1101、单词 uuids 的匹配文本:

  1. For example, when accessing /_uuids, you get a list of UUIDs from the system. Getting Started with CouchDB

  2. The images in the replicated glance server preserve the uuids, metadata, and image data from the original. bk-compute-adminguide-grizzly

  3. When you write your first programs, we recommend assigning your own UUIDs. CouchDB The Definitive Guide

  4. Randomly distributed keys could be usernames, email addresses, UUIDs, MD5 hashes, or any other key that has no identifiable pattern in your dataset. MongoDB The Definitive Guide 2nd Edition

  5. None This is an ordered list of firewall rule uuids. bk-admin-guide-cloud-latest

  6. The columns are sorted chronologically, using unique IDs (UUIDs) for column names to avoid clashes. Cassandra High Performance Cookbook

  7. Request Parameters: count (integer, the number of UUIDs to return, default 1) Beginning CouchDB

  8. The simplest way to generate mostly monotonic document IDs is to use the default value of sequential for the algorithm option in the uuids configuration section and let CouchDB generate your document IDs. Scaling CouchDB

  9. These can be simple numbers but also UUIDs† and so on. HBase:The Definitive Guide

  10. Both row keys and column names can be strings, like relational column names, but they can also be long integers, UUIDs, or any kind of byte array. Cassandra The Definitive Guide

1102、单词 ycsb 的匹配文本:

  1. Therefore, we will start by introducing how to use Yahoo! Cloud Serving Benchmark (YCSB) to measure (benchmark) performance of a HBase cluster. HBase Administration Cookbook

  2. The Yahoo! Cloud Serving Benchmark (YCSB) provides benchmarking for the bases of comparison between NoSQL systems. Cassandra High Performance Cookbook

  3. Although YCSB is built for comparing systems, you can use it to test the performance of any of the databases it supports, including HBase. HBase in Action

  4. Installation YCSB is available in an online repository only, and you need to compile a binary version yourself. HBase:The Definitive Guide

1103、单词 des 的匹配文本:

  1. For the DES algorithm, there are a total of 256 possible keys. Pro Spring 3

  2. All the native SerDes and complex types supported in Hive are also implementations of these interfaces. Hive A Petabyte Scale Data Warehouse Using Hadoop

  3. This secret key can then be used for a variety of operations: it can be used directly for creating MACs, or it can be converted into a DES key for use in a cipher. Java Security 2nd Edition

  4. The simplicity of the format has a lot going for it, such as making it easy to process with other tools, including MapReduce programs or Streaming, but there are more compact and performant binary SerDesthat you might consider using. Hadoop:The Definitive Guide 3rd Edition

  5. The Data Encryption Standard (DES) is a venerable block cipher with a key length of 56 bits. Core Java Volume II Advanced Features 9th Edition

  6. In order to use this package, you need to have a basic understanding of cryptographic algorithms such as DES. Java in a Nutshell 5th Edition

  7. Besides key lengths, there’s an important difference between DES/AES and RC4-based ciphers. Java Network Programming 4th Edition

  8. Third-party input and output formats and SerDes can be specified, a feature which permits users to customize Hive for a wide range of file formats not supported natively. Programming Hive

1104、单词 stax 的匹配文本:

  1. Java can process XML input using different techniques, including using a Streaming API for XML (StAX) parser. Spring Batch in Action

  2. In this code you use Java’s built-in Streaming API for XML (StAX) parser to extract the key and value for each property and output them. Hadoop in Practice

  3. Produce/consume JSON text in a streaming fashion (similar to StAX API for XML) • Build a Java object model for JSON text (similar to DOM API for XML) Java EE 7 Essentials

  4. In the future, support for streaming through StAX and/or SAX may be added to Spring Integration. Spring Integration in Action

  5. In the following sections, we discuss the streaming parsers supplied by the Java library: the venerable SAX parser and the more modern StAX parser that was added to Java SE 6 Core Java Volume II Advanced Features 9th Edition

  6. As you can see, we’ve used a simple StAX API (http://mng.bz/0S2s) to create an XML representation of our stock data. ActiveMQ in Action

  7. If using JAXP, the first step in parsing a document is the creation of the parser, SAXParser, XMLStreamReader, or DocumentBuilder depending on the API selected (SAX, StAX, and DOM, respectively) Java Performance

  8. The newer, simpler, and more efficient model is the Streaming API for XML (StAX) Java 7 Recipes A Problem-Solution Approach

1105、单词 frm 的匹配文本:

  1. Thus, when you create a table named MyTable, MySQL stores the table definition in MyTable.frm. High Performance MySQL 3rd Edition

  2. The Table Manager is responsible for creating, reading, and modifying the table definition files (.frmextension), maintaining a cache of table descriptors called table cache, and managing table-level locks. Understanding MySQL Internals

1106、单词 rdbmss 的匹配文本:

  1. Some of the biggest face-palm moments we’ve had were when someone published flawed benchmarks comparing MySQL to other relational database management systems (RDBMSs) with the default settings. High Performance MySQL 3rd Edition

  2. Similar to traditional relational database management systems (RDBMSs), data in HBase is organized in tables. Professional Hadoop Solutions

  3. Some RDBMSs ship powerful tools for managing these kinds of issues, but many don’t. HBase in Action

  4. We’ve seen similar contention with coarse-grained table-level locking in RDBMSs, where writes are latent even when there’s logically no contention. Graph Databases

  5. Examples include working with relational data in RDBMSs, structured files, and HBase. Hadoop in Practice

  6. However, there are several differences between the two languages, and between Pig and relational database management systems (RDBMSs) in general. Hadoop:The Definitive Guide 3rd Edition

  7. The HBase data model is not the relational approach we saw used in Hive and all other RDBMSs. Hadoop Beginners Guide

  8. Some applications use in-memory databases, while others use traditional relational database management systems (RDBMSs) Java 7 Recipes A Problem-Solution Approach

  9. Because MongoDB and most RDBMSs use the same data structure for their indexes, advice for managing indexes in both of these systems is compatible. MongoDB in Action

  10. Additionally, Sinfonia’s mini-transactions have limited semantics compared to the transactions provided by RDBMSs or Percolator: the user must specify a list of items to compare, read, and write prior to issuing the transaction. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications

1107、单词 chris 的匹配文本:

  1. In the 4th edition, Chris Grindstaff was very helpful during the development of the SWT section, and Sean Neville wrote the first draft of the Flex section for me. Thinking in Java 4th Edition

  2. While talking one afternoon about how to solve an unrelated problem, Chris mentioned Redis as a database that I might find interesting (given my education in theoretical computer science) Redis in Action

  3. Chris uses is that CouchDB has felt like a boulder we’ve been pushing up a hill. CouchDB The Definitive Guide

  4. Also to the authoring team, including Chris, Manuel and Brent, in providing me extraordinary support in writing this book. Pro Spring 3

  5. Another big thanks goes to Chris Nelson for keeping all of us focused and for his advice on the book; it was a pleasure working with you. Pro Spring MVC

  6. So I consulted with Chris Mattmann, another Nutch committer with whom I had worked, about the potential for refactoring all these disparate tools in a common and standardized project. Tika in Action

  7. A search for "Chris" would match on "Chris Isaak" since he is tagged with pop, but "Chris Cagle" would be filtered out since he plays only American and country music. Solr 3 Enterprise Search Server

  8. After several years of experience with the language, and significant contributions by Ed Frank, Patrick Naughton, Jonathan Payne, and Chris Warth it was retargeted to the Internet, renamed, and substantially revised to be the language specified here. The Java Language Specification Java SE 7 Edition

  9. I would like to thank my wife Karen for editing and proofreading my chapters; my children Chris, Connor, and Michael for keeping the zombies at bay; and my dog Rex for forcing me to go on walks in the snow and the rain. ActiveMQ in Action

  10. Chris Beams for his legitimizing of Gradle through SpringSource projects. Building and Testing with Gradle

1108、单词 multiprocessor 的匹配文本:

  1. Threads in Java can take advantage of multiprocessor systems if the base operating system does so. Core Java Volume I Fundamentals 9th Edition

  2. These kinds of issues can also be exposed or amplified if a program is moved to a multiprocessor system. Thinking in Java 4th Edition

  3. In this chapter, we show a process for exploiting the power of multiprocessor. Java Threads 3rd Edition

  4. Such an approach is particularly interesting if you want to leverage multicore or multiprocessor hardware, as illustrated in figure 13.1 Spring Batch in Action

  5. Figure 10.6 A second optimal solution for the multiprocessor case. Data Structures and Algorithm Analysis in Java 3rd Edition

  6. As with any cache mechanism, invalidation issues are a problem, especially on multiprocessor systems where we often get the situation that two processors want to access the same memory at the same time. Oracle JRockit The Definitive Guide

  7. The concurrent garbage collector should be especially effective on multiprocessor machines. Java Performance Tuning 2nd Edition

  8. Being able to make efficient use of CPU cycles can be challenging for multithreaded applications running on multiprocessor and multicore. Java Performance

  9. The cost advantages of using inexpensive, PC-based clusters over high-end multiprocessor servers can be quite substantial, at least for a highly parallelizable application like ours. Web search for a planet the google cluster architecture

  10. Each computer system may be a uniprocessor, a multiprocessor, or even a cluster of machines administered as a single unit and sharing a common operating system. Concurrent Programming in Java Design Principles and Pattern

1109、单词 cursors 的匹配文本:

  1. Table 8.3 lists the constants to use with this method along with what the cursors look like under Windows. Core Java Volume I Fundamentals 9th Edition

  2. Create an application and change the cursor to one of the stock cursors in the Cursor class. Thinking in Java 4th Edition

  3. MySQL’s implementation of stored code is pretty limited—execution plan caches are per-connection, cursors are materialized as temporary tables, there’s very. High Performance MySQL 3rd Edition

  4. Cursors The database returns results from find using a cursor. MongoDB The Definitive Guide 2nd Edition

  5. Reading with ORM cursors implies that code responsible for managing domain classes doesn’t use a first-level cache. Spring Batch in Action

  6. Scans Now that we have discussed the basic CRUD-type operations, it is time to take a look at scans, a technique akin to cursors† in database systems, which make use of the underlying sequential, sorted storage layout HBase is providing. HBase:The Definitive Guide

  7. In most cases, you can use one of the out-of-the box reader implementations and customize it for your application’s needs so that you can avoid the critical yet tedious tasks of dealing with file line reading, database cursors, and so on. Spring Integration in Action

  8. Additionally, the system usage memory limit determines the point at which messages are offloaded to disk by the pending message cursors. ActiveMQ in Action

  9. Cursors, found in many database systems, return query result sets in batches for efficiency iteratively. MongoDB in Action

1110、单词 filesort 的匹配文本:

  1. Just because a query does a filesort with a temporary table doesn’t mean it is a problem. High Performance MySQL 3rd Edition

  2. On the code level, the turning point is in the following lines inside sortlength( ) in sql/filesort.cc: Understanding MySQL Internals

1111、单词 runtimes 的匹配文本:

  1. We report runtimes for binary trees (to study scaling properties) and lognormal random graphs (to study the performance in a more realistic setting) using various graph sizes with the weights of all edges implicitly set to 1 Pregel  -  A System for Large-Scale Graph Processing

  2. This trade-off is illustrated in figure 13.7, where the runtimes for hypothetical sequential and parallel scalable algorithms are compared. Mahout in Action

  3. If the runtimes of tasks are too long, a single task may hold the cluster for a long period, or retrying a failed task becomes expensive. Pro Hadoop

  4. Any preprocessing of that data that can be done to improve execution time and reduce the byte count should be done to improve runtimes. MapReduce Design Patterns

  5. From there, we use sum() to calculate the sum off all runtimes, and we divide by the number of runs to get the average: Functional Programming Patterns in Scala and Clojure

  6. This way you’ll have a good sense of the expected compression and runtimes for the codecs. Hadoop in Practice

  7. An implementation of TaskRuntimeEstima tor used by Specula tor instances that provides estimates for task runtimes (MapReduce 2 only) Hadoop:The Definitive Guide 3rd Edition

  8. He has a background in computer security but has worked with runtimes since 1999 Oracle JRockit The Definitive Guide

  9. All objects may have to fit into memory without any garbage collection for these runtimes. Java Performance Tuning 2nd Edition

  10. Modern JVMs continue to evolve by integrating more sophisticated optimizations, runtimes, and garbage collectors. Java Performance

1112、单词 balancers 的匹配文本:

  1. Incoming web requests are handled by load balancers that distribute the requests to clusters of web servers. Monitoring with Ganglia

  2. This will include all facets of the application and all supporting system resources, including, but not limited to, infrastructure, network, database, servers, and load balancers. Performance Testing With JMeter 2.9

  3. A wide variety of load-balancing solutions are available, ranging from peer-based implementations such as Wackamole (http://www.backhand.org/wackamole/) to  DNS, LVS (Linux Virtual Server; http://www.linuxvirtualserver.org), hardware load balancers, TCP proxies, MySQL Proxy, and managing the load balancing in the application. High Performance MySQL 3rd Edition

  4. If there are no other balancers active, the mongos will take a cluster-wide lock from the config servers and do a balancing round. MongoDB The Definitive Guide 2nd Edition

  5. You may want to consider having multiple load balancers so that you can remove the load balancer as a single point of failure. Scaling CouchDB

  6. In this domain, several data centers support many applications on behalf of many customers using different pieces of infrastructure, from virtual machines to physical load balancers. Graph Databases

  7. As such, it is the home of the Staged Event-Driven Architecture (SEDA) classes, the gossiper, the balancers, and the classes that flush data in memtables. Cassandra The Definitive Guide

  8. Along with this, EC2 offers a suite of complimentary services, including load balancers, static IP addresses, high-performance additional virtual disk drives, and many more. Hadoop Beginners Guide

  9. The most common network problems included inadequate bandwidth somewhere along the communication route, and undersized, misconfigured, or incompatible routers, switches, firewalls, and load balancers. Java Performance Tuning 2nd Edition

  10. The load is balanced to the various systems through the use of hardware or software load balancers. Java Performance

1113、单词 spliterator 的匹配文本:

  1. This uses the fork/join framework introduced in Java 7 and the Spliterator abstraction that you’ll learn about in the next chapter. Java 8 in Action Lambdas, Streams and Functional-style Programming

1114、单词 sha 的匹配文本:

  1. When the first connection to a resource manager is established as part of the transaction, a resource manager specific local transaction is started on the connect can sha transact. Java EE 7 Specification

  2. A message digest may be implemented by a particular algorithm, such as MD5 or SHA. Java Security 2nd Edition

  3. Gradle relies heavily on hashes to optimize download performance; when resolving a dependency, it will first attempt to download the much-smaller SHA from the repo, skipping the download if it determines that it already has that content in the artifact cache. Gradle Beyond The Basics

  4. The newfunction block takes the incoming argument and we process it, first adding in support for working with SHA hashes by requiring the sha1 library, and then passing the argument to the hexdigest method. Pro Puppet

  5. They’re both faster than cryptographic hashers such as SHA-1 and produce good distributions. Hadoop in Practice

  6. The fingerprint is obtained by ordering the descriptions of the class, superclass, interfaces, field types, and method signatures in a canonical way, and then applying the so-called Secure Hash Algorithm (SHA) to that data. Core Java Volume II Advanced Features 9th Edition

  7. A popular algorithm in the past has been SHA-1, but researchers have. SQL Antipatterns

  8. Otherwise, a unique version number is computed by applying the Secure Hash Algorithm (SHA) to the API defined by the class. Java in a Nutshell 5th Edition

  9. Subclassing Thread Consider a program that calculates the Secure Hash Algorithm (SHA) digest for many files. Java Network Programming 4th Edition

  10. Even these hashing families have some theoretical vulnerabilities; however, no one has yet demonstrated a practical case of creating intentional collisions for the SHA family of hashes. The Definitive Guide to MongoDB

1115、单词 unary 的匹配文本:

  1. The unary minus (-) and unary plus (+) are the same operators as binary minus and plus. Thinking in Java 4th Edition

  2. For example, the operations of an IntStream are restricted to produce primitive integers: the map operation of an IntStream takes a lambda that takes an int and produces an int (an IntUnaryOperator) Java 8 in Action Lambdas, Streams and Functional-style Programming

  3. In this case, however, the name of the method has “unary_” prepended to the operator character. Programming in Scala 2nd Edition

  4. Here’s an example of defining unary operators on a Sample class: Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine

  5. It is also possible for a node to have only one child, as is the case with the unary minus operator. Data Structures and Algorithm Analysis in Java 3rd Edition

  6. Some operators apply unary numeric promotion to a single operand, which must produce a value of a numeric type: • If the operand is of compile-time type Byte, Short, Character, or Integer, it. The Java Language Specification Java SE 7 Edition

  7. But the identity function is special: it returns its argument unmodified, so we know that it is typesafe to use it as a UnaryFunction

    whatever the value of T. Effective Java 2nd Edition

  8. Unary operators and assignment operators are evaluated from right to left. Java in a Nutshell 5th Edition

  9. The unary negative operator (-) is also supported for both integers and floating-point numbers. Programming Pig

  10. Look carefully at the return type of the compose method of UnaryOperator

    Java SE 8 for the Really Impatient

1116、单词 multiuser 的匹配文本:

  1. These benchmarks measure online transaction processing (OLTP) throughput and are most suitable for interactive multiuser applications. High Performance MySQL 3rd Edition

  2. In a multiuser environment, multiple jobs can be submitted and run simultaneously. Hadoop Operations and Cluster Management Cookbook

  3. Because it’s embedded, Derby can’t be shared between users, and as such it can’t be used in a multiuserenvironment where the metastore needs to be shared. Hadoop in Practice

  4. The default in MapReduce 1 is the original FIFO queue-based scheduler, and there are also multiuserschedulers called the Fair Scheduler and the Capacity Scheduler. Hadoop:The Definitive Guide 3rd Edition

  5. OS/2 and the Integer multiuser spreadsheet engine for the JVM. Beginning Scala

  6. When you get to a multiuser production environment, you’ll have to narrow down your jobs by looking for your Hadoop user name and the name of your current job. Hadoop in Action

  7. Other ecosystem projects do have additional information or higher level constructs that must be secured in multiuser environments. Hadoop Operations

  8. Multiuser response times depending on the number of users (if applicable) Java Performance Tuning 2nd Edition

  9. These requirements include: Collaborative multiuser environments Hadoop enables new classes of analysis that were prohibitive computationally and economically with traditional RDBMS technologies. Programming Hive

1117、单词 committers 的匹配文本:

  1. Over Ganglia’s history, we’ve had nearly 40 active committers and hundreds of people who have submitted patches and bug reports. Monitoring with Ganglia

  2. Chris I would like to acknowledge all the committers of CouchDB, the people sending patches, and the rest of the community. CouchDB The Definitive Guide

  3. Code changes can be submitted as pull requests and undergo a close review process by the core committers before making it into the code base. Gradle in Action

  4. Last but not the least, Apache Hadoop YARN continues to be a community driven open source project and owes much of its success to the Apache Hadoop YARN and MapReduce communities— a big thanks to all the contributors and committers who have helped YARN in every way possible. Apache Hadoop YARN Yet Another Resource Negotiator

  5. Typically, the key committers have insights into the problem and the code base and help code get committed faster. Cassandra High Performance Cookbook

  6. Todd’s version is downstream of the master version maintained by Kevin Weil and other committers. Hadoop in Practice

  7. Output Committers Hadoop MapReduce uses a commit protocol to ensure that jobs and tasks either succeed or fail cleanly. Hadoop:The Definitive Guide 3rd Edition

  8. Code was there for more than a year in Apache and has active contributors and committers list. Namenode High Availability

  9. Cassandra was accepted into the Apache Incubator, and by the time it graduated in March 2010, it had become a true open source success story, with committers from Rackspace, Digg, Twitter, and other companies that wouldn’t have written their own database from scratch, but together built something important. Cassandra The Definitive Guide

  10. Cloudera employs many of the Apache Hadoop committers (the people who have privileges to commit code to the Apache source repositories) who work on Hadoop full-time. Hadoop Operations

1118、单词 multivalued 的匹配文本:

  1. You can bind numeric attributes to documents, including multivalued attributes. High Performance MySQL 3rd Edition

  2. Sorting with multivalued fields With versions prior to 0.90, ElasticSearch had problems with sorting on the field that had multiple values in their contents. Mastering ElasticSearch

  3. Cardinality Prescribes whether the metadata property is multivalued, for example, metadata describing a file’s set of MimeType names. Tika in Action

  4. Lucene's document structure is flat, but it does support multivalued fields—that is a field with an array of values. Solr 3 Enterprise Search Server

  5. For example, if we had a field named title, which was multivalued, we could set this parameter to split the data like this: Solr 3.1 Cookbook

  6. With Pig, the data structures are much richer, typically being multivalued and nested, and the set of transformations you can apply to the data are much more powerful. Hadoop:The Definitive Guide 3rd Edition

  7. A Catch all field should not be stored as it is populated from another field #B Destination field must be multivalued if any of the source fields are multi-valued. Solr in action

  8. We’ll first consider how analysis is impacted by multivalued fields. Lucene in Action 2nd Edition

  9. Bidirectional many-to-one relationships are explained later as part of the discussion of multivaluedbidirectional associations. Pro JPA2

  10. Please be careful when using this component on the multivalued fields as it can be a performance bottleneck. Apache Solr 4 Cookbook

1119、单词 jstatd 的匹配文本:

  1. If a remote host is specified, it must be running the jstatd daemon. Java in a Nutshell 5th Edition

  2. The remote system must be configured to run the jstatd daemon. Java Performance

1120、单词 xcp 的匹配文本:

  1. The nova-compute process is primarily a worker daemon that creates and terminates virtual machine instances via hypervisor's APIs (XenAPI for XenServer/XCP, libvirt for KVM or QEMU, VMwareAPI for VMware, etc.) bk-compute-adminguide-grizzly

  2. Xen Yes libvirt Most popular (along with XCP/XenServer) technology for larger scale and production deployments. Deploying OpenStack

  3. XenAPI (XenServer/XCP) Compute uses the XenAPI agent to inject passwords into guests when using the XenAPI hypervisor backend. bk-admin-guide-cloud-latest

1121、单词 jmenu 的匹配文本:

  1. JMenuItem add(JMenuItem item) adds a menu item (or a menu) Core Java Volume I Fundamentals 9th Edition

  2. You can use an Icon inside a JLabel or anything that inherits from AbstractButton (including JButton, JCheckBox, JRadioButton, and the different kinds of JMenuItem) Thinking in Java 4th Edition

  3. You will notice the apply() method creates a JMenuItem instance with an inner class definition containing an actionPerformed() method. Java 7 Recipes A Problem-Solution Approach

1122、单词 classname 的匹配文本:

  1. In fact, if I had my own custom source written, I would use its classname for the source's type parameter. Apache Flume Distributed Log Collection for Hadoop

  2. The classname parameter specifies the name of the class, and the codebase parameter specifies a URL to the resource (though this can also be a local file:// URL) Java Network Programming and Distributed Computing

  3. You may list their classname or their class label (the string that appears in JMeter's UI) here, and they will no longer appear in the menus. Performance Testing With JMeter 2.9

  4. Finally, the option java_outer_ classname declaration is the output class name that will be used. Hadoop RealWorld Solutions Cookbook

  5. The classname is the full classname of the login module you want to use. Java Security 2nd Edition

  6. In the previously sketched-out plug-in, we applied the plug-in directly by its classname with the line apply plugin: LiquibasePlugin at the top of the build.5 A properly packaged Liquibase plug-in should be applied just like the core plug-ins are, with the line apply plugin: 'liquibase' Gradle Beyond The Basics

  7. When the hadoop command is invoked with a classname as the first argument, it launches a Java Virtual Machine (JVM) to run the class. Hadoop:The Definitive Guide 3rd Edition

  8. To enable assertions within a specific class, use -ea followed by a colon and the classname: Java in a Nutshell 5th Edition

  9. The first is the full package, classname, and method name. Programming Pig

  10. Use the Services API (as detailed in the JAR specification), if available, to determine the classname. Java Performance

1123、单词 authenticates 的匹配文本:

  1. When a user successfully authenticates, a hash is generated from the username and a secret key and is stored in a cookie and made available to the rest of gweb. Monitoring with Ganglia

  2. It authenticates container leases, manages containers’ dependencies, monitors their execution, and provides a set of services to containers. Apache Hadoop YARN Yet Another Resource Negotiator

  3. To begin a session, a client first authenticates to the AS of the KDC. Professional Hadoop Solutions

  4. The web server then authenticates the r in the specified realm (referred to as HTTP Realm in this document) Java EE 7 Specification

  5. A login module is the code that actually authenticates a user. Java Security 2nd Edition

  6. The client authenticates itself to the Authentication Server and receives a timestamped Ticket-Granting Ticket (TGT) Hadoop:The Definitive Guide 3rd Edition

  7. The meaning of these keywords is given by the following algorithm: A login authenticates a subject, which can have multiple principals. Core Java Volume II Advanced Features 9th Edition

  8. The request should be sent to a certificate authority (CA), which authenticates the requestor and sends back a signed certificate authenticating the requestor’s public key. Java in a Nutshell 5th Edition

  9. Authorization So far, we’ve discussed only how clients identify themselves and how Hadoop authenticatesthem. Hadoop Operations

  10. We’ll demonstrate this process by building a custom security plug-in that authenticates the clients based on their IP address. ActiveMQ in Action

1124、单词 dijkstra 的匹配文本:

  1. Semaphores were invented by Edsger Dijkstra in 1968, for use as a synchronization primitive. Core Java Volume I Fundamentals 9th Edition

  2. The dining philosophers problem, invented by Edsger Dijkstra, is the classic demonstration of deadlock. Thinking in Java 4th Edition

  3. Many other graph algorithms can be applied to the graph at hand, such as Dijkstra’s algorithm [Dijkstra’s] for finding the shortest or cheapest path between nodes. NoSQL Distilled

  4. After all, as Edsger Dijkstra said, testing can only prove the presence of errors, never their absence.14 So the guarantees that static typing gives may be simple, but they are real guarantees of a form no amount of testing can deliver. Programming in Scala 2nd Edition

  5. Dijkstra’s algorithm proceeds in stages, just like the unweighted shortest-path algorithm. Data Structures and Algorithm Analysis in Java 3rd Edition

  6. A call to findSinglePath on the Dijkstra path finder returns the shortest path between the two delivery bases. Graph Databases

  7. Dijkstra’s algorithm is a shortest path algorithm commonly taught in undergraduate computer science courses. Hadoop in Practice

  8. The concept of a semaphore was introduced by Edsger Dijkstra in 1965 and was used for the first time in the THEOS operating system. Java 7 Concurrency Cookbook

1125、单词 interoperate 的匹配文本:

  1. Each operating system, server vendor, and application developer creates specific agents and software for performance monitoring, none of which interoperate. Monitoring with Ganglia

  2. For applications to interoperate, the implementation of application protocols must be precise. Java Network Programming and Distributed Computing

  3. Both Java 8 and Scala combine object-oriented and functional programming features into one programming language; both run on the JVM and to a large extent can interoperate. Java 8 in Action Lambdas, Streams and Functional-style Programming

  4. By now, you should be familiar with the main components of Oozie and the way they interoperate. Professional Hadoop Solutions

  5. This required that we enhance the Hadoop clients to be able to interoperate with Hadoop servers running different versions of the Hadoop software. Apache Hadoop Goes Realtime at Facebook

  6. Occasionally, you may need to interoperate with legacy APIs that use the File class instead of the Path class. Core Java Volume II Advanced Features 9th Edition

  7. The well-intentioned equals method in this class naively attempts to interoperate with ordinary strings. Effective Java 2nd Edition

  8. Although these are two very different network protocols that do not interoperate on the same network without special gateways and/or tunneling protocols, Java hides almost all of the differences from you. Java Network Programming 4th Edition

  9. To interoperate with pure thread-based versions, worker threads can be packaged as Executors. Concurrent Programming in Java Design Principles and Pattern

  10. Every complete source code example in this book has been compiled and executed on Windows and Solaris platforms, and in many cases has been used to interoperate between both platforms. Fundamental Networking in Java

1126、单词 tcpdump 的匹配文本:

  1. If using multicast, check the interface where packets are sent (a packet sniffer such as tcpdump might help) Monitoring with Ganglia

  2. You can use tcpdump to save the traffic to disk, then use pt-query-digest with the --type=tpcdump option to decode and analyze the queries. High Performance MySQL 3rd Edition

  3. In the first terminal, on the host running nova-network, use tcpdump to monitor DNSrelated traffic (UDP, port 53) on the VLAN interface. bk-compute-adminguide-grizzly

  4. Another option is to use a packet-sniffing tool such as tcpdump to capture HTTP traffic in PCAP format, and to then use a tool such as pcap2har to generate the HAR. Testable JavaScript

  5. You can use tcpdump to identify if packets are being routed to the inbound interface on the compute host. bk-admin-guide-cloud-latest

  6. A common example is to query the output of the tcpdump command to analyze network behavior. Programming Hive

  7. It’s recommended to use tcpdump at several points along the network path to correlate where a problem might be. OpenStack Operations Guide

1127、单词 localization 的匹配文本:

  1. That method formats the message part of the record, substituting parameters and applying localization. Core Java Volume I Fundamentals 9th Edition

  2. This feature has been renamed from push-down joins to adaptive query localization.) NDB used to have a completely different performance profile from other MySQL storage engines, but recent versions are more general-purpose. High Performance MySQL 3rd Edition

  3. The second trend reflects the increasing availability and use by applications of internet services accessible through public APIs, made available by known providers such as Google (for example, localization information), Facebook (for example, social information), and Twitter (for example, news) Java 8 in Action Lambdas, Streams and Functional-style Programming

  4. Commonly these are noncompiled files such as localization bundles or images, which, understandably might not have an effect on unit or integration tests. Jenkins The Definitive Guide

  5. Examples of when this may be needed include situations with changed attributes, isolation levels, character settings, and localization ration. Java EE 7 Specification

  6. Hadoop uses the standard Java localization mechanisms to load the correct properties for the locale you are running in. Hadoop:The Definitive Guide 3rd Edition

  7. The toString() method of Date produces a textual representation of a date and time but does no localization and allows no customization of which fields (day, month and year or hours and minutes, for example) are to be displayed. Java in a Nutshell 5th Edition

  8. Furthermore, sorting international Strings requires the ability to handle many kinds of localization issues, such as the sorted location for accented characters, characters that can be treated as character pairs, and so on. Java Performance Tuning 2nd Edition

  9. This book covers fundamentals of Java development such as installation of the JDK, writing classes, and running applications.It delves into essential topics such as the development of object-oriented constructs, exception handling, unit testing, and localization. Java 7 Recipes A Problem-Solution Approach

  10. Some localization mechanisms are built into the validation message interpolator, but custom message interpolation can also be plugged into the validator to perform localization in custom ways. Pro JPA2

1128、单词 springsource 的匹配文本:

  1. For users of the Spring framework, the author of Spring Data’s Redis interface, Costin Leau, has teamed up with Redis author Salvatore Sanfilippo to produce a one-hour introduction for using Spring with Redis available at http://www.springsource.org/ spring-data/redis. Redis in Action

  2. But why install these plugins manually, when you can do it the easy and convenient way using the Spring Tool Suite (STS) (http://www.springsource.org/sts)? STS is an Eclipse-based development environment mainly targeted for building applications using the Spring framework. Gradle in Action

  3. Installing Gradle plugin To install the Gradle plugin, we use the update site, http://dist.springsource. Gradle Effective Implementation Guide

  4. So, which one is better, XML or annotations? There have been lots of debates on this topic, and you can find numerous discussions about this topic on the Internet (for example, try the Spring Community Forum at http://forum.springsource.org) Pro Spring 3

  5. Spring Security LDAP support is assisted by the Spring LDAP module (http://www.springsource.org/ldap), which is actually a separate project from the core Spring Framework and Spring Security projects. Spring Security 3.1

  6. Following is the current supported functionality of SpEL extracted directly from Spring documentation at http://static.springsource.org/spring/docs/3.0.x/reference/expressions.html: Pro Spring Security

  7. To address this problem, SpringSource has repackaged a large number of open source libraries and made them available through its EBR (http://www.springsource.com/repository/app/) Spring Dynamic Modules in Action

  8. To follow along with the book, you’ll need to download and install Spring Roo, version 1.2.1, from http://springsource.org/spring-roo. Spring Roo in Action

  9. There are many ways of building workflows; a common approach is with Extract Transform and Load (ETL) tools such as Pentaho Kettle (http://kettle.pentaho.com) and Spring Batch (http://static.springsource.org/spring-batch) Hadoop Beginners Guide

  10. Feel free to reach out at any time to the Springsource Forums, Stackoverflow, or the Neo4j Google Group for answers to your questions. Spring Data Modern Data Access for Enterprise Java

1129、单词 kahadb 的匹配文本:

  1. Although not presented here, we also tested an alternative AMQ message store and found its performance very similar to that of KahaDB. Kafka a Distributed Messaging System for Log Processing

  2. For example, ActiveMQ offers its own style of ultra-fast message persistence via KahaDB, but also supports standard JDBC-accessible databases. ActiveMQ in Action

1130、单词 squeryl 的匹配文本:

  1. You’ll build applications using the Simple Build Tool (SBT), connect to a database using Squeryl, build scalable and reusable components in Scala, and use actors to make concurrent programming easy. Scala in Action

1131、单词 caveats 的匹配文本:

  1. Many of the caveats and “gotchas” you will face over time aren’t immediately obvious. CouchDB The Definitive Guide

  2. This recipe shows how to use this setting and explains the caveats that come with it. Cassandra High Performance Cookbook

  3. Within the framework of Release-to-Release Binary Compatibility in SOM (Forman, Conner, Danforth, and Raper, Proceedings of OOPSLA '95), Java programming language binaries are binary compatible under all relevant transformations that the authors identify (with some caveats with respect to the addition of instance variables) The Java Language Specification Java SE 7 Edition

  4. Pitfalls and false optimizations As in previous chapters, we will finish up with a discussion of obvious caveats. Oracle JRockit The Definitive Guide

  5. The API resulting from this refactoring is essentially identical to the state-testing method API in Item 57 and the same caveats apply: if an object is to be accessed concurrently without external synchronization or it is subject to externally induced state transitions, this refactoring is inappropriate, as the object’s state may change between the invocations of actionPermitted and action. Effective Java 2nd Edition

  6. Note that this method has two important caveats: first, it is intended to be used only once; second, it will probably be removed by version 0.8 Cassandra The Definitive Guide

  7. If we assume a table with 1 million records and four mappers, then each will process SQL statements to retrieve the data that each use the desired primary key column range as caveats. Hadoop Beginners Guide

  8. It’s not meant to supplant a complete understanding of the system, and as always, the normal caveatsapply when dealing with systems that store data or serve critical functions. Hadoop Operations

  9. And, finally, a multitude of tuning parameters can be applied, each of which have benefits and caveats. ActiveMQ in Action

  10. Reduced-power servers are attractive for large-scale clusters, but you must keep some caveats in mind. Web search for a planet the google cluster architecture

1132、单词 jcomponent 的匹配文本:

  1. To draw on a component, you define a class that extends JComponent and override the paintComponent method in that class. Core Java Volume I Fundamentals 9th Edition

  2. So, for virtually anything you place on your form, all you need to do is say (for an object j c of any JComponent-derived class): Thinking in Java 4th Edition

  3. One way to implement a cell renderer is to create a class that extends JComponent, like this: Click here to view code imageClick here to view code image. Core Java Volume II Advanced Features 9th Edition

  4. The ability to draw over a JComponent has been added. Java 7 New Features Cookbook

  5. Most of the recipes in this chapter extend the JComponent class and also containing a main() method. Java 7 Recipes A Problem-Solution Approach

1133、单词 builtin 的匹配文本:

  1. As a proof of concept, look no further than CouchDB’s builtin administrative interface. CouchDB The Definitive Guide

  2. Our partitioning function for this benchmark has builtin knowledge of the distribution of keys. MapReduce - Simplied Data Processing on Large Clusters

  3. Use one HDFS dir to store one “table”, associated with builtin serialization format. MapReduce and Parallel DBMSs Friends or Foes

  4. Log4j also has a number of builtin appenders such as the SyslogAppender used in this recipe. Cassandra High Performance Cookbook

  5. I rounded up this chapter and this part of the book by covering some of CouchDB’s builtin specialized views for retrieving all documents and some of the parameters that can be used to manipulate the resultset returned by these views. Beginning CouchDB

  6. The only builtin Writable array type in Hadoop, ArrayWritable, can only store one type of Writable, so it’s not a good fit for storing your tuple, which contains a variety of field types. Hadoop in Practice

  7. Their name is just an arbitrary number, based on the Java builtin random generator. HBase:The Definitive Guide

  8. Relational databases have some builtin capabilities to help ensure data integrity, such as primary keys (which ensure entity integrity) and foreign key constraints (which ensure referential integrity) Cassandra The Definitive Guide

  9. The shell fencing method has no builtin provision for a timeout. Hadoop Operations

  10. See Task Types for a description of the most important builtin task types.) The task declares properties (i.e., hostname, database, sql, etc.) in conventional Groovy idiom. Building and Testing with Gradle

1134、单词 ltw 的匹配文本:

  1. AspectJ supports another weaving mechanism called load-time weaving (LTW), in which it intercepts the underlying JVM class loader and provides weaving to the bytecode when it is being loaded by the class loader. Pro Spring 3

  2. OSGi environment for the chosen JPA implementations, such as the underlying mechanisms required to configure packages of classes used at runtime, and also LTW. Spring Dynamic Modules in Action

  3. AspectJ 5’s load-time weaving (LTW) support weaves aspects this way. Spring in Action 4th Edition

1135、单词 ngram 的匹配文本:

  1. Making a misspelling-proof search If you look back at the mappings, you will see that we have the title field defined as multi_field and one of the fields is analyzed with a defined ngram analyzer. Mastering ElasticSearch

  2. Create a class named NGram.java in your JAR file at whatever source package is appropriate. Hadoop RealWorld Solutions Cookbook

  3. On a technical level, David has solved challenging problems with Lucene and Solr including geospatial search, wildcard ngram query parsing, searching multiple multi-valued fields at coordinated positions, and part-of-speech search using Lucene payloads. Solr 3 Enterprise Search Server

  4. We’ll give special attention here to the snowball analyzers and shingle and ngram filters. Lucene in Action 2nd Edition

  5. In Solr, there are multiple ways to undo that: using a spellchecker component to try and correct the user's mistake, using the fuzzy query, or for example, using the ngram approach. Apache Solr 4 Cookbook

1136、单词 mlt 的匹配文本:

  1. The MLT capability in Solr can be used in the following three ways: Solr 3 Enterprise Search Server

  2. Next, the mlt.fl parameter specifies which fields we want to use with the more like this component. Solr 3.1 Cookbook

  3. The parameter mlt=true says that we want to add the more like this component to the result processing. Apache Solr 4 Cookbook

1137、单词 pseudodistributed 的匹配文本:

  1. The following table shows configuration files for configuring a Hadoop cluster in pseudodistributed mode: Hadoop Operations and Cluster Management Cookbook

  2. To run a Pipes job, we need to run Hadoop in pseudodistributed mode (where all the daemons run on the local machine), for which there are setup instructions in Appendix A. Hadoop:The Definitive Guide 3rd Edition

  3. pseudodistributed mode is simply a distributed mode that is run on a single host. HBase:The Definitive Guide

  4. Now that you have all the different configurations set up and know how to put data into each configuration, let’s look at how to develop and debug in local and pseudodistributed modes. Hadoop in Action

  5. Pseudodistributed mode means that you have several instances of HBase, but they’re all running on the same host. Cassandra The Definitive Guide

  6. As we only have a single host and one DataNode in the pseudodistributed mode, we change this value to 1 Hadoop Beginners Guide

  7. Figure 7-9 shows a sample page taken from a cluster running in pseudodistributed mode on a Linux desktop. Programming Pig

  8. To address this need, a single machine can be configured to run in pseudodistributed mode, where the behavior is identical to distributed mode, namely filesystem references default to the distributed filesystem and jobs are managed by the JobTracker service, but there is just a single machine. Programming Hive

1138、单词 rna 的匹配文本:

  1. Say you want to create a new sequence type for RNA strands, which are sequences of bases A (adenine), T (thymine), G (guanine), and U (uracil) Programming in Scala 2nd Edition

1139、单词 firehose 的匹配文本:

  1. In particular, we’ll offer the ability to filter over messages with an equivalent of follow (users), track (keywords), and location filters, in addition to a randomly selected subset of messages, similar to Twitter’s firehose and sample streams. Redis in Action

  2. The Firehose Strategy If you have some servers that are more powerful than others, you might want to let them handle proportionally more load than your less-powerful servers. MongoDB The Definitive Guide 2nd Edition

  3. Twitter client application that reads a subset of the Twitter firehose and writes. Storm Blueprints Patterns for Distributed Real-time Computation

1140、单词 prepended 的匹配文本:

  1. Execute the downloaded file, which is prepended by the path to it. Web Crawling and Data Mining with Apache Nutch

  2. He is also known as mrhaki, which is simply the initials of his name prepended by mr. Gradle Effective Implementation Guide

  3. Here, chroot is a base directory that is prepended to all path operations (this effectively namespaces all Kafka znodes to allow sharing with other applications on the same ZooKeeper cluster) Apache Kafka

  4. Since no member class can have the same name as any containing class, however, the use of the enclosing class name prepended to this is a perfectly general way to refer to any containing instance. Java in a Nutshell 5th Edition

  5. This file can optionally be prepended with the private key. admin-user-guide-trunk

  6. As with join, to avoid ambiguity, the field name will have the bag’s name and :: prepended to it. Programming Pig

  7. The body of each document from the docmaker will be truncated to this size, with the leftover being prepended to the next document. Lucene in Action 2nd Edition

  8. This option is not necessary if your key is prepended to your cert file. user-guide

  9. Note When a class resides within a Java package, it is no longer referenced by only the class name, but instead the package name is prepended to the class name, which is known as the fully qualified name. Java 7 Recipes A Problem-Solution Approach

  10. When specified, the schema name will be prepended to the table name when the persistence provider goes to the database to access the table. Pro JPA2

1141、单词 hcatalog 的匹配文本:

  1. Finally, you learn about HCatalog, and the way it can be used to advertise and access data. Professional Hadoop Solutions

  2. The Apache HCatalog project (http://incubator.apache.org/hcatalog/) solves this problem by providing a table metadata service, based on Hive’s metastore, so that Pig queries can reference schemas by name, rather than specifying them in full each time. Hadoop:The Definitive Guide 3rd Edition

  3. Apache HCatalog A relatively new entry, Apache HCatalog is a service that provides shared schema and data access abstraction services to applications with the ecosystem. Hadoop Operations

  4. Metadata in Hadoop Apache HCatalog provides a metadata and table management layer for Hadoop. Programming Pig

  5. HCatalog is a separate Apache project from Hive, and is part of the Apache Incubator. Programming Hive

1142、单词 suboptimal 的匹配文本:

  1. Even if your estimate for the value k is suboptimal, the clustering quality isn’t affected much by it. Mahout in Action

  2. This leads to fragmentation and suboptimal utilization, which is not viable for us, and so we did not explore this option any further. Omega - flexible, scalable schedulers for large compute clusters

  3. For example, suboptimal configuration on data replication properties can cause a large number of data block copies over the network, which will pose a negative effect on the performance of a cluster. Hadoop Operations and Cluster Management Cookbook

  4. It focuses on potential coding problems such as unused or suboptimal code, code size and complexity, and good coding practices. Jenkins The Definitive Guide

  5. Although splitting files on the file block boundaries works well in the majority of cases, sometimes such a split might be suboptimal. Professional Hadoop Solutions

  6. Region hot-spotting typically points to another problem, though—bad key design leading to suboptimalload distribution. HBase in Action

  7. Show that this algorithm is suboptimal, regardless of the choices for Algorithms A, B, and C. Data Structures and Algorithm Analysis in Java 3rd Edition

  8. This is to make sure that objects referenced near other objects in time appear near them in memory as well, evacuating them from suboptimal NUMA nodes. Oracle JRockit The Definitive Guide

  9. These use cases would have workloads that are challenging to scale because of very high write throughput, massive datasets, unpredictable growth, or other patterns that may be difficult or suboptimalin a sharded RDBMS environment. Apache Hadoop Goes Realtime at Facebook

  10. Some VMs are intended purely for development and are highly suboptimal in terms of performance. Java Performance Tuning 2nd Edition

1143、单词 mvcc 的匹配文本:

  1. Instead, they use row-level locking in conjunction with a technique for increasing concurrency known as multiversion concurrency control (MVCC) High Performance MySQL 3rd Edition

  2. Instead of locks, CouchDB uses Multi-Version Concurrency Control (MVCC) to manage concurrent access to the database. CouchDB The Definitive Guide

  3. The existing MVCC-like read-write consistency control (RWCC) provided sufficient isolation guarantees and the HLog (write ahead log) on HDFS provided sufficient durability. Apache Hadoop Goes Realtime at Facebook

  4. CouchDB is interesting in part for what it terms Multi-Version Concurrency Control (MVCC) Cassandra The Definitive Guide

  5. Many databases choose the multi-version concurrency control (MVCC) approach, which allows multiple users to see different versions of the data. The Definitive Guide to MongoDB

1144、单词 extractors 的匹配文本:

  1. You’ll see more examples of extractors and pattern matching throughout the book. Scala in Action

  2. Programs are written in a variant of SQL, with extensions to call out to custom extractors, filters, and processors that are written in C# FlumeJava - Easy, Efficient Data-Parallel Pipelines

  3. If you want to use pattern matching on one of your classes, but you do not want to open access to your classes the way case classes do, then you can use the extractors described in Chapter 26 Programming in Scala 2nd Edition

  4. If you want to match arbitrary patterns, Scala extractors are your friend. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine

  5. We can even introduce  as a pattern , which lets us** using custom extractors write: Functional Programming in Scala

  6. The following script demonstrates the extractors in pattern matching case statements: Programming Scala

  7. It turns out that they also get properties and extractors. Beginning Scala

1145、单词 reuses 的匹配文本:

  1. A high-fidelity simulator that replays historic workload traces from Google production clusters, and reusesmuch of the Google production scheduler’s code. Omega - flexible, scalable schedulers for large compute clusters

  2. As shown in the command-line output, Gradle inspects the available Ant targets, wraps them with Gradle tasks, reuses their description, and even keeps their dependencies intact. Gradle in Action

  3. HadoopDB[15] reuses most of Hive’s system, except, it uses traditional database instances in each of the nodes to store data instead of using a distributed file system. Hive A Petabyte Scale Data Warehouse Using Hadoop

  4. Hadoop starts only a single JVM per task slot and then reuses it for an unlimited number of tasks in the job. Hadoop MapReduce Cookbook

  5. The MapReduce framework reuses iterator value objects supplied to combine. Hadoop in Practice

  6. It is necessary to make a copy of the record with the highest temperature found so far, since the iterator reuses the instance for reasons of efficiency (and only the fields are updated) Hadoop:The Definitive Guide 3rd Edition

  7. The schema also reuses the same table to store various other details required to implement full Lucene support. HBase:The Definitive Guide

  8. If the same query is prepared twice, the database simply reuses the query strategy. Core Java Volume II Advanced Features 9th Edition

  9. It reuses familiar concepts from the relational database   world, such as tables, rows, columns, and schema, to ease learning. Hadoop in Action

  10. The cached thread pool you have created creates new threads if needed to execute the new tasks, and reuses the existing ones if they have finished the execution of the task they were running, which are now available. Java 7 Concurrency Cookbook

1146、单词 jlist 的匹配文本:

  1. Note If you want to show a permanently displayed list instead of a drop-down list, use the JListcomponent. Core Java Volume I Fundamentals 9th Edition

  2. While a JComboBox box drops down when you activate it, a JList occupies some fixed number of lines on a screen all the time and doesn’t change. Thinking in Java 4th Edition

  3. The JList component has many more features, and its design is similar to that of the tree and table components. Core Java Volume II Advanced Features 9th Edition

  4. In the constructor you’ll notice it takes a reference to a JListBox; this is where to display the words as the user is typing characters. Java 7 Recipes A Problem-Solution Approach

1147、单词 prepend 的匹配文本:

  1. For example, if the file is in the current directory, prepend it with ./ (necessary if. Web Crawling and Data Mining with Apache Nutch

  2. The simplest solution to achieve this is to prepend the arguments of the lambda expression with an additional argument for each of the captured variables, so the method generated to implement the former lambda expression will be something like this: Java 8 in Action Lambdas, Streams and Functional-style Programming

  3. You may wonder why you prepend the new element to the list head. RabbitMQ in Action

  4. The form has prependId set to false to ensure that the id of each element is preserved as mentioned in the form. Java EE 7 Essentials

  5. You prepend the command with the exclamation mark (!) and end it with a semicolon (;) Hadoop in Action

  6. I said earlier that to invoke an instance method you must prepend a reference to the object to be operated on. Java in a Nutshell 5th Edition

  7. By default, you have to prepend the destination name with either queue:// or topic:// ActiveMQ in Action

  8. You must reside within the same directory as the source file or prepend the name of the file with the path to where it is located. Java 7 Recipes A Problem-Solution Approach

  9. To facilitate this, we will prepend the query name with the name of the entity. Pro JPA2

  10. If the code is being run from a Ruby file, prepend Ruby’s p method to print the output to the screen: MongoDB in Action

1148、单词 odbc 的匹配文本:

  1. An Impala implementation makes use of some of the existing Hadoop infrastructure, namely the Hive metastore and Hive ODBC driver. Professional Hadoop Solutions

  2. HiveServer – The component that provides a thrift interface and a JDBC/ODBC server and provides a way of integrating Hive with other applications. Hive A Petabyte Scale Data Warehouse Using Hadoop

  3. What’s more, SQL is the lingua franca in business intelligence tools (ODBC is a common bridge, for example), so Hive is well placed to integrate with these products. Hadoop:The Definitive Guide 3rd Edition

  4. It was named to be reminiscent of ODBC, a standard database API pioneered by Microsoft and since incorporated into the SQL standard. Core Java Volume II Advanced Features 9th Edition

  5. However, the JDBC package does not provide concrete implementations of those APIs (except an ODBCdriver) Java Performance Tuning 2nd Edition

  6. When you do need access to API libraries for capabilities such as visualization and graphing, you can access Impala data from programs written in languages such as Java and C++ through the standard JDBC and ODBC protocols. Cloudera Impala

  7. Bundled with the Hive distribution is the CLI, a simple web interface called Hive web interface (HWI), and programmatic access through JDBC, ODBC, and a Thrift server (see Chapter 16) Programming Hive

  8. It was created as a Java-specific version of its more generic predecessor, the Object Database Connectivity (ODBC) specification, a standard for accessing any relational database from any language or platform. Pro JPA2

  9. Business Intelligence tools typically connect to databases using ODBC or JDBC, so databases that want to work with these tools must accept SQL queries through these interfaces. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads

  10. You have a legacy, proprietary database and want to give it an SQL/ODBC interface. Understanding MySQL Internals

1149、单词 initializations 的匹配文本:

  1. Any initializations that occur at the point of field definition are executed. Thinking in Java 4th Edition

  2. It’s instructive to trace the sequence of initializations that lead to the string 1/2 to be printed in the code above: Programming in Scala 2nd Edition

  3. For convenience, and to avoid the stutter endemic in some languages’ declaration syntaxes, in initializations the appropriate conversion operation (with default parameter values) is supplied implicitly by the compiler. Interpreting the Data Parallel Analysis with Sawzall

  4. The restrictions above are designed to catch, at compile time, circular or otherwise malformed initializations. The Java Language Specification Java SE 7 Edition

  5. This seems like a good idea in general; moreover, the Scheme interpreter needs some cumbersome initializations that we did not want to include in every event handler script. Core Java Volume II Advanced Features 9th Edition

  6. It would be possible to eliminate the unnecessary initializations by lazily initializing these fields (Item 71) the first time the isBabyBoomer method is invoked, but it is not recommended. Effective Java 2nd Edition

  7. Both the initialize and update expressions of a for loop can use a comma to separate multiple initializations and update expressions. Java in a Nutshell 5th Edition

  8. You can start several asynchronous operations in parallel, then perform your local initializations, and then request the results of the network operations: Java Network Programming 4th Edition

  9. The second component in the startup time of the VM is the time taken to manage the VM runtime initializations. Java Performance Tuning 2nd Edition

  10. The code evolved over time, gradually becoming more compact and readable as various initializationsinvolving THD variables were moved under the THD class. Understanding MySQL Internals

1150、单词 ebook 的匹配文本:

  1. Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub. Apache Flume Distributed Log Collection for Hadoop

  2. Buy the Book If you liked this eBook, perhaps you'd like to have a paper copy of the book. Programming Concurrency on the JVM

  3. The purchaser may place the eBook title on any of their personal computers for their own personal reading and reference. Pro Hadoop

  4. Did you know that Packt offers eBook versions of every book published, with. Storm Blueprints Patterns for Distributed Real-time Computation

  5. This book is available in both paper and PDF eBook form. Programming in Scala 2nd Edition

  6. For more information, reference our Special Bulk Sales–eBook Licensing web page at http://www.apress.com/info/bulksales. Beginning CouchDB

  7. Also, for ebook buyers, clicking on the box above the code extracts downloads the code for that extract for you. Functional Programming Patterns in Scala and Clojure

  8. Buy the Book If you liked this eBook, perhaps you’d like to have a paper copy of the book. SQL Antipatterns

  9. While on the project home page, look for a link to download a free O’Reilly ebook by Josh Long and Steve Mayzak called Getting Started with Roo [LongMay11] Spring Data Modern Data Access for Enterprise Java

  10. Even if you have an eBook copy that didn’t go through that process, there were numerous hands on the bits and bytes that you downloaded— hands that edited it, reviewed it, typeset it, and proofread it. Spring in Action 4th Edition

1151、单词 oauth 的匹配文本:

  1. OAuth is an authentication protocol that allows users to approve applications to act on their behalf, without sharing their password. Jenkins Continuous Integration Cookbook

  2. In addition, more recent trends such as mobile, social, and NoSQL are now commonplace in both corporate and noncorporate settings, and some of the recipes in the book treat topics such as GitHub, OAuth, MongoDB, and Neo4j as well. Spring in Practice

  3. Throughout his career, he has developed hands on experience integrating Spring Security with an array of security standards (that is, LDAP, SAML, CAS, OAuth, and so on) Spring Security 3.1

  4. There is also the OAuth integration, which lives on its own as an individual project. Pro Spring Security

  5. In order to connect to the Twitter API, we must first generate a set of OAuth. Storm Blueprints Patterns for Distributed Real-time Computation

  6. Recent developments in the trunk version of CouchDB include support for cookie authentication and OAuth authentication, which should allow for a much more streamlined security solution than the basic HTTP authentication option. Beginning CouchDB

  7. We cover the timeline reading adapter shortly, but first we discuss how you should provide the configuration necessary for creating a Twitter template instance that can pass OAuth credentials. Spring Integration in Action

  8. Problem In this recipe, we’ll implement a data model and interaction to support an OAuth v1.0a API. Redis Cookbook

1152、单词 fetcher 的匹配文本:

  1. FetcherJob The job of the fetcher is to fetch the URLs which are generated by the GeneratorJob. Web Crawling and Data Mining with Apache Nutch

  2. For example, the content part is populated by a tool called Fetcher, which downloads raw data from URLs on the fetchlist (2) Hadoop:The Definitive Guide 3rd Edition

  3. We added a time-shutoff parameter that terminates the fetcher after a fixed amount of time as an engineering fix to this problem. Hadoop in Action

  4. We’ll first look at how this fetcher works and then we’ll peel back the covers to reveal its implementation. MongoDB in Action

1153、单词 rados 的匹配文本:

  1. Rados Block Device (RBD) - This backend stores images inside of a Ceph storage cluster using Ceph's RBD interface. bk-compute-adminguide-grizzly

  2. Rados block device (RBD) Stores images inside of a Ceph storage cluster using Ceph's RBD interface. bk-admin-guide-cloud-latest

  3. To maintain system availability and ensure data safety in a scalable fashion, RADOS manages its own replication of data using a variant of primary-copy replication [2], while taking steps to minimize the impact on performance. Ceph A Scalable, High-Performance Distributed File System

  4. We present the design and implementation of RADOS, a reliable object storage service that can scales to many thousands of devices by leveraging the intelligence present in individual storage nodes. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.

1154、单词 composable 的匹配文本:

  1. To provide full flexibility, each composable trait should be able to call a super method, even in that super method doesn’t do anything. Scala in Depth

  2. Monads are a great way to raise the abstraction level that is composable. Scala in Action

  3. We have developed a Java library, based on a small set of composable primitives, that is both expressive and convenient. FlumeJava - Easy, Efficient Data-Parallel Pipelines

  4. The calculations that need to be run must be composable. Professional Hadoop Solutions

  5. An important property of averages is that they are not composable—that is, if I take two groups of orders, I can’t combine their averages alone. NoSQL Distilled

  6. A pure function is modular and composable because itcomposable separates the logic of the computation itself from "what to do with the result" and. Functional Programming in Scala

  7. Mathematical functions are side-effect-free, and they are composable from other functions. Programming Scala

  8. However, they tend to be at the wrong level of granularity for creating sophisticated, highly composablecode that can be shared among different developers. Hadoop:The Definitive Guide 3rd Edition

  9. This forces you to architect the pre- and postprocessing steps in a modular and composable manner. Hadoop in Action

  10. In Chapter 6, you learn about improvements in atomic counters, concurrent hash maps, parallel array operations, and composable futures. Java SE 8 for the Really Impatient

1155、单词 memtables 的匹配文本:

  1. Writes are first written to commit logs and memtables, and are only considered good when the write to commit log and memtable was successful. NoSQL Distilled

  2. It does this by isolating the disk traffic for Commit Log activity from the traffic used for reads as well as flush Memtables and compact SSTables. Cassandra High Performance Cookbook

  3. Memtables, SSTables, and Commit Logs When you perform a write operation, it’s immediately written to the commit log. Cassandra The Definitive Guide

  4. The manner in which Bigtable uses memtables and SSTables to store updates to tablets is analogous to the way that the Log-Structured Merge Tree [26] stores updates to index data. Bigtable - A Distributed Storage System for Structured Data

1156、单词 jtree 的匹配文本:

  1. On the other hand, the JList class is consistent with the JTree and JTable classes where this generality is useful. Core Java Volume II Advanced Features 9th Edition

1157、单词 syncing 的匹配文本:

  1. Writing to remote memory (a replica’s acknowledgment) is faster than writing to the local disk (syncing on commit) High Performance MySQL 3rd Edition

  2. Table 4.1 shows the appendfsync options and how they affect file-write syncing to disk. Redis in Action

  3. The candidate will continue syncing and once it has synced operation 124, it will call for an election again (if no one else has become primary in that time) MongoDB The Definitive Guide 2nd Edition

  4. HDFS-200, and implemented syncFs() to make the process of syncing changes to a file more reliable. HBase:The Definitive Guide

  5. Once it connects, the follower and the leader sync their state, and only after syncing can the follower start processing new requests. ZooKeeper Distributed Process Coordination

  6. Journaling works by syncing a write buffer to disk every 100 ms. MongoDB in Action

1158、单词 testability 的匹配文本:

  1. Even though you took it to the extreme and provided configurable properties for your tasks, code maintainability and testability fell by the wayside. Gradle in Action

  2. A secondary advantage of having a compiled source code is that you can run a number of statistic code review tools over the code base and obtain testability metrics. Jenkins Continuous Integration Cookbook

  3. The testability property of your design determines how easy it is to write tests. Scala in Action

  4. Improved testability: When you design your classes for DI, you make it possible to replace dependencies easily. Pro Spring 3

  5. Starting with the good habits of structuring your code syntactically and semantically for testability, writing the right tests at the right times, running them regularly, and monitoring their results will keep you in that lower-right sweet spot in the matrix. Testable JavaScript

  6. IoC promotes better decoupling and testability, as the object only knows about the abstractions of its dependencies, not specific concrete implementers of them. Programming Scala

  7. Ideally, you should reach out to developers and recommend that they add either the name attribute or title for better testability and accessibility. Selenium Testing Tools Cookbook

  8. Most presentations of constructions and design patterns later in this book include descriptions of how they resolve applicable forces discussed here (as well as others that are less directly tied to concurrency, such as accuracy, testability, and so on) Concurrent Programming in Java Design Principles and Pattern

  9. Integration and Testability Multitier applications hosted on an application server have become the de facto standard for application architectures. Pro JPA2

  10. This is really nice from a usability point of view, but from a testability point it is a nightmare! Selenium 2 Testing Tools Beginner's Guide

1159、单词 sdo 的匹配文本:

  1. If you wanted additionally to prevent code from accessing classes in the sdo package, you would edit the java.security file so that it defined a property like this: Java Security 2nd Edition

1160、单词 usability 的匹配文本:

  1. Having the dynamic schema built on top of the static schema, rather than the other way around, allows most applications to enjoy the performance, usability, Megastore - Providing Scalable, Highly Available Storage for Interactive Services

  2. We chose a different model for reasons of usability and performance. Pregel  -  A System for Large-Scale Graph Processing

  3. This data further underscores the usability of the FlumeJava API. FlumeJava - Easy, Efficient Data-Parallel Pipelines

  4. We could keep tinkering with it, but at this point let's try  the library to construct tests and see if weusing notice any deficiencies, either in what it can express or its general usability. Functional Programming in Scala

  5. By focusing on structured data , Hive can add certain optimization and usability features that MapReduce, being more general, doesn’t have. Hadoop in Action

  6. Like Chapter 5, this chapter focuses on usability, robustness, and flexibility. Effective Java 2nd Edition

  7. The JavaBeans conventions are widely used and wellunderstood, however, and you can improve the usability and reusabilty of your code by following the relevant ones. Java in a Nutshell 5th Edition

  8. Lucli lets you scroll through a history of commands and reexecute a previously entered command to enhance its usability. Lucene in Action 2nd Edition

  9. I believe it’s imperative to have server-side validation, but for better usability, client-side validation can add that extra polish your application needs. Java 7 Recipes A Problem-Solution Approach

  10. In the case of session beans and message-driven beans, solutions to usability issues were reached by simply removing some of the more onerous implementation requirements and letting components look more like plain Java objects. Pro JPA2

1161、单词 evaluator 的匹配文本:

  1. You could try using this as the UserSimilarity in the evaluator code from before. Mahout in Action

  2. Somewhat akin to FlumeJava’s executor, the Cascading evaluator breaks the dataflow graph into pieces, and, if possible, runs those in parallel, using the underlying Hadoop job scheduler. FlumeJava - Easy, Efficient Data-Parallel Pipelines

  3. This method (hasPermission) uses the permission evaluator we defined in Listing 7-22 to decide if the authentication has the required permissions on the object being passed. Pro Spring Security

  4. Hence, there’s a mutual dependency between the Model and the Evaluator. Programming in Scala 2nd Edition

  5. It is a compile-time error if the condition does not provide enough information to construct a reasonable evaluator for the quantifier. Interpreting the Data Parallel Analysis with Sawzall

  6. The algorithm is also configured with a cost evaluator (another static member), which simply identifies the property on a relationship representing that relationship’s weight or cost. Graph Databases

  7. Also implement , for anIO runAsync asynchronous evaluator for , and , the synchronous evaluator:Future run. Functional Programming in Scala

  8. An evaluator must implement five methods, described in turn here (the flow is illustrated in Figure 12-4): init() Hadoop:The Definitive Guide 3rd Edition

  9. It is possible to build rules that are not based on numeric attributes; for string attributes there is a string matching expression instead of a numeric evaluator. Oracle JRockit The Definitive Guide

  10. In the init method, the object inspectors for the result type are set, after determining what mode the evaluator is in. Programming Hive

1162、单词 usb 的匹配文本:

  1. For the novice Linux user who just wants to play around a bit, the Live CD and a USB stick for permanent storage can provide a simple and quick way to boot up a test environment. Pro Hadoop

  2. Volumes may be attached to a single instance at a time, but may be detached or reattached to a different instance while retaining all data, much like a USB drive. bk-compute-adminguide-grizzly

  3. In this section, we will cover steps of creating a kickstart file and a USB boot media with the operating system image. Hadoop Operations and Cluster Management Cookbook

  4. It shouts at you through mobile devices, radiates information as you walk past big screens, and fires at you with USB sponge missile launchers. Jenkins Continuous Integration Cookbook

  5. It comes in several versions and two formats (CD or USB stick image) Deploying OpenStack

  6. This includes devices such as Ambient Orbs, Lava Lamps, traffic lights, or other more exotic USB-controlled devices. Jenkins The Definitive Guide

  7. The JRockit VE kernel with a small built-in E1000 network driver can boot from a USB stick and run Java applications on any x86 machine out of the box (It is doubtful, however, why this demo, except for the fact that it is really cool, would illustrate any benefits of JRockit VE in cloud computing, but we'll get to that) Oracle JRockit The Definitive Guide

  8. These are purely abstractions in the computer’s memory and do not represent anything physical, like a USB port. Java Network Programming 4th Edition

  9. Manage volumes A volume is a detachable block storage device, similar to a USB hard drive. admin-user-guide-trunk

  10. Once you have dumped the database, you can archive and store the folder on to any online or offline media, such as CD, USB Drive, Tape, or S3 format. The Definitive Guide to MongoDB

1163、单词 manifoldcf 的匹配文本:

  1. Mahout, ManifoldCF, Lucene, Solr, Nutch, Droids—all of these will roll off the tongue by the time you’re done surveying Lucene’s rich and vibrant community. Tika in Action

  2. Maintaining document security with ManifoldCF A frequent requirement for search engines is to maintain document level security. Solr 3 Enterprise Search Server

  3. Sending data and running queries by sending JSON objects over HTTP makes it easy for someone to extend anything, from a syslog daemon like rsyslog to a connecting framework like ManifoldCF, to interact with Elasticsearch. Elasticsearch in Action MEAP V07 cHAPTER 1

1164、单词 setuptools 的匹配文本:

  1. Setuptools for Python 2.7 for Windows can be download from here: bk-compute-adminguide-grizzly

  2. But you’ll download and install a simple helper package called setuptools, which will help you download and install the Redis client libraries.1 This last step of installing the Redis client libraries for Python is shown next. Redis in Action

  3. If you got an installation error, the best next step is to attempt to upgrade setuptools and then upgrade CouchApp by running the following commands: CouchDB The Definitive Guide

  4. When the download has completed and you are returned to the shell, issue the following command to install setuptools: Beginning CouchDB

  5. As when installing the PHP driver, there are two methods you can use to install PyMongo: an automated approach that relies on setuptools or a manual approach where you download the source code for the project. The Definitive Guide to MongoDB

  6. Many Linux distributions provide packages to make setuptools easy to install. user-guide

1165、单词 functors 的匹配文本:

  1. The map method is associated with functors, and the flatMap method is associated with monads. Scala in Depth

  2. All monads are functors, but not all functors are monads. Functional Programming in Scala

  3. Assume thatA andB are two categories and thatBA is the collection of all functors from A andB. Steps in Scala An Introduction to Object-Functional Programming

1166、单词 hlog 的匹配文本:

  1. When passing the --dump option to the HLog class, it internally invokes the HLogPrettyPrinter class to dump the WAL file. HBase Administration Cookbook

  2. When a write is made, by default, it goes into two places: the write-ahead log (WAL), also referred to as the HLog, and the MemStore (figure 2.1) HBase in Action

  3. The first set of files are the write-ahead log files handled by the HLog instances, created in a directory called .logs underneath the HBase root directory. HBase:The Definitive Guide

  4. The existing MVCC-like read-write consistency control (RWCC) provided sufficient isolation guarantees and the HLog (write ahead log) on HDFS provided sufficient durability. Apache Hadoop Goes Realtime at Facebook

1167、单词 versioned 的匹配文本:

  1. Documents in CouchDB are versioned, much like they would be in a regular version control system such as Subversion. CouchDB The Definitive Guide

  2. Because the Java language doesn’t provide or propose any tooling for managing versioneddependencies, teams will have to come up with their own strategies to store and retrieve them. Gradle in Action

  3. Dependency configuration Java has no real support for working with versioned libraries as dependencies. Gradle Effective Implementation Guide

  4. As a consequence, Spanner has evolved from a Bigtable-like versioned key-value store into a temporal multi-version database. Spanner - Google’s Globally-Distributed Database

  5. To make things more complicated: Freshness requirements Heavily-versioned documents (e.g. Storage Architecture and Challenges

  6. Normally Gradle caches a module once and never reloads it from its source repository again, since versioned modules are supposed to be immutable. Gradle Beyond The Basics

  7. Versioning support The data types are capable of being versioned to support updates to the client API. Cassandra The Definitive Guide

  8. VersionedWritable: This is a base implementation to allow writable classes to track versions over time. Hadoop Beginners Guide

  9. Hightide is an optimized, versioned distribution of the Jetty open source web container. ActiveMQ in Action

  10. To make the management of versioned data less onerous, we support two per-column-family settings that tell Bigtable to garbage-collect cell versions automatically. Bigtable - A Distributed Storage System for Structured Data

1168、单词 findbugs 的匹配文本:

  1. FindBugs findbugs XML or HTML Discovers potential bugs, performance issues, and bad coding practices. Gradle in Action

  2. The FindBugs Eclipse plugin The automatic install location for the Eclipse plugin is http://findbugs.cs.umd.edu/eclipse. Jenkins Continuous Integration Cookbook

  3. The plugin will add the tasks findbugsMain and findbugsTest to analyze the source code from the main and test source sets. Gradle Effective Implementation Guide

  4. To make the build more portable, we are storing the FindBugs installation in our project directory structure, in the tools/findbugs directory: Jenkins The Definitive Guide

  5. The default Sonar Way profile does include Java standards rules but for a more comprehensive inspection, Sonar Way with Findbugs is recommended. Sonar Code Quality Testing Essentials

  6. Getting ready Before stating this recipe, you should download FindBugs from the project's web page (http://findbugs.sourceforge.net/) Java 7 Concurrency Cookbook

  7. Uncompress into a folder in your computer; then copy the contents of the ./lib/ folder into your project’s /dep/findbugs folder (create the /dep/findbugs folder if necessary) Java 7 Recipes A Problem-Solution Approach

1169、单词 zkybase 的匹配文本:

  1. This chapter shows how Willie is using Spring to implement several features in an open source configuration management database (CMDB) called Zkybase1 (http:// zkybase.org/) Spring in Practice

1170、单词 downloadable 的匹配文本:

  1. A README.txt file has more details about the downloadable code. Pro Hadoop

  2. A minimal amount of additional software is required, and most of the tools for Java programming are available for free and downloadable via the WWW. Java Network Programming and Distributed Computing

  3. The essential part of that CD, the Thinking in C multimedia seminar (created for MindView by Chuck Allison), is now available as a downloadable Flash presentation. Thinking in Java 4th Edition

  4. The downloadable code example contains all the relevant code if you want to dig deeper. Gradle in Action

  5. For example, follow the link http://mirror.quintex.com/apache/hbase/ stable/ and you can see the downloadable files as shown in the following screenshot: Hadoop Operations and Cluster Management Cookbook

  6. To help, the modified configuration files mentioned in this recipe will be downloadable from the Packt website. Jenkins Continuous Integration Cookbook

  7. We can run the job again, and this time, we see the artifacts of our projects as downloadable links on the job page. Gradle Effective Implementation Guide

  8. Since a Maven repository is nothing more than a website containing downloadable POM files and modules in a predictable directory structure, declaring a Maven repository in Gradle begins with telling Gradle the URL of the repo. Gradle Beyond The Basics

  9. The downloadable files contain instructions on how to use them. Oracle JRockit The Definitive Guide

  10. There you’ll see a grid with all the latest downloadable MongoDB binaries. MongoDB in Action

1171、单词 bashrc 的匹配文本:

  1. On your Mac system, you can run the following command or add it to ~/.bashrc. Web Crawling and Data Mining with Apache Nutch

  2. Add the following two lines to your .bashrc or .bash_profile: Pro Hadoop

  3. Note These commands need to be run as root only if the credentials used to interact with nova-api have been put under /root/.bashrc. bk-compute-adminguide-grizzly

  4. For example, the .bashrc file under a user's home directory is the run configuration file for bash shell. Hadoop Operations and Cluster Management Cookbook

  5. For example, you can do this by defining the JAVA_HOME and PATH variables in the .bashrc file, as shown here: Jenkins The Definitive Guide

  6. In Linux, edit the .bashrc or .bash_profile configuration files, and append the following lines and substitute the path highlighted in the following snippet with yours: Sonar Code Quality Testing Essentials

  7. You must run these commands as root only if the credentials used to interact with nova-api are in /root/.bashrc. bk-admin-guide-cloud-latest

  8. Mac OS X systems don’t have the /etc/profile.d directory and they are typically single-user systems, so it’s best to put the environment variable definitions in your $HOME/.bashrc. Programming Hive

1172、单词 checkboxes 的匹配文本:

  1. It also saves you the trouble of error checking.) In this section, you will learn how to program checkboxes, radio buttons, lists of choices, and sliders. Core Java Volume I Fundamentals 9th Edition

  2. It includes handling various HTML form elements, (checkboxes, radio buttons, file uploads, downloads, and so on), JSON data, and XML. Performance Testing With JMeter 2.9

  3. It’s in the same class as MySQL Workbench, but both tools have some checkboxes in their feature matrices that the other doesn’t have. High Performance MySQL 3rd Edition

  4. Click on the Extensions panel, scroll to the section Language and Framework Tooling, and tick the checkboxes next to the extensions named Gradle Support and Groovy-Eclipse, as shown in figure 10.9 Gradle in Action

  5. This is defined in the For previous build result set of checkboxes. Jenkins Continuous Integration Cookbook

  6. Installing all that stuff will take a long time so if you just want the adb tool, uncheck all the other checkboxes and then click Install. Testable JavaScript

  7. They should be listed with a black font, and the checkboxes next to them should be checked, as seen in Figure 14-5 Programming Scala

  8. Let's create a test which checks that specified checkboxes are selected when page is displayed, as follows: Selenium Testing Tools Cookbook

  9. An HTML form When the user clicks the Submit button, the text in the text fields and the settings of the checkboxes and radio buttons are sent back to the web server. Core Java Volume II Advanced Features 9th Edition

  10. For instance, it doesn’t matter if it’s a set of checkboxes, a pop-up list, or a text field. Java Network Programming 4th Edition

1173、单词 clob 的匹配文本:

  1. However, make sure that the problem is caused by the design of the DOM (e.g., a single domain object was found containing a large number of long text fields like CLOB or TEXT, which impact the performance of data retrieval) Pro Spring 3

  2. For example, MySQL’s direct mode cannot handle large objects, such as CLOB or BLOB columns, because Sqoop needs to use a JDBC-specific API to load these columns into HDFS.) For databases that provide such tools, Sqoop can use these to great effect. Hadoop:The Definitive Guide 3rd Edition

  3. To read a LOB, execute a SELECT statement and call the getBlob or getClob method on the ResultSet. Core Java Volume II Advanced Features 9th Edition

  4. Because the size of the Strings that need to be stored is unlimited, it is best to use a character large object (CLOB) data type to store the data. Java 7 Recipes A Problem-Solution Approach

  5. As their names imply, a CLOB column holds a large character sequence, and a BLOB column can store a large byte sequence. Pro JPA2

1174、单词 akkaoogle 的匹配文本:

  1. To understand how the individual pieces of Akka fit together, you’re going to build a large real-time product search application using Akka called Akkaoogle. Scala in Action

1175、单词 sys 的匹配文本:

  1. The benchmark was the standard SysBench read-only workload, with all data in InnoDB, fully in-memory and CPU-bound. High Performance MySQL 3rd Edition

  2. Keep that in mind if you are cutting and pasting this code: #!/usr/bin/python import sys from datetime import datetime, timedelta. Hadoop RealWorld Solutions Cookbook

  3. Puppet (http://www.puppetlabs.com/puppet) is a reaction to these gaps in the tools available to SysAdmins, Operators and Developers. Pro Puppet

  4. However, if you are interested only in the existence of a file or directory, the exists() method on FileSystem is more convenient: Hadoop:The Definitive Guide 3rd Edition

  5. The supplied ChecksumFileSys tem class is loaded by the client and uses local disk paths to store all the data. HBase:The Definitive Guide

  6. In this code, a new JsonWriter instance is created and configured to write to Sys tem.out. Java EE 7 Essentials

  7. The FileSystem object, zipFileSys, was created in the try-with-resources block, so the resource will automatically be closed, but if you do not wish to use the nested try-with-resources block you must use the FileSystem class' close method to close the resource manually. Java 7 New Features Cookbook

  8. Sun originally planned to deprecate PrintStream in favor of PrintWriter but backed off when it realized this step would invalidate too much existing code, especially code that depended on Sys tem.out. Java Network Programming 4th Edition

  9. For example, if monitoring operating system statistics suggests high sys CPU utilization, you should profile the application to determine what methods are consuming the highest sys CPU cycles. Java Performance

  10. However, there is one external file it will absolutely not run without: errmsg.sys. Understanding MySQL Internals

1176、单词 numa 的匹配文本:

  1. For example, one implementation may be suitable for a small shared-memory machine, another for a large NUMA multi-processor, and yet another for an even larger collection of networked machines. MapReduce - Simplied Data Processing on Large Clusters

  2. MongoDB will warn you about a variety of issues: that you’re running on a 32-bit machine (which MongoDB is not designed for), that you have NUMA enabled (which can slow your application to a crawl), or that your system does not allow enough open file descriptors (MongoDB uses a lot of file descriptors) MongoDB The Definitive Guide 2nd Edition

  3. Typically, in a NUMA architecture, the address space is divided between processors. Oracle JRockit The Definitive Guide

  4. If the application is deployed on a NUMA (Non-Uniform Memory Architecture) system, an additional HotSpot VM command line option that can be used with the throughput garbage collector is. Java Performance

  5. In the solution to this recipe, two values are accepted as input and they are referenced by their id attributes as numa and numb. Java 7 Recipes A Problem-Solution Approach

1177、单词 discriminator 的匹配文本:

  1. For example, Roo doesn’t have a command to let you configure the discriminator for the SINGLE_TABLE model, so you’ll just have to edit the classes and add the proper annotations yourself. Spring Roo in Action

  2. Uses one table for all classes and distinguishes between instance types by using a discriminator column. Java Performance

  3. The name element of this annotation specifies the name of the column that should be used as the discriminator column, and if not specified will be defaulted to a column named “DTYPE” Pro JPA2

1178、单词 denoting 的匹配文本:

  1. One of rows and columns (but not both) may be zero, denoting an arbitrary number of components per row or column. Core Java Volume I Fundamentals 9th Edition

  2. The revision number is the md5 hash of the transport representation of a document with an N- prefix denoting the number of times a document got updated. CouchDB The Definitive Guide

  3. Now we need to output each vertex's current value denoting the minimum number of hops from the source vertex. Hadoop RealWorld Solutions Cookbook

  4. A compile-time constant expression is an expression denoting a value of primitive type or a String that does not complete abruptly and is composed using only the following: The Java Language Specification Java SE 7 Edition

  5. All nodes other than the starting node start with a distance of infinity, denoting. Hadoop in Practice

  6. As can be seen from the previous example, the output is sorted in the form of an inheritance tree, with the stars denoting the depth in the tree. Oracle JRockit The Definitive Guide

  7. The method add() adds an object to the set, and the method contains() returns a Boolean true/false value denoting whether an object is in the set or not. Hadoop in Action

  8. Without creating and denoting the proper keystore and truststore, you can expect to see the following exceptions: ActiveMQ in Action

  9. Alternative supports a select method that returns an index denoting which of them can (and then must) be chosen. Concurrent Programming in Java Design Principles and Pattern

  10. You will first add a JLabel component that represents a read-only label denoting the first name beside the input field. Java 7 Recipes A Problem-Solution Approach

1179、单词 tokenize 的匹配文本:

  1. The following listing shows a custom Lucene Analyzer that can tokenize a document using the StandardTokenizer, a somewhat error-resilient tokenizer implementation in Lucene. Mahout in Action

  2. The usual solution is to read in a line of text, tokenize it, and then use the various parse methods of Integer, Double, etc., to parse the data: Thinking in Java 4th Edition

  3. As part of listing 7.1, we include a list of stop words (fetched from http://www.textfixer.com/resources/), as well as functions to both tokenize and index a document, taking into consideration the stop words that we want to remove. Redis in Action

  4. The pipeline also has two functions — a tokenize and a count function (which is an aggregator), and the workflow has a GroupBy pipe assembly. Professional Hadoop Solutions

  5. The call to strip() method removes any leading/trailing whitespace, and then we tokenize it into an array of named variables. Hadoop RealWorld Solutions Cookbook

  6. A better approach would be to tokenize each line and produce an intermediary file containing a word per line. Hadoop in Practice

  7. You can even use this class to tokenize words that are delimited by characters other than spaces: Java in a Nutshell 5th Edition

  8. In line 3, we have to cast the value to a character array in order to tokenize it with the built-in TOKENIZEfunction. Cassandra The Definitive Guide

  9. SimpleAnalyzer left in what may be considered irrelevant (stop) words, but it did lowercase and tokenizeat nonalphabetic character boundaries. Lucene in Action 2nd Edition

  10. Now, we will use the TRANSFORM feature and two Python scripts, one to tokenize lines of text into words, and the second to accept a stream of word occurrences and an intermediate count of the words (mostly the number “1”) and then sum up the counts for each word. Programming Hive

1180、单词 replicator 的匹配文本:

  1. When Solr runs in a replication mode, the index replicator is responsible for distributing indexes across multiple slaves. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr

  2. Replicator An interface to the replication system that enables you to initiate replication between local and remote databases. Getting Started with CouchDB

  3. Another option is to use Continuent’s Tungsten Replicator, which we’ll discuss later in this chapter. High Performance MySQL 3rd Edition

  4. Replicating images across multiple data centers The image service comes with a tool called glance-replicator that can be used to populate a new glance server using the images stored in an existing glance server. bk-compute-adminguide-grizzly

  5. Now click “Replicator” in the sidebar and choose hello-world as the source and hello-replication as the target. CouchDB The Definitive Guide

  6. For each local partition, the replicator compares it against the replicated copies in the other zones to see if there are any differences. bk-admin-guide-cloud-latest

  7. This is useful when you have large databases and are using the Futon Replicator to replicate these databases between instances or if you are compacting a large database. Beginning CouchDB

  8. Finally, Lounge includes a replicator which keeps design documents synchronized and can replicate documents for redundancy. Scaling CouchDB

1181、单词 jpeg 的匹配文本:

  1. If the user should choose a JPEG image file, the extension can be either .jpg or .jpeg. Core Java Volume I Fundamentals 9th Edition

  2. We’re using the -H option to tell CouchDB that we’re uploading a JPEG file. CouchDB The Definitive Guide

  3. What follows is a discussion of the growing complexity of the internet in terms of the types of information available (PDF files, Word documents, JPEG images, QuickTime files), and in terms of the number of languages and encoding schemes that this information is provided in. Tika in Action

  4. The response is the actual file attachment (in this example, a JPEG photo) Beginning CouchDB

  5. It is recommended that you enable compression unless you have a reason not to do so—for example, when using already compressed content, such as JPEG images. HBase:The Definitive Guide

  6. It was possible to read GIF and JPEG images, but there was no official support for writing images at all. Core Java Volume II Advanced Features 9th Edition

  7. It could well be pointing to a GIF or JPEG image, an MP3 sound file, or something else entirely. Java Network Programming 4th Edition

  8. Among other things, it has its own Content-Type header indicating that it’s a JPEG image. Spring in Action 4th Edition

1182、单词 scaladoc 的匹配文本:

  1. Because the collections library is always improving, the best source for learning these methods is the scaladoc documentation for the current release. Scala in Depth

  2. Creating documentation with the Scala plugin The Scala plugin also adds a scaladoc task to our build. Gradle Effective Implementation Guide

  3. Predef is interesting, and you can learn a lot about Scala by looking at the scaladoc or source of the scala.Predef object. Scala in Action

  4. For more information, you can also consult the library’s Scaladoc documentation, which is available in the distribution and online at http://www.scala-lang.org. Programming in Scala 2nd Edition

  5. This documentation was generated using the scaladoc tool, analogous to Java’s javadoc tool. Programming Scala

  6. You will also learn how to browse the Scaladoc documentation at a beginner’s level. Scala for the Impatient

1183、单词 memleak 的匹配文本:

  1. The Memleak tool, which is part of the JRockit Mission Control suit is ideal for this kind of analysis. Oracle JRockit The Definitive Guide

1184、单词 booleans 的匹配文本:

  1. For booleans, the bitwise operators have the same effect as the logical operators except that they do not short circuit. Thinking in Java 4th Edition

  2. The Boolean class now includes the static methods logicalAnd, logicalOr, and logicalXor, to apply the and, or, and xor operations between two booleans. Java 8 in Action Lambdas, Streams and Functional-style Programming

  3. You can choose from several different parameter types, such as Strings, Booleans, and drop-down lists. Jenkins The Definitive Guide

  4. A BitSet saves space compared to an array of booleans since the. Java Threads 3rd Edition

  5. The values stored in the document can be strings, numbers, dates, booleans, lists, maps, or other data types. Beginning CouchDB

  6. The term filter is used to filter by exact values, be they numbers, dates booleans, Elasticsearch The Definitive Guide

  7. Avro also supports primitive types such as integers, floats, and booleans as well as other structured types such as arrays and enums. Hadoop Beginners Guide

  8. Any data type manipulation other than with ints or booleans produced highly varying and misleading times. Java Performance Tuning 2nd Edition

  9. You’ll notice the call to super() where you will pass in Booleans to the super class to set the JInternalFrame object to be resizable, closable, maximizable, and iconifiable. Java 7 Recipes A Problem-Solution Approach

  10. Literals There are a number of different literal types that can be used in JP QL, including strings, numerics, booleans, enums, entity types, and temporal types. Pro JPA2

1185、单词 deserializing 的匹配文本:

  1. The core concept is that of defining a type in a text file and having a tool generate per-language APIs for accessing the data structure and for serializing and deserializing the data structure. Pro Hadoop

  2. For this reason, a SUID is added as a field, to enable a deserializing ObjectInputStream to check for a match. Java Network Programming and Distributed Computing

  3. Additionally, leaf-level indexes are structured in a way to allow a binary search on the key without deserializing. Professional Hadoop Solutions

  4. This interface permits implementors to compare records read from a stream without deserializing them into objects, thereby avoiding any overhead of object creation. Hadoop:The Definitive Guide 3rd Edition

  5. It does deserializing to allow multiple object references to be recovered. Core Java Volume II Advanced Features 9th Edition

  6. Encoding an object as a byte stream is known as serializing the object; the reverse process is known as deserializing it. Effective Java 2nd Edition

  7. These byte-stream classes are used for serializing and deserializing the internal state of objects for storage or interprocess communication. Java in a Nutshell 5th Edition

  8. Deserializing Booleans would have required special handling to return the canonical Boolean. Java Performance Tuning 2nd Edition

  9. Serializing and deserializing data to pass it in and out of the pipe is relatively inefficient. Programming Hive

  10. This is in addition to the already robust library for handling input and output streams, and serializing (and deserializing) object information. Java 7 Recipes A Problem-Solution Approach

1186、单词 encapsulating 的匹配文本:

  1. With the basic Checkstyle definitions in place, you can apply the encapsulating script plugin to all subprojects of your multiproject build, as shown in the next listing. Gradle in Action

  2. It’s likely that you may want to apply this manipulation to a date in several points of your code, and for this reason we suggest encapsulating its logic in a proper class as we did here. Java 8 in Action Lambdas, Streams and Functional-style Programming

  3. Listing 9-10 (code file: class TableManager) shows the class encapsulating HTablePool (TableManager), which additionally provides all configuration information (table names, family names, and so on) Professional Hadoop Solutions

  4. At the end of this stage the physical plan looks like a DAG of tasks with each task encapsulating a part of the plan. Hive A Petabyte Scale Data Warehouse Using Hadoop

  5. After confirming that the job has completed, we call the RunningJob’s getCounters() method, which returns a Counters object, encapsulating all the counters for a job. Hadoop:The Definitive Guide 3rd Edition

  6. The Java platform supports a number of permission classes, each encapsulating the details of a particular permission. Core Java Volume II Advanced Features 9th Edition

  7. In effect, we are applying the advice of Item 13 by encapsulating the lock object within the object it synchronizes. Effective Java 2nd Edition

  8. Encapsulating the complexity makes it easier for end users to construct complex queries from reusable parts. Programming Hive

  9. Optimizing for extensibility entails removing hard-wired decisions and instead allowing them to vary, for example by encapsulating them as overridable methods, supporting callback hooks, or abstracting functionality via interfaces that can be re-implemented in completely different ways by dynamically loaded components. Concurrent Programming in Java Design Principles and Pattern

  10. Methods can be very useful for encapsulating logic that performs tasks. Java 7 Recipes A Problem-Solution Approach

1187、单词 adt 的匹配文本:

  1. So far you’ve learned that ADT is a kind of type that represents a set of values. Scala in Action

  2. Thus any other part of the program that needs to perform an operation on the ADT can do so by calling the appropriate method. Data Structures and Algorithm Analysis in Java 3rd Edition

  3. List is just one example of what is called an  (ADT).algebraic data type (Somewhat confusingly, ADT is sometimes used in OO to stand for "abstract data type".) An ADT is just a data type defined by one or more data constructors, each of which may contain zero or more arguments. Functional Programming in Scala

  4. You can set up the Android Test framework with Eclipse by installing the Android Development Tools (ADT) plugin. Selenium Testing Tools Cookbook

  5. It is easy to define your own ADT classes, for example, Fraction, Interval, ComplexFloat, and so on. Concurrent Programming in Java Design Principles and Pattern

  6. Download and install the ADT plug-in for Eclipse according to the documentation that can be found at http://developer.android.com/sdk/eclipse-adt.html#installing. Java 7 Recipes A Problem-Solution Approach

1188、单词 retrying 的匹配文本:

  1. Disk failover mode stores undeliverable data to the local disk (or sometimes a local database) and keeps retrying until the data can be delivered to the next recipient in your data flow. Apache Flume Distributed Log Collection for Hadoop

  2. If the runtimes of tasks are too long, a single task may hold the cluster for a long period, or retrying a failed task becomes expensive. Pro Hadoop

  3. To throw an error in such a way that the user will be asked to authenticate, before retrying the request, use JavaScript code like: CouchDB The Definitive Guide

  4. In this case, a “standard” Hadoop retrying mechanism will do you no good. Professional Hadoop Solutions

  5. The framework tries to narrow down the skipped range by retrying until this threshold is met or all attempts get exhausted for this task. Hadoop RealWorld Solutions Cookbook

  6. Even if a node is a group member, communications with it may fail, and such failures must be handled in the usual ways (retrying, trying a different member of the group, and so on) Hadoop:The Definitive Guide 3rd Edition

  7. On the contrary, throwing a timeout exception or retrying the RPC request causes tasks to fail unnecessarily or add additional load to a RPC server. Apache Hadoop Goes Realtime at Facebook

  8. After checking the datanode processes’ logs and confirming that they were still alive and retrying, Mike checked the namenode user interface again. Hadoop Operations

  9. None of these exception classes have any special methods you wouldn’t find in any other exception class, but you can take advantage of these subclasses to provide more informative error messages or to decide whether retrying the offending operation is likely to be successful. Java Network Programming 4th Edition

  10. You can contain local failure to the current method, rather than throwing exceptions back to clients, if you have reason to believe that retrying an action will succeed. Concurrent Programming in Java Design Principles and Pattern

1189、单词 rmiregistry 的匹配文本:

  1. Included as part of the Java platform is an application called rmiregistry, which runs as a separate process and allows applications to register RMI services or obtain a reference to a named service. Java Network Programming and Distributed Computing

  2. For security reasons, the rmiregistry service that is part of the JDK only allows binding calls from the same host. Core Java Volume II Advanced Features 9th Edition

  3. A remote Java process may be probed by specifying the remote process id, the remote host name, and the port number on which the remote host’s rmiregistry server is running (if other than the default of 1099) Java in a Nutshell 5th Edition

1190、单词 associativity 的匹配文本:

  1. Scala’s treatment of the : character in operator notation is a general concept designed to handle cases like this where left associativity is not as expressive as right associativity. Scala in Depth

  2. The associativity of the cons ( :: ) is right instead of left. Scala in Action

  3. With this more round-about algorithm, the reducer code can be used as a combiner as associativity is preserved. MapReduce Design Patterns

  4. Operator associativity will be described in more detail in Section 5.8 Programming in Scala 2nd Edition

  5. The constraints of commutativity and associativity are not too restrictive; they permit a wide range of valuable analyses, including: counting, filtering, sampling, generating histograms, finding the most frequent items, and many more. Interpreting the Data Parallel Analysis with Sawzall

  6. Associativity is a nice property to expect of operations in an algebra. Functional Programming in Scala

  7. The P and A columns of the table specify the precedence and associativity of each group of related operators, respectively. Java in a Nutshell 5th Edition

  8. Associativity of operators whose Operator precedence of operator name ends with the corresponding whose name starts with characters. Steps in Scala An Introduction to Object-Functional Programming

1191、单词 inmemory 的匹配文本:

  1. When a deferred operation is evaluated, it converts its result PCollection into a materialized state, e.g., as an inmemory data structure or as a reference to a temporary intermediate file. FlumeJava - Easy, Efficient Data-Parallel Pipelines

  2. The order of the data sets in the line of code matters because all but the first data sets listed are stored inmemory. MapReduce Design Patterns

  3. The test is very fast because it is inmemory, but it has a nonzero probability of false positives, in which case the regular get() method is called. Hadoop:The Definitive Guide 3rd Edition

  4. Like a CheckpointNode, the BackupNode is capable of creating periodic checkpoints, but in addition it maintains an inmemory, up-to-date image of the file system namespace that is always synchronized with the state of the NameNode. The Hadoop Distributed File System

  5. Memstore flush size We discussed the storage model earlier and identified how HBase uses an inmemorystore to buffer values before writing them to disk as a new storage file in an operation called flush. HBase:The Definitive Guide

  6. If small enough, the secondary table is pulled into the memory of each mapper / reducer process for inmemory lookups, which typically is the fastest method for joining. Tenzing - A SQL Implementation On The MapReduce Framework

  7. Because the update mechanism is SQL, you can log the SQL statements locally to disk as you execute them on the inmemory database, a process called journaling. Java Performance Tuning 2nd Edition

  8. Its speed is the result of the combination of a fast transactional journal comprised of data log files, the highly optimized indexing of message IDs, and inmemory message caching. ActiveMQ in Action

  9. Between the two in-memory parsers, JAXB has a larger cost of building the inmemory tree because of the higher binding overhead incurred by JAXB. Java Performance

  10. A typical strategy for persistence providers dealing with bulk operations is to invalidate any inmemorycache of data related to the target entity. Pro JPA2

1192、单词 breakpoint 的匹配文本:

  1. A debugger runs your program in full motion until it reaches a breakpoint, and then you can look at everything that interests you. Core Java Volume I Fundamentals 9th Edition

  2. For Figure 7-5, a breakpoint was set in the map task, and the job launched via the Debug As Java Application menu item. Pro Hadoop

  3. You can also use the familiar debugger statement somewhere in your code to trigger a breakpoint. Testable JavaScript

  4. You also can modify your code to catch an exception, which will allow you to set a breakpoint in your IDE and observe the input that’s causing your exception. Hadoop in Practice

  5. This command should be used when the current thread is stopped at a breakpoint. Java in a Nutshell 5th Edition

  6. Unfortunately, you cannot set a breakpoint on a native method, so this is not possible. Java Performance Tuning 2nd Edition

  7. By default, when you debug a concurrent application and the debugger finds a breakpoint, it only stops the thread that has that breakpoint while the rest of the threads continue with their execution. Java 7 Concurrency Cookbook

  8. The debugger shows you the stack trace at the current breakpoint. Understanding MySQL Internals

  9. You simply right-click on the line and select breakpoint from the list. Selenium 2 Testing Tools Beginner's Guide

1193、单词 pong 的匹配文本:

  1. PongWebSocketFrame WebSocketFrame which is sent as response to a PingWebSocketFrame. Netty in Action MEAP V08

  2. From the WSDL file, SoapUI created a basic test for the Ping and Pong services. Jenkins Continuous Integration Cookbook

  3. Here is an example of two actors communicating with each other by sending ping-pong messages: Scala in Action

  4. If the answer is pong, then you succeeded; if you get pang as reply, that means you couldn’t connect to the other node. RabbitMQ in Action

  5. If we try to use a REQ socket in anything other than a strict send/receive fashion, we’ll get an error (technically, the REQ socket implements a small finite-state machine to enforce the send/receive ping-pong, so the error code is called “EFSM”) ZeroMQ

  6. Redis should respond with the message "PONG" if everything has been set up properly. Hadoop RealWorld Solutions Cookbook

  7. There will be Ping messages that the clock sends the simulants, and Pong messages that the simulants send back when they are ready for the clock to move forward. Programming in Scala 2nd Edition

  8. pong message is a WebSocket control message and is generally not dealt with at the application layer. Java EE 7 Essentials

  9. It’s vulnerable to a “ping-pong” denialof-service attack, in which spoofed Internet packets cause two hosts to spew an unlimited amount of data at each other. Java Network Programming 4th Edition

  10. This means that MarcoHandler will also handle binary and pong messages, but will do nothing with those messages. Spring in Action 4th Edition

1194、单词 referent 的匹配文本:

  1. Here, the referent can be inserted into any queue whose element type is a supertype of the type T of the referent; T is the lower bound for the wildcard. The Java Language Specification Java SE 7 Edition

  2. For a single instance, Spring DM will automatically look for a replacement when the current service referent disappears. Spring Dynamic Modules in Action

  3. However, reference handles don’t work well with random access, because the referent class may occur at any point in the preceding stream—that is, there is state stored in the stream. Hadoop:The Definitive Guide 3rd Edition

  4. A weak reference is one that does not prevent the referent object from being garbage-collected. Java in a Nutshell 5th Edition

  5. You can access the private object (termed the referent) using the Reference.get( ) method. Java Performance Tuning 2nd Edition

1195、单词 xenapi 的匹配文本:

  1. The nova-compute process is primarily a worker daemon that creates and terminates virtual machine instances via hypervisor's APIs (XenAPI for XenServer/XCP, libvirt for KVM or QEMU, VMwareAPI for VMware, etc.) bk-compute-adminguide-grizzly

  2. XenAPI (XenServer/XCP) Compute uses the XenAPI agent to inject passwords into guests when using the XenAPI hypervisor backend. bk-admin-guide-cloud-latest

1196、单词 ldif 的匹配文本:

  1. Add the LDIF records from the command line; you will then be asked for the administrator's password you filled in, in step 1 Jenkins Continuous Integration Cookbook

  2. Fortunately, this is a relatively simple exercise, using the embedded LDAP server and a sample LDIF file. Spring Security 3.1

  3. I will be importing a couple of users using an LDIF file. Pro Spring Security

  4. You can import your host definitions using LDIF files or manipulate your directory using your choice of tools such as phpldapadmin (http://phpldapadmin.sourceforge.net/wiki/index.php/Main_Page) Pro Puppet

  5. When the LDAP server starts, it will attempt to load data from any LDIF files that it can find in the classpath. Spring in Action 4th Edition

1197、单词 docid 的匹配文本:

  1. There are a few things going on here, so let’s list them out to be clear: • The URL contains the full path to the document (that is DATABASE/DOCID) Getting Started with CouchDB

  2. As we’ve seen, design documents are normal JSON documents, denoted by the fact that their DocID is prefixed with _design/ CouchDB The Definitive Guide

  3. A Document has a required integer DocId and optional Links, containing a list of Forward and Backward entries holding DocIds of other web pages. Dremel - Interactive Analysis of WebScale Datasets

  4. When skipping a large number of rows, CouchDB still needs to scan the entire B-tree index, starting from the startkey and startkey_docid (if specified) Scaling CouchDB

  5. Some of the Solr caches (the document cache, actually) operate on internal identifiers called docid. Solr 3.1 Cookbook

  6. Every Web page has an associated 1D number called a docID which is assigned whenever a new URL is parsed out of a Web page. The anatomy of a large-scale hypertextual Web search engine

  7. In the reduce phase, terms are sorted so that all term / docID pairs are sent to the same reducer process for each unique term. Solr in action

  8. For each of the top N results, TopDocs records the int docID (which you can use to retrieve the document) as well as the float score. Lucene in Action 2nd Edition

  9. Some of the Solr caches (documentCache actually) operate on internal identifiers called docid. Apache Solr 4 Cookbook

1198、单词 tiered 的匹配文本:

  1. Tiered data collection (multiple flows and/or agents) You can chain your Flume agents depending on your particular use case. Apache Flume Distributed Log Collection for Hadoop

  2. But you can smartly reduce the distance-measure computation and clustering time by an order of magnitude by using a two-tiered approach for batch clustering. Mahout in Action

  3. Site Architecture Tagged’s scale-out, tiered site architecture, shown in Figure 9-1, is typical of social networking websites. Monitoring with Ganglia

  4. As a result, he has been involved in the planning, development, implementation, integration, and testing of numerous applications, including multi-tiered, standalone, distributed, and cloud-based applications. Performance Testing With JMeter 2.9

  5. The tiered merge policy This is the default merge policy that ElasticSearch uses. Mastering ElasticSearch

  6. Our design further seeks to minimize metadata related disk I/O through the use of a two-tiered storage strategy, and to maximize locality and cache efficiency with Dynamic Subtree Partitioning [30] Ceph A Scalable, High-Performance Distributed File System

  7. We intend to implement a priority queue so that queries can be tiered by priority. Tenzing - A SQL Implementation On The MapReduce Framework

  8. There are tiered cost models, so the actual costs tend to have smaller marginal increases at higher levels. Hadoop Beginners Guide

  9. By far, the N-tiered tree network (see Figure 4-3) is the predominant architecture deployed in data centers today. Hadoop Operations

  10. At the time of this writing development is underway to introduce a hybrid HotSpot JIT compiler that combines the major attributes of the Client JIT compiler and the Server JIT compiler called tieredcompilation. Java Performance

1199、单词 tableswitch 的匹配文本:

  1. The compiler will then emit a tableswitch bytecode for this pattern match. Scala in Depth

  2. Compilation of switch statements uses the tableswitch and lookupswitch instructions. The Java Virtual Machine Specification Java SE 7 Edition

  3. It contains either a "tableswitch" bytecode identifier or a "lookupswitch" bytecode identifier. Java Performance Tuning 2nd Edition

1200、单词 sqlexception 的匹配文本:

  1. Suppose the code is inside a method public void updateRecord() throws SQLException. Core Java Volume I Fundamentals 9th Edition

  2. Exception Handling Because Spring advocates using runtime exceptions rather than checked exceptions, you need a mechanism to translate the checked SQLException into a runtime Spring JDBC exception. Pro Spring 3

  3. Each SQLException has a chain of SQLException objects that are retrieved with the getNextException method. Core Java Volume II Advanced Features 9th Edition

  4. The catch block then handles a SQLException, so if one is thrown the exception will be handled using the code within the catch block. Java 7 Recipes A Problem-Solution Approach

  5. And, to appease JDBC’s anger, you must catch SQLException, a checked exception, even though there’s not a lot you can do if it’s thrown. Spring in Action 4th Edition

1201、单词 confi 的匹配文本:

  1. A Solr core is nothing but the running instance of a Solr index along with its confi guration. Scaling Big Data with Hadoop and Solr Chapter-02 Understanding Solr

  2. Along the way, you’ll explore Springbased approaches to domain-specifi c challenges like CRM, configuration management, and site reliability. Spring in Practice

  3. And it uses Spring’s familiar programming model to simplify confi guration and implementation, so it’ll be comfortably familiar to most Java developers. Spring Batch in Action

  4. Along the way, you’ll learn to handle data access and web-based components, and explore topics like unit testing and confi guration in OSGi. Spring Dynamic Modules in Action

  5. Numerous examples will help you develop confi dence in the crucial area of data modeling. MongoDB in Action

1202、单词 rev 的匹配文本:

  1. This will save the document, and then display the new document with the saved revision information (the _rev field) Getting Started with CouchDB

  2. We’ll go into more detail about this in later chapters, but for now, the important thing to note is that _revacts like a safety feature when saving a document. CouchDB The Definitive Guide

  3. The REV column is for storing each revision number, which will be autoincremented when a new history record is created. Pro Spring 3

  4. Reverse could be implemented using concatenation (:::), like in the following method, rev: Programming in Scala 2nd Edition

  5. Issue the following command to delete your johndoe document from the database (be sure to replace the revision number after ?rev= with the actual revision number of your document): Beginning CouchDB

  6. This requires us to pass the incoming argument list, of type List

    , as an argument to rev() The Java Language Specification Java SE 7 Edition

  7. Mrs., Ms., Dr., and Rev., you’ve accounted for virtually everyone. SQL Antipatterns

  8. Exercise 2.37 Explain why function rev computes the reverse of a list. Steps in Scala An Introduction to Object-Functional Programming

1203、单词 sgt 的匹配文本:

  1. In this case, you’ll start with one: the SgtPeppers class, as shown in the next listing. Spring in Action 4th Edition

1204、单词 minimized 的匹配文本:

  1. When you are debugging a GUI program, it is a good idea to keep the console available on the screen and not minimized.) Core Java Volume I Fundamentals 9th Edition

  2. How can you cut the graph for distribution across the cluster so that the number of arcs bridging machines is minimized? Professional Hadoop Solutions

  3. Because the O(N logN) comparison-based sorting algorithms will generally look only at a small number of characters in each string comparison, once the average string length starts getting large, radix sort’s advantage is minimized or evaporates completely. Data Structures and Algorithm Analysis in Java 3rd Edition

  4. Using this filter combination will cause the region server to only load the row key of the first KeyValue (i.e., from the first column) found and return it to the client, resulting in minimized network traffic. HBase:The Definitive Guide

  5. If you have a development environment that provides Hadoop integration or are using Hadoop in standalone mode, the problems are minimized; just remember that Streaming does give you this ability to try the scripts outside of Hadoop; it may be useful some day. Hadoop Beginners Guide

  6. More realistically, several identical copies of the data traverse the Internet; but, by carefully choosing the points at which the streams are duplicated, the load on the network is minimized. Java Network Programming 4th Edition

  7. By choosing the most recently used thread, paging and cache overhead may be minimized. Java Performance Tuning 2nd Edition

  8. But when such a data structure is not available, an alternative is to identify a way to design the application such that the frequency at which multiple threads access the same data and the scope of the data that is accessed is minimized. Java Performance

  9. Useless signals, and the resulting "thundering herds" of context switches can be minimized by delegating operations with different wait conditions to different helper objects. Concurrent Programming in Java Design Principles and Pattern

  10. By breaking tasks into small, granular tasks, the effect of faults and “straggler” nodes can be minimized. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads

1205、单词 splunk 的匹配文本:

  1. Splunk Splunk (http://www.splunk.com) is a log aggregator and search engine that can help you gain operational insight into all of the machine-generated data in your environment. High Performance MySQL 3rd Edition

  2. Processing Applications Logs You can use a wide range of solutions for logging, starting from specialized software (for example, the Splunk App for HadoopOps) and up to a custom log-processing application. Professional Hadoop Solutions

  3. Splunk is one commercial product, another is Loggly, a cloud based logging tool that is based on Solr! More information is available at http://www.splunk.com/ and http://www.loggly.com. Solr 3 Enterprise Search Server

  4. On the consumer side, it outputs into Splunk, Graphite, or Esper-like real-time alerting. Apache Kafka

  5. Another product, Splunk, also requires a wide range of functionality to create real-world big data pipeline solutions. Spring Data Modern Data Access for Enterprise Java

1206、单词 tgt 的匹配文本:

  1. A ticket is issued with a Ticket Granting Ticket (TGT), which is issued by the KDC. HBase Administration Cookbook

  2. For Hadoop users, this is done via the kinit command.) The KDC responds with something called a Ticket Granting Ticket (TGT), which is simply a ticket used for requesting tickets to communicate to other servers and services. Professional Hadoop Solutions

  3. This means that in the case of a tgt restart or even a node reboot your existing volumes on that node will be restored automatically with their original IQN. bk-admin-guide-cloud-latest

  4. The client authenticates itself to the Authentication Server and receives a timestamped Ticket-Granting Ticket (TGT) Hadoop:The Definitive Guide 3rd Edition

  5. The KDC is made up of two distinct services: the authentication server (AS), which is responsible for authenticating a client and providing a ticket granting ticket (TGT), and the ticket granting service (TGS), which, given a valid TGT, can grant. Hadoop Operations

1207、单词 omega 的匹配文本:

  1. Indeed, the Omega service scheduler will try to place tasks to resist both independent and coordinated failures, which is an NP-hard chance-constrained optimization problem with tens of failure domains that nest and overlap. Omega - flexible, scalable schedulers for large compute clusters

  2. Although this might be the best of all possible cookbooks, there are two tiny problems with The Cookbook Omega. MongoDB in Action

1208、单词 mixins 的匹配文本:

  1. This gives all our mixed-in traits the ability to delegate to super, which is a common theme when using traits as mixins. Scala in Depth

  2. Mixins The term mixin seems to have acquired numerous meanings over time, but the fundamental concept is that of mixing in capabilities from multiple classes in order to produce a resulting class that represents all the types of the mixins. Thinking in Java 4th Edition

  3. Another way of thinking about Scala mixins is as decorators. Scala in Action

  4. Using ProxyFactoryBean for Introductions You are not limited in using the ProxyFactoryBean class for just advising an object but also for introducing mixins to your objects. Pro Spring 3

  5. The order of mixins is significant.2 The precise rules are given in the following section, but, roughly speaking, traits further to the right take effect first. Programming in Scala 2nd Edition

  6. Traits As Mixins Scala provides a complete mixin solution, called traits. Programming Scala

  7. If you are familiar with Ruby, traits are similar to Ruby’s mixins. Beginning Scala

  8. Abstract classes can’t be used to define mixins for the same reason that they can’t be retrofitted onto existing classes: a class cannot have more than one parent, and there is no reasonable place in the class hierarchy to insert a mixin. Effective Java 2nd Edition

1209、单词 makefile 的匹配文本:

  1. First, gmetad has one additional software dependency (RRDtool), and second, you must include the --with-gmetad option to the configure script, because only gmond is built by the default Makefile. Monitoring with Ganglia

  2. Any automation method will do; for example, a Makefile or a set of custom scripts. High Performance MySQL 3rd Edition

  3. The first file is called Makefile and will reference the umbrella make file. RabbitMQ in Action

  4. Here is a quick makefile that will run unit tests on all the code and then compress the code into a release directory to be blasted out to production web servers if all is OK: Testable JavaScript

  5. For example, many software projects contain text files such as README, LICENSE, and Makefile without any filename extensions. Tika in Action

  6. The .pro file is the Qt makefile or the project file. Storm Real-Time Processing Cookbook

  7. Compiling and Running Now we can compile and link our program using the makefile in Example 2-13 Hadoop:The Definitive Guide 3rd Edition

  8. For example, add the following options to Makefile.in, and then. SQL Antipatterns

  9. For each directory where you added files, edit Makefile.am in that directory. Understanding MySQL Internals

2000个软件开发领域的高频特殊词及精选例句相关推荐

  1. python是一个免费开源的软件吗_Python是开源的吗?使用Python的软件开发领域

    Python是开源的吗?使用Python的软件开发领域.我们要清除的是Python开放源代码,因此Python是开放源代码,这意味着它是免费的,并且python开放源代码不是不同的编程语言,每个人都可 ...

  2. 人工智能在软件开发领域应用现状

    转载本文需注明出处:微信公众号EAWorld,违者必究. 江湖上一直流传着这样的传闻:"程序员们很快就要失业了,因为人工智能马上就能写出完美的代码了".人工智能是以软件形式存在的, ...

  3. 什么是软件开发领域的 obsolete 或者 deprecated 含义

    我们在学习一门编程语言或者说使用一些工具 API 时,经常会看到文档或者 API 参数说明里,标注了 obsolete,deprecated,deprecation 等字眼. 这些单词代表什么含义呢? ...

  4. Delphi 和 TMS 控件在 ERP 软件开发领域的 20 年:访谈

    我们最近在我们的Youtube 频道(订阅!)发表了对Viasoft Korp技术总监Alexandre Henzen的采访.采访(葡萄牙语)可通过此链接获得,也可在下面的这篇文章中获得. 在这次采访 ...

  5. 软件开发领域,英文function翻译为函数并不准确

    翻译function为函数是错误的理解,应翻译为功能,英文原意也是功能的意识,函数是数学里的解释,不利于自然语言到程序语言的理解.

  6. 嵌入式蓝牙耳机音频软件开发领域词汇

    1 app 应用层 2 anc 主动降噪 3 Play 播放 4 a2dp 音频流相关 5 bt_sco 通话相关 6 MIC 麦克风相关 7 pwl LED相关 8 tgt_hardware.c 8 ...

  7. er图用什么软件_从软件开发生命周期看商业智能 BI 数据仓库建模

    关于商业智能 BI 的介绍面对不同的企业客户可以从很多不同的角度展开,比如从业务角度.管理角度.数据架构角度.IT 信息化建设角度.BI 实施方法论角度等,不同的视角可以帮助企业更加全面的了解商业智能 ...

  8. 软件开发工程师--经验之谈

    分享一位软件工程师的多年总结,经验之谈,借此导航自己人生. 1.分享第一条经验:"学历代表过去.能力代表现在.学习力代表未来." 其实这是一个来自国外教育领域的一个研究结果.相信工 ...

  9. 软件测试和软件开发哪个发展更好

    经常有想转IT行业的同学,在了解软件测试和软件开发之后不知道转那个岗位好,今天就系统的,从多个维度来比较软件测试与软件开发,具体包括从基本素质要求.性格要求.入职门槛.知识结构.竞争压力.职业发展.职 ...

最新文章

  1. VS2010非永久性配置和永久配置Opencv
  2. Java垃圾回收调优
  3. ant design vue input change_Ant-design-vue项目实现动态路由
  4. VTK:几何对象之ParametricObjects
  5. 建设数据中台之前,建议先看这份企业数据能力测评 | 大咖说中台
  6. 开发工具 idea中出现Error:(1, 1) java: 非法字符: ‘\ufeff‘
  7. JS === 实现通过点击td 跳转相应的图片
  8. 解决permission denied错误
  9. jsp include参数传送接收与应用
  10. 历年计算机考研复试_重点面试题
  11. 小米路由器R4 TTL刷不死Bread第三方固件写入升级
  12. lucas–kanade_Lucas–Kanade光流算法
  13. 5年后端WEB开发者的开机必备软件
  14. C 语言mj普通简单算法
  15. akoj-1170-国王的魔镜
  16. laravel-jwt attempt()异常问题处理
  17. FINTERRA在2018年第二届远东商业领袖奖中脱颖而出
  18. 计算机理论之父是哪位,计算机之父指的是谁 计算机之父是谁
  19. 诗人的眼泪(曾轶可)
  20. ds18b20遇到的坑

热门文章

  1. Java返回报文有单双引号_Spring MVC 响应结果有反斜杠转义字符+双引号
  2. 在style中设置图片背景
  3. Cloud Hosted Notebook Showdown(云托管笔记本)
  4. 用计算机刻录光盘,教你怎么用电脑刻录数据光盘
  5. 【装Linux系统时卡在logo处】禁用独显驱动
  6. Halcon 图形窗口显示文本
  7. Scrcpy-Android 设备投屏+控制工具--简略快捷键方便记忆
  8. SUS系统可用性量表
  9. 修改Firefox收藏夹位置
  10. Linux下安装OpenOffice