the Wireless Access Protocol (WAP) or by comparing the contents of the User-Agent header to a list of 90 or so keywords or prefixes. Spring in Practice


  2. To perform the actual geolocation, you use MaxMind’s GeoLite Country Lite binary file, which is free. Hadoop in Practice


  3. This will help define how EJB features beyond EJB Lite can be officially added to a product that does not support full Java EE Profile. Java EE 7 Essentials


  4. Query-string search is handy for ad hoc searches from the command line, but it has its limitations (see Search Lite) Elasticsearch The Definitive Guide


  5. Particular care should be taken when determining applicable requirements based on the presence of EJB Lite in the Web Profile. Java EE 7 Web Profile Specification


  6. An embedded EJB container supports EJB Lite, a subset of the overall EJB feature set. Pro JPA2



1887、单词 monday 的匹配文本:


  1. For example, in Germany, the group separator is a period, not a comma, and Monday is formatted as Montag. Core Java Volume I Fundamentals 9th Edition


  2. There is always a fall-back plan in case a problem is found on a Sunday so that the bank will always be open for business as usual on Monday morning. Monitoring with Ganglia


  3. On Monday, you do a differential backup of everything that has changed since Sunday. High Performance MySQL 3rd Edition


  4. There is one important issue to be aware of: suppose you take a backup of your cluster on Monday. MongoDB The Definitive Guide 2nd Edition


  5. It’s about being able to read the code several weeks later on a cold Monday morning before coffee, and not feel any pain. ZeroMQ


  6. If we run the code, we’ll get this match of SATURDAY followed by MONDAY. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


  7. But before you pack up and head out, you need to be sure your boss and colleagues know the status of the work you’ve been doing so that on Monday they can pick up where you left off. Spring in Action 4th Edition



1888、单词 pcollections 的匹配文本:


  1. There is also a version of parallelDo() that allows multiple output PCollections to be produced simultaneously from a single traversal of the input PCollection. FlumeJava - Easy, Efficient Data-Parallel Pipelines



1889、单词 multikey 的匹配文本:


  1. If any document has an array field for the indexed key, the index immediately is flagged as a multikey index. MongoDB The Definitive Guide 2nd Edition


  2. We’ll discuss unique, sparse, and multikey indexes, and provide a number of pointers on index administration. MongoDB in Action



1890、单词 stackable 的匹配文本:


  1. You can do this via HTTPS, which is a piece of cake thanks to the “stackable” ChannelHandlers that come with Netty. Netty in Action MEAP V08


  2. By nature Scala traits are stackable, meaning one trait can modify or decorate the behavior of another trait down the stack. Scala in Action


  3. It is built to support a set of pluggable, stackable login modules. Java Security 2nd Edition


  4. This chapter shows you how traits work and shows two of the most common ways they are useful: widening thin interfaces to rich ones, and defining stackable modifications. Programming in Scala 2nd Edition


  5. Stackable Traits There are a couple of refinements we can do to improve the reusability of our work and to make it easier to use more than one trait at a time, i.e., to “stack” them. Programming Scala



1891、单词 toint 的匹配文本:


  1. For instance, Scala’s strings support methods like toInt or toFloat, which convert the string to an integer or floating-point number. Programming in Scala 2nd Edition


  2. To convert a string containing a number into the number, use toInt or toDouble. Scala for the Impatient


  3. Next, we define the toInt method, which takes a single parameter called in. Beginning Scala


  4. Method toInt is one of a family of methods that parse a string as a literal of some basic type and return an object that corresponds to this literal (see Table 2.5) Steps in Scala An Introduction to Object-Functional Programming



1892、单词 payee 的匹配文本:


  1. One is the country for which you have to process the payroll, and the other is the payee. Scala in Action


  2. For example, in the following code, the @When annotation is used to map the step "When he enters "Jim" as payee name" from the feature file in the step definition file. Selenium Testing Tools Cookbook


  3. The transactions are transmitted as a text file, each line containing the payer and payee accounts and the amount that’s transferred between them, as well as the transfer date, as in the following listing. Spring Integration in Action



1893、单词 bigram 的匹配文本:


  1. A single word can be called a unigram, and two words like Coca Cola can be considered a single unit and called a bigram. Mahout in Action


  2. To illustrate the example, let's assume that we have a bigram ab and a unigram c which are common and they exist in our index used by suggester. Mastering ElasticSearch


  3. BiCount Bigram count measures the prevalence of each subsequence of two items within a given sequence. Incoop MapReduce for Incremental Computations


  4. The unigram field would form the basis of our search, with the bigram field being used to boost relevance. Elasticsearch The Definitive Guide


  5. Consider this program, in which the class Bigram represents a bigram, or ordered pair of letters: Effective Java 2nd Edition


  6. Nutch combines an index-time analysis bigram (grouping two consecutive words as a single token) technique with a query-time optimization of phrases. Lucene in Action 2nd Edition



1894、单词 metering 的匹配文本:


  1. Efficiently collects the metering data about the CPU and network costs. bk-admin-guide-cloud-latest


  2. You can only view metering statistics on the dashboard (available only to adminstrators) admin-user-guide-trunk


  3. Currently, metering is available through only the ceilometer command-line client. user-guide



1895、单词 urlclass 的匹配文本:


  1. If you're loading classes through the filesystem or from an HTTP server, then the URLClassLoader provides a complete definition of a class loader. Java Security 2nd Edition


  2. If the plugins are packaged as JAR files, you can simply load the plugin classes with an instance of URLClassLoader. Core Java Volume II Advanced Features 9th Edition


  3. Use the inherited loadClass( ) method to load a named class with a URLClassLoader. Java in a Nutshell 5th Edition


  4. URLClassLoader now implements AutoCloseable, so you can use a try-with-resources statement: Java SE 8 for the Really Impatient



1896、单词 jeff 的匹配文本:


  1. The F1 team, and Jeff Shute in particular, worked closely with us in developing our data model and helped immensely in tracking down performance and correctness bugs. Spanner - Google’s Globally-Distributed Database


  2. Thanks to Jeff Gold for providing some early encouragement and comments. MapReduce Design Patterns


  3. Thanks also to all the external reviewers, g Jeff Estefan (Adecco Technical Services) Java EE 7 Specification


  4. For full disclosure, both the author James Turnbull and co-author Jeff McCune work at Puppet Labs, the organization that supports the development of Puppet. Pro Puppet


  5. We would also like to thank Hector Garcia-Molina, Rajeev Motwani, Jeff Ullman, and Terry Winograd and the whole WebBase group for their support and insightful discussions. The anatomy of a large-scale hypertextual Web search engine


  6. For example, Jeff Atwood and Joel Spolsky see little value in documenting code, except for the database, in StackOverflow podcast #80, SQL Antipatterns


  7. The online edition of this book was created by the Safari production group (John Chodacki, Becki Maisch, and Madeleine Newell) using a set of Frame-to-XML conversion and cleanup tools written and maintained by Erik Ray, Benn Salter, John Chodacki, and Jeff Liggett. Java Performance Tuning 2nd Edition


  8. Jeff Bleiel, our development editor, for his work liaising with Manning—without Jeff’s input, the book would not be what it is today; Gary Tully for his tireless technical reviews of the entire book; the Manning staff for their arduous work on the book; Filip Hanik for his assistance with Tomcat; Jan Bartel and Greg Wilkins for their assistance with Jetty; David Jencks and Kevan Miller for their assistance with Geronimo; and Jaikiran Pai for his assistance with JBoss. ActiveMQ in Action


  9. To that end, Jeff Kessleman and I wrote one of the first books on Java performance, which was published back in 2000 Java Performance


  10. Michael Stephens helped conceive the book, and my development editors, Sara Onstine and Jeff Bleiel, pushed the book to completion while being helpful along the way. MongoDB in Action



1897、单词 kino 的匹配文本:


  1. Another example is KinoSearch, which provides Lucene-like functionality with a C core and Perl bindings. Lucene in Action 2nd Edition



1898、单词 browsermob 的匹配文本:


  1. To investigate how proxies work, we will play with the open source programmable proxy browsermob. Testable JavaScript



1899、单词 syntactical 的匹配文本:


  1. I’ve taken extra effort to keep the syntactical nuances and the language-specific idioms to a minimum. Programming Concurrency on the JVM


  2. You can learn enough about Python by going through the Python language tutorial for Python 2.7.x and reading the Python documentation for certain syntactical constructs when I mention them. Redis in Action


  3. Ultimately, this allows you to treat infrastructure code like any other software development project that can be versioned, tested, and checked for potential syntactical issues. Gradle in Action


  4. This is followed by a syntactical analysis phase that analyzes sequences of tokens. Programming in Scala 2nd Edition


  5. In order to use any of these without their syntactical meaning, you need to escape them by a preceding \ such as seen here: Solr 3 Enterprise Search Server


  6. Domain-Specific Languages Domain-Specific Languages, or DSLs, provide a convenient syntactical means for expressing goals in a given problem domain. Programming Scala


  7. In Java and C++, there are several syntactical differences between arrays and array lists/vectors. Scala for the Impatient


  8. A URI is a purely syntactical construct that contains the various parts of the string specifying a web resource. Core Java Volume II Advanced Features 9th Edition


  9. But there’s no syntactical difference in queries over    partition columns or data columns. Hadoop in Action


  10. You will get used to these syntactical differences relatively quickly. The Definitive Guide to MongoDB



1900、单词 hadn 的匹配文本:


  1. In particular, the Java 1.0/1.1 Vector class was commonly used and might have been even more useful if, in the name of efficiency (which was almost certainly an illusion), all the methods hadn’t been made final. Thinking in Java 4th Edition


  2. This is because you hadn’t written any test code that Gradle would need to compile or execute. Gradle in Action


  3. If they hadn’t checked in with the database in a while, we would see ‘XXX’ in their listing. Deploying OpenStack


  4. Otherwise, an application may perform a successful write, attempt to read the value, and not be able to find it (because it sent the read to a secondary, which hadn’t replicated yet) MongoDB The Definitive Guide 2nd Edition


  5. If it hadn’t been, the verify method would raise an error, letting our test fail. Pro Spring MVC


  6. We noted in chapter 7 that functions passed to stream operations should generally be side-effect free, and we noted the problems that arise otherwise (such as incorrect results, perhaps even unpredictable results due to race conditions we hadn’t thought of) Java 8 in Action Lambdas, Streams and Functional-style Programming


  7. The term NoSQL hadn’t even been presented yet but would come into common parlance over the next year. HBase in Action


  8. If we hadn't tried writing some of these laws out, we may not have discovered this behavior of  until much later.fork. Functional Programming in Scala


  9. The element being queried is d, which hadn’t been added to the Bloom filter. Hadoop in Practice


  10. Also, interconnectivity among systems hadn’t yet been invented, meaning that parallel processing wasn’t yet possible. ActiveMQ in Action



1901、单词 ation 的匹配文本:


  1. If profiles only included pointwise ogies, they would be little more than bundles of APIs with few or no tietead, the definition of profiles adopted here guarantees that whenever this ation defines requirements on combinations of technologies, these. Java EE 7 Specification


  2. As Java M the Web implem requirem other ha ation, products that implement the Web Profile must honor: equirements of the Java EE Platform specification that apply to all profiles; Java EE 7 Web Profile Specification



1902、单词 memcache 的匹配文本:


  1. Using sFlow as the agent technology works best for commodity web, memcache, virtual server, and Java clusters where sFlow’s standard metrics provide good coverage. Monitoring with Ganglia


  2. The proxy server may utilize an optional cache (usually deployed with memcache) to improve performance. bk-compute-adminguide-grizzly


  3. To improve performance, the proxy server can use an optional cache usually deployed with memcache. bk-admin-guide-cloud-latest



1903、单词 patrick 的匹配文本:


  1. Java goes back to 1991, when a group of Sun engineers, led by Patrick. Core Java Volume I Fundamentals 9th Edition


  2. I’ve read almost all the others—only yours and Patrick Winston’s have found a place in my heart. Thinking in Java 4th Edition


  3. Patrick was a computer scientist with a PhD in advanced network topologies. ZeroMQ


  4. A special thanks goes out to those that read our book and provided useful commentary and reviews: Tom Wheeler, Patrick Angeles, Tom Kulish, and Lance Byrd. MapReduce Design Patterns


  5. After several years of experience with the language, and significant contributions by Ed Frank, Patrick Naughton, Jonathan Payne, and Chris Warth it was retargeted to the Internet, renamed, and substantially revised to be the language specified here. The Java Language Specification Java SE 7 Edition


  6. Acknowledgements are also due to Patrick Kling for implementing a test suite for HDFS HA as part of his internship at Facebook. Apache Hadoop Goes Realtime at Facebook


  7. I thank Patrick Chan for suggesting that I write this book and for pitching the idea to Lisa Friendly, the series managing editor; Tim Lindholm, the series technical editor; and Mike Hendrickson, executive editor of Addison-Wesley. Effective Java 2nd Edition


  8. Thanks also to my reviewers for the first edition, Patrick Killelea, Ethan Henry, Eric Brower, and Bill Venners, who provided many useful comments. Java Performance Tuning 2nd Edition


  9. Keegan, Patrick, et al., NetBeans IDE field guide: developing desktop, web, enterprise, and mobile applications, 2nd Edition. Java Performance


  10. Patrick Lightbody and Paul Hammant thought that there must be a better way to drive their tests and in a way that they could use their favorite development language. Selenium 2 Testing Tools Beginner's Guide



1904、单词 globbing 的匹配文本:


  1. Bash by default performs globbing, meaning that it’ll expand wildcards like “*” Hadoop in Practice


  2. Rather than having to enumerate each file and directory to specify the input, it is convenient to use wildcard characters to match multiple files with a single expression, an operation that is known as globbing. Hadoop:The Definitive Guide 3rd Edition


  3. Java 7 provides a few approaches to filtering the contents of a directory as described in the Filtering a directory using globbing and Writing your own directory filter recipes. Java 7 New Features Cookbook



1905、单词 nnnnn 的匹配文本:


  1. This becomes the beginning of the filename, to which the framework will append -m-nnnnn, where nnnnn is the task ID number. MapReduce Design Patterns


  2. Output files are named slightly differently: in the old API both map and reduce outputs are named part-nnnnn, whereas in the new API map outputs are named part-m-nnnnn, and reduce outputs are named part-r-nnnnn (where nnnnn is an integer designating the part number, starting from zero) Hadoop:The Definitive Guide 3rd Edition


  3. Each part-m-nnnnn file contains a piece of the exported data, and together they form the full backup of the table. HBase:The Definitive Guide


  4. The output   files reside in a common directory and are typically named part-nnnnn, where nnnnn is the partition ID of the reducer. Hadoop in Action


  5. The output directory is created by Hadoop itself and the actual result files follow the part-nnnnn convention illustrated here; though given our setup, there is only one result file. Hadoop Beginners Guide



1906、单词 taxonomy 的匹配文本:


  1. Full container taxonomy The "Summary" section of the Holding Your Objects chapter showed a simplified diagram of the Java containers library. Thinking in Java 4th Edition


  2. To do this we’ll leverage the taxonomy of file formats specified in the Multipurpose Internet Mail Extensions (MIME) standard and maintained by the IANA. Tika in Action


  3. Hierarchical faceting Imagine if your documents have some sort of taxonomy or other hierarchical label. Solr 3 Enterprise Search Server


  4. To disambiguate these models, we’ve devised a simple taxonomy, as shown in Figure A-1 Graph Databases


  5. The unconditionally and conditionally thread-safe categories in the above taxonomy are both covered under the ThreadSafe annotation. Effective Java 2nd Edition


  6. With these fundamentals out of the way, I’ll present a taxonomy of all MongoDB query operators.4 MongoDB in Action


  7. While each of the new databases is unique in its own way, you can provide a rough taxonomy across most of them based on their data models. Spring Data Modern Data Access for Enterprise Java



1907、单词 uids 的匹配文本:


  1. Add the uids to the proper following and followers ZSETs. Redis in Action


  2. UIDs are of a fixed 3-byte width and used in a foreign-key relationship from the tsdb table; more on that later. HBase in Action


  3. There are other NFS gotchas to watch out for, such as synchronizing UIDs and GIDs. Hadoop:The Definitive Guide 3rd Edition


  4. A simple example of the constraints on evolution that accompany serializability concerns stream unique identifiers, more commonly known as serial version UIDs. Effective Java 2nd Edition


  5. You can also save yourself some heartache by ensuring users have the same UIDs on all machines as well. Hadoop Operations



1908、单词 specmine 的匹配文本:


  1. The SPECmine tool itself is a JSP that allows a user to query the SPEC database of benchmarks (http://www.spec.org/) Java Performance Tuning 2nd Edition



1909、单词 animations 的匹配文本:


  1. Most people have seen at least one form of simulation, as either a computer game or computer-generated animations within movies. Thinking in Java 4th Edition


  2. Unless you filter the description (see the recipe Exposing information through build descriptions in Chapter 3, Building Software) for HTML tags and JavaScript, you can use custom JavaScript or CSS animations to add eye candy to your personalized Jenkins. Jenkins Continuous Integration Cookbook


  3. Threads have been used extensively in applets that draw images or include animations. Steps in Scala An Introduction to Object-Functional Programming


  4. If the retrieval code is called from the EDT, many controls such as buttons, graphics, and animations will typically appear frozen for long periods of time. Java 7 Recipes A Problem-Solution Approach


  5. The language was optimized for programming animations and fancy effects. Java SE 8 for the Really Impatient



1910、单词 querys 的匹配文本:


  1. TermQuerys are especially useful for retrieving documents by a key. Lucene in Action 2nd Edition



1911、单词 mscr 的匹配文本:


  1. An MSCR operation has M input channels (each performing a map operation) and R output channels (each optionally performing a shuffle, an optional combine, and a reduce) FlumeJava - Easy, Efficient Data-Parallel Pipelines



1912、单词 merkle 的匹配文本:


  1. We go under the hood to understand some of the more complex inner workings, such as the gossip protocol, hinted handoffs, read repairs, Merkle trees, and more. Cassandra The Definitive Guide



1913、单词 dbobject 的匹配文本:


  1. The DBObject parameter is nothing but a key-value map provided by the Mongo Java driver, and you’re going to use the class directly. Scala in Action


  2. It takes a User object and extracts the values from its properties to store them on the MongoDB collection creating a Mongo DBObject, which ultimately will represent a Mongo document. Pro Spring Security


  3. The core data abstraction of the driver is the DBObject interface alongside the Basic DBObject implementation class. Spring Data Modern Data Access for Enterprise Java



1914、单词 javascript 的匹配文本:


  1. The view definition consists of two Javascript functions, the map function, and the reduce function. Getting Started with CouchDB


  2. Javascript and Closure plugins are available as third-party plugins, which add support for those languages. Gradle Effective Implementation Guide


  3. Now simply run Rocco on your code: % rocco myJavascript.js. Testable JavaScript


  4. The language field denotes the language the views in the document are written in, usually javascript (although the latest version of CouchDB also includes an Erlang view engine) Beginning CouchDB


  5. You may have seen eval in languages like Ruby or Javascript; however, there’s a crucial difference between that eval and the one Clojure has. Functional Programming Patterns in Scala and Clojure


  6. Selenium WebDriver provides a JavascriptExecutor interface that can be used to execute arbitrary JavaScript code within the context of the browser. Selenium Testing Tools Cookbook


  7. Accessing static files (HTML, CSS, image, Javascript files) as part of the Web request. Java Performance


  8. The javascript Sandbox project includes a sample HTML file that mimics Google’s advanced searching options, as shown in figure 8.14 Lucene in Action 2nd Edition


  9. On the server side, we’ll be running Redis and creating a Javascript file that we’ll run with Node.js. Redis Cookbook



1915、单词 interleaving 的匹配文本:


  1. What is the chance of this corruption occurring? We boosted the chance of observing the problem by interleaving the print statements with the statements that update the balance. Core Java Volume I Fundamentals 9th Edition


  2. Although interleaving is significantly more efficient for writing, it has the slight disadvantage that reading/reporting on a single consolidation function for a single source has to read all the interleaved data, potentially multiplying the number of blocks that must be read. Monitoring with Ganglia


  3. Figure 4: Example Spanner schema for photo metadata, and the interleaving implied by INTERLEAVE IN. Spanner - Google’s Globally-Distributed Database


  4. The Z-order curve is extremely similar to the geohash, involving the interleaving of bits. HBase in Action


  5. In this case, the keys are sorted numerically, which has the effect of interleaving the lines from the input files into one combined output file. Hadoop:The Definitive Guide 3rd Edition


  6. The removal of the keyword would result in an interleaving of the buffer's output, making it unreadable. Java 7 New Features Cookbook


  7. Furthermore, operating on one table at a time is normally faster than interleaving operations between multiple tables. Java Performance Tuning 2nd Edition


  8. Windows under AMD additionally requires enabling node-interleaving in the BIOS for single JVM deployments. Java Performance


  9. If you find that you are quickly interleaving added and deleted documents, this will slow down your indexing throughput substantially. Lucene in Action 2nd Edition


  10. Even though JLS addresses some particular legal and illegal reorderings that can occur, interactions with these other issues reduce practical guarantees to saying that the results may reflect just about any possible interleaving of just about any possible reordering. Concurrent Programming in Java Design Principles and Pattern



1916、单词 reconnection 的匹配文本:


  1. There isn’t a particularly good way of preventing this aside from restarting processes that get bogged down in a reconnection storm. MongoDB The Definitive Guide 2nd Edition


  2. There are a number of strategies for handling reconnection to the cluster, but the one we’ll focus on is using a load balancer to handle node selection. RabbitMQ in Action


  3. ZooKeeper will try to reconnect, and in most cases the reconnection will succeed and ensure that the session is intact. Hadoop:The Definitive Guide 3rd Edition


  4. It also provides namespaces, automatic reconnection, and other facilities that make applications more robust. ZooKeeper Distributed Process Coordination


  5. The failover transport in ActiveMQ supports automatic reconnection as well as the ability to connect to another broker just in case the broker to which a client is currently connected becomes unavailable. ActiveMQ in Action



1917、单词 lifecycles 的匹配文本:


  1. Both Percona XtraDB Cluster and Galera are still early in their lifecycles and are changing and improving rapidly. High Performance MySQL 3rd Edition


  2. You’ve seen that the Java plugin makes extensive use of this concept by creating task graphs to model full task lifecycles like the build task. Gradle in Action


  3. Object-relational mapping and transactions via Hibernate account for various concerns (multiplicity, directionality, whether the associated objects have dependent or independent lifecycles, and so on) Spring in Practice


  4. Maven uses the concept of a build lifecycle, where the three built-in build lifecycles are default, clean, and site. Spring Batch in Action


  5. Now that you know what an OSGi component is, what it can contain, and what rules must be followed to configure it, let’s see what an OSGi container looks like and what mechanisms and lifecycles it provides for managing these components. Spring Dynamic Modules in Action


  6. Sadly enough, a human always knows more about some aspects of application runtime and lifecycles than a machine can deduce. Oracle JRockit The Definitive Guide


  7. The stateful session bean and HTTP session have similar lifecycles, making them good candidates to work together. Pro JPA2


  8. Large projects are typically broken up into separate modules with independent build lifecycles. Building and Testing with Gradle



1918、单词 quorums 的匹配文本:


  1. ZooKeeper Quorums In quorum mode, ZooKeeper replicates its data tree across all servers in the ensemble. ZooKeeper Distributed Process Coordination



1919、单词 nonsingleton 的匹配文本:


  1. In this situation, both Setter and Constructor Injection result in the singleton maintaining a single instance of what should be a nonsingleton bean. Pro Spring 3


  2. Instantiation While not formally a part of the coupling jargon, the act of instantiating a nonsingleton global object is also a very tight form of coupling, closer to content coupling than common coupling. Testable JavaScript



1920、单词 realworld 的匹配文本:


  1. We toured various algorithms in Mahout and tried to apply them to a realworld case study, which gradually evolved from small input and non-distributed computation to large-scale distributed computation. Mahout in Action


  2. Hadoop jobs are generally dealing with bulk realworld data, which is never 100% clean, so a small error rate is generally acceptable. Pro Hadoop


  3. So why are we talking about Gradle’s API early on? You’ll find that after getting to know Gradle’s basics, you’ll want to go further and apply the concepts to your realworld projects. Gradle in Action


  4. Another key difference between domain objects and value objects is that a value object’s structure is driven by the need to transfer data remotely, whereas a domain object is modeled to represent a realworld concept and is not driven by some need of the application infrastructure. Pro Spring 3


  5. In a realworld application you’d include the logic for increasing the user points, say on a Redis database. RabbitMQ in Action


  6. It also introduces Spring Batch using a hands-on approach, based on a realworld use case. Spring Batch in Action


  7. In the next chapter we’ll look at how graph databases are being used today to solve realworld problems in domains as varied as social networking, recommendations, master data management, data center management, access control, and logistics. Graph Databases


  8. For this, the book uses a single, realworld example to showcase most of the features HBase has to offer. HBase:The Definitive Guide


  9. In a realworld situation, where the collection and the documents themselves would likely be larger, the time needed to process the query would be substantially greater than the 171 milliseconds noted here. MongoDB in Action


  10. Throughout the rest of this chapter, I aim to show you how to build complete, realworld applications using Spring Boot. Spring in Action 4th Edition



1921、单词 sudoers 的匹配文本:


  1. Permissions: You can install OpenStack services either as root or as a user with sudo permissions if you configure the sudoers file to enable all the permissions. bk-compute-adminguide-grizzly


  2. Historically, Compute used a specific sudoers file that listed every command that the Compute user was allowed to run, and used sudo to run that command as root. bk-admin-guide-cloud-latest


  3. Lastly, it will download the sudoers file and install it into /etc/sudoers. Pro Puppet



1922、单词 onward 的匹配文本:


  1. Whether through a physical medium such as a cable, through the air, or using light, this raw data is passed across various points in the network called nodes; a node could represent a computer, another type of hardware device such as a printer, or a piece of networking equipment that relays this information onward to other nodes in the network or to an entirely different network. Java Network Programming and Distributed Computing


  2. From JDK release 1.1 onward, Oracle’s Java Virtual Machine implementation links the class or interface directly, without relying on the class loader. The Java Virtual Machine Specification Java SE 7 Edition


  3. The Pets.randomPet( ) method is used to replace all the Pet objects in the List from location 3 onward. Thinking in Java 4th Edition


  4. From this point onward, all the sample code in this book will use ApplicationContext. Pro Spring 3


  5. Onward! Now that you have an idea about the style and purpose of this book let's waste no more time in getting you set up with a development environment. Pro Spring MVC


  6. Journeys requiring you to change trains will have several linked TrainJourney objects using the onward field; a direct train or final leg of a journey will have onward being null: Java 8 in Action Lambdas, Streams and Functional-style Programming


  7. The flow from this point onward is very similar to traditional username/password authentication, most notably in the retrieval of appropriate group and role assignments from the UserDetailsService. Spring Security 3.1


  8. Code words in text are shown as follows: "From this point onward, we shall call the unpacked Hadoop directory HADOOP_HOME." Hadoop MapReduce Cookbook


  9. The biggest advantage of the 2.6.x branch of releases onward is their replacement of XML-RPC as a transport layer. Pro Puppet


  10. From Avro 1.6.0 onward, there is an option to have Avro always perform the conversion to String. Hadoop:The Definitive Guide 3rd Edition



1923、单词 appenders 的匹配文本:


  1. Next we introduced two Log4J Appenders, a single path and a load-balancing version, for direct integration with Java applications. Apache Flume Distributed Log Collection for Hadoop


  2. For input and output of tabular data, Tajo has scanners and appenders. Tajo A Distributed Data Warehouse System on Large Clusters


  3. Log4j also has a number of builtin appenders such as the SyslogAppender used in this recipe. Cassandra High Performance Cookbook


  4. While you can't change the overall setup of your logging strategy, such as the appenders or file rollover strategies at runtime, you can change the level of detail to log without restarting Solr. Solr 3 Enterprise Search Server


  5. Here we are using it to compose together the string appenders: Functional Programming Patterns in Scala and Clojure


  6. It supports native connectivity and support for writing directly to HDFS, and simplifies reliable, streaming data delivery from a variety of sources including RPC services, log4j appenders, syslog, and even the output from OS commands. Hadoop Operations


  7. You can specify multiple appenders; for example, you could set zookeep er.root.logger to INFO, CONSOLE, ROLLINGFILE if you wanted to send log messages to both the CONSOLE and ROLLINGFILE appenders. ZooKeeper Distributed Process Coordination



1924、单词 modulus 的匹配文本:


  1. The partition number is simply the hash value of the key modulus the number of partitions. Pro Hadoop


  2. To fit the resulting number into the buckets array, the modulus operator is used with the size of that array. Thinking in Java 4th Edition


  3. Then, the partitioner performs a modulus operation by the number of reducers: key.hashCode() % (number of reducers) MapReduce Design Patterns


  4. In particular, the RSA public key interface has methods to return its modulus and public exponent while the private key has methods to return its modulus and private exponent. Java Security 2nd Edition


  5. For example, you can generate a random salt number by taking the hash code of the timestamp and taking its modulus with some multiple of the number of RegionServers: HBase in Action


  6. To implement this, simply maintain a member-level count and throw exceptions based on modulus tests within the execute method: Storm Real-Time Processing Cookbook


  7. We get thethe same code next  and assign it to , get the next  after that and assign it to , thenInt x Int y generate a list of length , and finally return the list with all of its elementsx wrapped around the modulus .y. Functional Programming in Scala


  8. Prior to Java 1.3, the getModulus( ) method was defined independently by RSAPublicKey and RSAPrivateKey. Java in a Nutshell 5th Edition



1925、单词 noatime 的匹配文本:


  1. If you mount the disks as noatime, the access timestamps are not updated when a file is read on the filesystem. HBase Administration Cookbook


  2. Therefore, enabling the noatime option can eliminate a huge amount of unnecessary IO and have a huge benefit. Monitoring with Ganglia


  3. Linux supports disabling the access time updates for several file systems with the noatime and nodiratime file system mount time options. Pro Hadoop


  4. To disable this option, add the noatime,nodiratime mount options to your /etc/fstab; this can sometimes boost performance by as much as 5–10%, depending on the workload and the filesystem (although it might not make much difference in other cases) High Performance MySQL 3rd Edition


  5. You can do this on Linux by changing atime to noatime in /etc/fstab: MongoDB The Definitive Guide 2nd Edition


  6. Noatime does not update inode information each time it is read. Cassandra High Performance Cookbook


  7. For maximum performance, you should mount storage disks with the noatime option. Hadoop:The Definitive Guide 3rd Edition


  8. First, you should set the noatime option when mounting the filesystem to reduce the administrative overhead required for the kernel to keep the access time for each file. HBase:The Definitive Guide



1926、单词 jmsreply 的匹配文本:


  1. JMSReplyTo Destination supplied by a client where a reply message should be sent. Java EE 7 Essentials


  2. Whatever client is passing request messages to the quoteRequest destination could also provide a JMSReplyTo property on each request message. Spring Integration in Action


  3. JMSReplyTo —Used to specify a destination where a reply should be sent. ActiveMQ in Action



1927、单词 ellipses 的匹配文本:


  1. Starting with Java 1.0, the Graphics class has methods to draw lines, rectangles, ellipses, Core Java Volume I Fundamentals 9th Edition


  2. In Java SE5, however, this long-requested feature was finally added, so you can now use ellipses to define a variable argument list, as you can see in printArray( ): Thinking in Java 4th Edition


  3. The use of the multiplicity denotes that multiple children may be present at the same level in the hierarchy, and the ellipses indicate that the remainder of the hierarchy has been elided in favor of brevity. Tika in Action


  4. Following the ellipses, we see that there is a new instance variable (stopButton) and. Java Threads 3rd Edition


  5. For each type of callback, you'll have an if block, substituting the class name where we have the ellipses. Java Security 2nd Edition


  6. To visualize the way the map works, consider the following sample lines of input data (some unused columns have been dropped to fit the page, indicated by ellipses): Hadoop:The Definitive Guide 3rd Edition


  7. Admittedly, ellipses and arcs are not rectangular, but they have a bounding rectangle (see Figure 7.2) Core Java Volume II Advanced Features 9th Edition


  8. PlaneCircle does not override either of the methods defined by Circle, but suppose we define another subclass of Circle, named Ellipse.* In this case, it is important for Ellipse to override the area( ) and circumference() methods of Circle since the formulas used to compute the area and circumference of a circle do not work for ellipses. Java in a Nutshell 5th Edition


  9. When creating the donut, we begin by creating two circular ellipses. Java 7 Recipes A Problem-Solution Approach


  10. You will often see comments with ellipses in them, meaning we are leaving pieces out that we feel are unimportant to the issue. Pro JPA2



1928、单词 ipv4 的匹配文本:


  1. Ganglia will not allow IPv6=>IPv4 mapping (for portability and security reasons) Monitoring with Ganglia


  2. This code accepts only IPv4 addresses in the format of four dot-separated octets. Pro Hadoop


  3. IPv4/IPv6 dual stack mode works with VlanManager and FlatDHCPManager networking modes. bk-compute-adminguide-grizzly


  4. Nonetheless, all IPv4 local network discovery protocols end up using UDP broadcast anyhow. ZeroMQ


  5. This bash script takes an IPv4 address and looks at the last of the four octets (assuming dot-decimal notation) Hadoop in Action


  6. Every computer on an IPv4 network is identified by a four-byte number. Java Network Programming 4th Edition



1929、单词 decompresses 的匹配文本:


  1. The first yields the blocks directly, whereas the other automatically decompresses gzip files. Redis in Action


  2. You implement a Tasklet that decompresses a ZIP archive into its source flat file. Spring Batch in Action


  3. We can try it out with the following command line, which compresses the string “Text” using the StreamCompressor program with the GzipCodec, then decompresses it from standard input using gunzip: Hadoop:The Definitive Guide 3rd Edition


  4. Basically, code inserted after every field load decompresses a reference and code inserted before every field store recompresses it. Oracle JRockit The Definitive Guide


  5. This compressed set of messages can be presented as a single message to the consumer who later decompresses it. Apache Kafka


  6. In fact, whenever the class loader of an applet reads a JAR file, it reads and decompresses data from the network. Core Java Volume II Advanced Features 9th Edition


  7. Finding a block number, it reads in and decompresses the data block and stores it in the block cache. Hadoop in Action


  8. It decompresses or inflates data compressed through the Deflater class. Java in a Nutshell 5th Edition


  9. While the name is confusing in this case, TextInput Format understands file extensions such as .deflate or .gz and decompresses these files on the fly. Programming Hive



1930、单词 hnil 的匹配文本:


  1. It contains each of the types in the list embedded within HCons types, ending with HNil. Scala in Depth



1931、单词 fjtask 的匹配文本:


  1. In the FJTask framework, these tasks subclass FJTask rather than subclassing Thread, both of which implement Runnable. A Java ForkJoin Framework


  2. An associated FJTaskRunnerGroup class provides control and entry points into this framework. Concurrent Programming in Java Design Principles and Pattern



1932、单词 j2se 的匹配文本:


  1. You'll also need to install the Java SDK, available for free from Sun Microsystems (http://java.sun.com/j2se/) Java Network Programming and Distributed Computing


  2. The introductory document for generics is Generics in the Java Programming Language, by Gilad Bracha, located at http://java.sun.eom/j2se/1.5/pdf/generics-tutorial.pdf. Thinking in Java 4th Edition


  3. In this section, we've examined higher-level synchronization tools provided by J2SE. Java Threads 3rd Edition


  4. J2SE ships with JConsole, a GUI client for connecting to JMX servers. Solr 3 Enterprise Search Server


  5. For more information on using keystores, please see the J2SE SDK Documentation, on the Internet, especially the JSSE section on creating keystores. Oracle JRockit The Definitive Guide


  6. J2SE profilers essentially monitor and log various aspects of a single VM. Java Performance Tuning 2nd Edition


  7. If you don’t have the Sun J2SE installed and you’re using Linux, Solaris, or Windows, download and install it from the following URL: http://www.oracle.com/technetwork/java/javase/downloads/ index.html. ActiveMQ in Action


  8. If you are using the J2SE, you will need to download and install the JavaMail API. Java 7 Recipes A Problem-Solution Approach



1933、单词 aol 的匹配文本:


  1. When a request for a hostname (such as www.aol.com) is made, the operating system of the client computer contacts the local DNS server on the LAN. Java Network Programming and Distributed Computing


  2. Common OpenID providers with which you probably already have an account are Google, Yahoo!, AOL, Flickr, or MySpace. Spring Security 3.1


  3. During that same time, AOL released a set of “anonymized” search engine logs for research purposes, and a New York Times reporter was able to cross-reference this data set with phonebook listings to personally identify users. Professional Hadoop Solutions


  4. It is probably well known by this point, but it doesn't hurt to reiterate: JavaScript and Java are completely different technologies produced by separate companies (AOL and Sun, respectively) Java Security 2nd Edition


  5. Morgan, Groupon, LinkedIn, AOL, Last.fm, and StumbleUpon are some of the other organizations that are also heavily invested in Hadoop. Hadoop in Practice


  6. If you look at a web server logfile, you’ll probably find some hits from clients in the aol.com domain, but not as many as you’d expect given the more than three million AOL subscribers. Java Network Programming 4th Edition



1934、单词 subpackage 的匹配文本:


  1. The generic subpackage provides building blocks for implementing various collections. Scala in Action


  2. Next, assuming that there is no class or interface named rpgpoet in any compilation unit of package org (and we know that there is no such class or interface because package org has a subpackage named rpgpoet), the qualified name org.rpgpoet is reclassified as a PackageName. The Java Language Specification Java SE 7 Edition


  3. For example, interfaces (the API) may be located in one package and internal classes (implementation, utilities) in an impl or internal subpackage. Spring Dynamic Modules in Action


  4. This code literally installs Spring MVC, configures the website layout, builds controllers for each entity automatically, and places the controllers in the web subpackage of the root package: Spring Roo in Action


  5. For example, to enable assertions throughout a package and then disable them in a specific class or subpackage, use: Java in a Nutshell 5th Edition



1935、单词 nano 的匹配文本:


  1. You should be aware that System.nanoTime( ) typically produces values with a granularity that is greater than one (and this granularity will vary with machines and operating systems), and this will produce a certain amount of rattle in the results. Thinking in Java 4th Edition


  2. Here you’re invoking the nanoTime method defined in the System class without a prefix because you’ve imported the members of the System class. Scala in Action


  3. Open this file in your favorite text editor (I like nano) Beginning CouchDB


  4. We declare a nano method, which prints a message and returns the current time with nano-second resolution: Beginning Scala


  5. System.nanoTime is both more accurate and more precise, and it is not affected by adjustments to the system’s real-time clock. Effective Java 2nd Edition


  6. Unlike currentTimeMillis( ), the nanoTime() does not return a time relative to any defined. Java in a Nutshell 5th Edition


  7. Method nanoTime measures time elapsed since the program has started. Steps in Scala An Introduction to Object-Functional Programming


  8. Run a Java profiler, or collect your own rough timing using System.nanoTime, to verify your performance problem is in fact Lucene and not your application. Lucene in Action 2nd Edition


  9. To do so, open a text editor (e.g., vim, nano, or whichever text editor you prefer) and alter the file called php.ini, which is the main configuration file PHP uses to control its behavior, including which extensions it should load. The Definitive Guide to MongoDB



1936、单词 bsp 的匹配文本:


  1. To our knowledge, the scalability and fault-tolerance of BSP implementations has not been evaluated beyond several dozen machines, and none of them provides a graph-specific API. Pregel  -  A System for Large-Scale Graph Processing


  2. Similarly, many graph algorithms are better expressed using a bulk-synchronous parallel model (BSP) using message passing to communicate between vertices, rather than the heavy, allto-all communication barrier in a fault-tolerant, largescale MapReduce job [22] Apache Hadoop YARN Yet Another Resource Negotiator


  3. Graph processing systems such as Pregel and Giraph are based on a parallel processing model called Bulk Synchronous Parallel (BSP), where communications between graph nodes are processed currently in lock-step. Professional Hadoop Solutions


  4. This recipe does not require a full understanding of the Giraph API, but it does assume some familiarity with Bulk Synchronous Parallel (BSP) and the design goals of vertex-centric APIs including Apache Giraph and Google Pregel. Hadoop RealWorld Solutions Cookbook


  5. Comet [13] introduces the Batched Stream Processing (BSP), where input data is modeled as a stream, with queries being triggered upon bulk appends to the stream. Incoop MapReduce for Incremental Computations



1937、单词 fsdirectory 的匹配文本:


  1. Our MergeAgent service decompresses each new index into a Lucene RAMDirectory or FSDirectory (depending on size), merges them to local disk, and sends a

    request to the Solr instance hosting the index to make the changed index visible to queries. Hadoop:The Definitive Guide 3rd Edition


  2. SimpleFSDirectory: Uses a Java RandomAccessFile; should be avoided unless you are running on 32-bit Windows. Solr in action


  3. In our Indexer example, we created an FSDirectory, which stores real files in a directory in the filesystem, and passed it to IndexWriter’s constructor. Lucene in Action 2nd Edition



1938、单词 operationally 的匹配文本:


  1. If you’ve looked at other monitoring tools, or have already implemented a few, you’ll find that Ganglia is as powerful as it is conceptually and operationally different from any monitoring system you’re likely to have previously encountered. Monitoring with Ganglia


  2. Operationally it is not desirable to have a long running job terminated if only a small number of records are causing problems. Pro Hadoop


  3. It is recommended that you use this option because it makes it easier to tell, operationally, what these servers are doing. MongoDB The Definitive Guide 2nd Edition


  4. Building job chains is only one of the many features that are useful for operationally running Hadoop MapReduce. MapReduce Design Patterns


  5. The Timer class itself has the waiting logic within it: operationally, we haven't. Java Threads 3rd Edition


  6. Overall, column family databases are reasonably expressive and operationally very competent. Graph Databases


  7. It is usually operationally easier and simpler to use your operating system’s package management system, especially if you are installing Puppet on a large number of hosts. Pro Puppet


  8. A left fold associates operations to the left while a right fold associates to the right, with the identity element on the left and right respectively: Footnote 3mAs of this writing, with Scala at version 2.9.2, the implementation of  in the standardfoldRight library is not tail-recursive, so for large lists it matters operationally which we choose since they have different memory usage characteristics. Functional Programming in Scala


  9. For architects and system administrators, the book also provides significant value in explaining how Hadoop works, its place in the broader architecture, and how it can be managed operationally. Hadoop Beginners Guide


  10. A more precise, though not very interesting definition of concurrent programming can be phrased operationally: A Java virtual machine and its underlying operating system (OS) provide mappings from apparent simultaneity to physical parallelism (via multiple CPUs), or lack thereof, by allowing independent activities to proceed in parallel when possible and desirable, and otherwise by timesharing. Concurrent Programming in Java Design Principles and Pattern



1939、单词 curation 的匹配文本:


  1. Unfortunately such information is often incomplete or contradictory, but luckily Tika solves some of these problems in a number of different ways, such as combining information from multiple existing media type registries, easily allowing for the addition and curation of those media types in a well-known format like XML (which in itself provides excellent tool support for managing media types), and finally by adopting a comprehensive specification for representing media types, allowing for their easy comparison, extension, and management. Tika in Action



1940、单词 xstream 的匹配文本:


  1. The framework uses Xstream for persisting configuration information as XML (http://xstream.codehaus.org/) and Jelly for the creation of parts of the GUI (http://commons.apache.org/jelly/) Jenkins Continuous Integration Cookbook


  2. Classes for abstraction of XML marshaling and unmarshaling and support for popular tools like Castor, JAXB, XMLBeans, XStream, and so on, are packed into this module. Pro Spring 3


  3. The OXM module provides an abstraction layer that offers simplified and consistent support for popular Object/XML mapping tools such as Castor, the Java Architecture for XML Binding (JAXB), JiBX, XMLBeans, and XStream. Spring in Practice


  4. In this example, you use the XStreamMarshaller class because it’s simple to configure. Spring Batch in Action


  5. Many libraries rely on inspecting data objects to perform operations on their data, such as XStream, which serializes data objects to XML, or Hibernate, which can generate SQL queries using them. Functional Programming Patterns in Scala and Clojure



1941、单词 hsql 的匹配文本:


  1. The unlicensed version can be used freely to create data models for free and open source databases including MySQL, PostgreSQL, HSQL, Derby, and so on. Pro Spring 3


  2. It’s also possible to implement support for other DBMSs, although here we’ll stick with HSQL. Spring in Practice


  3. We’ll use an HSQL database, so you need to configure its JDBC dependencies in the pom.xml file as Listing 6-5 shows. Pro Spring Security


  4. For the former we will use HSQL, a database that supports being run in-memory. Spring Data Modern Data Access for Enterprise Java



1942、单词 parenthesized 的匹配文本:


  1. In some languages (like C++) you must perform a special operation in order to get a type-safe downcast, but in Java, every cast is checked! So even though it looks like you’re just performing an ordinary parenthesized cast, at run time this cast is checked to ensure that it is in fact the type you think it is. Thinking in Java 4th Edition


  2. A parenthesized expression is also treated syntactically as a primary expression. The Java Language Specification Java SE 7 Edition


  3. We’ve been using the more common parenthesized syntax, but you can also use the arrow operator between two values, as well as special factory methods on the tuple-related classes: Programming Scala


  4. The if keyword is followed by a parenthesized expression and a statement. Java in a Nutshell 5th Edition


  5. Exercise 3.4 Write a function printSExp that will print its only argument fully parenthesized. Steps in Scala An Introduction to Object-Functional Programming



1943、单词 udfcontext 的匹配文本:


  1. The JobConf object can be obtained using UDFContext, which we will cover in more detail later. Programming Pig



1944、单词 grpd 的匹配文本:


  1. For example, we’ll look at the schemas for grpd and cntd. Hadoop in Action


  2. The line Grpd = group collects records together by URL. Programming Pig



1945、单词 master2 的匹配文本:


  1. We will set up a standby master node (master2), as you need another server ready to use. HBase Administration Cookbook


  2. In this configuration, we actually are not starting any daemons on the SecondaryNameNode machine master2 Hadoop Operations and Cluster Management Cookbook



1946、单词 master1 的匹配文本:


  1. We will have one master node (master1) run NameNode and JobTracker on it. HBase Administration Cookbook


  2. Start the Hadoop cluster in master1 with the following command: Hadoop Operations and Cluster Management Cookbook



1947、单词 multimachine 的匹配文本:


  1. Chapter 3, The Basics of Multimachine Clusters: This chapter walks you through the basics of creating a multimachine Hadoop cluster. Pro Hadoop


  2. Fortunately, Vagrant supports multiple machines with a syntax that makes it easy to convert our existing single-machine project into a multimachine configuration. Storm Blueprints Patterns for Distributed Real-time Computation



1948、单词 hod 的匹配文本:


  1. Hadoop On Demand (HOD) is a package that provides virtual map/red clusters on top of a larger HDFS installation. Pro Hadoop


  2. Onces nodes become available, Torque would start HoD’s ’leader’ process on the head node, which would then interact with Torque/Maui to start HoD’s slave processes that subsequently spawn a JobTracker and TaskTrackers for that user which then accept a sequence of jobs. Apache Hadoop YARN Yet Another Resource Negotiator



1949、单词 guis 的匹配文本:


  1. Any operating environment that supports GUIs constantly monitors events such as. Core Java Volume I Fundamentals 9th Edition


  2. This allowed the creation of GUIs where actors could be used to respond to backend events and update UI state. Scala in Depth


  3. I find this particularly handy for debugging jobs when I am on the road because the HDFS data persists after the debugger has exited, and I can examine the job status via the web GUIs. Pro Hadoop


  4. This points out that the scripting languages used inside Web browsers are really intended to solve specific types of problems, primarily the creation of richer and more interactive graphical user interfaces (GUIs) Thinking in Java 4th Edition


  5. Though GUIs and command-line integration are rapid ways of exploring what Tika has to offer, the real power of Tika is unveiled when you leverage Tika Java classes and APIs in your application. Tika in Action


  6. In this chapter, we will show you how to write internationalized Java programs and how to localize dates, times, numbers, text, and GUIs. Core Java Volume II Advanced Features 9th Edition


  7. Component implements Serializable so GUIs can be sent, saved, and restored. Effective Java 2nd Edition


  8. Of course, all network programs make extensive use of the I/O classes and some make heavy use of GUIs. Java Network Programming 4th Edition


  9. New graphics features have been added along with new Swing components to make graphical user interfaces (GUIs) better. Java 7 Recipes A Problem-Solution Approach



1950、单词 cidr 的匹配文本:


  1. The mask attribute defines a subnet mask in CIDR notation, allowing you to specify address ranges instead of individual addresses. Monitoring with Ganglia


  2. To take advantage of this filter, the requester must specify a range of valid IP address in CIDR format, by passing two scheduler hints: bk-compute-adminguide-grizzly


  3. Optionally you can specify a range by supplying the netmask in the CIDR (Classless Inter- Domain Routing6) notation (ipaddress/mask) Pro Spring MVC


  4. List of cidr sub-ranges that are available for dynamic allocation to ports. bk-admin-guide-cloud-latest


  5. Next, you will be presented with a screen similar to the following, which allows you to specify the network IP CIDR blocks and other settings for your VPC: Storm Real-Time Processing Cookbook


  6. The third column specifies the IP range in CIDR format. admin-user-guide-trunk


  7. To accept requests from a particular range of IP addresses, specify the IP address block in the CIDR box. user-guide


  8. SourceGroups are a special dynamic way of defining the CIDR of allowed sources. OpenStack Operations Guide



1951、单词 kvmsg 的匹配文本:


  1. Example 5-15 shows the kvmsg class, in the simplest form that works for now. ZeroMQ



1952、单词 pop3 的匹配文本:


  1. While many browsers and e-mail clients support only POP3, some also support the Internet Message Access Protocol (IMAP) Java Network Programming and Distributed Computing


  2. This kind of protocols are often text based and famous examples are SMTP/POP3/IMAP. Netty in Action MEAP V08


  3. The JavaMail API specification does not require any protocol providers, but the JavaMail reference implementation includes an essage store provider, a POP3 message store provider, and an SMTP. Java EE 7 Specification


  4. Spring Integration provides support for sending and receiving emails through dedicated channel adapters, which cover all the major connectivity options and email transfer protocols (POP3, IMAP, SMTP) Spring Integration in Action


  5. You can also use the Email API to check an IMAP or POP3 mailbox. Java 7 Recipes A Problem-Solution Approach



1953、单词 irb 的匹配文本:


  1. The HBase shell is the (J)Ruby IRB with the above HBase-specific commands added. HBase in Action


  2. We can also use the Ruby IRB (Interactive Ruby Shell) to confirm our function is properly defined, Pro Puppet


  3. This will bring up a JRuby IRB interpreter that has had some HBase-specific commands added to it. Hadoop:The Definitive Guide 3rd Edition


  4. Anything you can do in IRB, you should be able to do in the HBase Shell. HBase:The Definitive Guide


  5. Let's try a simple example using the Interactive Ruby Shell (IRB) Selenium Testing Tools Cookbook


  6. Alternatively, a nice approach is to use Ruby’s interactive REPL, irb. MongoDB in Action


  7. You can test your redis-rb installation straight from interactive Ruby (or irb for short): Redis Cookbook



1954、单词 isp 的匹配文本:


  1. He draws on a rich and varied background as founding member of a leading UK ISP, systems manager and IT consultant for an advertising agency and Internet solutions group, technical specialist for an intercontinental ISP network, and database designer and programmer—and as a self-confessed compulsive consumer of computing hardware and software. Getting Started with CouchDB


  2. The most common way to obtain an IP address is to have one assigned to you by a network administrator, ISP, or other network service. Java Network Programming and Distributed Computing


  3. That may be contacting your network administrator or your ISP. Cassandra High Performance Cookbook


  4. Then we use a built-in function that looks up the incoming IP address in a database to recover the location of the requesting machine (probably its ISP), and then count 1 for the appropriate latitude/longitude bucket. Interpreting the Data Parallel Analysis with Sawzall


  5. These frequent visitors may be legitimate ISP proxies (shared among many users) or they may be scrapers and fraudsters (if the server log is from an ad network) Hadoop in Action


  6. However, the addresses that an organization is allowed to choose for its computers are assigned by the organization’s Internet service provider (ISP) Java Network Programming 4th Edition



1955、单词 timestamped 的匹配文本:


  1. We’re simply summing the sizes of all of the files mysqld has open in /tmp, and printing out the total for each timestamped sample in the file: High Performance MySQL 3rd Edition


  2. Data is stored in schematized semi-relational tables; data is versioned, and each version is automatically timestamped with its commit time; old versions of data are subject to configurable garbage-collection policies; and applications can read data at old timestamps. Spanner - Google’s Globally-Distributed Database


  3. For example, if you have a bunch of timestamped data, but you don’t know how far back it spans, run a job that figures out the date range for you. MapReduce Design Patterns


  4. Our combiner sees all timestamped versions of every distinct key. Hadoop RealWorld Solutions Cookbook


  5. Most graph databases don’t support versioning as a first-class concept: it is possible, however, to create a versioning scheme inside the graph model whereby nodes and relationships are timestamped and archived whenever they are modified.2 The downside of such versioning schemes is that they leak into any queries written against the graph, adding a layer of complexity to even the simplest query. Graph Databases


  6. A simple yet useful distributed trace for this request would be a collection of message identifiers and timestamped events for every message sent and received at each server. Dapper a Large-Scale Distributed Systems Tracing Infrastructure


  7. Sqoop supports two types, append, which works for numerical data that’s incrementing over time, such as auto-increment keys; and lastmodified, which works on timestamped data. Hadoop in Practice


  8. The client authenticates itself to the Authentication Server and receives a timestamped Ticket-Granting Ticket (TGT) Hadoop:The Definitive Guide 3rd Edition


  9. Every column value, or cell, either is timestamped implicitly by the system or can be set explicitly by the user. HBase:The Definitive Guide


  10. For example, when the application gathers user-input data for the update, the data can be sent to the database as a batch set of SQL statements that includes timestamped safeguards that make sure the original data in the database is the same as the data originally used by the client. Java Performance Tuning 2nd Edition



1956、单词 lon 的匹配文本:


  1. That’s why we still need the filters on lat and lon, to discard the results that shouldn’t be included. High Performance MySQL 3rd Edition


  2. The getZOrderedCurve() method takes lat and lon strings as arguments. Hadoop RealWorld Solutions Cookbook


  3. The principle field type in Solr for geospatial is LatLonType, which stores a single latitude-longitude pair. Solr 3 Enterprise Search Server


  4. It's based on the solr.LatLonType class which is specially designed for spatial search and is defined by a single attribute – subFieldSuffix. Apache Solr 4 Cookbook



1957、单词 memoized 的匹配文本:


  1. To enable efficient reuse of matched sub-computations, it is important to schedule a task on the machine that stores the memoized results to be reused. Incoop MapReduce for Incremental Computations


  2. Now let’s take a look at a simple memoized version of expensiveLookup() Functional Programming Patterns in Scala and Clojure



1958、单词 bucketed 的匹配文本:


  1. The application data model is layered on top of the directory-bucketed key-value mappings supported by the implementation. Spanner - Google’s Globally-Distributed Database


  2. This allows the values to be counted and “bucketed,” allowing interested PDS users to use a combination of the facets and free-text search to find the PDS data (called products) of interest. Tika in Action


  3. To allow you to sample data from this table, it’s defined that it should be bucketed into 256 buckets (more on that shortly) Hadoop in Practice


  4. First, let’s see how to tell Hive that a table should be bucketed. Hadoop:The Definitive Guide 3rd Edition


  5. Using Solr, you have the ability to bring back the top values within each field using Field Facets, to bring back bucketed ranges of numbers or date values utilizing Range Facets, or to bring back the counts of any number of arbitrarily complex queries by utilizing Query Faceting. Solr in action


  6. We could, for example, have bucketed our data based on the UFO shape and within each bucket sorted on the sighting date. Hadoop Beginners Guide


  7. Briefly, the data must be bucketed on the keys used in the ON clause and the number of buckets for one table must be a multiple of the number of buckets for the other table. Programming Hive



1959、单词 mlc 的匹配文本:


  1. The two types are single-level cell (SLC) and multi-level cell (MLC) High Performance MySQL 3rd Edition


  2. The basic abstraction for receiving messages in Spring is the message listener container (MLC: see http://mng.bz/LJti) ActiveMQ in Action



1960、单词 jaql 的匹配文本:


  1. You’ll discover complementary tools, such as Cascading, HBase, and Jaql. Hadoop in Action



1961、单词 programatically 的匹配文本:


  1. There are two ways to create/modify views: one is via the web GUI, and the other by programatically defining views using JSON.i Creating views using the GUI. Monitoring with Ganglia


  2. Programatically, the class loader can set permissions for each class it loads. Java Security 2nd Edition


  3. Although specific to Neo4j, its close affinity with our habit of representing graphs using diagrams makes it ideal for programatically describing graphs in a precise fashion. Graph Databases


  4. Although the importtsv tool is useful in many cases, advanced users may want to generate data programatically, or import data from other formats. HBase:The Definitive Guide


  5. You can configure the index programatically or by using a mapping annotation. Spring Data Modern Data Access for Enterprise Java



1962、单词 rightmost 的匹配文本:


  1. The override join maps a call to the map method with each key in the input split set and with that single value from the rightmost input split or join that has a value for the key. Pro Hadoop


  2. I created a JSlider (the arguments are the leftmost value of the JSIider, the rightmost value, and the starting value, respectively, but there are other constructors as well) and dropped it into the JFrame. Thinking in Java 4th Edition


  3. Find the rightmost line break if any; rfind() returns -1 on failure. Redis in Action


  4. Hive will attempt to buffer the rows from the left-most table and then stream the rows from the rightmost table. Hadoop RealWorld Solutions Cookbook


  5. Further, the wildcard must be in the rightmost position: *.readDatabase wouldn't match any basic permission. Java Security 2nd Edition


  6. The rightmost trait picked up the call to check( ) Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine


  7. The unit will be listed at the end of the description, as can be seen (you may need a magnifier) in the rightmost column in the attribute table behind the Table Settings dialog in the screenshot. Oracle JRockit The Definitive Guide


  8. Different keys can go to the same reducer, as seen in the rightmost reducer. Hadoop in Action


  9. For the default join, the rightmost input has its records streamed through, whereas the other input(s) have their records for a given key value materialized in memory. Programming Pig


  10. So in this case, the query optimizer walks the rightmost edge of the B-tree until it reaches the maximum key and then works its way backward. MongoDB in Action



1963、单词 oid 的匹配文本:


  1. It takes a configuration file that maps a given OID (and whatever adjustments it might need) into a Ganglia metric, with a name, value, type, and units label. Monitoring with Ganglia


  2. Each OID is Spring Security’s representation of an application domain object. Spring in Practice


  3. The curly braces around oid identify it as a template parameter and bind its value at runtime to the id parameter of the getOrder resource method. Java EE 7 Essentials


  4. Each extension has a name, or OID (object identifier), that identifies the type of the extension. Java in a Nutshell 5th Edition



1964、单词 omg 的匹配文本:


  1. If you do want to write a method to change numeric parameters, you can use one of the holder types defined in the org.omg.CORBA package: IntHolder, BooleanHolder, and so on. Core Java Volume I Fundamentals 9th Edition


  2. The Object Management Group (OMG), a large consortium of companies devoted to improving remote object method invocation, developed the CORBA specification. Java Network Programming and Distributed Computing


  3. He worked as a member of the MDA OMG group, and has participated and presented at the Chicago area Hadoop User Group. Professional Hadoop Solutions


  4. We recommend that Java EE Product Providers use the IIOP transaction propagation protocol defined by OMG and described in the OTS specification (and im interope. Java EE 7 Specification


  5. Request objects are used in distributed object support systems such as those in java.rmi and org.omg.corba. Concurrent Programming in Java Design Principles and Pattern



1965、单词 xmlfilter 的匹配文本:


  1. If no XMLReader or XMLFilter is specified, then the Transformer object will a default XMLReader.) Note that since an InputSource is required, a SAXSource does not behave significantly differently than a StreamSource unless an XMLFilter is used. Java in a Nutshell 5th Edition



1966、单词 slowdowns 的匹配文本:


  1. Prefer immutability it appears that the ImmutableService will perform better in the general case and not suffer from random contention slowdowns. Scala in Depth


  2. If you are experiencing slowdowns on your gmetad servers, consider purchasing a RAID system and storing the RRD files there. Monitoring with Ganglia


  3. Finally, periodic indexer runs can cause bursts of additional I/O that will in turn cause intermittent searchd slowdowns. High Performance MySQL 3rd Edition


  4. On the other hand, if multiple slaves connect at the same time, the outgoing bandwidth used to synchronize all of the slaves initially may cause other commands to have difficulty getting through, and could cause general network slowdowns for other devices on the same network. Redis in Action


  5. Depending on your distribution model, you can get a data store that will give you the ability to handle larger quantities of data, the ability to process a greater read or write traffic, or more availability in the face of network slowdowns or breakages. NoSQL Distilled


  6. It is important to keep a record of subsequent test runs so that we can compare performance figures over time, and thereby quickly identify slowdowns and anomalous behavior. Graph Databases


  7. Finding a root cause: Dapper is effective in determining which part of a system is experiencing slowdowns, but is not always sufficient for finding the root causes. Dapper a Large-Scale Distributed Systems Tracing Infrastructure


  8. In truth, giving up control of memory management to the runtime may result in slowdowns, but this is rarely the case anymore, at least for well written applications. Oracle JRockit The Definitive Guide


  9. You may experience service blips or instance slowdowns and have no way of diagnosing or remedying them. MongoDB in Action


  10. Node failure caused HadoopDB and Hadoop to have smaller slowdowns than Vertica. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads



1967、单词 sslcontext 的匹配文本:


  1. Use the constructor to pass the SSLContext to use and if it’s a client and startTls should be used. Netty in Action MEAP V08


  2. The SSLContext class is an engine class; it provides the following methods: Java Security 2nd Edition


  3. If you want to explore this package beyond the two socket classes, the two factory classes, and the HttpsURLConnection class, start with SSLContext. Java in a Nutshell 5th Edition



1968、单词 dbpath 的匹配文本:


  1. Finally, we want to keep the dbpath the same, as we are presumably starting it up this way to manipulate the server’s data somehow. MongoDB The Definitive Guide 2nd Edition


  2. If you wish to use a directory other than /data/db or C:\data\db, then you can tell MongoDB to look at the desired directory by using the --dbpath flag when executing the service. The Definitive Guide to MongoDB


  3. The data files reside in whichever directory you’ve designated as the dbpath when starting nmongod. MongoDB in Action



1969、单词 equates 的匹配文本:


  1. You absolutely need to avoid this situation because it destroys credibility and equates to money lost for your organization. Gradle in Action


  2. Disc costs have decreased tremendously, but disk usage equates to longer backup times and more communication from the slave to the master. Jenkins Continuous Integration Cookbook


  3. Each request allocates temporary objects, so better memory usage equates to a higher theoretical maximum request rate. Cassandra High Performance Cookbook


  4. In your case a logical record equates to a line in your CSV file, so you’ll leverage the existing LineRecordReader class in MapReduce to handle working with the file. Hadoop in Practice


  5. High-availability systems typically achieve uptime of 99.99% or more, which roughly equates to less than an hour of cumulative downtime per year. high-availability-guide


  6. Remember that Flume is explicitly based around log files, so in most cases, an event equates to a line of text followed by a new line character. Hadoop Beginners Guide


  7. Namenode High Availability As we’ve seen, any interruption in namenode service equates to an interruption in HDFS service. Hadoop Operations


  8. Support for such a wide range of protocols equates to more flexibility. ActiveMQ in Action


  9. Optionally, the switch statement can contain a default label, which provides a branch point for the case when there is no case label constant that equates to the switch expression value. Java 7 Recipes A Problem-Solution Approach


  10. In the database, this equates to having a uniqueness constraint on the source foreign key column (that is, the foreign key column in the source entity table) Pro JPA2



1970、单词 webtable 的匹配文本:


  1. The canonical HBase use case is the webtable, a table of crawled web pages and their attributes (such as language and MIME type) keyed by the web page URL. Hadoop:The Definitive Guide 3rd Edition


  2. The Webtable The canonical use case of Bigtable and HBase is the webtable, that is, the web pages stored while crawling the Internet. HBase:The Definitive Guide


  3. As one concrete example that drove some of our design decisions, suppose we want to keep a copy of a large collection of web pages and related information that could be used by many different projects; let us call this particular table the Webtable. Bigtable - A Distributed Storage System for Structured Data



1971、单词 udaf 的匹配文本:


  1. The API allows the generation of many outputs from one input (GenericUDTF) as well as custom aggregate functions that take a list of input rows and output a single value (UDAF) Hadoop RealWorld Solutions Cookbook


  2. Extensibility Interfaces which include the SerDe and ObjectInspector interfaces already described previously as well as the UDF(User Defined Function) and UDAF(User Defined Aggregate Function) interfaces that enable users to define their own custom functions. Hive A Petabyte Scale Data Warehouse Using Hadoop


  3. Summary Although the UDF we looked at operates on scalar data, Hive also has something called a UDAF, which allows more complex processing capabilities over aggregated data. Hadoop in Practice


  4. A UDAF works on multiple input rows and creates a single output row. Hadoop:The Definitive Guide 3rd Edition


  5. Depending on the transformation the UDAF performs, the types returned by each phase could be different. Programming Hive



1972、单词 openvpn 的匹配文本:


  1. The cloudpipe image is basically just a Linux instance with openvpn installed. bk-compute-adminguide-grizzly


  2. From within the EC2 instance list screen, click on the Launch Instance button, select the classic wizard, and then enter OpenVPN Access Server under the Community AMIs tab. Storm Real-Time Processing Cookbook



1973、单词 iaas 的匹配文本:


  1. One way to frame the discussion about MySQL in the cloud is to divide it into two rough categories: IaaS (Infrastructure as a Service) High Performance MySQL 3rd Edition


  2. To achieve this, each of the constituent services are designed to work together to provide a complete Infrastructure as a Service (IaaS) bk-compute-adminguide-grizzly


  3. Intended Audience This book assumes that the reader is familiar with public Infrastructure as a Service (IaaS) cloud offerings such as Rackspace Cloud or Amazon Web Services. Deploying OpenStack


  4. Infrastructure as a service (IaaS): Delivers computing infrastructure as a service. Pro Spring MVC


  5. OpenStack provides an Infrastructure as a Service (IaaS) solution through a set of interrelated services. bk-admin-guide-cloud-latest


  6. The infrastructure as a service (IaaS) model helps organizations to outsource the. Spring Roo in Action


  7. OpenStack is an open source platform that lets you build an Infrastructure as a Service (IaaS) cloud that runs on commodity hardware. OpenStack Operations Guide



1974、单词 preallocate 的匹配文本:


  1. Creating an explicit StringBuilder also allows you to preallocate its size if you have extra information about how big it might need to be, so that it doesn’t need to constantly reallocate the buffer. Thinking in Java 4th Edition


  2. Preallocating Data Files If you know that your mongod will need certain data files, you can run the following script to preallocate them before your application goes online. MongoDB The Definitive Guide 2nd Edition


  3. Preallocate the entire file, or allocate it in large chunks, which allows the circular. ZeroMQ


  4. In order to preallocate an output buffer for use in the update( ) and doFinal( ) methods, you must know its size, which is returned from this method: Java Security 2nd Edition


  5. A detailed analysis of this topic is available at http://goo.gl/9NGe8, but the bottom line is that the safest bet is to use the StringBuilder class, and ideally use the constructor to preallocate enough space for the resulting String to avoid reallocation of the internal byte array in StringBuilder. Hadoop in Practice


  6. If you expect a StringBuffer to grow substantially and can approximate its eventual size, you can use ensureCapacity( ) to preallocate sufficient internal storage. Java in a Nutshell 5th Edition


  7. Preallocate storage for large collections of objects by mapping the instance variables into multiple arrays. Java Performance Tuning 2nd Edition


  8. The number of kilobytes to preallocate in the transaction log files (zookeeper.pre AllocSize) ZooKeeper Distributed Process Coordination


  9. This will cause the provider to preallocate a block of identifiers and then give out identifiers from memory as requested until the block is used up. Pro JPA2



1975、单词 alex 的匹配文本:


  1. Alex Ott who did a thorough technical review of the final manuscript shortly before it went to press. Mahout in Action


  2. Alex Blewitt is a technical architect, working at an investment bank in London. Jenkins Continuous Integration Cookbook


  3. In our example, the Jon Spectre node detected the client connection from the node named, Hayden, Alex. Mastering ElasticSearch


  4. Alex Clark's book will get you managing and enhancing your Plone website like a seasoned expert. Cassandra High Performance Cookbook


  5. Alex Payne is Platform Lead at Twitter, Inc., where he develops services that enable programmers to build atop the popular social messaging service. Programming Scala


  6. Alex Holmes is a senior soft ware engineer with extensive expertise in solving big data problems using Hadoop. Hadoop in Practice


  7. I asked Alex Boisvert, a Buildr committer, to convert the previous Maven Project Object Model (POM) file into Buildr, and he came back with the following for build.yml: Beginning Scala


  8. For a more comprehensive list, visit Alex Popescu’s wonderful site MyNoSQL at http://nosql.mypopescu.com. Cassandra The Definitive Guide


  9. Alex Stangl and Ryan Cuprak provided further assistance with spotting both new and lingering mistakes in this latest edition. Java Network Programming 4th Edition


  10. Started in 2003 by Alex Welch and Darren Crystal, Photobucket quickly became one of the most popular sites on the Internet and attracted over one hundred million users and billions of stored and shared media. Programming Hive



1976、单词 dbinput 的匹配文本:


  1. These classes are used by DBInputFormat, a Hadoop input format with the ability to read the results of arbitrary queries run against a database. Hadoop RealWorld Solutions Cookbook


  2. DBInputFormat uses the record number as the key (LongWritable) and the query result record as the value (DBWritable) Hadoop MapReduce Cookbook


  3. Solution This technique covers using the DBInputFormat class to import relational data into HDFS. Hadoop in Practice


  4. In a database context, a split might correspond to a range of rows from a table and a record to a row in that range (this is precisely what DBInputFormat does, which is an input format for reading data from a relational database) Hadoop:The Definitive Guide 3rd Edition


  5. These classes have specialized applications, and the interested reader can dig further in the online Java documentation for DBInputFormat and DBOutputFormat. Hadoop in Action



1977、单词 multifile 的匹配文本:


  1. Lucene supports two index structures: multifile indexes and compound indexes. Lucene in Action 2nd Edition



1978、单词 redelivery 的匹配文本:


  1. If the message isn’t a redelivery, you let it go to the writer. Spring Batch in Action


  2. Eventual consistency is guaranteed through a redelivery policy combined with an idempotent receiver. Spring Integration in Action


  3. The redelivery count should be specified to avoid indefinitely redelivered messages. Java Performance Tuning 2nd Edition


  4. We’ll also look at message redelivery and dead-letter queues, and how to extend the functionality ActiveMQ broker features in action. ActiveMQ in Action



1979、单词 ted 的匹配文本:


  1. I (Ted) came to the application side of projects from research in machine learning. Mahout in Action


  2. When a web component ted with a transaction makes an HTTP request to another web component, saction context is not propagated to the target servlet or page. Java EE 7 Specification


  3. However, in their book J2EE Performance Testing with BEA WebLogic Server (Expert Press), Peter Zadrozny, Philip Aston, and Ted Osborne state that there is no real difference in performance between these two options, as long as the beans are explicitly removed from the container when the session expires.[2] The beans are removed automatically by binding the session to a session listener that calls ejbRemove( ) when the session terminates. Java Performance Tuning 2nd Edition


  4. The main possible states of a session are mostly self-explanatory: CONNECTING, CONNEC TED, CLOSED, and NOT_CONNECTED. ZooKeeper Distributed Process Coordination



1980、单词 finders 的匹配文本:


  1. TransactionFailure .findAll B returns all the transaction failures stored in the database (for large database tables, you should define finders that take some criteria to filter data) Scala in Action


  2. As with the DAOs, you have two custom finders: one to find a list of packages for a given module B and one to find a specific package for a given module and version C. Spring in Practice


  3. We detail the options for setting up persistence using JPA, setting up a JPA entity, using the Bean Validation framework to provide annotation-driven validations, how to use finders to write simple JPA queries, and how to create repositories using the repository command and the Spring Data API. Spring Roo in Action


  4. The actual mapping of the entity bean to the database was done entirely using vendor-specific configurations, as was the definition of finders (the entity bean term for queries) Pro JPA2



1981、单词 chunkservers 的匹配文本:


  1. A chunk server (CSS) which store the data as chunks and replicate them across the chunkservers. bk-compute-adminguide-grizzly


  2. With that background, we now describe how the client, master, and chunkservers interact to implement data mutations, atomic record append, and snapshot. GFS - The Google File System


  3. Bigtable features two server types: one master node and many chunkservers. Cassandra The Definitive Guide


  4. The observers perform transactions by sending read/write RPCs to Bigtable tablet servers, which in turn send read/write RPCs to GFS chunkservers. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications



1982、单词 stemmers 的匹配文本:


  1. Many stemmers will generate stemmed tokens that are not correctly spelled words, like Bunnies becoming Bunni instead of Bunny or stemming Quote to Quot; you'll see this in Solr's analysis screen. Solr 3 Enterprise Search Server


  2. This stemmer is less aggressive in its transformations than other popular stemmers like the PorterStemmer. Solr in action


  3. Also freely available is the SnowballAnalyzer family of stemmers, which supports many European languages. Lucene in Action 2nd Edition


  4. To use the light stemmers for your respective language, add the following filters to your type: Apache Solr 4 Cookbook



1983、单词 rmilight 的匹配文本:


  1. For example, if the class files for the RMILightBulb system are in the current directory, the following would be typed to produce stub and skeleton classes: Java Network Programming and Distributed Computing



1984、单词 multibyte 的匹配文本:


  1. Multibyte data items are always stored in big-endian order, where the high bytes come first. The Java Virtual Machine Specification Java SE 7 Edition


  2. A multibyte character set can require more than one byte to store each character. High Performance MySQL 3rd Edition


  3. There are a few tricks for detecting encodings such as UTF-8 that use easily recognizable bit patterns when encoding multibyte characters, and some character encodings never use certain byte values (for example, ASCII only uses the lowest seven bits) Tika in Action


  4. Used properly, readers and writers can handle a wide variety of character encodings, including multibyte character sets such as SJIS and UTF-8 Java Network Programming 4th Edition



1985、单词 megastore 的匹配文本:


  1. Nearly all applications built on Megastore have found natural ways to draw entity group boundaries. Megastore - Providing Scalable, Highly Available Storage for Interactive Services


  2. The need to support schematized semi-relational tables and synchronous replication is supported by the popularity of Megastore [5] Spanner - Google’s Globally-Distributed Database



1986、单词 apns 的匹配文本:


  1. For example, integration with Apple’s APNS service is strictly a binary protocol where as other providers base their service on some form of HTTP but all with subtle variations that affect how to best achieve maximum throughput. Netty in Action MEAP V08



1987、单词 autowire 的匹配文本:


  1. Using Spring to autowire the Mapper Class Once the Spring application context has been created, the task may instantiate beans. Pro Hadoop


  2. We will then rely on Spring’s component scan and autowire features for scanning those classes for those annotations and manage the beans and their requirements on various resources under the cover. Pro Spring 3


  3. In this case, we simply autowire the session-scoped bean cart, just as we would for any other bean. Pro Spring MVC


  4. One way you can use this bean is to autowire it as shown next: Spring Roo in Action


  5. Thus a client could now go ahead and get access to the bean by letting Spring simply autowire it. Spring Data Modern Data Access for Enterprise Java


  6. Then, when Spring tries to autowire the Dessert parameter in setDessert(), it doesn’t have a single, unambiguous choice. Spring in Action 4th Edition



1988、单词 rand 的匹配文本:


  1. In this sample, much of the output is truncated, so that only the rand-write job output is displayed. Monitoring with Ganglia


  2. The results are not realistically distributed, and we used RAND(), so your results will vary, but that doesn’t matter for this exercise. High Performance MySQL 3rd Edition


  3. We should then come up with a more general type than , for handling anyRand type of state: Functional Programming in Scala


  4. Contrast this with sampling a nonbucketed table using the rand() function, where the whole input dataset is scanned, even if only a very small sample is needed: Hadoop:The Definitive Guide 3rd Edition


  5. Sorting by a nondeterministic expression (RAND( )) means the sorting. SQL Antipatterns


  6. If we bucket on a column instead of rand(), then identical results are returned on multiple runs: Programming Hive


  7. Rand Records the information necessary to reseed the random-number generator used by the RAND( ) function so that it will produce the same results on the slave as it did on the master. Understanding MySQL Internals



1989、单词 optionals 的匹配文本:


  1. The values in this Map are Optionals because this is the resulting type of the collector generated by the maxBy factory method, but in reality if there’s no Dish in the menu for a given type, that type won’t have an Optional.empty() as value; it won’t be present at all as a key in the Map. Java 8 in Action Lambdas, Streams and Functional-style Programming



1990、单词 heartbeating 的匹配文本:


  1. To make this work properly, we need to do heartbeating from worker to queue, so that the queue can detect a lost worker at any stage. ZeroMQ


  2. Each namenode runs a lightweight failover controller process whose job it is to monitor its namenode for failures (using a simple heartbeating mechanism) and trigger a failover should a namenode fail. Hadoop:The Definitive Guide 3rd Edition



1991、单词 xfs 的匹配文本:


  1. Also, some filesystems handle a large number of underlying drives better than others; XFS is often much better at this than ext3, for instance. High Performance MySQL 3rd Edition


  2. In contrast to systems like AFS, xFS, Frangipani [12], and. GFS - The Google File System


  3. Filesystem For Linux, the ext4 filesystem or XFS are recommended for your data volumes. MongoDB The Definitive Guide 2nd Edition


  4. Several file system options exist, including (but not limited to) EXT, JFS, and XFS. Cassandra High Performance Cookbook


  5. Choosing an entirely different filesystem like XFS would have made this impossible. HBase:The Definitive Guide


  6. XFS, a filesystem created by SGI, has a number of unique features. Hadoop Operations


  7. Two file systems in particular, ext4 and xfs, feature fast, contiguous disk allocation. MongoDB in Action


  8. If your operating system doesn’t have a version of fsfreeze available, you can use xfs_freeze instead, which is available on Ubuntu in the xfsprogs package. OpenStack Operations Guide



1992、单词 gzipped 的匹配文本:


  1. Zipped and gzipped files will also work, if their names end in .zip or .gz, respectively. Mahout in Action


  2. Each data set was then gzipped to prevent it from being split. MapReduce Design Patterns


  3. This utility assigns partitions to devices and writes an optimized Python structure to a gzipped, serialized file on disk for transmission to the servers. bk-admin-guide-cloud-latest


  4. It’s the same notion to write out a gzipped file—make sure to specify the extension for a compression codec. Hadoop in Practice


  5. For convenience, the input files were gzipped by year, resulting in large files for later years in the dataset, when the number of weather records was much higher. Hadoop:The Definitive Guide 3rd Edition


  6. Just click the link on the home page to download the latest release version as a gzipped tarball. Cassandra The Definitive Guide


  7. GZip compression is a good choice for output compression because it typically reduces the size of files significantly, but remember that GZipped files aren’t splittable by subsequent MapReduce jobs: Programming Hive



1993、单词 openssh 的匹配文本:


  1. For example, for OpenSSH, you can generate an unencrypted key for the user that will own the Hadoop Core server processes. Pro Hadoop


  2. Getting ready On your management system you will need an SSH client from OpenSSH. Cassandra High Performance Cookbook


  3. In the openssh workloads, each client replays a captured file system trace of a compilation in a private directory. Ceph A Scalable, High-Performance Distributed File System


  4. When Puppet runs the $package variable will have a value of "openssh-server" because this is what the variable was when evaluation occurred. Pro Puppet


  5. During the Cygwin installation process, you should include the openssh package if you plan to run Hadoop in pseudodistributed mode (see the following explanation) Hadoop:The Definitive Guide 3rd Edition


  6. A commonly used software package providing these commands is OpenSSH, available from http://www.openssh .com/ HBase:The Definitive Guide



1994、单词 triadic 的匹配文本:


  1. Triadic Closures A triadic closure is a common property of social graphs, where we observe that if two nodes are connected via a path involving a third node, there is an increased likelihood that the two nodes will become directly connected at some point in the future. Graph Databases



1995、单词 infile 的匹配文本:


  1. You can load the Apache log into a MySQL database with LOAD DATA INFILE and examine it with SQL queries easily. High Performance MySQL 3rd Edition


  2. We created a tab-separated data file, created the table in the database, and then used the LOAD DATA LOCAL INFILE statement to import the data into the table. Hadoop Beginners Guide


  3. For example, if the command was COM_QUERY with LOAD DATA INFILE, and some of the fields or lines could not be properly imported, a number of warnings will be generated. Understanding MySQL Internals



1996、单词 homebrew 的匹配文本:


  1. Note, however, that for more serious use, it is recommended that you do a traditional installation with something like Homebrew. CouchDB The Definitive Guide


  2. On a Mac, that’s easy because Thrift is available through Homebrew:7 HBase in Action


  3. With Homebrew installed, getting elasticsearch is a matter of running: Elasticsearch in Action MEAP V07 cHAPTER 1


  4. Get Riak from a package manager (a la apt-get or Homebrew), or build from source (the results end up under rel/riak, with the binaries under bin) A Little Riak Book


  5. MacPorts (http://www.macports.org) and Homebrew (http://mxcl.github.com/ homebrew/) are two package managers for Mac OS X known to maintain up-to-date versions of MongoDB. MongoDB in Action


  6. Most people, however, prefer the convenience of a package manager such as Fink, MacPorts, or Homebrew. Redis Cookbook


  7. The easiest installation process, shown in Example 8-1, is on Mac OS X using Homebrew. Spring Data Modern Data Access for Enterprise Java



1997、单词 voip 的匹配文本:


  1. This consideration is very relevant for servers running real-time systems, such as market data, Voice over IP (VoIP), or high-frequency trading. Monitoring with Ganglia


  2. Consider not only customer data at familiar retailers or suppliers, and not only digital video content, but also the required move to digital television and the explosive growth of email, messaging, mobile phones, RFID, Voice Over IP (VoIP) usage, and more. Cassandra The Definitive Guide


  3. For example, the Expedited Forwarding PHB is a good choice for for VOIP. Java Network Programming 4th Edition


  4. As a result of these differences, TCP is used in applications that require reliability (such as email), whereas UDP usually finds it place in applications that require fast data transfers and can handle occasional packet loss (such as VoIP or online gaming) ActiveMQ in Action



1998、单词 marco 的匹配文本:


  1. Although DeMarco and Lister have backgrounds in software development, this book is about projects and teams in general. Thinking in Java 4th Edition


  2. To demonstrate Spring’s low-level WebSocket API, let’s write a simple WebSocket example where a JavaScript-based client plays a never-ending game of Marco Polo with the server. Spring in Action 4th Edition



1999、单词 yyyy 的匹配文本:


  1. In our Hadoop cluster we like to keep data in a YYYY/MM/DD/HH layout. Apache Flume Distributed Log Collection for Hadoop


  2. On the server side, a data-binding process will be performed, in which the data from the HTTP request will be extracted, converted, and bound to the corresponding domain objects (for example, users enter contact information in an HTML form that will be bound to a Contact object in the server), based on the formatting rules defined for each attribute (for example, the date format pattern is yyyy-MM-dd) Pro Spring 3


  3. In order for the framework to sort records in ascending order of dates, we want to take the current form, which is dd/ mm/yy and convert it to yyyy-mm-dd. Hadoop RealWorld Solutions Cookbook


  4. The specification might say that  cannotname be empty, that  must be in the form , and that birthdate "yyyy-MM-dd" Functional Programming in Scala


  5. The Sighting_date field of type string to hold a date of the form yyyy-mm-dd. Hadoop Beginners Guide


  6. A cookie can be set to expire at a certain point in time by setting the expires attribute to a date in the form Wdy, DD-Mon-YYYY HH:MM:SS GMT. Java Network Programming 4th Edition


  7. The default suffix date is of the form yyyy-MM-dd, which can be changed if required. Java Performance


  8. To query by year only, use a PrefixQuery for YYYY, for example. Lucene in Action 2nd Edition



2000、单词 resequencer 的匹配文本:


  1. The Message Splitter, Aggregator, and Resequencer patterns are featured, along with lower-level patterns such as the Correlation Identifier and higher-level patterns like Scatter-Gather. Spring Integration in Action



涉及文献数目:161
1、A Java ForkJoin Framework
2、A Little Riak Book
3、ActiveMQ in Action
4、Apache Flume Distributed Log Collection for Hadoop
5、Apache Hadoop Goes Realtime at Facebook
6、Apache Hadoop YARN Yet Another Resource Negotiator
7、Apache Kafka
8、Apache Solr 4 Cookbook
9、Apache Sqoop Cookbook
10、Beginning CouchDB
11、Beginning Scala
12、Bigtable - A Distributed Storage System for Structured Data
13、Building LinkedIn’s Real-time Activity Data1
14、Building and Testing with Gradle
15、Cassandra High Performance Cookbook
16、Cassandra The Definitive Guide
17、Ceph A Scalable, High-Performance Distributed File System
18、Concurrent Programming in Java Design Principles and Pattern
19、Core Java Volume I Fundamentals 9th Edition
20、Core Java Volume II Advanced Features 9th Edition
21、CouchDB The Definitive Guide
22、Dapper a Large-Scale Distributed Systems Tracing Infrastructure
23、Data Structures and Algorithm Analysis in Java 3rd Edition
24、Deploying OpenStack
25、Dremel - Interactive Analysis of WebScale Datasets
26、Effective Java 2nd Edition
27、Elasticsearch The Definitive Guide
28、Elasticsearch in Action MEAP V07 cHAPTER 1
29、FlumeJava - Easy, Efficient Data-Parallel Pipelines
30、Functional Programming Patterns in Scala and Clojure
31、Functional Programming in Scala
32、Fundamental Networking in Java
33、GFS - The Google File System
34、Getting Started with CouchDB
35、Getting Started with Google Guava
36、Getting Started with Storm
37、Gradle Beyond The Basics
38、Gradle Effective Implementation Guide
39、Gradle in Action
40、Graph Databases
41、HBase Administration Cookbook
42、HBase in Action
43、HBase:The Definitive Guide
44、Hadoop Beginners Guide
45、Hadoop MapReduce Cookbook
46、Hadoop Operations
47、Hadoop Operations and Cluster Management Cookbook
48、Hadoop RealWorld Solutions Cookbook
49、Hadoop in Action
50、Hadoop in Practice
51、HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
52、Hadoop:The Definitive Guide 3rd Edition
53、High Performance MySQL 3rd Edition
54、Hive A Petabyte Scale Data Warehouse Using Hadoop
55、Incoop MapReduce for Incremental Computations
56、Interpreting the Data Parallel Analysis with Sawzall
57、JSR-133 Java Memory Model and Thread
58、Java 7 Concurrency Cookbook
59、Java 7 New Features Cookbook
60、Java 7 Recipes A Problem-Solution Approach
61、Java 8 in Action Lambdas, Streams and Functional-style Programming
62、Java EE 7 Essentials
63、Java EE 7 Specification
64、Java EE 7 Web Profile Specification
65、Java Network Programming 4th Edition
66、Java Network Programming and Distributed Computing
67、Java Performance
68、Java Performance Tuning 2nd Edition
69、Java SE 8 for the Really Impatient
70、Java Security 2nd Edition
71、Java Threads 3rd Edition
72、Java in a Nutshell 5th Edition
73、Jenkins Continuous Integration Cookbook
74、Jenkins The Definitive Guide
75、Kafka a Distributed Messaging System for Log Processing
76、Lucene in Action 2nd Edition
77、Mahout in Action
78、Managing Infrastructure with Puppet
79、MapReduce - Simplied Data Processing on Large Clusters
80、MapReduce Design Patterns
81、MapReduce a flexible data processing tool
82、MapReduce and Parallel DBMSs Friends or Foes
83、Mastering ElasticSearch
84、Megastore - Providing Scalable, Highly Available Storage for Interactive Services
85、Mesos A Platform for Fine-Grained Resource Sharing in the Data Center
86、MongoDB The Definitive Guide 2nd Edition
87、MongoDB in Action
88、Monitoring with Ganglia
89、Netty in Action MEAP V08
90、NoSQL Distilled
91、Omega - flexible, scalable schedulers for large compute clusters
92、OpenStack Operations Guide
93、Oracle JRockit The Definitive Guide
94、Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications
95、Performance Testing With JMeter 2.9
96、PowerDrill - Processing a Trillion Cells per Mouse Click
97、Pregel  -  A System for Large-Scale Graph Processing
98、Pro Hadoop
99、Pro JPA2
100、Pro Java 7 NIO.2
101、Pro Puppet
102、Pro Spring 3
103、Pro Spring MVC
104、Pro Spring Security
105、Professional Hadoop Solutions
106、Programming Concurrency on the JVM
107、Programming Hive
108、Programming Pig
109、Programming Scala
110、Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine
111、Programming in Scala 2nd Edition
112、RabbitMQ in Action
113、Redis Cookbook
114、Redis in Action
115、Resilient Distributed Datasets - A Fault-Tolerant Abstraction for In-Memory Cluster Computing
116、SQL Antipatterns
117、Scala for the Impatient
118、Scala in Action
119、Scala in Depth
120、Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr
121、Scaling CouchDB
122、Scaling MongoDB
123、Selenium 2 Testing Tools Beginner's Guide
124、Selenium Testing Tools Cookbook
125、Solr 3 Enterprise Search Server
126、Solr 3.1 Cookbook
127、Solr in action
128、Sonar Code Quality Testing Essentials
129、Spanner - Google’s Globally-Distributed Database
130、Spring Batch in Action
131、Spring Data Modern Data Access for Enterprise Java
132、Spring Dynamic Modules in Action
133、Spring Integration in Action
134、Spring Roo in Action
135、Spring Security 3.1
136、Spring in Action 4th Edition
137、Spring in Practice
138、Steps in Scala An Introduction to Object-Functional Programming
139、Storm Blueprints Patterns for Distributed Real-time Computation
140、Storm Real-Time Processing Cookbook
141、Tajo A Distributed Data Warehouse System on Large Clusters
142、Tenzing - A SQL Implementation On The MapReduce Framework
143、Testable JavaScript
144、The Definitive Guide to MongoDB
145、The Java Language Specification Java SE 7 Edition
146、The Java Virtual Machine Specification Java SE 7 Edition
147、The Little Redis Book
148、The anatomy of a large-scale hypertextual Web search engine
149、Thinking in Java 4th Edition
150、Tika in Action
151、Understanding MySQL Internals
152、Web Crawling and Data Mining with Apache Nutch
153、Web search for a planet the google cluster architecture
154、ZeroMQ
155、ZooKeeper Distributed Process Coordination
156、admin-user-guide-trunk
157、api-quick-start-onepager
158、bk-admin-guide-cloud-latest
159、bk-compute-adminguide-grizzly
160、high-availability-guide
161、user-guide

© 著作权归作者所有

杨尚川

杨尚川

粉丝 1102
博文 220
码字总数 1624053
作品 12
东城
架构师
私信 提问
Java8全新打造,英语学习supertool

superword是一个Java实现的英文单词分析软件,主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。Clean code、Fluent style、Java8 feature: Lambdas, Streams and...

杨尚川
2015/03/29
427
0
英文单词分析软件--superword

Superword is a Java open source project dedicated in the study of English words analysis and auxiliary reading, including but not limited to, spelling similarity, definition sim......

杨尚川
2015/02/18
2.2K
0
2000个软件开发领域的高频特殊词及精选例句(二)

superword是一个Java实现的英文单词分析软件,主要研究英语单词音近形似转化规律、前缀后缀规律、词之间的相似性规律等等。 276、单词 tokenizer 的匹配文本: Analysis is done by the anal...

杨尚川
2015/03/19
807
1
动词短语(Phrasal Verb)

动词短语(Phrasal Verb)是英语的重要组成部分,在口语和书面语中都被大量使用。本文对动词短语做一些简单的讨论。 一、什么是动词短语? 动词短语由动词加一个或两个小品词(particle)构成...

阮一峰
2006/09/14
0
0
技术写作实例解析 | 清晰为上,朦胧非美

“今晚月色真美”这种朦胧的言辞是不适用技术文档的。最好不要让用户“反复推敲你句意有几种”,也不要让用户感到你“稠密的心思没几人能懂”。在技术写作的世界里,清晰、直白、明确才是正途...

Lilian_Lee
2017/10/18
0
0

没有更多内容

加载失败,请刷新页面

加载更多

CSS--属性

一、溢出 当内容多,元素区域小的时候,就会产生溢出效果,默认是纵向溢出 横向溢出:在内容和容器之间再套一层容器,并且内部容器要比外部容器宽 属性:overflow/overflow-x/overflow-y 取值...

wytao1995
39分钟前
4
0
Confluence 6.15 使用附件宏

希望添加附件宏到一个页面中: 从编辑工具栏中,选择 插入(Insert) > 其他宏(Other Macros) 找到并且选择需要的宏。 可用使用自动完成加快这个过程:输入 { 然后开始输入你希望插入的宏的...

honeymoose
今天
4
0
精华帖

第一章 jQuery简介 jQuery是一个JavaScript库 jQuery具备简洁的语法和跨平台的兼容性 简化了JavaScript的操作。 在页面中引入jQuery jQuery是一个JavaScript脚本库,不需要特别的安装,只需要...

流川偑
今天
6
0
语音对话英语翻译在线翻译成中文哪个方法好用

想要进行将中文翻译成英文,或者将英文翻译成中文的操作,其实有一个非常简单的工具就能够帮助完成将语音进行翻译转换的软件。 在应用市场或者百度手机助手等各大应用渠道里面就能够找到一款...

401恶户
今天
3
0
jenkins 插件下载加速最终方案

推荐做法 1、告诉jenkins 我哪些插件需要更新 jenkins插件清华大学镜像地址 https://mirrors.tuna.tsinghua.edu.cn/jenkins/updates/update-center.json 1.进入jenkins系统管理 2.进入插件管...

vasks
今天
4
0

没有更多内容

加载失败,请刷新页面

加载更多

返回顶部
顶部