The file coveraged.js is now a fully working copy of instrument-me.js with embedded coverage tracking. Testable JavaScript
This is available as a native package for most modern Linux distributions or the latest version can be installed directly using pip python package installer: bk-compute-adminguide-grizzly
This is because virtualenv, which is necessary for the easy download of pip, is out of the scope of these instructions. Redis in Action
This is available as a native package for most Linux distributions, or you can install the latest version using the pip python package installer: bk-admin-guide-cloud-latest
This recipe also requires Python and the Python installer pip. Cassandra High Performance Cookbook
Install the clients Use pip to install the OpenStack clients on a Mac OS X or Linux system. api-quick-start-onepager
Install Castro using easy_install or the pip tool from the command line: Selenium Testing Tools Cookbook
Alternatively, install pip and use it to manage client installation: user-guide
Solution Install and use Andy McCurdy’s redis-py using pip, easy_install, or from the source code. Redis Cookbook
Installing the Tools To install (or upgrade) a package from the PyPI archive with pip, as root: OpenStack Operations Guide
To draw a shape, you first create an object of a class that implements the Shape interface and then call the draw method of the Graphics2D class. Core Java Volume I Fundamentals 9th Edition
To draw a shape, first create an object of a class that implements the Shape interface and then call the draw method of the Graphics2D class. Core Java Volume II Advanced Features 9th Edition
Finally, we cast the gradient as a Graphics2D object and called the setPaint and fillRect method to paint our gradient across the window. Java 7 New Features Cookbook
However, there are cases that can be dealt with better using Graphics2D. Steps in Scala An Introduction to Object-Functional Programming
Shown here is the Graphics object cast into a Graphics2D: Java 7 Recipes A Problem-Solution Approach
The central body responsible for allocating blocks of IP addresses is the Internet Corporation for Assigned Names and Numbers (ICANN), building on the work of an earlier organization, the Internet Assigned Numbers Authority (IANA) Java Network Programming and Distributed Computing
We’ll discuss this issue and modern attempts to classify and understand these file formats (such as those from the Internet Assigned Numbers Authority, IANA) and the relationships of those frameworks to Tika. Tika in Action
If you aim to make a public protocol of any importance, such as FILEMQ, you’re going to want an IANA-registered port. ZeroMQ
The x- prefix indicates that this is an experimental name, not one that is sanctioned by IANA, the organization that assigns standard MIME type names. Core Java Volume II Advanced Features 9th Edition
The IANA is responsible for handing out permanent multicast addresses as needed. Java Network Programming 4th Edition
A Charset represents a character set encoding in defined in the IANA Charset Registry. Java 7 Recipes A Problem-Solution Approach
If evaluation of an expression requires evaluation of a subexpression, then abrupt completion of the subexpression always causes the immediate abrupt completion of the expression itself, with the same reason, and all succeeding steps in the normal mode of evaluation are not performed. The Java Language Specification Java SE 7 Edition
If a subexpression refers to any local variables (the + operation refers to the local variables and introduced by the pattern, similarlyx xs for ), turn the subexpression into a function that accepts these variablesproduct as arguments. Functional Programming in Scala
At the same time, a number of performance optimizations are being worked on, such as predicate pushdown and common subexpression elimination. Hadoop:The Definitive Guide 3rd Edition
Group subexpression as with ( ), but do not capture the text that matched. Java in a Nutshell 5th Edition
Thus, in the expression ((A)(B(C))), the subexpression B(C) is in group 2 Steps in Scala An Introduction to Object-Functional Programming
The most basic classes of optimizations are simple identity transformations, constant folding, common subexpression elimination, and inlining of functions. Java Performance
Instead of splitting data into equal ranges using one column (usually the table’s primary key), OraOop utilizes the concept of rowid. Apache Sqoop Cookbook
The _id is a special field that is found on all documents in Mongo, just like ROWID in Oracle. NoSQL Distilled
It takes an array of arbitrary strings and returns a single string representing the rowID. Hadoop RealWorld Solutions Cookbook
Some databases support ROWID values that describe the location of a row so that it can be retrieved very rapidly. Core Java Volume II Advanced Features 9th Edition
In C++, throw specifiers are enforced at runtime, not at compile time. Core Java Volume I Fundamentals 9th Edition
These access specifiers determine who can use the definitions that follow. Thinking in Java 4th Edition
These precision specifiers are nonstandard, so we suggest that you specify the type you want but not the precision. High Performance MySQL 3rd Edition
This is unlike the other key specifiers, which suppress unmentioned keys from being returned. MongoDB The Definitive Guide 2nd Edition
Because of the occasional need to use a generic class or interface name without type arguments, type names are distinct from type declaration specifiers. The Java Language Specification Java SE 7 Edition
They denote compiler-dependent specifiers for exported functions that come from a dynamically loaded library.) Now, simply copy the function prototype from the header file into the source file and give the implementation code for the function, as shown in Listing 12.3 Core Java Volume II Advanced Features 9th Edition
The remaining arguments to printf( ) are values to be converted to strings and substituted into the format string in place of the format specifiers. Java in a Nutshell 5th Edition
Objects of the THD type are thread descriptors, and are critical in the operation of most of the server modules. Understanding MySQL Internals
Here is a table summarizing the properties for the timestamp interceptor: Apache Flume Distributed Log Collection for Hadoop
And not just pretty graphs, but a snazzy, welldesigned UI to go with them—a UI that is generous with the data, summarizing the status of the entire data center in just a few graphs while still providing quick, easy access to every combination of any individual metrics. Monitoring with Ganglia
The reduce task is an ideal place for summarizing data and for doing basic duplicate suppression. Pro Hadoop
At the end of section 6.4 you’ll find a table summarizing all the predefined collectors explored in this chapter. Java 8 in Action Lambdas, Streams and Functional-style Programming
This differentiates filtering patterns from those in the previous chapter, which was all about summarizing and grouping data by similar fields to get a top-level view of the data. MapReduce Design Patterns
In order to prevent lookups into files that do not contain the key, a bloom filter, summarizing the keys in the file, is also stored in each data file and also kept in memory. Cassandra A Decentralized Structured Storage System
Summarizing the features, you can say the following about the batch() functions: Both calls. HBase:The Definitive Guide
Initially, the Sawzall API did not support writing values to the database, but did allow data filtering, transformation, and summarizing. Cassandra The Definitive Guide
Time for action – summarizing the UFO data Now we have the data, let's get an initial summarization of its size and how many records may be incomplete: Hadoop Beginners Guide
Start by summarizing the problem and the end result, and then walk through the timeline of events, calling out anything interesting along the way. Hadoop Operations
First and foremost, we will only see the true performance difference if the mutexes are under contention, so there must be multiple tasks trying to access the mutexed code sections. Thinking in Java 4th Edition
It does have some severe scalability limitations, including mutexes on key caches. High Performance MySQL 3rd Edition
Getting a program to do more than one thing at a time has traditionally meant hassling with mutexes, race conditions, lock contention, and the rest of the unpleasant baggage that comes along with multithreading. Programming Scala
Like the mutexes known to most programmers, locks are advisory. Chubby - The lock service for loosely-coupled distributed systems
The problem was attributed to the inability of LinuxThreads to deal efficiently with frequently acquired and released mutexes, something MySQL server had to do a lot of. Understanding MySQL Internals
Though not the most efficient way to do this (performance could be sped up by buffering, for example), it is illustrative of how low-level streams can be read from. Java Network Programming and Distributed Computing
On Unix For illustrative purposes, we assume you have installed Java JDK at /opt/ tools/jdk: Performance Testing With JMeter 2.9
The list above is meant to be illustrative rather than comprehensive. The Java Virtual Machine Specification Java SE 7 Edition
We’ve included more illustrative stories and case studies, which demonstrate the principles in action. High Performance MySQL 3rd Edition
The example load test in this chapter is intended as an illustrative example that can be helpful when you are writing your own tests. Scaling CouchDB
For illustrative purposes we’ll use the Neo4j database as an example of how a graph database is architected. Graph Databases
Using a random sample doesn’t work well in general because join and filter operations tend to remove all random data, leaving an empty result, which is not illustrative of the general data flow. Hadoop:The Definitive Guide 3rd Edition
We also tell Hive to use the newline character as the line delimiter, but that’s already the default and we include it here only for illustrative purposes: Hadoop in Action
We won’t worry about that here, but for illustrative purposes, we have assumed in the figure that a particular alphanumeric partitioning was used. Programming Hive
More illustrative are the follow-up comments to the question about Alexander the Great’s teacher. MongoDB in Action
Multiquery Execution Because DUMP is a diagnostic tool, it will always trigger execution. Hadoop:The Definitive Guide 3rd Edition
If your script has multiple DUMP/STORE, Pig script’s multiquery execution improves efficiency by avoiding redundant evaluations. Hadoop in Action
Pig does not use multiquery for any of the multiple-input operators: join, union, Programming Pig
Erlang has the concept of function arity—the number of arguments a function takes. RabbitMQ in Action
Generics, annotations, autoboxing and unboxing, enum types, foreach loops, variable arity methods, and static imports are all new to the language as of Autumn 2004 The Java Language Specification Java SE 7 Edition
Higher arity tuples work similarly—trycase class experimenting with them on the REPL if you're interested. Functional Programming in Scala
To do so, we’ll add a second arity to command that expects to be passed an output map. Functional Programming Patterns in Scala and Clojure
Functions are instances of FunctionN types, where N is the arity of the function. Programming Scala
The arity property is used to specify the number of subcontexts; in this case, there are two. Hadoop:The Definitive Guide 3rd Edition
This interface defines a single method to return the XPathFunction with the specified qualified name and specified arity (number of arguments) Java in a Nutshell 5th Edition
Starting with version 1.2, the JDK implementors rigged the class loader to explicitly disallow loading of user-defined classes whose package name starts with "java." Core Java Volume I Fundamentals 9th Edition
To disallow a call when the type is used with wildcards, use the type parameter in the argument list. Thinking in Java 4th Edition
Most security issues that have been reported with MongoDB have been JavaScript-related and it is generally safer to disallow it, if your application allows. MongoDB The Definitive Guide 2nd Edition
When set to true this decider will disallow allocating a shard and its replicas on the same physical machine. Mastering ElasticSearch
We can use this method to disallow writing to a file by any class that was loaded via a class loader: Java Security 2nd Edition
It is possible that future versions of the Java programming language will disallow the use of raw types. The Java Language Specification Java SE 7 Edition
One way to overcome this is to disallow write operations to a table, flush its memstores explicitly, and then copy the HDFS files. HBase:The Definitive Guide
Atomic instructions introduce overhead, as they enforce memory ordering, potentially destroy CPU caches, and disallow parallel execution. Oracle JRockit The Definitive Guide
Some companies allow incoming FTP but disallow outgoing FTP so confidential data cannot be as easily smuggled out of the company. Java Network Programming 4th Edition
In this section, we demonstrate subclassing QueryParser to disallow inefficient wildcard and fuzzy queries, custom date-range handling, and morphing phrase queries into SpanNearQuerys instead of PhraseQuerys. Lucene in Action 2nd Edition
The rescore() method boosts the estimated preference value for mystery novels. Mahout in Action
Chapter 2, Power User Query DSL, describes how Apache Lucene scoring works, why ElasticSearch rewrites queries, and how query rescore mechanism works. Mastering ElasticSearch
The window_size is the number of top results to rescore, per shard. Elasticsearch The Definitive Guide
Thanks to Agile software development methodology, the card wall (or notice board or whiteboard with index cards) has become popular, and you’ll use it to visualize the work in progress for user stories and backlog, and to determine who is working on what. Scala in Action
There is really no better way to explain your ideas to your colleagues than using a whiteboard. ZeroMQ
On the whole, Cypher patterns follow very naturally from the way we draw graphs on the whiteboard. Graph Databases
We’ll describe in this section how to take advantage of this event system and see that it’s implemented using a common OSGi pattern: the whiteboard pattern. Spring Dynamic Modules in Action
The primary advantage of a graph database over RDBMS is that there’s no impedance mismatch; you can store your objects just as you would use them in your application and just as you would draw them on a whiteboard, which makes for straightforward, readily understandable, and quick modeling. Cassandra The Definitive Guide
Taking one of these domains, and putting it first on a whiteboard and then into a graph database, is your first step toward realizing the power behind these concepts. Spring Data Modern Data Access for Enterprise Java
Thank you also to Martin Odersky for his endorsement and kind words on the final product that you will read in the foreword, Josh Cough for being a guy I can bounce ideas off when needed, and Peter Simanyi for an email with a very detailed, thorough, complete, and awesome review of the entire book. Scala in Depth
Josh and Levi, the founders, asked me to "make it fast, whatever it takes" Netty in Action MEAP V08
A special thanks to Josh Kearney for collaborating with me on my first Nova blueprint, as well as technically reviewing this book. Deploying OpenStack
Josh Levenberg has been instrumental in revising and extending the user-level MapReduce API with a number of new features based on his experience with using MapReduce and other people’s suggestions for enhancements. MapReduce - Simplied Data Processing on Large Clusters
Josh participated in endless language design discussions, chaired several Expert Groups and was a key contributor to the Java platform. The Java Language Specification Java SE 7 Edition
Many thanks to Josh Wills, the creator of Crunch, who kindly looked over the chapter that covers that topic. Hadoop in Practice
Josh Bloch gives great insight into best practices that really can only be discovered after years of study and experience.” Effective Java 2nd Edition
Josh Bloch, a former Sun employee who is now at Google, reviewed the material on enumerated types and annotations. Java in a Nutshell 5th Edition
Josh Juneau has been developing software and database systems for several years. Java 7 Recipes A Problem-Solution Approach
While on the project home page, look for a link to download a free O’Reilly ebook by Josh Long and Steve Mayzak called Getting Started with Roo [LongMay11] Spring Data Modern Data Access for Enterprise Java
It is possible to set up a Linux system so that an HDFS is mounted at system start time by updating the system /etc/fstab file with a mount request for an HDFS file system. Pro Hadoop
To disable this option, add the noatime,nodiratime mount options to your /etc/fstab; this can sometimes boost performance by as much as 5–10%, depending on the workload and the filesystem (although it might not make much difference in other cases) High Performance MySQL 3rd Edition
Configure NFS at HostB and HostC by adding below to /etc/fstab. bk-compute-adminguide-grizzly
Create the fstab configuration file using the following command: sudo mkdir -pv /etc/fstab. Hadoop Operations and Cluster Management Cookbook
You can do this on Linux by changing atime to noatime in /etc/fstab: MongoDB The Definitive Guide 2nd Edition
In fact it depends on whether you added an /etc/fstab entry for that volume. bk-admin-guide-cloud-latest
Editing the /etc/fstab file ensures swap will not be reactivated on operating system startup. Cassandra High Performance Cookbook
Replace /dev/md1 with the name of your disk device (consult /etc/fstab for device names): Hadoop in Practice
Mount options are typically specified in a configuration file called /etc/fstab. HBase:The Definitive Guide
This is, conceptually, almost identical to the Linux /etc/ fstab file, except that rather than mapping paths to physical devices, ViewFS maps paths to HDFS namenodes. Hadoop Operations
An Exchanger is used when two threads are working on two instances of the. Core Java Volume I Fundamentals 9th Edition
If we simply want to exchange data between two threads, we can use the Exchanger class. Programming Concurrency on the JVM
An Exchanger is a barrier that swaps objects between two tasks. Thinking in Java 4th Edition
The exchanger implements a synchronization tool that does not really have. Java Threads 3rd Edition
Exchanger An Exchanger is a utility that allows two threads to rendezvous and exchange values. Java in a Nutshell 5th Edition
In more detail, the Exchanger class allows the definition of a synchronization point between two threads. Java 7 Concurrency Cookbook
It is convenient to define the helper class Exchanger as an inner class to gain access to the host and the array serving as the shared representation. Concurrent Programming in Java Design Principles and Pattern
For example, in an application that must support multiple protocols, such as HTTP or WebSockets, a WebSocket fallback such as SockJS or Flash sockets would require a ChannelHandler for each. Netty in Action MEAP V08
Recognizing that WebSocket offers a low-level API, screaming for a higher-level abstraction, Spring 4.0 includes a higher level message-oriented programming model on top of WebSocket that’s based on SockJS and includes STOMP subprotocol support. Spring in Action 4th Edition
In large installations in which there is an IO constraint, rrdcached acts as a buffer between gmetad and the RRD files, as illustrated in Figure 2-7 Monitoring with Ganglia
Assuming MySQL decides to join the tables in the order shown in the query, the following pseudocode shows how MySQL might execute the query: High Performance MySQL 3rd Edition
For this reason an implementation of this method often resembles the following pseudocode: Java 8 in Action Lambdas, Streams and Functional-style Programming
To keep the discussion as generally applicable as possible, we’ll present first pseudocode for HBase interactions and then show you the snippets from OpenTSDB. HBase in Action
Virtually all the standard algorithms are presented along with appropriate data structures, pseudocode, and analysis of running time. Data Structures and Algorithm Analysis in Java 3rd Edition
The first job, the pseudocode for which is shown in figure 7.14, calculates the FoFs and counts the number of friends in common. Hadoop in Practice
The ZooKeeper website describes several such data structures and protocols in pseudocode. Hadoop:The Definitive Guide 3rd Edition
The following pseudocode describes a naive mark and sweep algorithm: Oracle JRockit The Definitive Guide
The pseudocode for the first phase, to be distributed over many machines, is. Hadoop in Action
We’ll use just enough pseudocode for you to get the idea. Hadoop Operations
For example, here is a pseudocode version of the counter class using WHEN: Concurrent Programming in Java Design Principles and Pattern
This creates a pattern that will match lines starting with "Java," "Java," "JAVA," etc., and attempt a match for each line within a multiline set (matches starting at the beginning of the character sequence and following each line terminator within the character sequence) Thinking in Java 4th Edition
Multiline Strings, wrapped by triple double quotes, are helpful if you want to assign wordy text or impose formatting (for example, multiline SQL statements) Gradle in Action
Editing Complex Variables The multiline support in the shell is somewhat limited: you cannot edit previous lines, which can be annoying when you realize that the first line has a typo and you’re currently working on line 15 MongoDB The Definitive Guide 2nd Edition
Scala also supports a special multiline string literal that’s enclosed in triple quotes (""") Scala in Action
If your source data is multiline XML or JSON form, for example, you may want to consider a preprocessing step. Hadoop in Practice
Like Java, an if expression may have a multiline code block: Beginning Scala
Pig Latin supports two forms of comments, single-line and multiline. Hadoop in Action
Although this style of comment is typically used for multiline comments, it can also be used for single-line comments. Java in a Nutshell 5th Edition
In addition, the Pattern object needs to know that we are searching line-by-line, as it also supports searching text while treating line endings simply as any other characters, so we use the MULTILINE flag. Java Performance Tuning 2nd Edition
Actually, each previous line of input is shown separately; the CLI does not combine multiline commands and queries into a single history entry. Programming Hive
The directory bsd_license contains the items that are provided under the BSD license. Pro Hadoop
SysV/BSD-Style Systems Depending on your operating system, the couchdb daemon script could be installed into a directory called init.d (for SysV-style systems) or rc.d (for BSD-style systems) under. CouchDB The Definitive Guide
Other flavors of Unix are not as well supported: proceed with caution if you’re using Solaris or one of the BSD variants. MongoDB The Definitive Guide 2nd Edition
Redis is an open source, BSD licensed, advanced key-value store. bk-admin-guide-cloud-latest
Snappy, on the other hand, is BSD-licensed, which makes it easier to bundle with the Hadoop and HBase distributions. HBase in Action
With Snappy, released by Google under the BSD License, you have access to the same compression used by Bigtable (where it is called Zippy) HBase:The Definitive Guide
This interface defines constants that represent low-level BSD Unix-style socket options and methods that set and query the value of those options. Java in a Nutshell 5th Edition
Relatively old operating systems designed in the age of small files and slow networks, such as BSD 4.2, use two-kilobyte buffers. Java Network Programming 4th Edition
The downside of this approach is that it is not possible to run operating systems that lack virtio drivers, for example, BSD, Solaris, old Linux, and old Windows. admin-user-guide-trunk
In doing so, they discovered that there was no good message broker available that utilized a BSD-style license. ActiveMQ in Action
You can do this with the open_files_limit server variable in your my.cnf file. High Performance MySQL 3rd Edition
First, you have to locate the my.cnf MySQL configuration file, which resides inside MySQL's installation directory. Sonar Code Quality Testing Essentials
When you run nova-api the first time, it generates the certificate authority information, including openssl.cnf. bk-admin-guide-cloud-latest
By default, other locations are also searched after a successful or unsuccessful attempt to load /etc/my.cnf in the given order: first my.cnf in the directory specified by a compiled-in macro DATADIR, and then .my.cnf (note the initial period) in the home directory of the real (rather than effective) user that started mysqld. Understanding MySQL Internals
Because it’s subclassed from AnyRef, you can’t assign null to any value type in Scala: Scala in Action
Here we revisit our example from section 14.4 and assume a class Expr, which is subclassed into BinOp and Number: Java 8 in Action Lambdas, Streams and Functional-style Programming
The latter permission allows the ObjectInputStream and ObjectOutputStream classes to be subclassed, which would potentially override the readObject( ) and writeObject( ) methods. Java Security 2nd Edition
You may also at times want to ensure that an entire class not be subclassed. Programming in Scala 2nd Edition
Curiously, our previous example was able to declare a public class that subclassed a protected class without a similar error. Programming Scala
The main disadvantage of providing only static factory methods is that classes without public or protected constructors cannot be subclassed. Effective Java 2nd Edition
When a class is declared with the final modifier, it means that it cannot be extended or subclassed. Java in a Nutshell 5th Edition
Example 12-9 is a simple iterative UDPServer class that can be subclassed to provide specific servers for different protocols. Java Network Programming 4th Edition
The HttpServlet class is abstract, so it must be subclassed and then an implementation can be provided for its methods. Java 7 Recipes A Problem-Solution Approach
We could also have a method on the CompanyEmployee mapped superclass that we want to apply to all the entities that subclassed it. Pro JPA2
He has been focused on the Big Data space since 2009, and is both MapR and Cloudera certified. Professional Hadoop Solutions
Finally, MapR, which provides a Hadoop distribution, has its own distributed filesystem that supports large numbers of small files. Hadoop in Practice
There are Hadoop distributions from the large, established enterprise vendors, including EMC, IBM, Microsoft, and Oracle, as well as from specialist Hadoop companies such as Cloudera, Hortonworks, and MapR. Hadoop:The Definitive Guide 3rd Edition
Other developments include HBase running on filesystems other than Apache HDFS, such as MapR. HBase:The Definitive Guide
MapR A different type of distribution is offered by MapR Technologies, though the company and distribution are usually referred to simply as MapR. Hadoop Beginners Guide
Programming Hive introduces Hive, an essential tool in the Hadoop ecosystem that provides an SQL (Structured Query Language) dialect for querying data stored in the Hadoop Distributed Filesystem (HDFS), other filesystems that integrate with Hadoop, such as MapR-FS and Amazon’s S3 and databases like HBase (the Hadoop database) and Cassandra. Programming Hive
Join the Community http://pragprog.com/community Read our weblogs, join our online discussions, participate in our mailing list, interact with our wiki, and benefit from the experience of other Pragmatic Programmers. Programming Concurrency on the JVM
A MapReduce job is started, which runs using the weblogs as its input. Hadoop RealWorld Solutions Cookbook
For example, in this recipe, if we take the access time from weblogs as the dimension, then we will group the access time by the hour. Hadoop MapReduce Cookbook
Read our weblogs, join our online discussions, participate in our mailing list, interact. SQL Antipatterns
OnJava.com is a one-stop resource for enterprise Java developers, featuring news, code recipes, interviews, weblogs, and more. Java in a Nutshell 5th Edition
You’ll also find links to news, events, articles, weblogs, sample chapters, and code examples. Understanding MySQL Internals
Prior to Schoox Inc, he joined a European startup company, OTS SA, which developed administrative and financial software for the Public Sector. Sonar Code Quality Testing Essentials
In biotech, financial services, and defense IT, he has helped European and American companies develop coherent strategies for embracing open source search software. Solr 3 Enterprise Search Server
Graph Databases, the image of a European octopus, and related trade dress are trademarks of O’Reilly Media, Inc. Graph Databases
So Lars started writing critical how-tos and architectural descriptions inbetween jobs and his intraEuropean travels as unofficial HBase European ambassador. HBase:The Definitive Guide
The character sets in Table 1.3 are installed only on operating systems that use non-European languages. Core Java Volume II Advanced Features 9th Edition
This 8-bit charset is suitable for most Western European languages, including English. Java in a Nutshell 5th Edition
However, running the test in a sampling of other locales (European and Asian locales), I find similar relative speedups. Java Performance Tuning 2nd Edition
Also freely available is the SnowballAnalyzer family of stemmers, which supports many European languages. Lucene in Action 2nd Edition
Colophon The animal on the cover of Programming Hive is a European hornet (Vespa cabro) and its hive. Programming Hive
You can use various stemmers for English, and there are ones available for French, German, and most of the European languages. Apache Solr 4 Cookbook
This is achieved through the use of the administrative command, asadmin (or as admin.bat in the case of Windows), which is available under the bin directory of the GlassFish installation. Java Performance
We can map HBase tables and columns to a Hive table so that it is possible to perform complex queries over HBase data using HQL. HBase Administration Cookbook
Instead, for Hibernate, we use the Hibernate Query Language (HQL) to define our queries. Pro Spring 3
In another situation, you want to make sure that an HQL or JPQL query translates to executable SQL and performs what you want. Pro Spring MVC
Hive provides a mechanism to project this data into a table definition, and query the data using a SQL-like language called HiveQL (HQL) Professional Hadoop Solutions
Create an HQL query that will count values of the favorite_movie column and then order the counts in ascending order: Cassandra High Performance Cookbook
Additional features: Hypertable has its own query language called Hypertable Query Language (HQL) Cassandra The Definitive Guide
Create the following as s3test.hql, click on the Upload link within the ufodata directory, and follow the prompts to upload the file: Hadoop Beginners Guide
Hive provides an SQL dialect, called Hive Query Language (abbreviated HiveQL or just HQL) for querying data stored in a Hadoop cluster. Programming Hive
The query languages of choice have been SQL for JDBC as well as HQL/JPQL for Hibernate/JPA. Spring Data Modern Data Access for Enterprise Java
Hive is a data warehouse infrastructure built on Hadoop Core that provides data summarization, adhoc querying and analysis of datasets. Pro Hadoop
Summarization analytics are all about grouping similar data together and then performing an operation such as calculating a statistic, building an index, or just simply counting. MapReduce Design Patterns
HiveQL supports ad-hoc queries, joins, summarization, and so on, by transparently converting them into MapReduce execution. Professional Hadoop Solutions
Hive is a data warehouse infrastructure built on top of Hadoop that provides tools to enable easy data summarization, ad hoc querying, and analysis of large data sets stored in Hadoop files. Cassandra High Performance Cookbook
Today, we regularly run thousands of jobs on the Hadoop/Hive cluster with hundreds of users for a wide variety of applications starting from simple summarization jobs to business intelligence, machine learning applications and to also support Facebook product features. Hive A Petabyte Scale Data Warehouse Using Hadoop
Alternatively, the job statistics summarization tool, shown in figure 6.10, will show minimum, maximum, average, and median values for the input map bytes. Hadoop in Practice
Its target users remain data analysts who are comfortable with SQL and who need to do ad hoc queries , summarization , and data analysis on Hadoop-scale data.3 You interact with Hive by issuing queries in a SQL-like language called HiveQL. Hadoop in Action
Time for action – summarizing the UFO data Now we have the data, let's get an initial summarization of its size and how many records may be incomplete: Hadoop Beginners Guide
Table 4.1 contains a summarization of the connectors with a brief description. ActiveMQ in Action
At the moment, our Sawzall-based API does not allow client scripts to write back into Bigtable, but it does allow various forms of data transformation, filtering based on arbitrary expressions, and summarization via a variety of operators. Bigtable - A Distributed Storage System for Structured Data
That command will start a WEBrick server and run the application on that server. Pro Spring Security
In the next chapter, we’ll look at how to scale Puppet beyond the basic Webrick server, using tools like Mongrel and Passenger and allowing you to manage larger numbers of hosts. Pro Puppet
ACKNOWLEDGMENTSxx Finally, we’d like to acknowledge and thank Ken Krugler and Chris Schneider of Bixo Labs, for contributing the bulk of chapter 15 and for showing us a real-world example of where Tika shines. Tika in Action
For example, the web crawler component (using Bixo, a Cascading-based web-crawler toolkit developed by EMI and ShareThis) may run continuously on a small cluster with a companion Hypertable cluster. Hadoop:The Definitive Guide 3rd Edition
CGMgraph [8] is similar in concept, providing a number of parallel graph algorithms using the Coarse Grained Multicomputer (CGM) model based on MPI. Pregel - A System for Large-Scale Graph Processing
For example, the output from Example P-1 could be used to autogenerate an MPI machine file that contained the least-loaded machines in the cluster for load-balancing MPI jobs. Monitoring with Ganglia
All have downsides: gang scheduling may be needed by some jobs (e.g., MPI programs), but can unnecessarily delay the start of others that can make progress with only a fraction of their requested resources (e.g., MapReduce jobs) Omega - flexible, scalable schedulers for large compute clusters
Different from Hadoop, MPI was designed for high performance on both massively parallel machines and on workstation clusters. Hadoop Operations and Cluster Management Cookbook
Perhaps some of these issues were due to the fact that many of these distributed schedulers were originally created to support MPI style and HPC application models and running coarse-grained non-elastic workloads. Apache Hadoop YARN Yet Another Resource Negotiator
In this model, MapReduce is just another framework and doesn’t look any more special than a custom frameworks such as MPI, streaming, commercial products, or who knows what. MapReduce Design Patterns
Acknowledgments We appreciate the detailed and helpful feedback from Remzi Arpaci-Dusseau, Rose Hoberman, Jens Dittrich, and the Sysnets group members at MPI-SWS.We would like to thank Daniel Porto for helping us to set up the PigMix experiments. Incoop MapReduce for Incremental Computations
Abstract We present Mesos, a platform for sharing commodity clusters between multiple diverse cluster computing frameworks, such as Hadoop and MPI. Mesos A Platform for Fine-Grained Resource Sharing in the Data Center
By contrast, MPI programs have to explicitly manage their own checkpointing and recovery, which gives more control to the programmer but makes them more difficult to write. Hadoop:The Definitive Guide 3rd Edition
Early examples of other models being ported to YARN are stream-based processing and a port of the Message Passing Interface (MPI), which is broadly used in scientific computing. Hadoop Beginners Guide
To keep the clock from moving forward before all simulants are ready, the clock can ping actors at carefully chosen times to make sure they have received and processed all messages for the current time tick. Programming in Scala 2nd Edition
Inexact results are rounded to the nearest representable value, with ties going to the value with a zero least-significant bit. The Java Virtual Machine Specification Java SE 7 Edition
Returning it without boxing is trickier in the JVM, of course, because the JVM only provides method-return instructions passing values representable in a 64-bit machine register.) But if you pass a larger value type as an argument (perhaps a large immutable array), then the compiler can instead, transparently to. Java 8 in Action Lambdas, Streams and Functional-style Programming
The returned value, Double.NaN, is the IEEE representation for a computation that does not have a representable floating-point value. Programming in Scala 2nd Edition
The value must be too large (a positive value of large magnitude or positive infinity), and the result of the first step is the largest representable value of type int or long. The Java Language Specification Java SE 7 Edition
The infinity values result when a floating-point computation produces a value that overflows the representable range of a float or double. Java in a Nutshell 5th Edition
Early on in the history of the Internet, a system was designed that made it easy to distribute new and updated protocol specifications to protocol implementers. Java Network Programming and Distributed Computing
You can tackle the same problem (creating an outline of an algorithm and letting implementers plug in some parts) using your favorite lambdas! The different components of the algorithms you want to plug in can be represented by lambda expressions or method references. Java 8 in Action Lambdas, Streams and Functional-style Programming
Reliability, failover, and scalability — In the past, implementers of parallel applications struggled to deal with the issue of reliability when it came to moving to a cluster of machines. Professional Hadoop Solutions
The trade-off is between the implementers and the clients of an interface. Programming in Scala 2nd Edition
Many local systems implementers and consultants also have Puppet, skills should you require assistance. Pro Puppet
Protected Visibility Protected visibility is for the benefit of implementers of derived types, who need a little more access to the details of their parent types. Programming Scala
InputFormat implementers must fulfill three contracts: first, they describe type information for map input keys and values; next, they specify how the input data should be partitioned; and finally, they indicate the RecordReader instance that should read the data from source. Hadoop in Practice
Other implementers may replace this package with one of their own; for instance, one that uses native code to speed up the CPU-intensive key generation and encryption process. Java Network Programming 4th Edition
Also, third-party implementers can create resources that will work with the try-with-resources statements by implementing the AutoCloseable interface. Java 7 Recipes A Problem-Solution Approach
A client can always depend on the availability of this core API and implementers are always required to support it in its entirety. OpenStack Operations Guide
There are some workarounds for TailSource having been removed, but it should be noted that no workaround can eliminate the possibility of data loss under load under these conditions. Apache Flume Distributed Log Collection for Hadoop
We have put up a list of frequently asked questions, bugs fixes, and workarounds on a web page at http://horstmann.com/corejava. Core Java Volume I Fundamentals 9th Edition
There are a few rough edges with integration we’ll run into, but the workarounds are fairly easy. Programming Concurrency on the JVM
We showed a number of workarounds for specific cases; for the general case, you’ll have to use other techniques, such as performing the ALTER on a replica and then promoting it to master. High Performance MySQL 3rd Edition
Over the years a lot of “workarounds” were invented to allow real time updates while still using HTTP, but none of them was optimal. Netty in Action MEAP V08
Developers, in order to leverage the physical resources, often resorted to clever workarounds to sidestep the limits of the MapReduce API. Apache Hadoop YARN Yet Another Resource Negotiator
However, these kinds of products rarely supported the full dynamic nature of the Java language and were unable to graciously handle things like code being replaced at runtime without large workarounds. Oracle JRockit The Definitive Guide
My colleague Kirk Pepperdine, who first pointed out the performance problem to me, puts it this way: "I've now got a bitwise-correct but excruciatingly slow program." The potential workarounds to this performance issue are all ugly: using an earlier JDK version, replacing the JDK class with an earlier version, or writing your own class to manage faster alternative floating-point calculations. Java Performance Tuning 2nd Edition
Rather, it’s a general problem for all systems that use the IEEE standard for encoding floating-point numbers! However, there are two workarounds we can use in Hive. Programming Hive
Due to its requirements for portability and robustness, even simple additions to the code base involve a lot of error checking and handling, and a lot of portability workarounds. Understanding MySQL Internals
The unmarshaller property specifies the XML unmarshaller to use, which in our case is the Castor’s batchMarshaller bean. Pro Spring 3
You’re using the oxm namespace to define a JAXB2 marshaller, which happens to be an unmarshaller too. Spring in Practice
Spring OXM provides generic components called marshaller and unmarshaller to convert, respectively, objects to XML, and vice versa, as shown in figure 5.7 Spring Batch in Action
This decoupling is achieved by encapsulating the mapping process behind implementations of the Marshaller interface, which maps from an Object to the XML Result, and the Unmarshaller interface, which maps from a Source to the Object representation. Spring Integration in Action
While using JAXB for document processing, the Unmarshaller needs to be first created as shown in the following code snippet. Java Performance
There are too many to name, but all of you in Dublin, Portland, Lisbon, London, Zurich, San Francisco, Mountain View, Dortmund, Stockholm, Hamburg, Frankfurt, Salt Lake City, Blacksburg, San Diego, and Amsterdam: you know who you are—thanks! To my family, friends, and coworkers: thanks you for your support and your patience with me over the last year. CouchDB The Definitive Guide
The book introduces you to the world of mining text and binary documents and other information sources like internet media types and Dublin Core metadata. Tika in Action
The line is terminated by a line separator sequence, such as a carriage return/linefeed. Java Network Programming and Distributed Computing
After each 72-character chunk is written, a carriage return and a linefeed are written onto the output stream. Java Network Programming 4th Edition
Text files use \n (linefeed) as the default row delimiter. Programming Hive
The script is invoked with the additional arguments of the paths to the stdout, stderr, and syslog output files for the task. Pro Hadoop
For applications, the default root logger is INFO,console, which logs all messages at level INFO and above the console's stderr. Hadoop Operations and Cluster Management Cookbook
For example, the current implementation includes a log aggregation service that will upload data written by the application to stdout and stderr to HDFS once the application completes. Apache Hadoop YARN Yet Another Resource Negotiator
Each task records its stdout and stderr information to two files in this directory. Professional Hadoop Solutions
Instead, it will write data to stderr in a format that has special meaning. Hadoop RealWorld Solutions Cookbook
Depending on the problem, you may find additional useful information in the logs, or in the standard out (stdout) or standard error (stderr) of the task process. Hadoop in Practice
MapReduce task logs Users Each tasktracker child process produces a logfile using log4j (called syslog), a file for data sent to standard out (stdout), and a file for standard error (stderr) Hadoop:The Definitive Guide 3rd Edition
To view the log messages sent to the console on Windows systems, stderr must be redirected somewhere. Oracle JRockit The Definitive Guide
Your MapReduce program can output to STDOUT and STDERR (System.out and System.err in Java) its own logging messages. Hadoop in Action
There is a directory for each task attempt and several files within each; the one to look for is stderr. Hadoop Beginners Guide
You can query the PROCESSLIST table in the INFORMATION_SCHEMA if your server is new enough, or use innotop with a fast refresh rate and watch the screen for an unusual buildup of queries. High Performance MySQL 3rd Edition
Fitnesse has a built-in set of acceptance tests, which it uses to check itself for regressions. Jenkins Continuous Integration Cookbook
A crucial part of the value proposition of any Continuous Integration environment is to improve the flow of information about the health of your project, be it failing unit tests or regressions in the integration test suite, or other quality related issues such as a drop in code coverage or code quality metrics. Jenkins The Definitive Guide
Regressions and failures should fail the build, prompting developers to address the issues in a timely manner. Graph Databases
These are functional unit tests that the developers use to verify a release is fully operational and that there are no regressions. HBase:The Definitive Guide
Continuous testing against performance regressions is also done as a fundamental part of our QA infrastructure. Oracle JRockit The Definitive Guide
In this case, loose coupling can insulate you from causing regressions that in turn cause unhappy service consumers with broken systems. Spring Integration in Action
The output of an automated performance testing activity could emit notifications, such as sending e-mail to the application stakeholders notifying them of performance results, such as identified performance regressions, identified performance improvements, or status on how well performance criteria is being met. Java Performance
Integration tests are also automated and often run at least daily to ensure that there are no regressions introduced by developers. Pro JPA2
It can be used to record workflows so that developers can prevent future regressions of code. Selenium 2 Testing Tools Beginner's Guide
The plugin named eclipse-wtp builds on top of the eclipse plugin and generates configuration files to be used with Eclipse’s Web Tools Platform (WTP) Gradle in Action
We add the Eclipse WTP plugin to the project and also the War or Ear plugin. Gradle Effective Implementation Guide
You can see that a spreadsheet is a scrollable table. Programming in Scala 2nd Edition
In a scrollable result, you can move forward and backward through a result set and even jump to any position. Core Java Volume II Advanced Features 9th Edition
Some have restrictions, such as only supporting update batching with one type of Statement (Oracle batches updates only with PreparedStatement) or one mode of ResultSet (DB2 doesn't batch when used with scrollable ResultSets) Java Performance Tuning 2nd Edition
Create a scrollable ResultSet object and then you will have the ability to read the next, first record, last, and previous record. Java 7 Recipes A Problem-Solution Approach
More recently, the JDBC specification has taken this even further with the concept of scrollable result sets, which can be navigated forward and backward as required. Pro JPA2
Since all experiments could run in a relatively short time, failure probability was low, and checkpointing was disabled. Pregel - A System for Large-Scale Graph Processing
This includes storage management, caching, fault-detection, checkpointing, push-based control flow (showcased experimentally later), and container reuse. Apache Hadoop YARN Yet Another Resource Negotiator
To minimize the impact of checkpoint creation and the NameNode functioning, checkpointing is performed by the Secondary NameNode daemon, often on a separate machine. Professional Hadoop Solutions
Lastly, we turn off checkpointing to tell Giraph that we do not care about backing up the graph state at any superstep. Hadoop RealWorld Solutions Cookbook
Apart from doing its job of checkpointing and backing up the metadata, it’s also typically the server you fall back on if the NameNode server goes to lunch and doesn’t come back. HBase in Action
The Backup Node is a superset of the Checkpoint Node, also providing that checkpointing mechanism, as well as acting as a NameNode in its own right. Hadoop in Practice
By contrast, MPI programs have to explicitly manage their own checkpointing and recovery, which gives more control to the programmer but makes them more difficult to write. Hadoop:The Definitive Guide 3rd Edition
Therefore, it’s more appropriate to think of the SNN as a checkpointing server. Hadoop in Action
Checkpointing is usually simpler to arrange and is thus often preferable in other situations. Concurrent Programming in Java Design Principles and Pattern
The probability of failure in these next generation applications will be far larger than it is today, and restarting entire jobs upon a failure will be unacceptable (failures might be common enough that long-running jobs never finish!) Thus, although Hadoop and HadoopDB pay a performance penalty for runtime scheduling, block-level restart, and frequent checkpointing, such an overhead to achieve robust fault tolerance will become necessary in the future. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
Audio page 147 Robin explains the progression of KMeans clustering iterations. Mahout in Action
The iteration time of kmeans is dominated by computation, while logistic regression is less compute-intensive and thus more sensitive to time spent in deserialization and I/O. Resilient Distributed Datasets - A Fault-Tolerant Abstraction for In-Memory Cluster Computing
This is common practice for algorithms that have some sort of optimization component, such as kmeans clustering in MapReduce. MapReduce Design Patterns
Example 3-10 shows the load-balancing broker rewritten to use a higher-level API (CZMQ for the C case) ZeroMQ
In our example, the customizer is rather spare, containing a single button. Core Java Volume II Advanced Features 9th Edition
A pure functional program is a single referentially transparent expression. Scala in Action
A function is referentially transparent if it always returns the same result value when called with the same argument value. Java 8 in Action Lambdas, Streams and Functional-style Programming
Methods like replace are called referentially transparent, which means that for any given input the method call could be replaced by its result without affecting the program’s semantics. Programming in Scala 2nd Edition
This is all it means for an expression to be referentially transparent—in any program, the expression can be replaced by its result without changing the meaning of the program. Functional Programming in Scala
It is the combination of referentially transparent functions and immutable values that make functional programming compelling as a better way to write concurrent software. Programming Scala
He has been helping the Japanese Hadoop and HBase community to grow since 2010 HBase Administration Cookbook
Unicode grew beyond 65,536 characters, primarily due to the addition of a very large set of ideographs used for Chinese, Japanese, and Korean. Core Java Volume I Fundamentals 9th Edition
Each of these calendar systems has a dedicated date class: ThaiBuddhistDate, MinguoDate, JapaneseDate, and HijrahDate. Java 8 in Action Lambdas, Streams and Functional-style Programming
Letters and digits may be drawn from the entire Unicode character set, which supports most writing scripts in use in the world today, including the large sets for Chinese, Japanese, and Korean. The Java Language Specification Java SE 7 Edition
Java SE also predefines a number of language locales that specify just a language without a location: Locale.CHINESE Locale.ENGLISH Locale.FRENCH Locale.GERMAN Locale.ITALIAN Locale.JAPANESE. Core Java Volume II Advanced Features 9th Edition
This means if Japanese script is used before digits, then Japanese digits are displayed. Java 7 New Features Cookbook
While most species are resident, others, including the Japanese Paradise flycatcher and the Satin flycatcher, are migratory. Cassandra The Definitive Guide
However, a web server that uses PrintStream may well send the files encoded in CP1252 from a U.S.-localized Windows system or SJIS from a Japanese-localized system, whether the client expects or understands those encodings or not. Java Network Programming 4th Edition
A JFlex-based1 grammar underlies it, tokenizing with cleverness for the following lexical types: alphanumerics, acronyms, company names, e-mail addresses, computer host names, numbers, words with an interior apostrophe, serial numbers, IP addresses, and CJK (Chinese Japanese Korean) characters. Lucene in Action 2nd Edition
The demoComplex() method finds two Japanese symbols in a string: Java 7 Recipes A Problem-Solution Approach
This is also a demonstration of Solritas, which formats Solr requests using templates based on Apache Velocity. Solr 3 Enterprise Search Server
This parameter specifies how all the web pages rendered by Solritas will look like. Solr 3.1 Cookbook
As we'll see in section 2.2.5 below, Solr provides an example search UI, called Solritas, to help you get started building your own awesome search application. Solr in action
Use the following steps on a command line to create a new Android Virtual Device (AVD), and use this AVD in the emulator for Android: Selenium Testing Tools Cookbook
After following these steps to install and configure your development environment, you will be ready to develop your first Android mobile application and test it using an AVD. Java 7 Recipes A Problem-Solution Approach
Visit the Jenkins configuration page (http://localhost:8080/configure), and review the markup formatters. Jenkins Continuous Integration Cookbook
Also, in the init() method, the custom formatter is registered by calling the setFormatters() method. Pro Spring 3
Property editors are the old-style of doing type conversion, whereas converters and formatters are the new way of doing type conversion. Pro Spring MVC
All DateTimeFormatters can be used to create a String representing a given date or time in a specific format. Java 8 in Action Lambdas, Streams and Functional-style Programming
Hadoop by default loads data from flat files, and it is a responsibility of the MapReduce job to read and parse the data through data formatters. Hadoop MapReduce Cookbook
It takes several options: formatters at E (to set where the results of the tests should be printed–on the console and in XML files in our case), the classpath to use for launching the tests F, and the batchtest element specifying the set of tests that should be launched G. Spring Dynamic Modules in Action
The NumberFormat type is an abstract class, and the actual formatters belong to one of its subclasses. Core Java Volume II Advanced Features 9th Edition
You can create your own formatters by extending the Formatter abstract class. Java 7 Recipes A Problem-Solution Approach
The DateTimeFormatter class provides three kinds of formatters to print a date/time value: Java SE 8 for the Really Impatient
We'd also like to thank our editorial team at Addison-Wesley, including Karen Gettman, whose initial encouragement and persistence convinced us to take on the project, Mary Hart, Marcy Barnes-Henrie, Melissa Dobson, and Emily Frey. Java Network Programming and Distributed Computing
This distribution of tests and their correlation to ROI is best illustrated by the test automation pyramid, introduced by Mike Cohn in his book Succeeding with Agile: Software Development Using Scrum (Addison Wesley, 2009) Gradle in Action
Ann Sellers, Greg Doench, and John Fuller at Addison-Wesley were exceedingly patient and ensured that the book materialized, despite the many missed deadlines for this text. The Java Language Specification Java SE 7 Edition
Subscribers have access to thousands of books, training videos, and prepublication manuscripts in one fully searchable database from publishers like O’Reilly Media, Prentice Hall Professional, Addison-Wesley. Java EE 7 Essentials
I thank the whole team at Addison-Wesley for the their kindness, professionalism, patience, and grace under pressure. Effective Java 2nd Edition
Effective Java Programming Guide by Joshua Bloch (Addison Wesley) includes a helpful recipe for constructing efficient hashCode() methods like this one. Java in a Nutshell 5th Edition
A good place to start is the classic reference The Art of Computer Programming by Donald Knuth (Addison-Wesley) Java Performance Tuning 2nd Edition
Find trusted answers, fast Only Safari lets you search across thousands of best-selling books from the top technology publishers, including Addison-Wesley Professional, Cisco Press, O'Reilly, Prentice Hall, Que, and Sarns. Java Performance
Where those designations appear in this book and Addison-Wesley was aware of a trademark claim, the designations have been printed in initial caps or all caps. Concurrent Programming in Java Design Principles and Pattern
The continued growth in software engineering maturity today can be seen in the DevOps movement, climaxing with the publication last year of Jez Humble and David Farley’s book Continuous Delivery (AddisonWesley) Building and Testing with Gradle
Sample configurations for other web servers such as Nginx and Lighttpd are available on the gweb wiki. Monitoring with Ganglia
You can also use Nginx, Squid, or Apache in event-driven mode in front of the application. High Performance MySQL 3rd Edition
When a traditional web stack uses an HTTP server like Apache or Nginx to pass requests to code, incoming SSL requests have already been decoded at the point when they are received by the application code. Netty in Action MEAP V08
We know we are ready to render everything for the current user, so we pass the profile row and the subdomain rows to a render function (which nicely hides all the gnarly nginx config details from our fair reader) CouchDB The Definitive Guide
A workaround would be to create an SSL proxy using nginx or Apache and mod_proxy. Beginning CouchDB
The dumbproxy is nginx packaged up with a custom proxying module. Scaling CouchDB
Adopt Nginx for your web applications to make the most of your infrastructure and serve pages faster than ever. Solr 3.1 Cookbook
In production situations, a more robust web server such as Apache or Nginx is necessary to handle the number of client requests. Pro Puppet
We expect this to return an integer, as the x method on T returns the X type, and this is aliased to Int. Scala in Depth
If you create a table with an aliased data type and then examine SHOW CREATE TABLE, you’ll see that MySQL reports the base type, not the alias you used. High Performance MySQL 3rd Edition
We also defined an additional field aliased as url_length to be calculated for each selected record. Hadoop RealWorld Solutions Cookbook
Finally, note that the stringLists array could be aliased through variables of types other than Object[], and heap pollution could still occur. The Java Language Specification Java SE 7 Edition
We can now refer to this resource as File["passwd"] as an aliased short-hand. Pro Puppet
Summary This short overview of Nutch necessarily omits many details, such as error handling, logging, URL filtering and normalization, dealing with redirects or other forms of “aliased” pages (such as mirrors), removing duplicate content, calculating PageRank scoring, etc. Hadoop:The Definitive Guide 3rd Edition
As can be seen, the user home directory is aliased to. Hadoop Beginners Guide
As in SQL, it has been aliased to the identifier e. Pro JPA2
This structure is defined in sql/table.h as struct st_table, but then is aliased to TABLE with a typedef in sql/handler.h. Understanding MySQL Internals
When developing Swing GUI applications, it is imperative to understand how to effectively interact with its event dispatching thread (EDT) Java 7 Recipes A Problem-Solution Approach
Our MergeAgent service decompresses each new index into a Lucene RAMDirectory or FSDirectory (depending on size), merges them to local disk, and sends a request to the Solr instance hosting the index to make the changed index visible to queries. Hadoop:The Definitive Guide 3rd Edition
The other commonly used implementation of Directory is a class called RAMDirectory. Lucene in Action 2nd Edition
The reasons may be different—you may want to have a smaller index so that it would fit into the operating system's I/O cache or you want to store your index in RAMDirectory. Apache Solr 4 Cookbook
For efficiency, the results of several calls to publish may be batched up in a single call to process. Core Java Volume I Fundamentals 9th Edition
Given that the total number of networks is relatively bounded, if the incoming log records are batched in smaller sizes, this job will run reasonably well and reasonably fast. Pro Hadoop
Comet [13] introduces the Batched Stream Processing (BSP), where input data is modeled as a stream, with queries being triggered upon bulk appends to the stream. Incoop MapReduce for Incremental Computations
Moreover, if multiple traced requests are batched together, only one of them will appear responsible for the span due to our reliance on a single unique trace id for each trace. Dapper a Large-Scale Distributed Systems Tracing Infrastructure
When one of the NameNode’s threads initiates a flush-and-sync operation, all transactions batched at that time are committed together. The Hadoop Distributed File System
The batch is too large for each row, so all 20 columns are batched. HBase:The Definitive Guide
If files are being batched and then fed to Flume, then a file's contents may have timestamps from the previous hour than when they are being processed. Hadoop Beginners Guide
First, the number of messages can be reduced by combining multiple messages into fewer batched messages. Java Performance Tuning 2nd Edition
The message consumer has to work twice as hard as the message producer, so optimizing delivery with a MessageListener and using straight-through message processing together with an acknowledgment mode or transactions that allow acknowledgments to be batched can reduce this load. ActiveMQ in Action
Many conditional mutations destined for the same tablet server can also be batched together into a single RPC to further reduce the total number of RPCs we send. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications
For instance, one might have misconfigured gmond to the extent that certain nodes are not shown in the web interface. Monitoring with Ganglia
But those descriptor files can be misconfigured, and so we may want to override the descriptors ourselves to ensure the dependencies are correct. Gradle Effective Implementation Guide
Often, you can find issues here when RegionServers have fallen over, aren’t balanced in terms of the regions and requests they’re serving, or are misconfigured to use less heap than you had planned to give them. HBase in Action
A message path is essentially a directed graph (which is typically acyclic, but it may contain loops if servers are misconfigured) Hadoop:The Definitive Guide 3rd Edition
This ranges from misconfigured or faulty network interface cards (NICs) to completely oversubscribed switches in the I/O path. HBase:The Definitive Guide
If the Management Console tells you that a certain MBean, for instance the Profiling MBean, cannot be found, it may be due to a misconfigured jmxremote.access file. Oracle JRockit The Definitive Guide
When run across a cluster, there is a real risk that a misconfigured or ill host will cause its tasks to run significantly slower than the others. Hadoop Beginners Guide
Kerberos does not, by definition, afford leniency to misconfigured clients. Hadoop Operations
Not only do we have to deal with older protocols such as FTP that predate MIME, but many HTTP servers that should use MIME don’t provide MIME headers at all or lie and provide headers that are incorrect (usually because the server has been misconfigured) Java Network Programming 4th Edition
The most common network problems included inadequate bandwidth somewhere along the communication route, and undersized, misconfigured, or incompatible routers, switches, firewalls, and load balancers. Java Performance Tuning 2nd Edition
Certain Broadcom Network Interface Controllers (NICs) are known to cause spikes due to hardware bugs. Monitoring with Ganglia
If the switch ports are inexpensive, using bonded network interface cards (NICs) to increase per machine network bandwidth will greatly increase the I/O performance of the cluster. Pro Hadoop
Because of the wide variety of NICs, many addressing schemes are used. Java Network Programming and Distributed Computing
If you need more bandwidth than that, you can use network trunking: connecting multiple network interface cards (NICs) to get more bandwidth. High Performance MySQL 3rd Edition
All VM NICs will be attached to this port group. bk-compute-adminguide-grizzly
For the nodes hosting these processes, it’s recommended that you have redundancy at the hardware level for the various components: dual power supplies, bonded network interface cards (NICs), and possibly RAID disks. HBase in Action
In between each of the components there are, of course, many networking elements: cables, switches, patch panels, NICs, power supplies, air conditioning, and so on—all of which can fail at inconvenient times. Graph Databases
This ranges from misconfigured or faulty network interface cards (NICs) to completely oversubscribed switches in the I/O path. HBase:The Definitive Guide
Dual power supplies, bonded network interface cards (NICs), and sometimes even RAID 10 in the case of the namenode storage device, are not uncommon to find in the wild. Hadoop Operations
For example, you usually cannot configure NICs for VLANs when PXE booting. OpenStack Operations Guide
Metric modules are dynamically loadable shared object files that extend the available metrics gmond is able to collect. Monitoring with Ganglia
Using the LoadableComponent class We can implement the objects of the Page Object model using the LoadableComponent class of Selenium WebDriver. Selenium Testing Tools Cookbook
The process of validation could unwittingly cause the entire object graph to be loaded into memory! Another case is if validation is occurring on a JPA entity on the client side and the unloaded attributes are not even loadable. Pro JPA2
LoadableComponent is a base class that all of the pages need to extend. Selenium 2 Testing Tools Beginner's Guide
This includes HTML validators, link checkers, search engine crawlers, and security tools. Jenkins Continuous Integration Cookbook
In addition, custom validators (for example, class-level validators) can be developed and applied using annotation. Pro Spring 3
They allow object property creation with built-in validators, getters, setters, and more, and all are very testable: Testable JavaScript
This means that Validators will be equivalent to those obtained by first acquiring a Valictory and then invoking the getValidator method on it with no. Java EE 7 Specification
Besides these attributes, the job element supports nested elements to configure listeners and validators. Spring Batch in Action
The validators themselves are straightforward; they return true if they consider the person valid and false otherwise. Functional Programming Patterns in Scala and Clojure
Any custom converters, validators, renderers, if attached for the UI components, are restored in this phase. Java EE 7 Essentials
This package is of primary interest to those implementing schema validators and XPath evaluators and should not be required by applications that use schemas or XPath expressions. Java in a Nutshell 5th Edition
The Schema class can then be used either to create parsers that are optimized for validating documents based on that schema or to create validators that can validate different XML input sources (SAX, DOM, or Stream) Java Performance
Thus, Spring Batch supports the processing of large volumes of data with features such as automatic retries after failure, skipping of records, job restarting from the point of last failure, periodic batch commits to a transactional database, reusable components (such as parsers, mappers, readers, processors, writers, and validators), and workflow definitions. Spring Data Modern Data Access for Enterprise Java
There are additional language constructs that allow the addition of arbitrary Java classes into the namespace of the Jython applications. Pro Hadoop
The book includes an introduction to Jython, which allows you to combine Java and Python in a single program (the Jython interpreter is compiled to pure Java bytecodes, so there is nothing special you need to add to accomplish this) Thinking in Java 4th Edition
And by installing additional plugins, you can also integrate other build tools, such as Groovy, Gradle, Grails, Jython, MSBuild, Phing, Python, Rake, and Ruby, just to name some of the more well-known tools. Jenkins The Definitive Guide
To build the file, download the Jython java installer, run the installer, and select Standalone from the installation menu. Hadoop RealWorld Solutions Cookbook
Jython is an implementation of Python on the JVM, and there are entirely unique languages like Clojure and Scala as well. HBase in Action
Embedded Pig programs always run in a JVM, so for Python and JavaScript you use the pig command followed by the name of your script, and the appropriate Java scripting engine will be selected (Jython for Python, Rhino for JavaScript) Hadoop:The Definitive Guide 3rd Edition
These functions can be written in Java or in scripting languages that can compile down to Java (e.g., Jython) Programming Pig
If you prefer a reverse port, you could simply use Jython, a port of the Python language to run on a JVM, Lucene in Action 2nd Edition
All are JVM (Java Virtual Machine) libraries that can be used from programming languages like Java, Clojure, Scala, JRuby, Groovy, and Jython, as opposed to tools with their own languages, like Hive and Pig. Programming Hive
Not only is Java 7 the most modern, statically typed, object-oriented language available for development, it also enhances the ability to integrate different languages that run on the JVM, such as Jython, Groovy, JRuby, and Scala to name a handful. Java 7 Recipes A Problem-Solution Approach
At the other end of the spectrum, if you’re coding up a C++ desktop application and you can’t afford a separate server let alone a separate process, choose a native port like CLucene. Lucene in Action 2nd Edition
A Linux i386 version is provided in the distribution in the directory libhdfs. Pro Hadoop
Valid program names are: DFSCIOTest: Distributed i/o benchmark of libhdfs. Hadoop Operations and Cluster Management Cookbook
You may have to download the Hadoop standard distribution and compile the libhdfs library from the source code, if your operating system is not compatible with the pre-compiled libraries. Hadoop MapReduce Cookbook
You can find the generated documentation for the C API in the libhdfs/docs/api directory of the Hadoop distribution. Hadoop:The Definitive Guide 3rd Edition
This is where libhdfs.so, libhadoop.a, and libhadooppipes.a live, for example. Hadoop Operations
Timestamp: This is used to add a timestamp header, possibly overwriting an existing one. Apache Flume Distributed Log Collection for Hadoop
The script also backs up the original /etc/hosts file before overwriting it. HBase Administration Cookbook
The single biggest difference between Java and C/C++ is that Java has a pointer model that eliminates the possibility of overwriting memory and corrupting data. Core Java Volume I Fundamentals 9th Edition
Of course, their usefulness in most applications is limited—the thought of someone overwriting your page, uploading a rogue servlet, or deleting your Web site is fairly frightening. Java Network Programming and Distributed Computing
The massive data storage capabilities of Hadoop enable you to store versions of data sets, as opposed to the traditional approach of overwriting data. Professional Hadoop Solutions
That value is always unique, so you’ll never run into the problem of overwriting existing information. HBase in Action
Although the data will survive the loss of an individual RAID disk, it may not if the RAID controller fails or is buggy (perhaps overwriting some data), or the entire array is damaged. Hadoop:The Definitive Guide 3rd Edition
Code written in C or C++ offers no protection against overwriting memory through invalid pointer usage. Core Java Volume II Advanced Features 9th Edition
You should use the HDFS permission system only to prevent accidental misuse and overwriting of data among trusted users sharing a Hadoop cluster. Hadoop in Action
Applications can use temporary files for any purpose without worrying about overwriting files belonging to other applications. Java in a Nutshell 5th Edition
We'd also like to thank our editorial team at Addison-Wesley, including Karen Gettman, whose initial encouragement and persistence convinced us to take on the project, Mary Hart, Marcy Barnes-Henrie, Melissa Dobson, and Emily Frey. Java Network Programming and Distributed Computing
This distribution of tests and their correlation to ROI is best illustrated by the test automation pyramid, introduced by Mike Cohn in his book Succeeding with Agile: Software Development Using Scrum (Addison Wesley, 2009) Gradle in Action
Ann Sellers, Greg Doench, and John Fuller at Addison-Wesley were exceedingly patient and ensured that the book materialized, despite the many missed deadlines for this text. The Java Language Specification Java SE 7 Edition
Subscribers have access to thousands of books, training videos, and prepublication manuscripts in one fully searchable database from publishers like O’Reilly Media, Prentice Hall Professional, Addison-Wesley. Java EE 7 Essentials
I thank the whole team at Addison-Wesley for the their kindness, professionalism, patience, and grace under pressure. Effective Java 2nd Edition
Effective Java Programming Guide by Joshua Bloch (Addison Wesley) includes a helpful recipe for constructing efficient hashCode() methods like this one. Java in a Nutshell 5th Edition
A good place to start is the classic reference The Art of Computer Programming by Donald Knuth (Addison-Wesley) Java Performance Tuning 2nd Edition
Find trusted answers, fast Only Safari lets you search across thousands of best-selling books from the top technology publishers, including Addison-Wesley Professional, Cisco Press, O'Reilly, Prentice Hall, Que, and Sarns. Java Performance
Where those designations appear in this book and Addison-Wesley was aware of a trademark claim, the designations have been printed in initial caps or all caps. Concurrent Programming in Java Design Principles and Pattern
The continued growth in software engineering maturity today can be seen in the DevOps movement, climaxing with the publication last year of Jez Humble and David Farley’s book Continuous Delivery (AddisonWesley) Building and Testing with Gradle
As an example, on our box, our keypair file named book-test.pem is stored under the .ec2 directory in our home directory and we want to place the results file in /tmp directory. Performance Testing With JMeter 2.9
Creating Certificates You can create certificates contained within pem files using these nova client commands, ensuring you have set up your environment variables for the nova client: bk-compute-adminguide-grizzly
There you tell openssl that the certificate will be stored in the file cacert.pem in the same directory as the configuration file. RabbitMQ in Action
Download and save the private key file (PEM format) in a safe location. Hadoop MapReduce Cookbook
The puppet cert command will automatically keep the ca_crl.pem file updated as we issue and revoke new Puppet agent certificates. Pro Puppet
You will want to import the public key into the Java keystores of all employees, but it is in the Privacy Enhanced Mail (PEM) format, not the DER format that the keystore accepts easily. Core Java Volume II Advanced Features 9th Edition
The filenames for the certificate and the private key are prefixed with cert- and pk-, respectively, and they have the .pem file extension. Hadoop in Action
To set the permissions of the MY_KEY.pem file, run the following command: user-guide
Master_SSL_CA_Path Pathname to a directory containing trusted SSL CA certificates in pem format. Understanding MySQL Internals
The file mykey.pem is the private key which should be saved to a secure location as it allows root access to instances the mykey key is associated with. OpenStack Operations Guide
In addition, if the data has more than one categorical word-like or text-like variable, it’s possible to concatenate your variables together, disambiguating them by prefixing them in an unambiguous way. Mahout in Action
Per virtual machine statistics are distinguished in Ganglia by prefixing the statistic by the virtual machine name. Monitoring with Ganglia
Register it with your component with the method produced by prefixing "add" to your listener name. Thinking in Java 4th Edition
Be sure to escape the & character by prefixing it with a backslash. Beginning CouchDB
In a different scenario, you might decide to “namespace” the task names by prefixing them with lb or liquibase to keep them from colliding with tasks from other plug-ins, but for our purposes here we can keep the task names short and simple. Gradle Beyond The Basics
A single join is implemented as a single MapReduce job, but multiple joins can be performed in less than one MapReduce job per join if the same column is used in the join condition.12 You can see how many MapReduce jobs Hive will use for any particular query by prefixing it with the EXPLAIN keyword: Hadoop:The Definitive Guide 3rd Edition
This can be done, for example, by prefixing the row key with a nonsequential prefix. HBase:The Definitive Guide
It is possible to use regular expressions in the JRockit Mission Control filter textboxes by prefixing the filter string with "regexp:" Oracle JRockit The Definitive Guide
In its simplest form, collecting an experiment profile is as easy as prefixing collect -j on to the java command line used to launch a Java application. Java Performance
The single quotes used in the query parameter here have been escaped by prefixing them with an additional single quote. Pro JPA2
Also include noneditable text fields that show the current RGB values. Thinking in Java 4th Edition
Our sample program in Listing 6.32 has three input fields for the RGB values of a color. Core Java Volume II Advanced Features 9th Edition
For example, two java.awt.Color objects that both represent black (via RGB value 0) are typically intended to be treated as equivalent. Concurrent Programming in Java Design Principles and Pattern
The red, green, and blue (RGB) components will mix colors based a web standard color model. Java 7 Recipes A Problem-Solution Approach
Also included in 2.x are the additions of a Backup Node and Checkpoint Node, which serve as replacements of the SecondaryNameNode (although the SNN still exists) Hadoop in Practice
The Secondary NameNode (SNN) is an assistant daemon for monitoring the state of the cluster HDFS. Hadoop in Action
If jobs have equal priority, the first requester gets the open task slots. Pro Hadoop
To take advantage of this filter, the requester must pass a scheduler hint, using different_host as the key and a list of instance uuids as the value. bk-compute-adminguide-grizzly
In this case, the requester does not know anything about execution capabilities, or even the number of workers. Professional Hadoop Solutions
If it receives a GetSum message, it sends the current value of sum back to the requester using the message send requester ! sum. Programming in Scala 2nd Edition
Figure 2.2 Synchronous invocation: the requester suspends execution until it receives an answer. Spring Integration in Action
The proxy server would then request the page from the web server and forward the response back to the original requester. Java Network Programming 4th Edition
Many HotSpot VM operations are synchronous, that is, the requester blocks until the operation has completed, but some are asynchronous or concurrent, meaning that the requester can proceed in parallel with the VMThread (assuming no safepoint is initiated) Java Performance
Joinpoints: A joinpoint is a well-defined point during the execution of your application. Pro Spring 3
Here, we apply join to each subtask and return the sum. Core Java Volume I Fundamentals 9th Edition
When a task waits for a subtask to finish, the thread that’s executing the task picks up a new task to run. Programming Concurrency on the JVM
The fork/join framework was designed to recursively split a parallelizable task into smaller tasks and then combine the results of each subtask to produce the overall result. Java 8 in Action Lambdas, Streams and Functional-style Programming
Getting ready To use the fork/join framework for a task that returns a result for each subtask: Java 7 New Features Cookbook
Each subtask should be the only one operating on some small piece of a problem, not only conceptually but also at the level of lower-level resources and memory access patterns. Concurrent Programming in Java Design Principles and Pattern
Instead of simply tokenizing words, we also add a filter that converts the token into lowercase. Mahout in Action
With Scanner, the input, tokenizing, and parsing are all ensconced in various different kinds of "next" methods. Thinking in Java 4th Edition
Next, it iterates over each record, tokenizing the text into words and “flattening” the words into individual records. Professional Hadoop Solutions
In the previous function, I am taking the content field of the document, lowering it, and replacing any nonalphabetical characters with a space, before tokenizing the document into an array of words, split by a single whitespace token. Beginning CouchDB
In the Map function, we first replace all the nonalphanumeric characters from the input text value before tokenizing it. Hadoop MapReduce Cookbook
A compiler whose frontend reads source code (be it Java, C++, or anything else) usually works by first tokenizing the source code into known constructs and building an Abstract Syntax Tree (AST) Oracle JRockit The Definitive Guide
Analysis is the process of: o first, tokenizing a block of text into individual terms suitable for use in an. Elasticsearch The Definitive Guide
Regular expressions provide acceptable performance compared with using String searching methods and String character iteration tokenizing techniques. Java Performance Tuning 2nd Edition
WhitespaceAnalyzer didn’t lowercase, left in the dash, and did the bare minimum of tokenizing at whitespace boundaries. Lucene in Action 2nd Edition
String instances store Unicode character sequences and provide relatively simple operations for finding, replacing, and tokenizing characters using regular expressions. Java 7 Recipes A Problem-Solution Approach
If you stick with multicast, though, the entire cluster may share the same configuration file, which means that in practice Ganglia admins have to manage only as many configuration files as there are clusters. Monitoring with Ganglia
Parties include business stakeholders, enterprise architects, developers, testers, DBAs, system admins, and network admins. Performance Testing With JMeter 2.9
Admins can create and delete design documents despite the existence of this extreme validation function. CouchDB The Definitive Guide
For example, running a Job that sends an e-mail to all of the Jenkins admins warning them of the startup event. Jenkins Continuous Integration Cookbook
Keeping different kinds of documents in the same collection can be a nightmare for developers and admins. MongoDB The Definitive Guide 2nd Edition
Both authors and admins will be able to do this. Pro Spring MVC
In your organization, you need an alert about this to go both to the infrastructure admins (who get all alerts flagged as critical), and to your API dev team (who get all alerts tagged rate_limiting) RabbitMQ in Action
Puppet (http://www.puppetlabs.com/puppet) is a reaction to these gaps in the tools available to SysAdmins, Operators and Developers. Pro Puppet
The cluster owner, cluster admins, and job owner can always administer their jobs. Hadoop Operations
Chapter 9: Managing Projects and Users: This chapter walks through those userenabling processes that all admins must face to manage users, give them quotas to parcel out resources, and so on. OpenStack Operations Guide
The bitwise EXCLUSIVE OR, or XOR (^), produces a one in the output bit if one or the other input bit is a one, but not both. Thinking in Java 4th Edition
The Boolean class now includes the static methods logicalAnd, logicalOr, and logicalXor, to apply the and, or, and xor operations between two booleans. Java 8 in Action Lambdas, Streams and Functional-style Programming
Ours will hold the single integer used in XOR encryption: Java Security 2nd Edition
In this representation, is nothing more than a non-strict , andProp Boolean any of the usual functions ('and', 'or', 'not', 'xor', etc) can be defined for Boolean. Functional Programming in Scala
A function could serve this purpose, but the Filter is optimized for this case, and many filters can be grouped by “logical” filters such as And, Or, Xor, and Not, rapidly creating more complex filtering operations. Hadoop:The Definitive Guide 3rd Edition
BitComparator Performs a bitwise comparison, providing a BitwiseOp class with AND, OR, and XOR operators. HBase:The Definitive Guide
Note that the and, xor, and or operations now have the same first operand as destination, the way x86 requires. Oracle JRockit The Definitive Guide
Boolean XOR (^) When used with boolean operands, this operator computes the Exclusive OR (XOR) of its operands. Java in a Nutshell 5th Edition
The Sandbox contains an interesting meta-filter in the misc project, contributed by Kelvin Tan, which chains other filters together and performs AND, OR, XOR, and ANDNOT bit operations between them. Lucene in Action 2nd Edition
This can be optionally followed by the initial database name, in which case a zero byte terminator is added immediately after the XOR encrypted password, followed by the database name string without a terminating zero byte. Understanding MySQL Internals
That’s all we need to secure the given URL for the Scarvarez family only. Pro Spring Security
On any blocking call, libzmq will return -1 if there was an error. ZeroMQ
Sadly, that benefit was lost on the deprecation police, and Java SE 5.0 deprecated the show method for windows as well. Core Java Volume I Fundamentals 9th Edition
New MapReduce Context APIs and Deprecation of the Old Parameter Passing APIs The core of this change is that a Mapper or a Reducer Context object is passed to the Mapper and Reducer classes, in place of the JobConf, to configure(), and the Reporter and OutputCollector to map() and reduce() Pro Hadoop
The reason for deprecation is because the Thread.resume() method has been marked as depre-cated in the Java 2 platform. Java Network Programming and Distributed Computing
There’s one direction that’s quite clear: Whenever you want to use readLine( ), you shouldn’t do it with a DataInputStream (this is met with a deprecation message at compile time), but instead use a BufferedReader. Thinking in Java 4th Edition
You will get a deprecation warning when you compile code that makes use of these features in Scala 2.8 Programming in Scala 2nd Edition
A Java compiler must produce a deprecation warning when a type, method, field, or constructor whose declaration is annotated with the annotation @Deprecated is used (i.e. The Java Language Specification Java SE 7 Edition
We recommend routine use of the -deprecation and -unchecked options. Programming Scala
If you are using a release after 1.x, you may wish to use the new property names in your configuration files and code to remove deprecation warnings. Hadoop:The Definitive Guide 3rd Edition
This however, was a bit too late, and, even today, they are widely used both in legacy code and new applications, despite the deprecation warnings. Oracle JRockit The Definitive Guide
When this tag appears, the compiler notes the deprecation in the class file it produces. Java in a Nutshell 5th Edition
Look at each instance of gmond within the same network broadcast domain (since reachability is based on multicast packets), and find the udp_recv_channel block in gmond.conf. Apache Flume Distributed Log Collection for Hadoop
If you are not receiving Hadoop metrics after setting the servers property, doublecheck your gmond udp_recv_channel setting in gmond.conf. Monitoring with Ganglia
When a ticket retrieval message is received by your app over chan_recv, it looks up the ticket ID contained in the message. RabbitMQ in Action
Any other sequence (e.g., sending two messages in a row) will result in a return code of -1 from the send or recv call. ZeroMQ
In the recv() method, we're reading all the data available from a client. Java Threads 3rd Edition
If this action returns an successfully, we invoke the functionIO A recv. Functional Programming in Scala
A call to receive the next message m in the input buffer is represented by an event recv(m, pi) Zab High-performance broadcast for primary-backup systems
You have a list of senders’ addresses that you’d like to join. Pro Java 7 NIO.2
I’d receive the years in sequence as they arrive, but the senders are concurrent and nonblocking. Programming Concurrency on the JVM
If you require something more elaborate, such as multiple senders or attachments, you could modify the code yourself as a programming exercise, or use the JavaMail API covered in Chapter 13; it provides prewritten support for advanced mail features. Java Network Programming and Distributed Computing
In the next section, we’ll talk about creating message queues that can be used to send to a single recipient, or to communicate between many senders and receivers. Redis in Action
They often depend on DAOs, mail senders, SOAP proxies, and whatnot. Spring in Practice
But we also remove any possibility to coordinate senders and receivers. ZeroMQ
In the next sections, we focus on other targets like JMS and email senders. Spring Batch in Action
If the channel sits with the receiving end, you can let multiple senders sink their messages into the same bundle. Spring Integration in Action
The overall idea behind a MOM is that it acts as a message mediator between message senders and message receivers. ActiveMQ in Action
Figure 17.4 Like queues, topics decouple message senders from message receivers. Spring in Action 4th Edition
TcpConn The TcpConn metric module (Table A-5) provides a way to look at TCP network connections in an effort to detect problems or misconfiguration. Monitoring with Ganglia
The result of this misconfiguration was that none of the computationally intense work could be run in the map task, and the map method would return immediately with an exception. Pro Hadoop
In the case we’re examining, iostat’s output could point to either too much work, or misconfiguration (why are I/O requests queueing so long before reaching the disk, if it’s actually responding quickly?) High Performance MySQL 3rd Edition
However, in case of misconfiguration, you should monitor the archive for disc usage. Jenkins Continuous Integration Cookbook
Sometimes secondaries can fall behind by minutes, hours, or even days due to load, misconfiguration, network errors, or other issues. MongoDB The Definitive Guide 2nd Edition
If portability is an issue, then use the initialization or annotation method; otherwise, use the InitializingBean interface to reduce the amount of configuration your application needs and the chance of errors creeping into your application because of misconfiguration. Pro Spring 3
If left unspecified, there would be no text-analysis, which would in all likelihood be a misconfiguration. Solr 3 Enterprise Search Server
Common sources of error are either misconfiguration or lack of connectivity from the Hadoop nodes. Hadoop in Practice
Tasks may be slow for various reasons, including hardware degradation or software misconfiguration, but the causes may be hard to detect because the tasks still complete successfully, albeit after a longer time than expected. Hadoop:The Definitive Guide 3rd Edition
You’ll want to iron out any kinks in DNS resolution, network connectivity, and simple misconfiguration early. Hadoop Operations
To obtain the current balance, we use the deref() method, which is the Java-side API for the @ prefix we used in Clojure to dereference. Programming Concurrency on the JVM
Unlike normal software engineering, the failures of models aren’t usually as dramatic as a null pointer dereference or out-of-memory exception. Mahout in Action
The sort command can dereference those relations and sort by the underlying value. The Little Redis Book
For each execution, the behavior of reads is influenced by two additional partial orders, the dereference chain dereferences() and the memory chain mc(), which are considered to be part of the execution (and thus, fixed for any particular execution) The Java Language Specification Java SE 7 Edition
Assembly or LIR instructions that dereference memory typically annotate their pointers as a value or variable within square brackets. Oracle JRockit The Definitive Guide
Therefore, you must prefix every JNI call with (*env)-> to actually dereference the function pointer. Core Java Volume II Advanced Features 9th Edition
Note that when recycling container objects, you need to dereference all the elements previously in the container so that you don't prevent them from being garbage-collected. Java Performance Tuning 2nd Edition
In addition, the resizing can also impact Collection’s field access time, the time it takes to dereference a field, because a new underlying data store, again typically an array, for the Collection’s underlying data store may be allocated in a location in the JVM heap away from the object references stored within the data store and the other fields of the Collection. Java Performance
At this point, you can use the dereference() function to dereference the Owner field to the person["Owner"] field as an argument. The Definitive Guide to MongoDB
On a little-endian architecture, the macro is a mere pointer dereference. Understanding MySQL Internals
It is also possible to use VLANs to separate these networks. bk-compute-adminguide-grizzly
Advanced features such as VLANs that can cause overhead are not recommended. Hadoop Operations and Cluster Management Cookbook
Competent system administration skills, with advanced knowledge of key areas such as virtualization (perhaps deployed Xen or VMware at their company), storage (usage of iSCSI), and networking (understanding of VLANS and advanced switching) Deploying OpenStack
OpenStack Compute creates the Linux networking bridges and VLANs when required. bk-admin-guide-cloud-latest
Determined to be” really means that Cassandra has to guess based on an assumption of how your servers are located in different VLANs or subnets. Cassandra The Definitive Guide
You should be familiar with concepts such as DHCP, Linux bridges, VLANs, and iptables. OpenStack Operations Guide
We also discussed special types of objects called embeddables that are mapped but can exist only within persistent entities. Pro JPA2
It will cause the plug-in to consider JPA mapping annotations to discover entities, relationships to other entities, embeddables, etc. Spring Data Modern Data Access for Enterprise Java
DynamoDB presents a key-value interface, and only replicates within a region. Spanner - Google’s Globally-Distributed Database
DynamoDB — Amazon DynamoDB is a fully managed NoSQL database that allows scaling up or down an individual table’s request capacity without downtime or performance degradation. Professional Hadoop Solutions
Another AWS service with similar support is DynamoDB (at http://aws.amazon.com/ dynamodb), a hosted NoSQL database solution in the cloud. Hadoop Beginners Guide
This allows the user to issue queries seamlessly whether the table represents a text file stored in Hadoop or a column family stored in a NoSQL database such as Apache HBase, Apache Cassandra, and Amazon DynamoDB. Programming Hive
The Sortable type class is defined against the type parameter A. Scala in Depth
In this case, the map function is emitting a key of the type SortableBytes, which represents the bucket for the metric and the actual text read from the input source as the value. Storm Blueprints Patterns for Distributed Real-time Computation
Let's say, for the sake of argument, that the only information queryable, sortable, and so on is a track's name, when doing a query for tracks. Solr 3 Enterprise Search Server
As you can see, our ExampleFieldType class extends the SortableIntField class, which is a class that stores the integer number and allows sorting. Solr 3.1 Cookbook
How large can f(N) be for the entire list still to be sortable in O(N) time? Data Structures and Algorithm Analysis in Java 3rd Edition
I am sorting a randomized array of Sortable objects, using the same randomized order for each test. Java Performance Tuning 2nd Edition
Sorting by a field first requires that you follow the rules for indexing a sortable field, as detailed in section 2.9 Lucene in Action 2nd Edition
Introducing Spring MVC In the Spring Framework, the Spring MVC module provides comprehensive support for the MVC pattern, with support for other features (for example, theming, i18n, validation, type conversion and formatting, and so on) that ease the implementation of the presentation layer. Pro Spring 3
It provides interactions, widgets, effects, and theming for building rich Internet applications. Selenium Testing Tools Cookbook
We outline how to display reference data in drop-down lists, customize date fields, deal with localization and theming, and we show you how Roo uses Apache Tiles to lay out your user interfaces. Spring Roo in Action
Methods that change instance fields are called mutator methods, and those that only access instance fields without modifying them are called accessor methods. Core Java Volume I Fundamentals 9th Edition
Create a mutator as you would for a single insert and make multiple calls to the addInsertion method. Cassandra High Performance Cookbook
Which form should you use? It is considered good style to use () for a mutator method (a method that changes the object state), and to drop the () for an accessor method (a method that does not change the object state) Scala for the Impatient
The target type is dictated by the signature of the property mutator being used. Spring Dynamic Modules in Action
For example, all accessor methods begin with get, and all mutator methods begin with set. Core Java Volume II Advanced Features 9th Edition
If the documentation does not provide a precise description of the state transitions performed by mutator methods, it can be difficult or impossible to use a mutable class reliably. Effective Java 2nd Edition
To write data, you just need a Mutator class; to read data, just use a Selector. Cassandra The Definitive Guide
Once one of the mutator methods has been called, the WeakHashMap runs through its ReferenceQueue, removing all WeakReference objects from the queue and also removing each WeakReference object as a key in its internal map, thus simultaneously dereferencing the value. Java Performance Tuning 2nd Edition
The following code demonstrates the declaration of a private field, followed by accessor and mutator methods that can be used to obtain or set the value of that field from an outside class: Java 7 Recipes A Problem-Solution Approach
Here is a Specs object that demonstrates ObservableClicks and VetoableClicks working together. Programming Scala
Since the method is vetoable, it calls all registered vetoable change listeners before proceeding to make the change. Core Java Volume II Advanced Features 9th Edition
A host component may have a list of listeners to which it sends vetoable change events in the course of a vetoable set method. Concurrent Programming in Java Design Principles and Pattern
The Java programming language has an interesting history, and draws heavily from earlier objectoriented languages such as C++ and Smalltalk. Java Network Programming and Distributed Computing
On the other hand, C++, VB, Perl, and other languages like Smalltalk had some of their design efforts focused on the issue of complexity and as a result are remarkably successful in solving certain types of problems. Thinking in Java 4th Edition
Introducing Groovy Started by James Strachan in 2003, the main objective of Groovy is to provide an agile and dynamic language for the JVM, with features inspired from other popular scripting languages including Python, Ruby, and Smalltalk. Pro Spring 3
Various languages such as Smalltalk and JavaScript have explored this route. Java 8 in Action Lambdas, Streams and Functional-style Programming
Alan Kay, the inventor of Smalltalk, remarked that in this way the simplest object has the same construction principle as a full computer: it combines data with. Programming in Scala 2nd Edition
Smalltalk captured the essence of object-oriented programming (OOP) as that model of programming entered the mainstream. Programming Scala
The launch of the Macintosh in 1984 introduced him to objects via Smalltalk, Object Pascal, and MacApp. Beginning Scala
Robust data structures • An efficient, small binary format for RPC calls • Easy integration with dynamically typed languages such as Python, Ruby, Smalltalk, Perl, PHP, and Objective-C Avro has certain advantages that Thrift doesn’t, in particular the fact that static code generation is not required to use RPC for your application, though you can use it for. Cassandra The Definitive Guide
If the JDK had taken the "printOn: aStream" paradigm from Smalltalk, the temporary objects used would be significantly reduced. Java Performance Tuning 2nd Edition
Products such as Oracle TopLink got their start in the Smalltalk world before making the switch to Java. Pro JPA2
Nevertheless, having prebuilt standard OS packages such as RPMs and DEBs eases installation as well as providing startup/shutdown scripts. Apache Flume Distributed Log Collection for Hadoop
HBase ships with its prebuilt hadoop-core and ZooKeeper JAR files. HBase Administration Cookbook
In general this method is not recommended as the prebuilt packages are much easier to use. Getting Started with CouchDB
There is no prebuilt version of fuse-dfs bundled into the distribution. Pro Hadoop
Storm comes with several prebuilt stream groupings, including the following: Professional Hadoop Solutions
Maven archetypes are prebuilt project templates that provide basic Maven project scaffolding. HBase in Action
Prebuilt versions of the libraries aren’t bundled, so you’ll need to build them yourself. Hadoop in Practice
Hadoop comes with prebuilt libhdfs binaries for 32-bit Linux, but for other platforms, you will need to build them yourself using the instructions at http://wiki.apache.org/ hadoop/LibHDFS. Hadoop:The Definitive Guide 3rd Edition
Extracting the Download The simplest way to get started is to download the prebuilt binary. Cassandra The Definitive Guide
HiveQL statements are interpreted and an execution plan of prebuilt map and reduce classes is assembled to perform the MapReduce equivalent of the SQL statement. Hadoop Operations
This makes it possible to analyze the application quite flexibly by looking at the database server’s query log, and it also makes it easy to know what’s really going on when you look at SHOW PROCESSLIST and see some abusive query running in MySQL. High Performance MySQL 3rd Edition
This value shows up in the Id column of SHOW PROCESSLIST output and is used as an argument to the KILL command. Understanding MySQL Internals
Check whether MySQL is running by entering the following command: sudo netstat -tap | grep mysql. Web Crawling and Data Mining with Apache Nutch
Because the TcpConn module relies heavily on the netstat Linux utility to acquire TCP metric data and the fact that gmond is not a multithreaded daemon, the module doesn’t want to cause any delays in the gmond gathering process due to latency in calling an external process utility. Monitoring with Ganglia
If you’re interested in other parts of your system, such as the network, you might want to instead use tools such as ifconfig (which shows how many network errors have occurred, among other things) or netstat. High Performance MySQL 3rd Edition
System- and network-level information can be seen from Ganglia (figure 10.3) and from several Linux tools such as lsof, top, iostat, netstat, and so on. HBase in Action
The operator first restarts the rabbitmq-server service, then uses the netstat command to verify that Port 6163 is bound and listening. Pro Puppet
The complete battery usually includes OS utilities such as top, vmstat, sar, iostat, and netstat, but also Hadoop-specific tools such as hadoop dfsadmin, and hadoop fsck. Hadoop Operations
Network packet sniffers (both hardware and software types, e.g., netstat) Java Performance Tuning 2nd Edition
For example, even though Linux has netstat with its optional sysstat package and Solaris bundles netstat, neither the Linux nor Solaris implementation of netstat reports network utilization. Java Performance
A quick way to ensure the HiveServer is running is to use the netstat command to determine if port 10,000 is open and listening for connections: Programming Hive
The definition of a nonterminal is introduced by the name of the nonterminal being defined, followed by a colon. The Java Virtual Machine Specification Java SE 7 Edition
Each production has an abstract symbol called a nonterminal as its left-hand side, and a sequence of one or more nonterminal and terminal symbols as its right-hand side. The Java Language Specification Java SE 7 Edition
Context-Free Grammar A kind of language grammar for which each nonterminal can be specified as a production without reference to additional context information. Programming Scala
These symbols enclose terminal or nonterminal symbols that can be repeated zero or more times. Steps in Scala An Introduction to Object-Functional Programming
Relational database management systems (RDBMSes) have been around since the early 1970s, and have helped countless companies and organizations to implement their solution to given problems. HBase:The Definitive Guide
Pre and postauthorization provide formalized support for what are generally termed preconditions and postconditions in a classic, object-oriented design. Spring Security 3.1
You can also specify the results the module guarantees to deliver, the postconditions, if the preconditions were satisfied. Programming Scala
This also ensures that the postconditions are guaranteed to the caller after a method or constructor invocation returns. Java EE 7 Essentials
The doc comment should enumerate all of the method’s preconditions, which are the things that have to be true in order for a client to invoke it, and its postconditions, which are the things that will be true after the invocation has completed successfully. Effective Java 2nd Edition
You should use this pattern for debug and trace statements and assertion preconditions, postconditions, and invariants. Java Performance Tuning 2nd Edition
In Scala preconditions and postconditions can be asserted with the two forms of the assume method: Steps in Scala An Introduction to Object-Functional Programming
Preconditions and postconditions on the effects of operations, such as rules stating that it is impossible to remove water from an empty tank, or to add water to a full tank that is not equipped with an available overflow tank. Concurrent Programming in Java Design Principles and Pattern
Most of their products, including Search, Gmail, Maps, YouTube, and so on, use AJAX extensively. Performance Testing With JMeter 2.9
As proof of its difficulty, only recently has anyone created a truly complex piece of JavaScript (Google, in GMail), and that required excessive dedication and expertise. Thinking in Java 4th Edition
Make sure you have a test user account for Gmail. Jenkins Continuous Integration Cookbook
All you need to do in this case is to use the Gmail SMTP server, and provide your Gmail username and password in the SMTP Authentication (you also need to use SSL and the non-standard port of 465) Jenkins The Definitive Guide
This is not surprising, as Gmail is a single-page web application with lots of JavaScript (like Google Calendar) Testable JavaScript
Current day: World-wide traffic Continuous crawl and indexing processes (Caffeine) Seek-heavy, latency-sensitive apps (Gmail) Person-to-person, person-to-group sharing (Docs) Storage Architecture and Challenges
However, our core data model is not restricted to our particular RPC framework; we also trace activities such as SMTP sessions in Gmail, HTTP requests from the outside world, and outbound queries to SQL servers. Dapper a Large-Scale Distributed Systems Tracing Infrastructure
In the following example, we will locate the GMail link: Selenium Testing Tools Cookbook
Windows users: Remember to type a semicolon instead of a colon in the classpath.) At the time of this writing, GMail does not check the veracity of the information—you can supply any sender you like. Core Java Volume II Advanced Features 9th Edition
Suppose you want to create a repository method to find all Spitters whose email address is a Gmail address. Spring in Action 4th Edition
For example, we might want to create a regular user for Hadoop with privileges to run Hadoop commands and to configure system services such as SSHD and FTP. Hadoop Operations and Cluster Management Cookbook
Jenkins has its own build-in SSH client, and almost all Unix environments support SSH (usually sshd) out of the box. Jenkins The Definitive Guide
Jenkins starts up its own SSHD server by default on a random port. Testable JavaScript
Getting ready Ensure that you have Java 1.6, ssh, and sshd installed. Hadoop RealWorld Solutions Cookbook
The easiest way to do this is to copy an existing functional sshd_config file and use that. Pro Puppet
Note that ssh must be installed and sshd must be running if you want to use the supplied scripts to manage remote Hadoop and HBase daemons. HBase:The Definitive Guide
These two steps, extracting features and choosing the algorithm, go hand in hand in designing and training a classifier, and to help you develop an intuitive sense of the different options, we look at a second step-bystep example using a different learning algorithm, naive Bayes, with the same 20 newsgroups data set. Mahout in Action
Online services such as DejaNews (http://www.dejanews.com/usenet/) provide a Web-based interface, but newsgroups can also be accessed via newsreader software that uses NNTP. Java Network Programming and Distributed Computing
We use the message ID to identify the duplicated messages that are a result of cross-posting across different newsgroups. Hadoop MapReduce Cookbook
This is probably the single most common network programming error, and it is seen daily in programming forums and newsgroups all over the Internet. Fundamental Networking in Java
Or you can use a precompiled job JAR from Mahout’s distribution. Mahout in Action
Obviously, the C programing language provides the developer with a much lower-level view of the system and the performance that comes with a precompiled. Monitoring with Ganglia
To install Redis in OS X without using a compiler, you’ll use a Python utility called Rudix, which installs precompiled binaries for a variety of software. Redis in Action
Precompiled binary versions of CouchDB are available via various package managers; for example, you can use aptitude on newer versions of Ubuntu Linux and yum on Fedora Linux. Beginning CouchDB
Installing RabbitMQ on Debian Debian and Ubuntu systems provide the Erlang runtime as precompiled binary packages. Pro Puppet
We’ve only compiled our own copy rather than running the precompiled version. Hadoop in Action
Stored procedures are precompiled SQL code that can be executed by the database server. Java Performance Tuning 2nd Edition
There is a distinct advantage in using named queries or parameterized dynamic queries whenever possible, as the JPA provider can skip the compilation stage during runtime and uses the precompiled queries from its cache. Java Performance
PreparedStatements send a precompiled SQL statement to the DBMS rather than a String. Java 7 Recipes A Problem-Solution Approach
Precompiled binaries are available for each of these platforms at mongodb.org. MongoDB in Action
There are arguments for using gzip or bzip2 for their higher compression ratios at the cost of longer compression times, especially if your data is written once but will be read hundreds or thousands of times. Apache Flume Distributed Log Collection for Hadoop
We have set it to use the BZip2 codec, which has the highest compression ratio. HBase Administration Cookbook
The framework supports the gzip, zip, sometimes LZO, and bzip2 compression codecs. Pro Hadoop
For example, if you want very high compression and don’t care about how long it takes, you can use bzip2 instead of gzip. High Performance MySQL 3rd Edition
To create a TAR archive with the optional gzip or bzip2 compression, we must use the tarFiles task. Gradle Effective Implementation Guide
Since files compressed using the bzip2, gzip, and DEFLATE codecs cannot be split, the whole file must be given as a single input split to the mapper. Hadoop RealWorld Solutions Cookbook
Anyone looking for a balance between compression and execution times would have to eliminate bzip2 from the picture. Hadoop in Practice
Bzip2’s decompression speed is faster than its compression speed, but it is still slower than the other formats. Hadoop:The Definitive Guide 3rd Edition
Use this option if you want to apply a different compression filter, such as bzip2 Java in a Nutshell 5th Edition
All recent versions of Hadoop have built-in support for the GZip and BZip2 compression schemes, including native Linux libraries that accelerate compression and decompression for these formats. Programming Hive
To understand how these elements come together, we now examine some illustrative search queries and their corresponding results on ES2 Hadoop in Action
We also use simple JavaScript conditionals to ensure that the doc._id is set to be the same as doc.slug for the sake of pretty URLs. CouchDB The Definitive Guide
You can query for ranges, set inclusion, inequalities, and more by using $-conditionals. MongoDB The Definitive Guide 2nd Edition
Also, regular Java control flow constructs can be used to define computations involving PCollections, including functions, conditionals, and loops. FlumeJava - Easy, Efficient Data-Parallel Pipelines
These components are wrapped in a configuration language that includes variables, conditionals, arrays and other features. Pro Puppet
In the long run, it should save you from unexpected results in your conditionals. Programming Scala
Many of the statements defined by Java, however, are flow-control statements, such as conditionals and loops, that alter this default order of execution in welldefined ways. Java in a Nutshell 5th Edition
Pig allows integration of user code wherever possible, so it currently supports user defined field transformation functions, user defined aggregates, and user defined conditionals. Programming Pig
On the other hand, casts may appear in the form of conditionals: Steps in Scala An Introduction to Object-Functional Programming
Guards may also be considered as special forms of conditionals. Concurrent Programming in Java Design Principles and Pattern
At last, you will implement the conditionals that decide whether the layer should display an error or a warning icon by drawing an image onto the Graphics object, as shown here: Java 7 Recipes A Problem-Solution Approach
The HPC-centric admin and engineers who designed it were used to thinking about massive, parallel applications, so even though the designers of other monitoring systems looked at tens of thousands of hosts and saw a problem, it was natural for the Berkeley engineers to see those same hosts as the solution. Monitoring with Ganglia
This approach is common in the high-performance computing (HPC) world, where a monolithic scheduler usually runs a. Omega - flexible, scalable schedulers for large compute clusters
Perhaps some of these issues were due to the fact that many of these distributed schedulers were originally created to support MPI style and HPC application models and running coarse-grained non-elastic workloads. Apache Hadoop YARN Yet Another Resource Negotiator
For precisely this reason, a set of high performance computing extensions to the POSIX I/O interface have been proposed by the high-performance computing (HPC) community [31], a subset of which are implemented by Ceph. Ceph A Scalable, High-Performance Distributed File System
For these reasons, HPC schedulers use centralized scheduling, and require jobs to declare the required resources at job submission time. Mesos A Platform for Fine-Grained Resource Sharing in the Data Center
Broadly, the approach in HPC is to distribute the work across a cluster of machines, which access a shared filesystem, hosted by a Storage Area Network (SAN) Hadoop:The Definitive Guide 3rd Edition
Managing scalability in object storage systems for HPC Linux clusters. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.
Many traditional high-performance computing (HPC) systems have a similar master/worker model, but computation is generally distinct from data storage. Hadoop Operations
Dea is currently a software engineer working for BCT-LLC on projects with high performance computing (HPC) architectures. Java 7 Recipes A Problem-Solution Approach
You’ll find that some RPM-based distributions ship with Ganglia packages in the base repositories, and others require you to use special-purpose package repositories, such as the Red Hat project’s EPEL (Extra Packages for Enterprise Linux) repository. Monitoring with Ganglia
Install the epel repository with the following command: sudo yum install epel-release. Hadoop Operations and Cluster Management Cookbook
Next, to get the latest releases of Puppet, you will need to add the EPEL repository (see sidebar) to your host and then install packages from that repository. Pro Puppet
The following graphical tools can be used to monitor the HotSpot VM: JConsole, VisualGC, and VisualVM. Java Performance
It tolerates delayed or reordered messages and replicas that fail by stopping. Megastore - Providing Scalable, Highly Available Storage for Interactive Services
In addition, the memory hierarchy of the architecture on which a virtual machine is run may make it appear as if code is being reordered. JSR-133 Java Memory Model and Thread
In addition, the memory hierarchy of the architecture on which a Java Virtual Machine implementation is run may make it appear as if code is being reordered. The Java Language Specification Java SE 7 Edition
During runtime, the handler chain is reordered such that logical handlers are executed before the SOAP handlers on an outbound message and SOAP handlers are executed before logical handlers on an inbound message. Java EE 7 Essentials
The original memory model allowed volatile and non-volatile writes to be reordered interchangeably. Oracle JRockit The Definitive Guide
If the constants are reordered, the numberOfMusicians method will break. Effective Java 2nd Edition
It’s important to point out that tasks within a job can always be reordered. Hadoop Operations
It’s also possible that one or more packets may be lost or corrupted in transit and need to be retransmitted or that packets arrive out of order and need to be reordered. Java Network Programming 4th Edition
It is important to note that the order of the data for all columns is the same and corresponds to the (possibly reordered) rows of the original table. PowerDrill - Processing a Trillion Cells per Mouse Click
In other words, not only may concurrent executions be interleaved, but they may also be reordered and otherwise manipulated in an optimized form that bears little resemblance to their source code. Concurrent Programming in Java Design Principles and Pattern
For example, there is an abstract Window class and implementations of it for UNIX, Windows, and the Macintosh. Core Java Volume I Fundamentals 9th Edition
Whether an individual is running a PC, Unix, Macintosh, or Palm handheld computer, the complexities of communication and translation are handled transparently for users by the TCP/IP suite of protocols. Java Network Programming and Distributed Computing
For example, the pre-OSX versions of the Macintosh operating system (a reasonably important target for the first versions of Java) did not support multitasking. Thinking in Java 4th Edition
For example, the term has been used to describe binary translation tools such as Rosetta on the Macintosh, enabling software compiled for PowerPC to run on Intel hardware. Oracle JRockit The Definitive Guide
Java technology resources are not the same as Windows or Macintosh resources. Core Java Volume II Advanced Features 9th Edition
The launch of the Macintosh in 1984 introduced him to objects via Smalltalk, Object Pascal, and MacApp. Beginning Scala
This means you do not have to create distinct Windows, Macintosh, and Unix versions of your programs, for example. Java in a Nutshell 5th Edition
Readers with previous experience in network programming in a Unix, Windows, or Macintosh environment will be pleasantly surprised at how much easier it is to write equivalent programs in Java. Java Network Programming 4th Edition
Some older versions of Windows TCP/IP stacks, both those delivered with the OS and others, had performance problems, as did some versions of TCP/IP stacks on the Macintosh OS (up to and including System 7.1) Java Performance Tuning 2nd Edition
This book was written and typeset by the author using Adobe FrameMaker, Acrobat, and Distiller on Macintosh and PC platforms, and supplied to the publisher and printer as an Adobe Portable Document Format (PDF) file. Fundamental Networking in Java
In their optimization they further partition the distributed cache into N partitions, and likewise cache the map tuples into N hashtables, which process provides a more optimal join in the map cleanup method. Hadoop in Practice
We have now, with a few clicks, been able to list all the Hashtable instances in the system that contain Hashtables. Oracle JRockit The Definitive Guide
Key/Value, or KV stores, are conceptually like hashtables, where values are stored and accessed by an immutable key. A Little Riak Book
Collection, Set, List, Map, SortedSet, and SortedMap are all interfaces, but the java.util package also defines various concrete implementations, such as lists based on arrays and linked lists, and maps and sets based on hashtables or binary trees. Java in a Nutshell 5th Edition
Here we contextualize Cassandra against a variety of the more popular nonrelational databases, examining documentoriented databases, distributed hashtables, and graph databases, to better understand Cassandra’s offerings. Cassandra The Definitive Guide
Most container objects (e.g., Vectors, Hashtables) can be reused rather than created and thrown away. Java Performance Tuning 2nd Edition
Much like traditional hashtables, hashes in Redis store several fields and their values inside a specific key. Redis Cookbook
You can also use the -verbosegc option with the VM. Java Performance Tuning 2nd Edition
But the key can’t be encrypted because Gus doesn’t have the key yet, so Angela has to send the key unencrypted. Java Network Programming 4th Edition
To my wife Angela: you have provided me with the love and support that I need to be successful in my career. Java 7 Recipes A Problem-Solution Approach
This includes a shift in concern from throughput to response time, a commitment to understanding the performance of MySQL on new hardware, and a pursuit of new skills like queueing theory that can be used to understand performance. High Performance MySQL 3rd Edition
Deadline and completely fair queueing (CFQ) both tend to be good choices. MongoDB The Definitive Guide 2nd Edition
Also, classes that integrate with Oracle Advanced Queueing are provided. Pro Spring 3
First you obtain a new instance of a QueueingConsumer by passing it the channel object E. RabbitMQ in Action
The cloud controller communicates with the internal object store using HTTP, but it communicates with the scheduler, network controller, and volume controller using AMQP (advanced message queueing protocol) bk-admin-guide-cloud-latest
The publish-subscribe channel doesn’t support queueing, but it does support asynchronous operation if you provide a task executor that delivers messages to each of. Spring Integration in Action
Elite.com includes a queueing subsystem that asynchronously accepts external communications, such as email entries. Java Performance Tuning 2nd Edition
Disabling asynchronous dispatch allows messages to be pass the internal queueing and dispatching done by the session, as shown in figure 13.6 ActiveMQ in Action
From the point of view of queueing theory this refinement doesn’t change Model A at all: since the first queue is fed directly into the second they constitute one large queue. Fundamental Networking in Java
Pub/sub can even be used as a building block of a robust queueing system. Redis Cookbook
If the dividend is an infinity or the divisor is a zero or both, the. The Java Virtual Machine Specification Java SE 7 Edition
It’s pointless to test it against a divisor that’s not itself prime! So you can limit the test to only the prime numbers found before the current candidate. Java 8 in Action Lambdas, Streams and Functional-style Programming
To normalize in this way, you need to divide the numerator and denominator by their greatest common divisor. Programming in Scala 2nd Edition
The binary % operator is said to yield the remainder of its operands from an implied division; the left-hand operand is the dividend and the right-hand operand is the divisor. The Java Language Specification Java SE 7 Edition
Euclid’s algorithm (which is over two thousand years old) computes the greatest common divisor of two numbers as gcd(a, b) = a if b is zero, and gcd(b, rem(a, b)) otherwise, where rem is the remainder. Java SE 8 for the Really Impatient
The first is the divisor and the second is the expected remainder. MongoDB in Action
The custom analyzer tokenizes the text from the input Reader into a stream of tokens. Mahout in Action
The map() method tokenizes the line and emits a record for each word of the input record, a Text and the value 1, an IntWritable. Pro Hadoop
This analyzer takes a stream of characters and tokenizes it into a stream of tokens, usually with a simple algorithm such as splitting on whitespace. Solr 3 Enterprise Search Server
The querying one is straightforward—it just tokenizes the data on the basis of whitespace characters. Solr 3.1 Cookbook
The map function tokenizes the line, and for each token (word), emits a key value pair (word, 1) Hadoop MapReduce Cookbook
TokenCounterMapper A mapper that tokenizes the input value into words (using Java’s StringTokenizer) and emits each word along with a count of one. Hadoop:The Definitive Guide 3rd Edition
We see q that WordCount uses Java’s StringTokenizer in its default setting, which tokenizes based only on whitespaces. Hadoop in Action
An analyzer tokenizes text by performing any number of operations on it, which could include extracting words, discarding punctuation, removing accents from characters, lowercasing (also called normalizing), removing common words, reducing words to a root form (stemming), or changing words into the basic form (lemmatization) Lucene in Action 2nd Edition
Here is the first Python script that tokenizes lines of text on whitespace (which doesn’t properly handle punctuation, etc.): Programming Hive
The querying analyzer is straight; it just tokenizes the data on the basis of whitespace characters. Apache Solr 4 Cookbook
Instead of creating vectors where dimensions map to single words (unigrams), you could as easily create vectors where dimensions map to bigrams—or even both. Mahout in Action
Linear interpolation Linear interpolation is the last smoothing model that takes the values of the lambdas provided in the configuration and uses them to calculate weights of trigrams, bigrams and unigrams. Mastering ElasticSearch
We chose 6, because there were six Shakespeare documents, and we wanted to identify significant bigrams around those documents. Hadoop RealWorld Solutions Cookbook
We could index both unigrams and bigrams into a single field, but it is cleaner to keep unigrams and bigrams in separate fields which can be queried independently. Elasticsearch The Definitive Guide
Both bigrams and trigrams are important in natural language processing. Hadoop in Action
The main program repeatedly adds twenty-six bigrams, each consisting of two identical lowercase letters, to a set. Effective Java 2nd Edition
To change the version of PMD that we want to use, we must set the property toolVersion of the PDM plugin. Gradle Effective Implementation Guide
They named the project Big Cloud–based Parallel Data Mining (BC-PDM ) and it was architected to achieve four objectives : Hadoop in Action
But we’re not forced to use Clojure, because there are ways to use STM directly in Java, thanks to nice tools like Multiverse and Akka. Programming Concurrency on the JVM
See Chapter 6 for information about how to perform distributed load testing on your system using Tsung. Scaling CouchDB
Flash and Flex support the use of the Web’s most common image formats, and Flex also has the ability to translate scalable vector graphics (SVG) files into SWF resources that can be embedded in Flex clients. Thinking in Java 4th Edition
The SVG image can be processed either as a vector image, as a structured XML document, as plain text, or ultimately as a raw sequence of bytes. Tika in Action
For example, if you need SVG inside XHTML, you can construct an element like this: Core Java Volume II Advanced Features 9th Edition
The application will load an SVG file named clock3.svg and display the contents onto the JavaFX Scene graph: Java 7 Recipes A Problem-Solution Approach
As an added bonus, the reduce task is also run as a chain, with a postprocessing map that converts the encoded key formats back into dot-separated octet format. Pro Hadoop
While XML is a useful format for postprocessing the results from other tools like Sonar, it’s not convenient to read. Gradle in Action
In addition, the AbstractAction class implements the Action interface’s execute() method and provides a doExecute()method for you to place the code you would normally place in the execute() method, and two additional template methods, doPreExecute()and doPostExecute(), which you can override to do pre- and postprocessing. Spring in Practice
At some point, you should run some postprocessing that collects the outputs into larger files. MapReduce Design Patterns
The Security Interceptor works with a preprocessing step and a postprocessing step. Pro Spring Security
The scans pulled down all the data, and postprocessing happened in the client. HBase in Action
Let’s move on from application context creation to their postprocessing, which allows you to modify the definitions of Spring beans. Spring Dynamic Modules in Action
The only difference between an HDFS import and a Hive import is that the Hive import has a postprocessing step where the Hive table is created and loaded, as shown in figure 2.23 Hadoop in Practice
Doing a bit of postprocessing of data from MapReduce is very common, as is feeding it into analysis tools such as R, a spreadsheet, or even a relational database. Hadoop:The Definitive Guide 3rd Edition
You can add a postprocessing step after the MapReduce job to complete the computation. Hadoop in Action
Coord: It is the coordination factor that is based on the number of terms the. Mastering ElasticSearch
These correspond to the four-hour frequency specified for the data-prep-coord Coordinator application. Professional Hadoop Solutions
For a coordinate Coord(row, column), it returns a single-element list containing the cell at that coordinate. Programming in Scala 2nd Edition
At a high level, the important concepts are demonstrated by the high-level formula – namely, Term Frequency (tf), Inverse Document Frequency (idf), Term Boosts (t.getBoost), the Field Normalization (norm), the Coordination Factor (coord), and the Query Normalization (queryNorm) Solr in action
Thus, to create an index on a column in table stores named gps_coord of the type GEOMETRY, use the following syntax: Understanding MySQL Internals
You can use a regular HTML form to submit logins to CouchDB. CouchDB The Definitive Guide
In this case, users will log into Jenkins using their Unix account logins and passwords. Jenkins The Definitive Guide
But what about getting notified when your app is experiencing an unusual number of requests for user logins, all from a single IP? Or perhaps you’d like to allow your customers to be notified when unusual events occur to their data? What you need is for your app to generate alerts, but this opens up a whole new set of questions and adds a lot of complexity to your app. RabbitMQ in Action
If you group logins by the hour of the day and perform a count of the number of records in each group, you can plot these counts on a histogram and recognize times when your website is more active. MapReduce Design Patterns
Debugging information for RabbitMQ is located in /var/log/rabbitmq, and may contain information about invalid logins if the Stomp username and password are not correct. Pro Puppet
Even though we want password-less logins, keys without passphrases are not considered good practice (it’s OK to have an empty passphrase when running a local pseudodistributed cluster, as described in Appendix A), so we specify a passphrase when prompted for one. Hadoop:The Definitive Guide 3rd Edition
In general, this setting is good for small column families with few values, such as the passwords of a user table, so that logins can be processed very fast. HBase:The Definitive Guide
Data is one of the newer ingredients in these Internet-based systems and typically includes user-activity events corresponding to logins, page visits, clicks, social networking activities such as likes, sharing, and comments, and operational and system metrics. Apache Kafka
Management of user names and logins is just one of the issues that require special attention. Core Java Volume II Advanced Features 9th Edition
If you create individual logins and access rights for the same user on different databases, then there is no synchronization between those records. The Definitive Guide to MongoDB
It may well work with older versions of MySQL, or even other databases, because it tries to use standard ANSI SQL where possible. Mahout in Action
CloudBase: Data Warehousing The CloudBase project, http://cloudbase.sourceforge.net/, provides a high-performance, data warehousing system built on top of MapReduce, with an ANSI SQL API. Pro Hadoop
I believe the reason for one of these positions is the distinct benefit seen in going from a poorly typed language like pre-ANSI C to a strong, statically typed language (that is, checked at compile time) like C++ or Java. Thinking in Java 4th Edition
Redis is written in ANSI C and works in most POSIX systems, such as Linux, without any external dependencies. MapReduce Design Patterns
Drill’s query parser supports full SQL (ANSI SQL:2003), including correlated sub-query, analytics functions, and so on. Professional Hadoop Solutions
This format is an ANSI standard for certificates, and while there are PGP and other certificate formats in the world, the X509 format is dominant. Java Security 2nd Edition
It makes a stricter goal of ANSI SQL adherence, and interaction is primarily through a JDBC driver, which makes it easier to connect to business intelligence reporting tools. Hadoop in Action
Drivers can support other syntaxes, such as the database's stored-procedure syntax, but ANSI SQL must be supported. Java Performance Tuning 2nd Edition
However, like most SQL dialects, HiveQL does not conform to the ANSI SQL standard and it differs in various ways from the familiar SQL dialects provided by Oracle, MySQL, and SQL Server. Programming Hive
The syntax for joins is similar to the JOIN expressions supported by ANSI SQL. Pro JPA2
There are thousands of IETF specifications, each solving part of the puzzle. ZeroMQ
The bSocket protocol has been standardized by IETF under RFC 6455 Java EE 7 Specification
A standard set of tags is defined by the IETF BCP 47 standard. Java 7 New Features Cookbook
And the org.ietf.jgss package is of interest to only a very narrow subset of readers. Java in a Nutshell 5th Edition
Although there are many standards organizations in the world, the two that produce most of the standards relevant to application layer network programming and protocols are the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C) Java Network Programming 4th Edition
Pig will call getPartitionKeys, and HCatLoader will return two key names, date and colo. Programming Pig
HCatalog provides HCatInputFormat to enable MapReduce users to read data stored in Hive’s data warehouse. Programming Hive
Use the jstat command to show the Java Garbage Collection (GC) statistics: HBase Administration Cookbook
In this section, we will show two methods of observing and identifying problems with garbage collector: first is turning on logging for garbage collector in ElasticSearch and the second is using the jstat command, which is present in most Java distributions. Mastering ElasticSearch
Process ids are used by a number of other Java tools, such as jconsole, jstat, and jmap. Java in a Nutshell 5th Edition
Use of jstat, jps and configuring jstatd are covered in Chapter 4 Java Performance
Description jsadebugd is a server process that allows remote invocations of jinfo, jmap, and jstack on a local Java process or core file. Java in a Nutshell 5th Edition
A Java process showing high CPU utilization with prstat -mL can be mapped to a Java process and Java thread(s) on Solaris through a sequence of steps using prstat, pstack, and Java 6’s jstack command line tool. Java Performance
Solution Use JStack to get a thread dump, and then analyze the thread dump for deadlocks. Java 7 Recipes A Problem-Solution Approach
It is also important that throughput and latency remain constant with respect to the volume of unconsumed data as we often have slow or batch-oriented consumers. Building LinkedIn’s Real-time Activity Data1
Otherwise, you could end up with a wake-up call in the middle of the night from your monitoring system telling you that your queues are chock full of unconsumed messages. RabbitMQ in Action
Both are derived from p.NoSuccess, which contains fields for an error message and the unconsumed input at the point of failure. Programming Scala
Prior to 0.8, any unconsumed partition of data within the topic could be lost if the broker failed. Apache Kafka
Finally, many messaging systems assume near immediate consumption of messages, so the queue of unconsumed messages is always fairly small. Kafka a Distributed Messaging System for Log Processing
There are helpful cheat sheets available on the Internet (http://ha.ckers.org/xss.html) Jenkins Continuous Integration Cookbook
One basic requirement with comment engines is to prevent XSS attacks. Spring in Practice
Use of SSL (covered in the Appendix) and other network security techniques can mitigate this type of attack, but be aware that there are other techniques, such as cross-site scripting (XSS) that could steal or compromise a remembered user session. Spring Security 3.1
Setting thread stack size using -Xss The -Xss flag specifies how much stack each thread should be allocated. Oracle JRockit The Definitive Guide
Second is the jsessionid cookie in the first line of the request. Performance Testing With JMeter 2.9
For example, if a thread logs in to a Tomcat server, then the unique Jsessionid needs to be stored for each thread. Jenkins Continuous Integration Cookbook
Now, delete the JSESSIONID cookie (or close the tab and then all the browser instances), and ensure that access is still granted to the All Events page. Spring Security 3.1
The JSESSIONID cookie exists, but the session was already invalidated by the framework. Pro Spring Security
A servlet can send an HTTP cookie, named JSESSIONID, to the client for session tracking. Java EE 7 Essentials
The s1 source's type is netcat, which simply opens a socket listening for events (one line of text per event) Apache Flume Distributed Log Collection for Hadoop
Indeed, gmetad could easily be replaced by a shell script that used netcat to glean the XML dump from various gmond nodes and then parse and write the data to RRDtool databases via command-line tools. Monitoring with Ganglia
On server1, we then start another instance of netcat, sending to the port on which the destination is listening. High Performance MySQL 3rd Edition
For this let us fire up the Netcat program, which should be installed if you use a UNIX-like OS or can be installed on windows via the available installer34 Netty in Action MEAP V08
In this case, we create a Netcat source which listens on a port for network connections. Hadoop Beginners Guide
Some of the more common sources are an Avro RPC source to which applications can speak directly, syslog, a raw netcat-style source, and a source that executes a command and reads from its standard output. Hadoop Operations
In particular, should the value ever turn out wrong, only that method needs to be debugged. Core Java Volume I Fundamentals 9th Edition
Once you have implemented, tested, and debugged your Python metric module outside of gmond, you can be confident that your module will perform correctly when loaded by gmond. Monitoring with Ganglia
The core issue is to arrange for the JVM of the server or task that is to be debugged to have the additional command-line arguments that enable the Java Platform Debugger Architecture (JPDA) servers. Pro Hadoop
Due to the complex state stored for each job, an implementation preserving jobs across restarts was never completely debugged. Apache Hadoop YARN Yet Another Resource Negotiator
These abstractions enable an entire pipeline to be initially developed and tested on small in-memory test data, running in a single process, and debugged using standard Java IDEs and debuggers, and then run completely unchanged over large production data. FlumeJava - Easy, Efficient Data-Parallel Pipelines
You have substantial amounts of tested and debugged code in another language, and you know how to port it to all desired target platforms. Core Java Volume II Advanced Features 9th Edition
After you have developed your MapReduce program and fully debugged it, you may want to start tuning it for performance. Hadoop in Action
A colleague debugged a long-running GUI application that was mysteriously dying with an OutOfMemoryError. Effective Java 2nd Edition
Once you have carefully tested and debugged your methods, you can be confident that the class will work as expected. Java in a Nutshell 5th Edition
Leave code tuning until after the code is functional and debugged. Java Performance Tuning 2nd Edition
There is even a Hadoop module for rsyslog, one of the more modern variants of syslog (http://www.rsyslog.com/doc/rsyslog_conf_modules.html/omhdfs.html) Apache Flume Distributed Log Collection for Hadoop
This is particularly useful if you want to use rsyslog, which will forward the logs to a remote machine. bk-compute-adminguide-grizzly
This is useful if you want to use rsyslog, which forwards the logs to a remote machine. bk-admin-guide-cloud-latest
Sending data and running queries by sending JSON objects over HTTP makes it easy for someone to extend anything, from a syslog daemon like rsyslog to a connecting framework like ManifoldCF, to interact with Elasticsearch. Elasticsearch in Action MEAP V07 cHAPTER 1
This instructs rsyslog to send all logs to the IP listed. OpenStack Operations Guide
For example, for OpenSSH, you can generate an unencrypted key for the user that will own the Hadoop Core server processes. Pro Hadoop
If you haven't done this or you are trying to debug a problem image OpenStack can be configured to provide a VNC console, be aware that VNC is an unencrypted protocol so you should be cautious what you type across that link. bk-compute-adminguide-grizzly
When deploying in production, use an SSL connection to avoid sending passwords unencrypted over the wire. Jenkins Continuous Integration Cookbook
Furthermore, clients and DataNodes transmit data using the Hadoop Data Transfer Protocol, and this is unencrypted as well. Professional Hadoop Solutions
Hence, you can't simply send the key over the network without somehow encrypting the key itself; doing so would be tantamount to sending the data itself unencrypted. Java Security 2nd Edition
A transport guarantee of NONE allows unencrypted ws:// connections to the WebSocket. Java EE 7 Essentials
As the password file contains unencrypted passwords, Java will rely on the file permissions of the underlying operating system to ensure that the file can only be read by the user executing the JVM. Oracle JRockit The Definitive Guide
Now if you try to authenticate using an unencrypted password, you’ll see an error like this: Cassandra The Definitive Guide
But the key can’t be encrypted because Gus doesn’t have the key yet, so Angela has to send the key unencrypted. Java Network Programming 4th Edition
Oh, and OpenStack Object Storage communicates internally with unencrypted, unauthenticated rsync for performance - you do want the private network to be private. OpenStack Operations Guide
Table 8.7 shows the ChunkedInput implementations that are part of Netty. Netty in Action MEAP V08
But there is a method of producing incremental content with an HTTP server—sending data using the chunked transfer encoding. Redis in Action
If you don’t know the size of the data in advance, you can use chunked transfer encoding instead. Java Network Programming 4th Edition
We, therefore, maintain an additional, non-chunked copy of the Rankings table containing the entire 1GB. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
It handles more than three billion write and 20 billion read transactions daily and stores nearly a petabyte of primary data across many global datacenters. Megastore - Providing Scalable, Highly Available Storage for Interactive Services
Both Google and Yahoo handle applications on the petabyte scale with MapReduce clusters. Pro Hadoop
In uncompressed, nonreplicated form the datasets occupy about a petabyte of space. Dremel - Interactive Analysis of WebScale Datasets
He worked in the Hadoop/Big Data environment for five years for different companies and projects: petabyte stores, process automation, natural language processing (NLP), data science with data streams from mobile devices, and social media. Professional Hadoop Solutions
Our architecture is based on the assumption that systems at the petabyte scale are inherently dynamic: large systems are inevitably built incrementally, node failures are the norm rather than the exception, and the quality and character of workloads are constantly shifting over time. Ceph A Scalable, High-Performance Distributed File System
Facebook hosts approximately 10 billion photos, taking up one petabyte of storage. Hadoop:The Definitive Guide 3rd Edition
At the petabyte scale, storage systems are necessarily dynamic: they are built incrementally, they grow and contract with the deployment of new storage and decommissioning of old devices, devices fail and recover on a continuous basis, and large amounts of data are created and destroyed. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.
Google Bigtable Bigtable is Google’s internally used custom database, designed to scale into the petabyte range. Cassandra The Definitive Guide
Because modern processors have multiple cores it is possible to build a 50-node cluster with a petabyte of storage and still have a CPU core dedicated to process the data stream coming off each individual disk. Hadoop Beginners Guide
It is no longer uncommon to hear of companies claiming to load more than a terabyte of structured data per day into their analytical database system and claiming data warehouses of size more than a petabyte [19] HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
There are three steps involved in inputting data for the Mahout clustering algorithms: you need to preprocess the data, use that data to create vectors, and save the vectors in SequenceFile format as input for the algorithm. Mahout in Action
If you preprocess it, you’ll surely find yourself wishing for the raw data later when you find an anomaly and need more data to understand it. High Performance MySQL 3rd Edition
The mapper will preprocess our input values by extracting the XML attributes from each input record: the creation data and the user identifier. MapReduce Design Patterns
For the data processing layer, Oozie is used to combine MapReduce jobs to preprocess source data and convert it to the intermediate data. Professional Hadoop Solutions
Apart from the ability to implement Java MapReduce programs, Pig, and Hive scripts to preprocess these data, Hadoop also provides several useful tools and features that we can utilize to perform these data preprocessing operations. Hadoop MapReduce Cookbook
But using the DBInputFormat classes will give you the added flexibility to transform or preprocess your data in the same MapReduce job that performs the database export. Hadoop in Practice
Often, the only way to do that is to preprocess the data with another MapReduce job whose sole purpose is to make the data ready for a map-side join. Hadoop Beginners Guide
Pig runs a map-only MapReduce job to preprocess the file and get it ready for loading into the distributed cache. Programming Pig
This system uses one table to preprocess data, and a different set of tables for serving client data. Bigtable - A Distributed Storage System for Structured Data
The provider will not normally try to translate or preprocess temporal literals. Pro JPA2
You will be shown how to run Fitnesse tests through Jenkins. Jenkins Continuous Integration Cookbook
Behaviour-Driven Development and automated Acceptance-Test tools such as easyb, Fitnesse, Concordion are also xUnitfriendly. Jenkins The Definitive Guide
Whether it be reading password data from /etc/passwd on a Unix system or executing the "format c:" command on a Wintel host, such effects could be devastating. Java Network Programming and Distributed Computing
Set the nova uid in /etc/passwd to the same number in all hosts (e.g. bk-compute-adminguide-grizzly
User names and passwords are stored in a passwd file stored inside the repository's conf directory. Sonar Code Quality Testing Essentials
Set the nova uid in /etc/passwd to the same number in all hosts (for example, 112) bk-admin-guide-cloud-latest
We don’t need to specify the namevar because the value will be taken from the title, "/etc/passwd" Pro Puppet
This can be achieved by passing host and passwd parameters while creating an instance of Castro in the following way: Selenium Testing Tools Cookbook
Suppose that an applet (or some other untrusted code running in the sandbox) attempts to read the contents of the file /etc/passwd by passing this filename to the FileInputStream() constructor. Java in a Nutshell 5th Edition
The KDC contains a database of principals and their keys, very much like /etc/passwd and some KDC implementations (including MIT Kerberos) support storing this data in centralized systems like LDAP. Hadoop Operations
The first line loads the data from the HDFS file, /test/passwd, into the variable named passwd. Spring Data Modern Data Access for Enterprise Java
The swift context of an account, or a user account from an identity service such as Active Directory, /etc/passwd, OpenLDAP, keystone, and so on. OpenStack Operations Guide
This phenomenon is often called aliasing, and it’s a fundamental way that Java works with objects. Thinking in Java 4th Edition
While querying, we can also use the aliasing feature and make the indices visible as one index, just as with sharding. Mastering ElasticSearch
This is due to the aliasing problems with the C language: Java Threads 3rd Edition
This chapter introduces only one language feature that was not explained before: this aliasing, in Section 33.6 Programming in Scala 2nd Edition
Furthermore, the fact that Object[] is a supertype of all array types means that unsafe aliasing can occur which leads to heap pollution. The Java Language Specification Java SE 7 Edition
Aliasing is useful if you want to give the item a more convenient name or you want to avoid ambiguities with other items in scope that have the same name. Programming Scala
You renamed a field, but used Avro’s aliasing capabilities to preserve the old name for. Hadoop in Practice
It is generally a bad idea to take any form of aliasing into account. Effective Java 2nd Edition
In the paintComponent() method, you will set the background to white, set anti-aliasing on, and set the color of the stroke to be black. Java 7 Recipes A Problem-Solution Approach
To understand aliasing a discriminator column, consider the following query that returns data from another EMPLOYEE_STAGE table structured to use single-table inheritance: Pro JPA2
The open source project Cargo (http://cargo.codehaus.org/) provides versatile support for web application deployment to a variety of Servlet containers and application servers. Gradle in Action
The framework uses Xstream for persisting configuration information as XML (http://xstream.codehaus.org/) and Jelly for the creation of parts of the GUI (http://commons.apache.org/jelly/) Jenkins Continuous Integration Cookbook
Configuring Castor XML To support the transformation of the returned contact information into XML format, we will use the Castor XML library (http://castor.codehaus.org) Pro Spring 3
A dedicated repository located at http://sonar-plugins.codehaus.org/ hosts the Sonar plugin library. Sonar Code Quality Testing Essentials
Note N Jetty (http://jetty.codehaus.org/jetty/ and http://www.eclipse.org/jetty/) is both an HTTP server and a Java Servlet container in the same way as Apache Tomcat. Pro Spring Security
More information on the Cassandra maven plugin can be found at http://mojo.codehaus.org/cassandra-maven-plugin/ Cassandra High Performance Cookbook
You can get your download package from an automatic installer (like apt -get) or you can download it yourself from http://jetty.codehaus.org/jetty/ Solr 3.1 Cookbook
There is also a dependency on ParaNamer that we download from its home page at codehaus.org. Hadoop Beginners Guide
One example of this is the use of Woodstox, the open source StAX parser (http://woodstox.codehaus.org/) that outperforms Oracle Java Streaming XML Parser (SJSXP), the default StAX parser within JAXP. Java Performance
You can get your download package from an automatic installer (such as, apt-get), or you can download it yourself from http://jetty.codehaus.org/jetty/ Apache Solr 4 Cookbook
The ZipEntry object contains an extensive interface that allows you to get and set all the data available on that particular entry in your Zip file: name, compressed and uncompressed sizes, date, CRC checksum, extra field data, comment, compression method, and whether it’s a directory entry. Thinking in Java 4th Edition
But if you remove the index on the url column and add an indexed url_crc column to the table, you can use a query like this: High Performance MySQL 3rd Edition
Sometimes, we might get a CRC exception when running this command. Hadoop Operations and Cluster Management Cookbook
For example, instead of having to deal with things such as CRC checksums, compression methods, and various other details, an application that uses the java.util.zip parser library package included in the standard Java class library can simply use concepts such as ZipFile and ZipEntry, as shown in the following example that outputs the names of all of the entries within a Zip file: Tika in Action
The copyToLocal command does a Cyclic Redundancy Check (CRC) to verify that the data copied was unchanged. Hadoop RealWorld Solutions Cookbook
Common methods for checking correctness of raw data such as storage devices include Cyclic Redundancy Checks (CRC), which are what HDFS uses internally to maintain block-level integrity. Hadoop in Practice
The same effect is possible from the shell by using the -ignoreCrc option with the -get or the equivalent -copyToLocal command. Hadoop:The Definitive Guide 3rd Edition
For the get command, the -crc option will copy that hidden checksum file. Hadoop in Action
This class implements the Checksum interface and computes a checksum on a stream of data using the CRC-32 algorithm. Java in a Nutshell 5th Edition
To avoid log corruption, Kafka stores a CRC for each message in the log. Kafka a Distributed Messaging System for Log Processing
Thank you also to Martin Odersky for his endorsement and kind words on the final product that you will read in the foreword, Josh Cough for being a guy I can bounce ideas off when needed, and Peter Simanyi for an email with a very detailed, thorough, complete, and awesome review of the entire book. Scala in Depth
I bought an early electronic version of the Programming in Scala book, by Odersky, Spoon, and Venners, and I was immediately a fan. Programming in Scala 2nd Edition
I concurrently thank Martin Odersky and the Scala community for their. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine
In Scala, we use a simplified version of a technique introduced in a paper written by Scala’s designer, Martin Odersky. Functional Programming Patterns in Scala and Clojure
Its creator, Martin Odersky, participated in the development of Java for years and understands the needs of professional developers. Programming Scala
Martin Odersky, the creator of Scala, has identified the following levels of expertise for application programmers and library designers: Scala for the Impatient
Martin Odersky’s amazing balance between theory and reality make Scala possible, and the people he has attracted into the community are brilliant. Beginning Scala
Scala is a relatively new programming language that was designed by Martin Odersky and released in 2003 Steps in Scala An Introduction to Object-Functional Programming
The ORM is configured to use Ehcache as cache implementation. Pro Spring MVC
The service also uses caching for performance, so you inject an Ehcache-backed cache too G.15 Spring in Practice
As you might have suspected, the cache requires the ehcache dependency that we mentioned at the beginning of the chapter. Spring Security 3.1
Caching in Guava gives us more power and flexibility than using plain HashMap but is not as robust as EHCache or Memcached. Getting Started with Google Guava
For larger systems, this might include distributed caches such as memcached, EHCache, Oracle Coherence, or other related products. Cassandra The Definitive Guide
This particular bit of injection can be confusing because both Spring and Ehcache define a CacheManager type. Spring in Action 4th Edition
We'd also like to thank our editorial team at Addison-Wesley, including Karen Gettman, whose initial encouragement and persistence convinced us to take on the project, Mary Hart, Marcy Barnes-Henrie, Melissa Dobson, and Emily Frey. Java Network Programming and Distributed Computing
It was then converted to HTML by Mary Campione and was made available on our Web site before being expanded into book form. The Java Virtual Machine Specification Java SE 7 Edition
Look at the "pri mary" field to see which node is primary and then repeat the connection steps above for that host/port. MongoDB The Definitive Guide 2nd Edition
The details switch prints out the most information when running hbck, while sum mary prints out the least. HBase:The Definitive Guide
The next query looks for "john" in the name field and "mary" in the tweet field. Elasticsearch The Definitive Guide
The output should display the first two names in reverse order: Mary Bob. Java 7 New Features Cookbook
The scheduler creates a pool called mary if it doesn’t already exist, because it’s configured to use the value of the property user.name as the pool name. Hadoop Operations
Mary had a little lamb its fleece was white as snow and everywhere that Mary went the lamb was sure to go. Programming Pig
Special thanks to Mary Tobin who was tasked with managing us—which is somewhat akin to trying to herd cats. The Definitive Guide to MongoDB
Richard Dal Porto and Mary Tobin were firm in trying to keep us to a schedule, but understanding when the laws of physics couldn’t be broken. Pro JPA2
In this case, gmond.conf, hsflowd.conf, and gmetad.conf files are all generated using Puppet ERB templates. Monitoring with Ganglia
The web.xml.erb in the config folder, including configuration for Spring Security. Pro Spring Security
Puppet also leverages the Ruby ERB templating system that allows you to. Storm Blueprints Patterns for Distributed Real-time Computation
If you have a couple of configurations, it’s easy enough to maintain multiple files, but what if you have a very large number of differing configurations? We can manage this situation by writing ERB templates and populating the templates with node-specific information. Managing Infrastructure with Puppet
In this case, the template function allows us to specify a Ruby ERB template (http://rubydoc.org/stdlib/libdoc/erb/rdoc/), from which we can create the templated content for our configuration file. Pro Puppet
Next, make a subdirectory called views, and place a file there called tweets.erb. MongoDB in Action
Creating Credentials The credentials you will use to launch instances, bundle images, and all the other assorted API functions can be sourced in a single file, such as creating one called /creds/openrc. bk-compute-adminguide-grizzly
After you install the clients, you must source an openrc file to set required environment variables before you can request OpenStack services through the clients or the APIs. api-quick-start-onepager
After you install the clients, you must source an openrc.sh file to set required environment variables before you can request OpenStack services through the clients or the APIs. user-guide
This generates a file called openrc.sh, which looks something like this: OpenStack Operations Guide
The MyISAM Engine As MySQL’s default storage engine in versions 5.1 and older, MyISAM provides a large list of features, such as full-text indexing, compression, and spatial (GIS) functions. High Performance MySQL 3rd Edition
No previous GIS experience is expected, but be prepared to use most of what you’ve learned in the previous chapters. HBase in Action
Prior to graduation, she worked for the Center for Agribusiness Excellence at Tarleton, where she used Java in conjunction with GIS software to analyze crop and weather data. Java 7 New Features Cookbook
While by no means a full GIS (geographical information system) solution, spatial lucene supports these functions: Lucene in Action 2nd Edition
Then to configure my new interceptor, use the FQDN for the Builder class as the type: Apache Flume Distributed Log Collection for Hadoop
Replace the hostname part of the principal with your host's FQDN: HBase Administration Cookbook
Strip domain name from hostname in graphs By default, the gweb interface will display fully qualified domain names (FQDN) in graphs. Monitoring with Ganglia
It is not necessarily a hostname, FQDN, or IP address. bk-compute-adminguide-grizzly
The 3PAR host constructed by the driver uses just the local hostname, not the fully qualified domain name (FQDN) of the compute host. bk-admin-guide-cloud-latest
Here we have a file resource that creates an Apache config file named by the fqdn variable. Managing Infrastructure with Puppet
For the moment, this class only contains a Puppet server variable that specifies the fully-qualified domain name (FQDN) of our Puppet master. Pro Puppet
Referring back to the webtable example earlier, you may have noted that the key used is the reversed FQDN (the domain name part of the URL), such as org.hbase.www. HBase:The Definitive Guide
This allows for pipelining--new requests can be sent without waiting for a response from the server. Netty in Action MEAP V08
This method of sending multiple commands at once and waiting for all of the replies is generally referred to as pipelining, and has the ability to improve Redis’s performance when executing multiple commands by reducing the number of network round trips that a client needs to wait for. Redis in Action
Finally, we minimize latency by pipelining the data transfer over TCP connections. GFS - The Google File System
Pipelining— Many stream operations return a stream themselves, allowing operations to be chained and form a larger pipeline. Java 8 in Action Lambdas, Streams and Functional-style Programming
This is a technique called “pipelining,” and it works because our DEALER and ROUTER sockets are fully asynchronous. ZeroMQ
With pipelining you can send a number of requests without waiting for their responses. The Little Redis Book
A similar argument runs in CPU design circles where dynamic rescheduling of instructions to take pipelining into account allows CPUs to process instructions out of order. Java Performance Tuning 2nd Edition
Overlapping or pipelining the adjacent stages can reduce latency [10], but straggler shards still set the minimum time to complete the pipeline. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications
In addition, pipelining intermediate results between query operators can improve performance, but can result in a large amount of work being lost upon a failure. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
As of JSF 2, Facelets is the standard technology for all JSF pages. Pro Spring 3
Facelets Facelets is the view declaration language (aka view handler) for JSF. Java EE 7 Essentials
The pages themselves, known as facelets, are composed of containers and components. Spring Roo in Action
This statement concatenates the empty string with the string representation of x that is exactly x.toString() Core Java Volume I Fundamentals 9th Edition
Using the partial vectors from the Mapper as input, the Reducer simply concatenates them into a full vector, as seen in the following listing. Mahout in Action
This is because the Java compiler converts x, y, and z into their String representations and concatenates those strings, instead of adding them together first. Thinking in Java 4th Edition
In a nutshell, the flatMap method lets you replace each value of a stream with another stream and then concatenates all the generated streams into a single stream. Java 8 in Action Lambdas, Streams and Functional-style Programming
InputFormat and OutputFormat classe concatenates the string forms of th. Hadoop in Practice
The processing is explained in the script, but briefly, it unpacks the bzip2 file and then concatenates each station file into a single file for the whole year. Hadoop:The Definitive Guide 3rd Edition
When you index a document, Elasticsearch takes the string values of all of its fields and concatenates them into one big string which it indexes as the special _all field. Elasticsearch The Definitive Guide
If the list contains strings and the function concatenates two strings, the method returns a string consisting of all the strings in the list in sequence. Effective Java 2nd Edition
The + operator concatenates two String objects or one String and one value of some other type, producing a new String object. Java in a Nutshell 5th Edition
Many query engines will cache the translated SQL for later use, but this can easily be defeated if the application does not use parameter binding and concatenates parameter values directly into query strings. Pro JPA2
If you've defined and used multiple classloaders in your application, Java Threads 3rd Edition
Before describing the way OSGi uses classloaders, let’s recap how default classloaders work in Java. Spring Dynamic Modules in Action
In application containers, such as a J2EE server, where multiple classloaders are used, special care must be taken so that classes are not dependency injected into some framework and then forgotten about. Oracle JRockit The Definitive Guide
Note that classloaders seem to be changed in almost every version of the SDK. Java Performance Tuning 2nd Edition
In addition, a LinkedHashMap can be configured in the constructor to use a leastrecently- used (LRU) algorithm based on accesses, so elements that haven’t been accessed (and thus are candidates for removal) appear at the front of the list. Thinking in Java 4th Edition
A one-off query such as those issued by mysqldump will typically bring a page into the buffer pool LRU list, read the rows from it, and move on to the next page. High Performance MySQL 3rd Edition
Terms lookup filter cache settings As we've mentioned, in order to provide the terms lookup functionalities, ElasticSearch introduced a new type of cache, which uses a fast LRU (Least Recently Used) cache to handle terms caching. Mastering ElasticSearch
A cache eviction policy (if any) is least recently used (LRU) Professional Hadoop Solutions
You can choose some column families to have a higher priority in the block cache (LRU cache) HBase in Action
HBase has an in-memory option per column family and uses its LRU cache‡ to retain blocks for subsequent use. HBase:The Definitive Guide
Bear in mind that which SoftReferences are garbage-collected is determined by a leastrecently-used (LRU) calculation on a JVM-wide scale. Getting Started with Google Guava
We employ an asynchronous batch lookup technique combined with a local LRU cache in order to improve performance. Tenzing - A SQL Implementation On The MapReduce Framework
GlassFish supports three eviction policies: FIFO (first in first out), LRU (least recently used), and NRU (not recently used) Java Performance
Moving items between these layers or finally evicting them entirely can be done, e.g., with the well-known LRU cache eviction heuristic. PowerDrill - Processing a Trillion Cells per Mouse Click
As the data in HBase is sorted by row key, in lexicographical order, a row belongs to the region that has the closest start/end key of the row key. HBase Administration Cookbook
Result is negative, zero, or positive depending on the lexicographical ordering of the String and the argument. Thinking in Java 4th Edition
This means that all internal value comparisons and, consequently, sorting, is done in lexicographical order. Professional Hadoop Solutions
If using RandomParitioner, the data will not be in a lexicographical order, but it will be in a constant order. Cassandra High Performance Cookbook
Accumulo will maintain the sorted order of our geospatial keys using lexicographical byte-order sorting. Hadoop RealWorld Solutions Cookbook
Assume that you want to perform a lexicographical comparison that includes both the last and first names, but you can’t do this with the entire byte array because the string lengths are also encoded in the array. Hadoop in Practice
In lexicographical sorting, each key is compared on a binary level, byte by byte, from left to right. HBase:The Definitive Guide
Terms in the inverted index are sorted in lexicographical order, which is why string ranges use this order. Elasticsearch The Definitive Guide
StringValueMax Finds the lexicographical maximum of a sequence of string values. Hadoop in Action
When performing range queries, Lucene uses lexicographical values of Fields for ordering. Lucene in Action 2nd Edition
The nice thing about MDP is that it came out of working code, a simpler ancestor protocol (PPP), and a precise set of improvements. ZeroMQ
Listing 17.5 Spring MDP that asynchronously receives and processes messages. Spring in Action 4th Edition
In this chapter, you will integrate Storm with Titan, a popular graph. Storm Blueprints Patterns for Distributed Real-time Computation
He is currently working for Gemini Mobile Technologies as a Research & Development software engineer. HBase Administration Cookbook
SpringSource also introduced the dm Server (now project Gemini in Eclipse) and more importantly, they launched the OSGi Bundle Repository, filling a crucial gap for the acceptance of OSGi in the enterprise. Spring Dynamic Modules in Action
In the process, this chapter also provides background information about the Eclipse Gemini Blueprint project, which is the successor to Spring Dynamic Modules. Spring Integration in Action
A short-lived partnership with NuSphere to add Gemini, a transactional engine with row-level locking, ended in a lawsuit toward the end of 2001 Understanding MySQL Internals
Jill and Jack must check in for their afternoon flight to New York. Spring Integration in Action
Jack, a software developer, described his client’s request that he prevent. SQL Antipatterns
If Jill has checked out the first book and Jack has checked out the second, and neither is willing to give up the book they have, neither can finish the paper. Java Network Programming 4th Edition
But what if we would like to add another user called jack. Apache Solr 4 Cookbook
The data set has been preprocessed in a way: no users who produced less than 20 ratings are included. Mahout in Action
Links are preprocessed at indexing time using a specially crafted MySQL UDF. High Performance MySQL 3rd Edition
Whereas the normal command-line parameters are passed directly and are fully processed by Sqoop, the property parameters are preprocessed before the Sqoop execution and put into a Hadoop configuration object that Sqoop will load and use. Apache Sqoop Cookbook
The content of the Text field will be pulled out and preprocessed a bit, and then we’ll count up how many times we see each word. MapReduce Design Patterns
Data is preprocessed, grouped, and ingested into permanent data repositories. Professional Hadoop Solutions
We don’t expect you to be familiar with GIS or GIS data, so we’ve preprocessed it a bit. HBase in Action
Tokenizer specifies how your data will be preprocessed after it is sent to the appropriate field. Solr 3.1 Cookbook
It’s generally easier and more efficient to process a smaller number of relatively large files, so the data was preprocessed so that each. Hadoop:The Definitive Guide 3rd Edition
Let's consider another use case, where raw clickstreams generated by customers through website usage are captured and preprocessed. Apache Kafka
In these cases, the documents should be parsed, or preprocessed, into separate blocks of text representing each field. Lucene in Action 2nd Edition
To avoid imposing a specific choice of file format, Pregel decouples the task of interpreting an input file as a graph from the task of graph computation. Pregel - A System for Large-Scale Graph Processing
This decouples the operations from the objects themselves, meaning that you can add new operations without adding methods to the class definitions. Thinking in Java 4th Edition
This replication architecture decouples the processes of fetching and replaying events on the replica, which allows them to be asynchronous. High Performance MySQL 3rd Edition
The new architecture we introduced decouples the programming model from the resource management infrastructure, and delegates many scheduling functions (e.g., task faulttolerance) to per-application components. Apache Hadoop YARN Yet Another Resource Negotiator
Messaging is essentially asynchronous in that it decouples applications by separating the sending and receiving of data. RabbitMQ in Action
Ceph decouples data and metadata operations by eliminating file allocation tables and replacing them with generating functions. Ceph A Scalable, High-Performance Distributed File System
Information hiding is important for many reasons, most of which stem from the fact that it decouples the modules that comprise a system, allowing them to be developed, tested, optimized, used, understood, and modified in isolation. Effective Java 2nd Edition
This approach decouples the application write from the cluster writes, acting as a queue, similar to a messaging system. Hadoop Operations
The layer model decouples the application protocols (the main subject of this book) from the physics of the network hardware and the topology of the network connections. Java Network Programming 4th Edition
Lucene’s elegant analyzer architecture decouples each of the processes internal to textual analysis, letting you reuse fundamental building blocks to construct custom analyzers. Lucene in Action 2nd Edition
It uses the mmap system call (http://en.wikipedia.org/wiki/ Mmap) for reading and randomly accessing a file for writing. Mastering ElasticSearch
The alternative to mmap and mmap_index_only is standard, which uses direct IO. Cassandra High Performance Cookbook
For example, on *NIX-style operating systems, pages in memory are allocated differently than on Microsoft Windows, with different system calls (mmap versus VirtualAlloc) Oracle JRockit The Definitive Guide
MMapDirectory: Uses memory-mapped I/O when reading the index; best option for installations on 64-bit Windows, Solaris, or Linux operating systems with the Sun JVM. Solr in action
Virtual memory, in this context, is the address space of the process, meaning it includes physical memory, secondary storage such as swap, and resources like mmap()ed files. Hadoop Operations
The next point is that at the system level, most operating systems support mmap( ) , memcntl( ), and various shared-memory options. Java Performance Tuning 2nd Edition
There is also MMapDirectory, which is similar to FSDirectory in that it stores files in the file system. Lucene in Action 2nd Edition
Thus, data files are mapped to a system’s virtual memory using the mmap() system call. MongoDB in Action
This directory implementation uses virtual memory and a kernel feature called mmap to access index files stored on disk. Apache Solr 4 Cookbook
This is not as efficient and convenient as using mmap( ), but it is more robust in case of an I/O error. Understanding MySQL Internals
All of the core services that make up Twitter's architecture are built on Finagle, from backends serving user information, tweets, and timelines to front end API endpoints handling HTTP requests. Netty in Action MEAP V08
Most support standard backends like LDAP or SQL, as well as Key Value Stores (KVS) bk-compute-adminguide-grizzly
The major objective of the project is to provide useful extensions on top of Spring’s core data access functionality to address the needs of Spring developers who are interacting with database backends other than RDBMSs. Pro Spring 3
Then you tell HAProxy to use the round-robin algorithm C to distribute the load among the backends (see figure 6.3) RabbitMQ in Action
This works great for multiple clients and backends all joining the same party: Testable JavaScript
To enable a multi back-end configuration, you must set the enabled_backends flag in the cinder.conf file. bk-admin-guide-cloud-latest
Each type has a set of “provider” backends that specify what to do with all of the parameters we’ve given it. Managing Infrastructure with Puppet
Several modern databases have swappable backends, and Riak is no different in that respect. A Little Riak Book
We compare latency and memory usage of the basic datastructures with other data formats and backends: CSV, record-io (binary format based on protocol buffers [29]), and Dremel (as mentioned in the introduction, Dremel is a high performance column-store developed at Google) PowerDrill - Processing a Trillion Cells per Mouse Click
Spring 3.1 gives you some helpers that work with a variety of cache backends to perform these functions for you. Spring Data Modern Data Access for Enterprise Java
It keeps its undo log (old row versions), insert buffer, doublewrite buffer (described in an upcoming section), and other internal structures in the tablespace. High Performance MySQL 3rd Edition
NoSQL distilled : a brief guide to the emerging world of polyglot persistence / Pramod J Sadalage, Martin Fowler. NoSQL Distilled
You can use partitioning to avoid some bottlenecks in specific workloads, such as per-index mutexes with InnoDB or per-inode locking with the ext3 filesystem. High Performance MySQL 3rd Edition
For example the cloud-init package included in Ubuntu's stock cloud images will format this space as an ext3 filesystem and mount it on / mnt. bk-compute-adminguide-grizzly
If ext3 is necessary, there are some hacks around this. MongoDB The Definitive Guide 2nd Edition
For example, the cloud-init package included in Ubuntu's stock cloud images format this space as an ext3 file system and mount it on / mnt. bk-admin-guide-cloud-latest
Experience with an earlier EBOFS design suggests it will experience significantly lower fragmentation than ext3, but we have not yet evaluated the current implementation on an aged file system. Ceph A Scalable, High-Performance Distributed File System
Here are some notes on the more commonly used filesystems: ext3 HBase:The Definitive Guide
This is similar to common Linux filesystems such as ext3 Hadoop Operations
In addition to these tools, your operating system might provide others, such as mpstat or sar. High Performance MySQL 3rd Edition
The next recipe, Using sar to review performance over time. Cassandra High Performance Cookbook
There are many fine tools that you can use for this, ranging from sar,1 the built-in Linux utility that collects and reports on system activity, to more sophisticated tools such as Nagios and Ganglia. Hadoop in Practice
The complete battery usually includes OS utilities such as top, vmstat, sar, iostat, and netstat, but also Hadoop-specific tools such as hadoop dfsadmin, and hadoop fsck. Hadoop Operations
System performance measuring utilities (vmstat, iostat, sar, top on Unix; the task manager and performance monitor on Windows) Java Performance Tuning 2nd Edition
When monitoring applications for an extended period of time such as several hours or several days, or in a production environment, many performance engineers and system administrators of Solaris or Linux systems use sar to collect performance statistics. Java Performance
If you don’t take the time to trace the connections, you might never realize that your total bandwidth from all database servers to all web servers is limited to a gigabit! Each hop adds latency, too. High Performance MySQL 3rd Edition
You can provision object stores provisioned with single gigabit or 10 gigabit network interface depending on the expected workload and desired performance. bk-admin-guide-cloud-latest
Larger servers may even be able to utilize 10 gigabit Ethernet. Cassandra High Performance Cookbook
Gigabit Ethernet Although the hardware specification for your cluster will assuredly be different, Hadoop is designed to use multiple cores and disks, so it will be able to take full advantage of more powerful hardware. Hadoop:The Definitive Guide 3rd Edition
As far as networking is concerned, it is recommended that you use a two-port Gigabit Ethernet card—or two channel-bonded cards. HBase:The Definitive Guide
Even a gigabit network can be saturated by a hundred. SQL Antipatterns
If you need network throughput greater than that provided by a single-gigabit port then, unless your hardware or operating system can present multiple ports as a single device to Hadoop, the only option is to use a 10-gigabit Ethernet device. Hadoop Beginners Guide
Speed refers to the rated speed of the networking technology (e.g., Gigabit Ethernet is rated at 1 gigabit per second), and bandwidth refers to the theoretical data capacity. Java Performance
We used the same number of clients as tablet servers to ensure that clients were never a bottleneck.) Each machine had two dual-core Opteron 2 GHz chips, enough physical memory to hold the working set of all running processes, and a single gigabit Ethernet link. Bigtable - A Distributed Storage System for Structured Data
The servers on each side of a rack interconnect via a 100-Mbps Ethernet switch that has one or two gigabit uplinks to a core gigabit switch that connects all racks together. Web search for a planet the google cluster architecture
Also, the mysqlbinlog tool, which we mention throughout the chapter, is most convenient to use with statement-based logging. High Performance MySQL 3rd Edition
Used by the replication slave, and in the mysqlbinlog command-line utility. Understanding MySQL Internals
The Using the ExtendedSSLSession interface recipe uses SSL, and is used to illustrate the use of the ExtendedSSLSession interface and new security features. Java 7 New Features Cookbook
Once a connection is established over an SSLSocket, you can use the getSession( ) method to obtain an SSLSession object that provides information about the connection. Java in a Nutshell 5th Edition
In the JSSE, sessions are represented by instances of the SSLSession interface; you can use the methods of this interface to check the times the session was created and last accessed, invalidate the session, and get various information about the session: Java Network Programming 4th Edition
Once the nonce feature is turned on, Jenkins avoids CSRF by generating a random one-time number called a nonce that is returned as part of the request. Jenkins Continuous Integration Cookbook
It also configures a bean that automatically adds a hidden cross-site request forgery (CSRF) token field on forms using Spring’s form-binding tag library. Spring in Action 4th Edition
You can partition the data in several indexes, as shown in the next section, and reindex only the updated part from scratch on each run of indexer. High Performance MySQL 3rd Edition
However, we know that we need to adjust the index fields and in order not to reindex the data we create the index upfront. Mastering ElasticSearch
You can load all of the artists through the populate.rb script and then run rake sunspot:reindex, although it will take a long time to complete. Solr 3 Enterprise Search Server
CouchDB’s implementation of Map/Reduce is designed to allow views to be updated incrementally, meaning that it will only reindex any documents that have been modified since the last time the index was updated. Beginning CouchDB
When updating a document using the index API, we read the original document, make our changes, then reindex the whole document in one go. Elasticsearch The Definitive Guide
If you decide to enable this feature after indexing documents, then you will need to need to reindex all documents. Solr in action
Rather than reindex documents when specials change, we opt to keep the specials flagged in our (hypothetical) relational database. Lucene in Action 2nd Edition
Repairing a Collection’s Indexes If the validation process shows that the indexes are damaged, then you use the reIndex() function to reindex the affected collection. The Definitive Guide to MongoDB
Note that if you change the stop word list, it is necessary to reindex the existing tables, which can be done with REPAIR TABLE tbl_name QUICK. Understanding MySQL Internals
Tools such as dynaTrace AJAX Edition and Speed Tracer provide this highly browser-dependent data to be analyzed. Testable JavaScript
We can use tools such as dynaTrace and HttpWatch, along with Selenium WebDriver to collect, measure, and monitor client-side performance of web applications. Selenium Testing Tools Cookbook
Quite randomly, one of our old mobile projects was called “Zyre,” and I have the domain names for it. ZeroMQ
Active notification (push) will proactively alert the developers when a build fails, and includes methods such as desktop notifiers, chat, and SMS. Jenkins The Definitive Guide
But let’s face it — if we’re honest with ourselves, most of our organizations haven’t been able to proactively manage massive quantities of this data effectively, and we haven’t been able to use this information to our advantage to make better decisions and to do business smarter. Professional Hadoop Solutions
If a zone goes down, one of the nodes containing a replica notices and proactively copies data to a handoff location. bk-admin-guide-cloud-latest
This entails moving the regions being served by that RegionServer to some other RegionServer proactively rather than having HBase react to a RegionServer going down. HBase in Action
It is advisable to run HDFS’s fsck tool regularly (for example, daily) on the whole filesystem to proactively look for missing or corrupt blocks. Hadoop:The Definitive Guide 3rd Edition
If the broker has the lead partition shut down, this tool transfers the leadership proactively to other in-sync replicas on another broker. Apache Kafka
This avoids the need proactively share map updates with clients: they will learn about them as they interact with the storage cluster. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.
You should proactively archive and delete them to make sure they’re not taking up too much space. Hadoop in Action
To proactively test your index for corruption, here are two things to try: Lucene in Action 2nd Edition
After months of being the point people for an OpenStack cloud, we also wanted to have a document to hand to our system administrators so they’d know how to operate the cloud on a daily basis — both reactively and proactively. OpenStack Operations Guide
This is equivalent to the dereferencing we saw in Clojure using the @ prefix. Programming Concurrency on the JVM
We can remove one of the dereferencing queries by embedding class references in the student’s document: MongoDB The Definitive Guide 2nd Edition
This method performs a null check every time it dereferences a variable, returning the string “Unknown” if any of the variables traversed in this dereferencing chain is a null value. Java 8 in Action Lambdas, Streams and Functional-style Programming
For concision and simplicity in our examples, we often exhibit code fragments that could as easily be C or Pascal code fragments, without class or method definitions, or explicit dereferencing. JSR-133 Java Memory Model and Thread
If this parameter dereferencing syntax is familiar to you, then that's because it works the same way in local-params too, as explained in Chapter 4, Searching. Solr 3 Enterprise Search Server
For conciseness and simplicity in our examples, we often exhibit code fragments without class or method definitions, or explicit dereferencing. The Java Language Specification Java SE 7 Edition
The disadvantage here is that explicit code for dereferencing the guard page has to be inserted in the generated code, contributing to some execution overhead. Oracle JRockit The Definitive Guide
However, Java does not prevent you from using excessive amounts of memory nor from cycling through too much memory (e.g., creating and dereferencing many objects) Java Performance Tuning 2nd Edition
The trade-off is that it makes dereferencing a part of the identifier a little bit longer in code or in JP QL, although having helper methods, like those in Listing 10-8, can help. Pro JPA2
Introduction Making a simple query is not a hard task, but making a complex one, with faceting, local params, parameters dereferencing, and phrase queries can be a challenging task. Apache Solr 4 Cookbook
Using tpstats to find bottlenecks Cassandra is written using a SEDA architecture. Cassandra High Performance Cookbook
Each of these modules rely on an event driven substrate where the message processing pipeline and the task pipeline are split into multiple stages along the line of the SEDA[20] architecture. Cassandra A Decentralized Structured Storage System
Together, the two phases of the mail log MapReduce job and their InputFormat and OutputFormat form a type of staged event-driven architecture (SEDA) Hadoop:The Definitive Guide 3rd Edition
Where events are communicated via channels that can act as buffers in periods of high throughput, such a system can be described as having a staged eventdriven architecture (SEDA) Spring Integration in Action
Cassandra, however, is different: its concurrency model is based on SEDA, so a single operation may start with one thread, which then hands off the work to another thread, which may hand it off to other threads. Cassandra The Definitive Guide
We will start this section with the simplest dialogs—modal dialogs with just a single message. Core Java Volume I Fundamentals 9th Edition
The following application exercises two forms of JFileChooser dialogs, one for opening and one for saving. Thinking in Java 4th Edition
To wrap up, let’s look at one of the embedded dialogs, the create dialog, which lives within the panel just after the list view definition: Spring Roo in Action
Clearly they were mindful of the fact that Swing dialogs don’t always come up as snappily as we all would like. Core Java Volume II Advanced Features 9th Edition
It is sometimes possible to support multiple policies and let client code decide which one to use — for example via dialogs asking users whether to retry reading from a disk. Concurrent Programming in Java Design Principles and Pattern
Of course CSS can be used both for good and for evil (see Figure 4–11), and I hope you will resist the temptation to apply gratuitous background textures to your login dialogs. Java SE 8 for the Really Impatient
Using a separate table can help you avoid query cache invalidations and lets you use some of the more advanced techniques we show in this section. High Performance MySQL 3rd Edition
However, if very frequent events are assumed to be rare, we will instead have to pay the penalty in increased code generation time for reoptimizations or invalidations. Oracle JRockit The Definitive Guide
The cache is maintained by a lease mechanism described below, and kept consistent by invalidations sent by the master, which keeps a list of what each client may be caching. Chubby - The lock service for loosely-coupled distributed systems
In fact, if ZooKeeper had to manage cache invalidations, it could cause ZooKeeper operations to stall while waiting for a client to acknowledge a cache invalidation request, because write operations would need a confirmation that all cached values had been invalidated. ZooKeeper Distributed Process Coordination
To get good clustering, you need to understand the techniques of vectorization: the process of representing objects as Vectors. Mahout in Action
Loop unrolling enables another optimization called superword, which is a form of vectorization. Java Performance
It uses an in-memory X server Xvfb (http://en.wikipedia.org/wiki/Xvfb) so that Firefox can be run on an otherwise headless server. Jenkins Continuous Integration Cookbook
Using XVFB with Selenium The following section of this book requires that we do this work in Linux as the requirements are only available on that platform. Selenium 2 Testing Tools Beginner's Guide
Chapter 13 shows you how the Apache Jackrabbit content repository, a key component in many content and document management systems, uses Tika to implement full-text search and WebDAV integration. Tika in Action
In addition to the standard set of methods supported with corresponding annotations, HttpMethod may be used to build extensions such as WebDAV. Java EE 7 Essentials
Table 6-1 lists the standard and experimental response codes you’re most likely to encounter, minus a few used by WebDAV. Java Network Programming 4th Edition
Protocols other than file:// require just slightly more configuration in that the protocol and wagon JAR that supplies that connectivity must be explicitly called out as shown for webdav in Example 4-34 Building and Testing with Gradle
The x509 certificates used by Keystone must be obtained externally and configured for use with Keystone as described in this section. bk-compute-adminguide-grizzly
More information about the x509 extensions can be found at the OpenSSL website: http://www.openssl.org/ RabbitMQ in Action
Observe that the <x509> element references our existing userDetailsService configuration. Spring Security 3.1
The default Sun security provider has one certificate factory that works with certificates of type X509 Java Security 2nd Edition
This generates a zip file with server x509 certificates and a shell script fragment. OpenStack Operations Guide
Many user interface toolkits provide other common dialogs: to choose a date/time, currency value, font, color, and so on. Core Java Volume I Fundamentals 9th Edition
It’s a key component of today’s Web—a powerful, dynamic language with a rich ecosystem of professional-grade development tools, infrastructures, frameworks, and toolkits. Programming Concurrency on the JVM
Today, toolkits like jQuery or Dojo make this process easier. Getting Started with CouchDB
This situation will certainly improve, and providers of APIs and frameworks will start providing annotations as part of their toolkits. Thinking in Java 4th Edition
The MySQL community has also created a wide range of high-quality toolkits with good documentation to supplement these utilities: Percona Toolkit. High Performance MySQL 3rd Edition
It uses HDFS as its storage architecture and contains a number of toolkits for log analysis and cluster monitoring. Hadoop Operations and Cluster Management Cookbook
In addition, Spring MVC integrates with many common web frameworks and toolkits (for example, Struts, Adobe Flex, GWT, and so on) Pro Spring 3
Ease of deployment — This would be the availability of toolkits to manage deployment, version upgrades, patches, and so on. Professional Hadoop Solutions
Invoking alien methods from synchronized regions has caused many deadlocks in real systems, such as GUI toolkits. Effective Java 2nd Edition
Like most GUI toolkits, Swing uses a single-threaded model in which any GUI renderings are. Java 7 Recipes A Problem-Solution Approach
This tendency to centralize and strictly define the configuration begets a central daemon that sits somewhere on the network and polls every host every so often for status. Monitoring with Ganglia
It can help centralize business rules, which can enforce consistent behavior and provide more safety and peace of mind. High Performance MySQL 3rd Edition
This abstraction for managing resources will remove duplication from your code and centralize the way you manage and dispose of resources after use, without cluttering the code base with try-finally blocks. Scala in Action
Learn to centralize shared functions (and modules) and use them! Testable JavaScript
This allows organizations to leverage these already-existing assets stored in LDAP directories or to decouple their configuration from Puppet and centralize it. Pro Puppet
We can centralize logic that deals with handling the absence of a value. Functional Programming Patterns in Scala and Clojure
Also, there are other systems at Google which collect and centralize information from general-purpose debug logs, and it is not trivial to integrate large volumes of data from these systems and the Dapper repositories. Dapper a Large-Scale Distributed Systems Tracing Infrastructure
With this factory, we centralize the creation of objects with some advantages: Java 7 Concurrency Cookbook
They also give you a way to centralize and better control the SQL used in an application. Java 7 Recipes A Problem-Solution Approach
It is preferable to centralize this logic in a single class than to duplicate the validation logic in each of the class setter methods if there is any possibility of an inheritance hierarchy. Pro JPA2
A quick and easy way to host an application is to use a platform as a service (PaaS), a combination of a deployment platform and a solution stack that in many cases is free of charge. Gradle in Action
EC2 offers platform as a service (PaaS), with which we can start up theoretically an unlimited number of servers on the cloud. Hadoop Operations and Cluster Management Cookbook
Platform as a service (PaaS): Offers services beyond the infrastructure. Pro Spring MVC
Both provide a prepackaged version of Hadoop running in the corresponding cloud (Amazon or Azure) as Platform as a Service (PaaS) Professional Hadoop Solutions
Acquia's hosted search product is a great example of Platform as a Service (PaaS), and hosted Solr search is a very common integration approach for many organizations that don't wish to manage their own Java infrastructure or need to customize the behavior of Solr drastically. Solr 3 Enterprise Search Server
This isn't the only cloud hosting provider you might want to use, there are many good Platform as a Service (PaaS) providers, and many of them are excellent and also have high levels of automation and availability. Storm Real-Time Processing Cookbook
Several PaaS cloud providers can deploy Java-based web applications to the cloud infrastructure, including Heroku, CloudBees, and Cloud Foundry. Spring Roo in Action
Thanks to all of my coworkers at 10gen for sharing your knowledge and advice on MongoDB as well as Eliot Horowitz and Dwight Merriman, for starting the MongoDB project. MongoDB The Definitive Guide 2nd Edition
Mars Cheng, who organized the event, arranged for the venue, while 10gen paid for travel and accommodation for Peter Membrey. The Definitive Guide to MongoDB
PREFACExvi Through an unlikely turn of events, I started working for 10gen, the company spearheading the development of this open source database. MongoDB in Action
The MongoDB Java Driver To access MongoDB from a Java program, you can use the Java driver provided and maintained by 10gen, the company behind MongoDB. Spring Data Modern Data Access for Enterprise Java
There are at least three notable implementations of a procedure like this: Soundex, Metaphone, and Double Metaphone. Mahout in Action
There are four phonetic encoding algorithms to choose from: Caverphone, DoubleMetaphone, Metaphone, RefinedSoundex, and Soundex. Solr 3 Enterprise Search Server
This filter uses algorithm named double metaphone to analyze the phonetics of the words. Solr 3.1 Cookbook
In this section, we’ll implement an analyzer to convert words to a phonetic root using an implementation of the Metaphone algorithm from the Jakarta Commons Codec project. Lucene in Action 2nd Edition
This filter uses an algorithm named double metaphone to analyse the phonetics of the words. Apache Solr 4 Cookbook
The other dependency is an API that encodes arbitrary strings first with the Metaphone algorithm, then the Base64 format. Building and Testing with Gradle
The MapReduce APIs allow developers to focus on the question they’re trying to answer instead of worrying about how to handle machine failures—you’re regretting what you did with that bat now, aren’t you? Because data in the Hadoop filesystem is replicated, Hadoop can automatically handle failures by rerunning the computation on a replica, often without the user even noticing. Monitoring with Ganglia
Determining which resource is fully utilized, tuning the appropriate configuration parameters for that resource, and then rerunning the job will allow you to optimize your job’s runtime on your cluster. Pro Hadoop
If you started in a console, then hitting Ctrl-C and rerunning the same command you used to start it is the simplest way. CouchDB The Definitive Guide
It’ll help you to upgrade your wrapper version later by changing the gradleVersion and rerunning the wrapper task. Gradle in Action
It is possible to improve the results by recalculating the cluster centroids in the reducer, splitting any clusters that have customers that are too far apart from each others, and rerunning the GRGPF algorithm with new clusters. Hadoop MapReduce Cookbook
You may wonder why you had to delete the stocks directory in HDFS before rerunning the import command. Hadoop in Practice
Oozie makes rerunning failed workflows more tractable, since no time is wasted running successful parts of a workflow. Hadoop:The Definitive Guide 3rd Edition
Possibly this involves going over a large number of recent source code check-ins, recompiling the application at different changes and rerunning the affected application until the guilty check-in is spotted. Oracle JRockit The Definitive Guide
This can be done by rerunning the reindex process, but again filtering on a date field to only match documents that have been added since the last reindex process started. Elasticsearch The Definitive Guide
Rerunning the profile on the altered application finds that this method has shifted its percentage time down to just 4% Java Performance Tuning 2nd Edition
My family’s wish list originally contains only one item, an iPad. Programming Concurrency on the JVM
Alternatively, you can specify iPhone or iPad to target devices individually. Testable JavaScript
The iOS simulator enables you to test your web applications without using an actual device, whether it's an iPhone or any other iOS device, such as iPad or iPod Touch. Selenium Testing Tools Cookbook
Unfortunately, the means that searches for “iPad” won’t match our example document as we saw in the previous section. Solr in action
A web server doesn’t care whether the client is a Unix workstation, an Android phone, or an iPad, because all clients speak the same HTTP protocol regardless of platform. Java Network Programming 4th Edition
We then simply hand that Pageable into the method and make sure we’ve got the iPad back, that we’re the first page, and that there are further pages available. Spring Data Modern Data Access for Enterprise Java
Depending on which simulator we start XCode from, we can either have it run against iPhone or iPad. Selenium 2 Testing Tools Beginner's Guide
Get a Path Subpath You can extract a relative path with the subpath() method, which gets two parameters, the start index and the end index, representing the subsequence of elements: Pro Java 7 NIO.2
We can also fetch a subsequence of items based on their scores. Redis in Action
BiCount Bigram count measures the prevalence of each subsequence of two items within a given sequence. Incoop MapReduce for Incremental Computations
For convenience, the maximum subsequence sum is 0 if all the integers are negative.) Example: Data Structures and Algorithm Analysis in Java 3rd Edition
Clients can use this to guarantee that network and server outages cause only a suffix of a sequence of operations to be lost, rather than an arbitrary subsequence, thus allowing complex changes to be marked as committed with a final write. Chubby - The lock service for loosely-coupled distributed systems
The lookingAt( ) method is similar: it returns true if the pattern matches the complete region, or if it matches some subsequence at the beginning of the region. Java in a Nutshell 5th Edition
That is, the slice is a subsequence of the original buffer that only contains the elements from the current position to the limit. Java Network Programming 4th Edition
This means that the length attribute of a datagram which is re-used for multiple receive operations must be reset before the second and subsequence receives; otherwise it continually shrinks to the size of the smallest datagram received so far. Fundamental Networking in Java
Without the synchronized keyword, each thread overwrites the other and the resulting count is significantly less. Java Network Programming and Distributed Computing
This happens because the second run of the report generation overwrites the first one. Gradle in Action
It turns out that most of these overwrites came from client retries due to errors or timeouts. GFS - The Google File System
Although, technically, updates can be implemented as overwrites, the granularity of such an approach (overwrite will work only on the file level) can be cost-prohibitive in most cases. Professional Hadoop Solutions
Previously, only major compactions processed deletes, overwrites, and purging of expired data, which meant that minor compactions resulted in larger HFiles than necessary, which decreases block cache efficiency and penalizes future compactions. Apache Hadoop Goes Realtime at Facebook
If you subsequently add another attribute with the same category, it overwrites the first one. Core Java Volume II Advanced Features 9th Edition
If this option is not specified, jarsigner overwrites the jarfile specified on the command line. Java in a Nutshell 5th Edition
A tombstone is a special marker issued in a delete that overwrites the deleted values, acting as a placeholder. Cassandra The Definitive Guide
Here’s a SELECT TRANSFORM query that reads binary data from a src table, streams it through the shell cat command and overwrites the contents of a destination1 table: Programming Hive
Knowing this, you will see that the red paint fills the ellipse and therefore overwrites the inner part of the ellipse including some of the inner outline. Java 7 Recipes A Problem-Solution Approach
For example, don’t use TPC-H to benchmark an ecommerce system. High Performance MySQL 3rd Edition
Jason also converted his mom’s ecommerce website, Bet Ha Bracha, to a CouchApp. CouchDB The Definitive Guide
Before starting to query for data, we have to issue the keyspace command use ecommerce; NoSQL Distilled
Back then, dinosaurs ruled the earth and search engines with names like Altavista, Lycos, and Excite were used, primarily to find ecommerce portals for pet food on the Internet. Graph Databases
For example, in an ecommerce database, both tables Users and Orders. SQL Antipatterns
If you were to turn faceting on and facet on the type field using the ecommerce data for this chapter, you would get the results in listing 11.9 Solr in action
Consider two customers are attempting to put the same item into their shopping carts on an ecommerce site. Cassandra The Definitive Guide
Take, for instance, the problem of recommending products to a visitor of an ecommerce website. Hadoop Operations
Often an ecommerce site will boost categories of products that are more profitable, or filter out products presently out of stock (so you don’t see that they are out of stock and then go elsewhere to buy them) Lucene in Action 2nd Edition
From the early days of the Internet’s mainstream breakout, the major search engines and ecommerce companies wrestled with ever-growing quantities of data. Programming Hive
MooseFS (Moose File System) is a shared file system ; it implements the same rough concepts of shared storage solutions - such as Ceph, Lustre or even GlusterFS. bk-compute-adminguide-grizzly
This list of open-source file-level shared storage solutions is not exhaustive, other open source solutions exist (MooseFS) OpenStack Operations Guide
This type of primary key column is sometimes called a pseudokey. SQL Antipatterns
Tip The excellent tutorial at http://docs.oracle.com/javase/tutorial/getStarted/cupojava goes into much greater detail about the “gotchas” that beginners can run into. Core Java Volume I Fundamentals 9th Edition
Many of the caveats and “gotchas” you will face over time aren’t immediately obvious. CouchDB The Definitive Guide
Don’t be turned off by these issues though; there’s good news! Most integrated development environments (IDEs) such as NetBeans and IntelliJ support this refactoring and will automatically ensure these gotchas don’t arise. Java 8 in Action Lambdas, Streams and Functional-style Programming
Common MapReduce Design Gotchas Following is a list of some things to watch for and avoid when you design your MapReduce implementation: Professional Hadoop Solutions
A few gotchas in the current implementation make some management tasks tricky. HBase in Action
In this section we’ll discuss the two issues discovered in the previous code (regular expressions in Java, and lack of code reuse), as well as some other general Java gotchas in MapReduce. Hadoop in Practice
There are other NFS gotchas to watch out for, such as synchronizing UIDs and GIDs. Hadoop:The Definitive Guide 3rd Edition
This is a valid technique, but there are a few not-so-obvious gotchas. Hadoop Beginners Guide
One of the common gotchas is to forget to synchronize clocks between machines. Hadoop Operations
Gotchas with Floating-Point Comparisons A common gotcha arises when you compare floating-point numbers of different types (i.e., FLOAT versus DOUBLE) Programming Hive
At least one resource used by the tasks must not be shareable. Thinking in Java 4th Edition
Props is an ActorRef configuration object that’s thread-safe and shareable. Scala in Action
On Unix systems, if you use ipc endpoints you need to create these with appropriate permissions; otherwise, they may not be shareable between processes running under different user IDs. ZeroMQ
Containers must assume connections to be shareable if oyment hint is provided. Java EE 7 Specification
Certainly for shared resources pooling will always be an option if the overhead associated with creating a shareable resource is expensive. Java Performance Tuning 2nd Edition
This recipe will explore the manipulation of home pages found under the /user/userid directory and configured by the user through the Jenkins /me folder path. Jenkins Continuous Integration Cookbook
This regular expression must contain a single matching group, but it can be configured to support the username and DN issuance requirements of your application, for example, if the DNs for your organization's certificates include the email or userid fields, the regular expression can be modified to use these values as the authenticated principal's name. Spring Security 3.1
Grab the “UserID” since it is what we are grouping by. MapReduce Design Patterns
As we want the shopping carts to be available all the time, across browsers, machines, and sessions, all the shopping information can be put into the value where the key is the userid. NoSQL Distilled
Your program could have a single HashMap (or dict, for you Pythonistas) with UserID as the key and summed TimeSpent as the value. HBase in Action
After interpolating the string from the userid parameter into your SQL. SQL Antipatterns
The mongo console shows the contents of the user collection, enabling you to see what the userid is, while the password is shown as an MD5 hash of the original password you supplied: The Definitive Guide to MongoDB
Each user has a unique userid and is assigned a row named by that userid. Bigtable - A Distributed Storage System for Structured Data
We then create an instance of type Foo.T labeled baz. Scala in Depth
Starting at that root, the interpreter will take the package name and replace each dot with a slash to generate a path name off of the CLASSPATH root (so package foo.bar.baz becomes foo\bar\baz or foo/bar/baz or possibly something else, depending on your operating system) Thinking in Java 4th Edition
For example, db.baz returns the baz collection in the current database. MongoDB The Definitive Guide 2nd Edition
So if your module implements functions foo, bar, and baz but only exports foo, then bar and baz can’t be called from outside. RabbitMQ in Action
Loading sample data for the following keywords: foo, bar, baz. Cassandra High Performance Cookbook
We’ve again started with our three dashes and then specified the names of the lists we’re creating: foo and baz. Pro Puppet
We can mechanicallybar baz s translate this to the purely functional API: Functional Programming in Scala
Scope 1 - Top Level (def foo "first foo") (def bar "first bar") (def baz "first baz") Functional Programming Patterns in Scala and Clojure
To define Baz with a constructor that tests name and throws an exception if name is null: Beginning Scala
This limitation is eliminated by patches to core Hadoop committed to trunk and branch 1.1 by Hortonworks. Professional Hadoop Solutions
Presently, he works at Hortonworks where he leads the integration of Storm. Storm Blueprints Patterns for Distributed Real-time Computation
The Hortonworks blog is worth reading; it discusses application and future Hadoop roadmap items: http://hortonworks.com/blog/ Hadoop in Practice
There are Hadoop distributions from the large, established enterprise vendors, including EMC, IBM, Microsoft, and Oracle, as well as from specialist Hadoop companies such as Cloudera, Hortonworks, and MapR. Hadoop:The Definitive Guide 3rd Edition
Though Doug has now moved on to Cloudera (another prominent startup supporting the Hadoop community) and much of the Yahoo's Hadoop team has been spun off into a startup called Hortonworks, Yahoo remains a major Hadoop contributor. Hadoop Beginners Guide
Alan is a member of the Apache Software Foundation and a cofounder of Hortonworks. Programming Pig
Note that the bundled Cloudera, MapR, and planned Hortonworks distributions all include a Hive release. Programming Hive
It is usually not a good idea to set this variable globally, but some poorly written software installers in Windows do just that.) You can temporarily unset the CLASSPATH environment variable in the current shell window by typing. Core Java Volume I Fundamentals 9th Edition
If the hadoop.log.dir system property is unset, a subprocess of the virtual cluster may crash and leave the test case in limbo. Pro Hadoop
If the user realizes that he actually doesn’t like reading, he can remove the key altogether with "$unset": MongoDB The Definitive Guide 2nd Edition
We unset the HADOOP_CLASSPATH environment variable because we don’t have any third-party dependencies for this job. Hadoop:The Definitive Guide 3rd Edition
An increment would assume they are unset and start at 1 again. HBase:The Definitive Guide
Furthermore, once an error has occurred, there is no way to unset the flag so further errors can be detected. Java Network Programming 4th Edition
Enabled bits mean the document for that position is available to be searched against the query, and unset bits mean the document won’t be considered in the search. Lucene in Action 2nd Edition
There is no way to delete or “unset” a DBPROPERTY. Programming Hive
It is an arbitrary object which remains associated with the selection key which results from the registration, and which can be set, unset, and retrieved subsequently: Fundamental Networking in Java
You can also use $unset on embedded documents and on arrays. MongoDB in Action
Add the following to the /etc/sysctl.conf file, so that the setting will be enabled whenever the system boots: HBase Administration Cookbook
For disabling IPv6, open sysctl.conf (which you will find in /etc) and put the following configuration at the end of the file: Web Crawling and Data Mining with Apache Nutch
If you will run a much larger number of file descriptors, you may need to alter the per-system limits via changes to fs.file-max in /etc/sysctl.conf. Pro Hadoop
How you do this varies from system to system, but in most GNU/Linux systems you can change the values in /etc/sysctl.conf and execute sysctl -p, or use the /proc filesystem by echoing new values into the files found at /proc/sys/net/ High Performance MySQL 3rd Edition
In order to make the changes permanent, edit the /etc/sysctl.conf and update the IP forwarding setting : bk-compute-adminguide-grizzly
To make the changes permanent, edit the /etc/sysctl.conf file and update the IP forwarding setting: bk-admin-guide-cloud-latest
You may also need to edit /etc/sysctl.conf and adjust the fs.file-max value. HBase:The Definitive Guide
Kernel parameters should be configured in /etc/sysctl.conf so that settings survive reboots. Hadoop Operations
We needed to use sudo, because in order to set that property with the use of the sysctl command we need administration privileges. Apache Solr 4 Cookbook
This is sometimes appropriate on systems that have a very large number of collocated applications, none of which is very busy. High Performance MySQL 3rd Edition
Because access servers are collocated in their own tier, you can scale out read/write access regardless of the storage capacity. bk-admin-guide-cloud-latest
Ring 3 is a Cassandra cluster that is physically collocated. Storm Blueprints Patterns for Distributed Real-time Computation
RegionServers are typically collocated with HDFS DataNodes (figure 3.7) on the same physical hardware, although that’s not a requirement. HBase in Action
In practice, a lot of HBase setups are collocated with Hadoop, to make use of locality using HDFS as well as MapReduce. HBase:The Definitive Guide
Local EJBs were added to the EJB specification to address this issue of improving performance among locally collocated EJBs. Java Performance Tuning 2nd Edition
This assumption does not completely hold in HadoopDB as some tables are collocated and if partitioned on the same attribute, the join operation can be pushed entirely into the database layer. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
Writing test plans with SoapUI SoapUI (http://www.soapui.org/) is a tool that allows the efficient writing of functional, performance, and security tests, mostly for web services. Jenkins Continuous Integration Cookbook
Since 2000, he has architected a number of middle-tier business processes. Pro Hadoop
Nova Architecture Nova is architected as a distributed application with many components, but the majority of these are custom-written Python daemons of two varieties: Deploying OpenStack
Since the channel concept is specific to the TCP transport, the .NET client was architected to use the more generic term model for the same concept. RabbitMQ in Action
Miner architected several large-scale and mission-critical Hadoop deployments with the U.S. MapReduce Design Patterns
Upgrading from legacy Lucene A common situation is when you have an existing Java-based web application that was architected prior to Solr becoming the well-known and stable product that it is today. Solr 3 Enterprise Search Server
Most of the warts we encountered when we began with the project have been cleaned up, patched, or completely re-architected. HBase in Action
For illustrative purposes we’ll use the Neo4j database as an example of how a graph database is architected. Graph Databases
Unmesh has architected functional test automation projects using industry standard, in-house and custom test automation frameworks along with leading commercial and open source test automation tools. Selenium Testing Tools Cookbook
Robust—Because it is intended to run on commodity hardware, Hadoop is architected with the assumption of frequent hardware malfunctions. Hadoop in Action
In a properly architected system, GET requests can be bookmarked and prefetched without concern. Java Network Programming 4th Edition
We can use Heartbeat to associate EIP to the standby master automatically, if the active one is down. HBase Administration Cookbook
By implementing the Enterprise Integration Pattern (EIP), Spring Integration can make integrating Spring applications with external systems easy. Pro Spring 3
Note that although SI provides ready-made implementations of the various EIP patterns, there are architecturally different approaches to applying those patterns, and SI isn’t prescriptive about it. Spring in Practice
The first type of integration project we consider is the information portal (as named in the EIP book) Spring Batch in Action
Regarding the EIP book, I probably have one of the most well-worn copies, and it’s always within easy reach at my desk. Spring Integration in Action
In this section, we’ll discuss the design details of the course registration use case with EIP patterns and Spring Integration in the mix. Spring Roo in Action
This implies that ActiveMQ can be seen not only as a JMS broker, but as a whole development platform as well, especially when you add Enterprise Integration Patterns (EIP) to the mix (as we’ll see in chapter 13) ActiveMQ in Action
You’ll run into stop-the-world garbage collectors (GCs), and that will bring down your system in no time. HBase in Action
Typically, this will lead to the runtime system triggering more and more GCs in order to attempt clean up of the mess, but still isn't able to reclaim enough contiguous space for new objects. Oracle JRockit The Definitive Guide
It manages its young generation the same way the Parallel and Serial GCs do. Java Performance
Now that the config document is correct, we need to send it to the database using the rs.reconfig helper: MongoDB The Definitive Guide 2nd Edition
Once they are in place, we can reconfigure an ensemble using the reconfig operation. ZooKeeper Distributed Process Coordination
To modify a replica set’s configuration, there’s a separate command, replSetReconfig, which takes a new configuration document. MongoDB in Action
By default, a single-threaded map runner is used, and the key/value pairs are passed to the Mapper.map() method serially. Pro Hadoop
And regardless of whether the replica is acting as a standby to replace the master, it must be powerful enough to perform all the writes that occur on the master, with the extra handicap that it must perform them serially. High Performance MySQL 3rd Edition
The added benefit here over serially reading the data set on one node is that the input splits are read in parallel and the reducers use a configurable number of threads to read each mapper’s output. MapReduce Design Patterns
Disks on platters are capable of reading and writing fast serially. Cassandra High Performance Cookbook
All the subscribers are notified serially, so it's important that any code performed in the event-handling method executes quickly. Getting Started with Google Guava
Not only do typical JMS clients need to manually manage their own resources and environment, but they’re usually built for processing messages serially—one at a time (unless they’re specifically built with concurrency in mind) ActiveMQ in Action
Note that earlier version of this garbage collector actually performed old collections serially. Java Performance
Constructing and managing an object to process a task in parallel, rather than just invoking a method to process it serially, is the main unavoidable overhead associated with taskbased programming compared with sequential solutions. Concurrent Programming in Java Design Principles and Pattern
When stream operations run in parallel, the intent is that the same result is returned as if they had run serially. Java SE 8 for the Really Impatient
An address association property mapped as a many-to-one mapping could conceivably be overridden to be stored serially as a blob, but this could not only break client access but also spill over to break other areas like JP QL queries that traverse the address. Pro JPA2
To implement a dialog box, you extend the JDialog class. Core Java Volume I Fundamentals 9th Edition
Each component capable of holding a menu, including JApplet, JFrame, JDialog, and their descendants, has a setJMenuBar( ) method that accepts a JMenuBar (you can have only one JMenuBar on a particular component) Thinking in Java 4th Edition
If you use internal frames, you should not use the JDialog class for dialog boxes. Core Java Volume II Advanced Features 9th Edition
Solution Create an application with a menu option to prompt the user with a dialog box (JDialog) Java 7 Recipes A Problem-Solution Approach
Listing 9.5 A custom Lucene analyzer that filters non-alphabetic tokens. Mahout in Action
We’ll keep it simple and consider words of alphabetic characters and apostrophes (') that are at least two characters long. Redis in Action
Fortunately, our data is very predictable, and we hardcode the column value reads based on the alphabetic ordering of our qualifier labels. Hadoop RealWorld Solutions Cookbook
These set operations exist in two forms: alphabetic and symbolic. Programming in Scala 2nd Edition
Alphabetic range bucketing Solr does not directly support alphabetic range bucketing (A-C, D-F, and so on) Solr 3 Enterprise Search Server
Components should consist of lowercase alphabetic characters and, rarely, digits. Effective Java 2nd Edition
Lexicographic Ordering Lexicographic ordering is the natural (alphabetic) ordering of the product of two ordered Cartesian sets. Cassandra The Definitive Guide
Both relation and field names must start with an alphabetic character, and then they can have zero or more alphabetic, numeric, or _ (underscore) characters. Programming Pig
This example uses category as a primary alphabetic sort, with results within category sorted by score; finally, books with equal score within a category are sorted by decreasing publication month: Lucene in Action 2nd Edition
The attribute values are the same as for the align attribute of the HTML img tag. Core Java Volume I Fundamentals 9th Edition
An image is an .img file that most CD/DVD burner applications can burn directly to writable media. Pro Hadoop
In a web application, you accomplish this by putting the filename in the <img> element’s src attribute. High Performance MySQL 3rd Edition
The size of the output file, centos.img, is determined by the block size and count. Hadoop Operations and Cluster Management Cookbook
Write a Scala program that prints the src attributes of all img tags of a web page. Scala for the Impatient
This will cause changes to the underlying hypervisor specific config file and possibly to the contents of the image (in our example system.img) Oracle JRockit The Definitive Guide
In the following example, the <img> element is located by using its alt attribute. Selenium Testing Tools Cookbook
That way, the parser knows not to look for a img> tag. Core Java Volume II Advanced Features 9th Edition
If the IMG elements don’t have HEIGHT and WIDTH attributes, the main thread might have to wait for all the images to load before it can finish by displaying the page. Java Network Programming 4th Edition
Additionally, you must set the qemu_img_cmd value in the hyperv configuration section to the full path to an qemu-img command installation. user-guide
Data model agnostic frameworks such as JDO aren't easy for use cases, where one has to use the complete power of data models in column stores. Web Crawling and Data Mining with Apache Nutch
The support for Hibernate, MyBatis, JDO, and JPA makes already simple APIs even simpler, thus easing the burden on developers. Pro Spring 3
This layer abstracts the actual persistence framework (e.g., JDBC, JDO, or JPA) Pro Spring MVC
Often these objects are backed by a relational database of some type, and you manage them through object relational mapping tools such as Hibernate, JPA, or JDO. Solr 3 Enterprise Search Server
Java Data Objects (JDO) was inspired and supported primarily by the object-oriented database (OODB) vendors. Pro JPA2
It significantly simplified the implementation of data access layers, regardless of whether JDBC, Hibernate, TopLink, JDO, or iBatis was used as persistence technology. Spring Data Modern Data Access for Enterprise Java
Despite a handful of rough spots, such as applets, Enterprise JavaBeans (EJB), Java Data Objects (JDO), and countless logging frameworks, Java has enjoyed a rich and diverse history as the platform on which much enterprise software has been built. Spring in Action 4th Edition
As a further illustration of this, consider some of the recent discussion within the Tika community regarding character sets (often abbreviated charsets), which are (sometimes numerical) encodings of characters from a particular alphabet, language, or dialect used to ensure interoperability and proper representation of heterogeneous electronic textual formats. Tika in Action
To find out which character sets are available in a particular implementation, call the static availableCharsets method. Core Java Volume II Advanced Features 9th Edition
Using the Charsets class In Java, there are six standard character sets that are supported on every Java platform. Getting Started with Google Guava
For more complex charsets, such as the UTF-8 encoding of Unicode or the EUC-JP charset. Java in a Nutshell 5th Edition
No actual removal from ification occurs, although the feature may be removed from products at. Java EE 7 Specification
Some volunteers OSGi-ify standard Java artifacts and make them available, hoping original developers will then include the OSGi-ification process in the build of their frameworks and libraries. Spring Dynamic Modules in Action
Searching for Files by Glob Pattern Sometimes you may have only partial information about the file you want to search for, such as only its name or extension or perhaps even just a chuck of its name or extension. Pro Java 7 NIO.2
The essential part of that CD, the Thinking in C multimedia seminar (created for MindView by Chuck Allison), is now available as a downloadable Flash presentation. Thinking in Java 4th Edition
Ian was in a conference, Mikko was getting on a plane, and Chuck was probably in the office, but three hours later, Ian merged the pull request. ZeroMQ
However, it's possible for us to specify a chuck size to control the actual storage of the SequenceFile data blocks in the HDFS. Hadoop MapReduce Cookbook
Manning’s Hadoop in Action by Chuck Lam contains the necessary prerequisites to understand and apply the techniques covered in this book. Hadoop in Practice
About the author Chuck Lam is currently founding a mobile social networking startup called RollCall. Hadoop in Action
Perhaps you want to get all of Chuck’s orders that were placed over the web: Spring in Action 4th Edition
Message-Driven Beans A message-driven bean (MDB) is a container-managed bean that is used to process messages asynchronously. Java EE 7 Essentials
Each of these methods is invoked by the EJB container for the purposes of creation and destruction of the MDB. ActiveMQ in Action
The type of pools and caches used depends on the type of EJBs—stateless session, stateful session, entity, or MDB. Java Performance
The message-driven bean (MDB) is the EJB component for asynchronous messaging. Pro JPA2
One of the highlights of the EJB 2 specification was the inclusion of the messagedriven bean (MDB) Spring in Action 4th Edition
The most popular approach to network layering is the Open Systems Interconnection (OSI) model, created by the International Standards Organization (ISO) Java Network Programming and Distributed Computing
We encourage hosted plugins to use the same MIT license, to simplify the story for users, but plugins are free to choose their own licenses, so long as it's OSI-approved open-source license. Jenkins Continuous Integration Cookbook
If you read the network literature, you’re likely to encounter an alternative seven-layer model called the Open Systems Interconnection (OSI) Reference Model. Java Network Programming 4th Edition
Layer-2 network Term used for OSI network architecture for the data link layer. OpenStack Operations Guide
Races between validates for earlier writes and invalidates for later writes are protected in the coordinator by always sending the log position associated with the action. Megastore - Providing Scalable, Highly Available Storage for Interactive Services
This mistaken assumption about MapReduce affects three of the five benchmarks in the comparison paper (the selection, aggregation, and join tasks) and invalidates the conclusions in the paper about the relative performance of MapReduce and parallel databases. MapReduce a flexible data processing tool
However, doing so invalidates the contents of local variable n. The Java Virtual Machine Specification Java SE 7 Edition
Dynamic and changing modules are still cached, but since the artifact can become outof-date with respect to their identifiers, Gradle invalidates the cached versions after some period of time. Gradle Beyond The Basics
The caching protocol is simple: it invalidates cached data on a change, and never updates it. Chubby - The lock service for loosely-coupled distributed systems
It is important to do a pack/unpack cycle on a JAR file before signing it with jarsigner because the pack/unpack cycle reorders some internal elements of a class file and invalidates any digital signatures or checksums in the JAR file manifest. Java in a Nutshell 5th Edition
Rack awareness If, however, you do have a multi-rack setup, or another configuration that otherwise invalidates the previous assumptions, you can add the ability for each node to report its rack ID to Hadoop, which will then take this into account when placing replicas. Hadoop Beginners Guide
Similarly, closing a selector invalidates all keys in that selector. Java Network Programming 4th Edition
If another update that invalidates the user's changes is made by another user, the timestamps will have changed, and the current transaction needs to be rolled back instead of committed. Java Performance Tuning 2nd Edition
Once compiled code has been generated it may be invalidated for several reasons, such as class loading that invalidates a CHA optimization or because classes referenced by the code have been unloaded. Java Performance
After this, the kadmin and kinit commands should be accessible from the command line. Hadoop Operations and Cluster Management Cookbook
For Hadoop users, this is done via the kinit command.) The KDC responds with something called a Ticket Granting Ticket (TGT), which is simply a ticket used for requesting tickets to communicate to other servers and services. Professional Hadoop Solutions
By running the kinit command, the client would obtain a Kerberos ticket and store it in the filesystem. Hadoop MapReduce Cookbook
The authentication step, however, is normally carried out explicitly by the user using the kinit command, which will prompt for a password. Hadoop:The Definitive Guide 3rd Edition
To perform the initial authentication and retrieve a TGT from the KDC with MIT Kerberos, use the kinit command; to list cached credentials, use the klist command as in Example 6-2 Hadoop Operations
If you used the --oplog option to dump the database, you must use the -oplogReplay option with mongorestore to get the point-in-time snapshot. MongoDB The Definitive Guide 2nd Edition
Then only restore data from those chunks using your backups (and mongorestore) Scaling MongoDB
The --drop option tells the mongorestore utility to discard each collection in the database before restoring it. The Definitive Guide to MongoDB
For instance, you might be tempted to use mongodump and mongorestore, but these utilities preserve collections and index declarations only. MongoDB in Action
After creating a new source and index, we run the indexer program to create the initial full-text index data files and then (re)start the searchd daemon to pick up the changes: High Performance MySQL 3rd Edition
The Sockets Direct Protocol (SDP) is a network protocol, which supports stream connections using InfiniBand (IB) Java 7 New Features Cookbook
Solution Make use of the Sockets Direct Protocol (SDP) to bypass TCP, a possible bottleneck in the process. Java 7 Recipes A Problem-Solution Approach
If you benchmarked your systems with real workloads, it would be harder to draw accurate conclusions from the benchmarks. High Performance MySQL 3rd Edition
This incurs a great deal of random I/O in the systems that we benchmarked to update the per-message state. Building LinkedIn’s Real-time Activity Data1
Other issues Naturally, these are just a few of the possible areas where application performance might need to be benchmarked. Oracle JRockit The Definitive Guide
Sam Pullara benchmarked Java’s String classes against Objective-C’s NSString classes and found that Java outperformed native code by a wide margin. Beginning Scala
In order to evaluate Tenzing performance against commercial parallel databases, we benchmarked four commonly used analyst queries (see appendix A) against DBMS-X, a leading MPP database appliance with row-major storage. Tenzing - A SQL Implementation On The MapReduce Framework
We have “benchmarked” our program by modifying the code snippet presented above as follows: Steps in Scala An Introduction to Object-Functional Programming
Specifics of what is being benchmarked are deliberately not included. Java Performance
To explore more complex uses of the benchmarked systems, the benchmark includes four more analytical tasks related to log-file analysis and HTML document processing. HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
The folder contains several .jar files and folders such as bin, sbin, and conf. Hadoop Operations and Cluster Management Cookbook
For RabbitMQ they’re created using the rabbitmqctl utility found in the ./sbin/ directory of your RabbitMQ installation. RabbitMQ in Action
A quick check is to look for /sbin/mkfs.ext4 on your system. Cassandra High Performance Cookbook
The mc-puppetd command may be copied from the plugin directory into the /usr/sbin/ directory on the MCollective client systems. Pro Puppet
A full list of ethernet cards can be obtained with “/sbin/ifconfig ." Hadoop in Practice
The YARN start-yarn.sh script (in the sbin directory) starts the YARN daemons in the cluster. Hadoop:The Definitive Guide 3rd Edition
You’ll notice that the directory includes common directories like bin, sbin, lib, libexec, share, as well as conf directory that contains configuration files. Hadoop Operations
The second command (the / sbin/swapoff -a one) disables swapping on all known devices. Apache Solr 4 Cookbook
So, using parallel collections for parallelism requires using the parallelizable operations. Scala in Depth
First, not all operations are parallelizable, so switching to parallel collection won’t improve the performance of these operations. Scala in Action
The second issue is particularly interesting because you need to keep a mental model that some stream operations are more parallelizable than others. Java 8 in Action Lambdas, Streams and Functional-style Programming
Hadoop provides a powerful computational platform, providing highly scalable, parallelizable execution that is wellsuited for the creation of a new generation of powerful data science and enterprise applications. Professional Hadoop Solutions
In principle, the evaluation of a when statement is parallelizable, but we have not explored this option yet. Interpreting the Data Parallel Analysis with Sawzall
Not all problems are easily parallelizable, but you’ll be surprised by how many are once you start to look. HBase in Action
This is not necessarily optimal and there are several ways that have been addressed in research over the years to make faster and more parallelizable variants. Oracle JRockit The Definitive Guide
These enhancements are designed to be fully parallelizable to utilize the underlying MapReduce framework. Tenzing - A SQL Implementation On The MapReduce Framework
For example, let's suppose our number-crunching application is fully parallelizable to any number of CPUs, and that on a single unutilized CPU it takes 100 seconds. Java Performance Tuning 2nd Edition
Fortunately, the search is highly parallelizable by dividing the index into pieces (index shards), each having a randomly chosen subset of documents from the full index. Web search for a planet the google cluster architecture
You’ll create one based on data taken from a dating site, and then you’ll turn it into a deployable, production-ready web service. Mahout in Action
Deployable artifacts often look different by nature, follow custom project requirements, and demand distinct runtime environments. Gradle in Action
It is an explicit goal to make Spring applications deployable without changing one line of configuration or code in most cases. Pro Spring MVC
One effective strategy is to automate this process in Jenkins in the deployment build job, and then to save both the database snapshot and the deployable binary file as artifacts. Jenkins The Definitive Guide
A Smarter Hub: The Event Switch An event switch enhances event-based architectures by making them more modular and more deployable. Testable JavaScript
For example, you might want to constrain individual apps to be deployable to specific server farms, but you might not want apps to know about server farms and vice versa. Spring in Practice
Take a special note of the scope definitions of JUnit and JMock so as to not include them in your final deployable JAR. Storm Real-Time Processing Cookbook
Compile the sources, set up a deployable application, and copy the contents into the Tomcat deployment directory. Java 7 Recipes A Problem-Solution Approach
The resulting package will then be deployable into a compliant application server. Pro JPA2
One way of doing this is to configure each bean in a separate configuration class (or XML file) and then make a build-time decision (perhaps using Maven profiles) about which to compile into the deployable application. Spring in Action 4th Edition
Figure 14.4 To get classifiable data, training examples are constructed from several sources to denormalize everything into a single record that describes what happened. Mahout in Action
If you denormalize the data by combining the tables and add an index on (account_type, published), you can write the query without a join. High Performance MySQL 3rd Edition
With that sort of data, you want to denormalize as much as you possibly can. CouchDB The Definitive Guide
Deciding when to normalize and when to denormalize can be difficult: typically, normalizing makes writes faster and denormalizing makes reads faster. MongoDB The Definitive Guide 2nd Edition
To avoid having to process the entire dataset, we could denormalize the storage model by adding backward links. Graph Databases
New features increases query complexity; now we have too many joins Denormalize your data to reduce joins. Hadoop:The Definitive Guide 3rd Edition
The question is, wouldn’t it be good to trade relational features permanently for performance? You could denormalize (see the next section) the data model and avoid waits and deadlocks by minimizing necessary locking. HBase:The Definitive Guide
Performing joins on the client should be a very rare case; you really want to duplicate (denormalize) the data instead. Cassandra The Definitive Guide
The second major difference between Lucene and databases is that Lucene requires you to flatten, or denormalize, your content when you index it. Lucene in Action 2nd Edition
In this case, because MongoDB doesn’t support joins, we’ve elected to denormalize the parent category names in each child document. MongoDB in Action
This TCP source has some additional tunable options over the standard TCP syslog source, which you may want to tune. Apache Flume Distributed Log Collection for Hadoop
Tunable Items for Cluster and Jobs Hadoop Core is designed for running jobs that have large input data sets and medium to large outputs, running on large sets of dissimilar machines. Pro Hadoop
We implement this in a way that is tunable at the application level. Building LinkedIn’s Real-time Activity Data1
Using PooledExecutor " A tunable worker thread pool " Main method execute(Runnable r) " Controls for: Scalable IO in Java
With Cassandra, which has tunable consistency, writes will use a. Storm Blueprints Patterns for Distributed Real-time Computation
Chapter 4, Performance Tuning: Many configuration knobs and tunable settings exist for Cassandra. Cassandra High Performance Cookbook
Riak’s solution is based on Amazon Dynamo’s novel approach of a tunable AP system. A Little Riak Book
The number of threads is stored in a tunable parameter, numberOfThreads, so that it can be adjusted to fit the VM and network stack. Java Network Programming 4th Edition
In extreme cases, the Solaris kernel tunable rechoose_interval can be increased as a means to reduce thread migrations. Java Performance
The trade-offs that obtain the performance advantages of worker threads have several additional tunable parameters, usage consequences, and programming obligations that can impact the design and use of worker thread classes (including those contained in the util.concurrent package available from the online supplement) Concurrent Programming in Java Design Principles and Pattern
On the other hand, the JList class is consistent with the JTree and JTable classes where this generality is useful. Core Java Volume II Advanced Features 9th Edition
The component I used in this recipe is a JTable that contains this built-in print() method. Java 7 Recipes A Problem-Solution Approach
As scale increases, you’re likely to have to commit to a parallel extraction architecture, such as Hadoop, or a commercially supported system like Aster Data, Vertica, or Greenplum. Mahout in Action
The success of MR led to a wide range of third-party implementations (notably open-source Hadoop [15]), and a number of hybrid systems that combine parallel DBMSs with MR, offered by vendors like Aster, Cloudera, Greenplum, and Vertica. Dremel - Interactive Analysis of WebScale Datasets
Don would like to thank the support he got from coworkers at Greenplum, who provided slack in my schedule to work on this project, moral support, and technical suggestions. MapReduce Design Patterns
Using HDFS in a Greenplum external table Greenplum is a parallel database that distributes data and queries to one or more PostgreSQL instances. Hadoop RealWorld Solutions Cookbook
Over time, however, the differences between relational databases and MapReduce systems are likely to blur—both as relational databases start incorporating some of the ideas from MapReduce (such as Aster Data’s and Greenplum’s databases) and, from the other direction, as higher-level query languages built on MapReduce (such as Pig and Hive) make MapReduce systems more approachable for traditional database programmers.5 Hadoop:The Definitive Guide 3rd Edition
All of them except Aster Data and Greenplum are open source in some way. Hadoop in Action
A number of vendors have such offerings now, including Greenplum, AsterData, Paraccel and Vertica. Tenzing - A SQL Implementation On The MapReduce Framework
Venture capitalists are very much aware of this trend, and have funded no fewer than a dozen new companies in recent years that build specialized analytical data management software (e.g., Netezza, Vertica, DATAllegro, Greenplum, Aster Data, Infobright, Kickfire, Dataupia, ParAccel, and Exasol), and continue to fund them, even in pressing economic times [18] HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
Cloud-init is an open source project, and the source code is available on Launchpad. bk-compute-adminguide-grizzly
Trunk versions of the code are referred to by their Launchpad commit revision number (or “revno”) Deploying OpenStack
You can view existing bugs and report bugs in the Launchpad Bugs area. bk-admin-guide-cloud-latest
The Launchpad Bugs area The OpenStack community values your set up and testing efforts and wants your feedback. admin-user-guide-trunk
If you find a bug and can’t fix it or aren’t sure it’s really a doc bug, log a bug at OpenStack Manuals (http://bugs.launchpad.net/openstack-manuals) OpenStack Operations Guide
Clickable report URLs Navigating to the reports directory and double-clicking the HTML index file can become tedious over time. Gradle in Action
By following this REST API you can easily automate tasks that so far have been only possible via a clickable interface. RabbitMQ in Action
The results list, which appears below the search panel, is clickable and transfers you to a more detailed screen allowing to resolve the review or to reassign it. Sonar Code Quality Testing Essentials
Every job in every list (running, completed, and failed) is “clickable,” which enables you to get additional information about job execution. Professional Hadoop Solutions
The facets are typically displayed with clickable links that apply Solr filter queries to a subsequent search. Solr 3 Enterprise Search Server
First, let’s introduce a new trait, Clickable, an abstraction for any widget that responds to clicks: Programming Scala
If you look closely at the footer of each Roo page in a web browser, you’ll see two clickable links for these themes. Spring Roo in Action
Overridable—Type classes allow you to override a default implementation through the implicit system. Scala in Depth
Constructor calls overridable method To better allow inheritance and provide a healthy framework, free of bugs, calling overridable methods in class constructors is not acceptable and can cause many problems from exceptions to inconsistent object state. Sonar Code Quality Testing Essentials
In other words, the class must document its self-use of overridable methods. Effective Java 2nd Edition
Optimizing for extensibility entails removing hard-wired decisions and instead allowing them to vary, for example by encapsulating them as overridable methods, supporting callback hooks, or abstracting functionality via interfaces that can be re-implemented in completely different ways by dynamically loaded components. Concurrent Programming in Java Design Principles and Pattern
This setting cannot currently be overridden, but the intent is that it be overridable in future releases. Pro JPA2
The central class of the FlumeJava library is PCollection, a (possibly huge) immutable bag of elements of type T. FlumeJava - Easy, Efficient Data-Parallel Pipelines
As you can see in figure 12.5, the parallelDo methods that you saw on the PCollection interface all take either a PType or PTableType argument, depending on whether the result was a PCollection or PTable. Hadoop in Practice
On Windows, you can use third-party wrapper utilities that turn JAR files into Windows executables. Core Java Volume I Fundamentals 9th Edition
Make these two scripts executables by running the following command : bk-compute-adminguide-grizzly
You can refresh the servicelevel authorization for the NameNode and JobTracker without restarting the Hadoop daemons using the –refreshServiceAcl command switch on the dsfadmin (for NameNode) and mradmin (for JobTracker) executables. Professional Hadoop Solutions
Exec is used to execute arbitrary commands from the agent and it is convenient to have a standard default path set to look for executables: Managing Infrastructure with Puppet
Hence, the scripts or the executables for reducer programs should keep track of the last seen key of the input records to demarcate between key groups. Hadoop MapReduce Cookbook
Files and directories are installed according to the FHS; configuration files are in /etc/hadoop, logs in /var/log/hadoop, executables are in /usr/bin, and so forth. Hadoop Operations
In a similar way, there are products available that precache shared libraries (DLLs) and even executables in memory. Java Performance Tuning 2nd Edition
It supports external executables via its stream command and MapReduce JARs via its mapreduce command. Programming Pig
For example, the executables that you just extracted and found in the bin directory can’t be executed from anywhere except the bin directory by default. The Definitive Guide to MongoDB
To see more on how to create .jar file executables, see recipe 14-22 Java 7 Recipes A Problem-Solution Approach
Inside the non-Java code, C’s malloc( ) family of functions might be called to allocate storage, and unless you call free( ), that storage will not be released, causing a memory leak. Thinking in Java 4th Edition
Internal JVM memory management is, to a large extent, kept off the Java heap and allocated natively in the operating system, through system calls like malloc. Oracle JRockit The Definitive Guide
An OutOfMemoryError if the call to malloc fails Finally, to demonstrate how to check for an exception when calling a Java method from a native method, we send the string to the stream, a character at a time, and call ExceptionOccurred after each call. Core Java Volume II Advanced Features 9th Edition
Each object creation is roughly as expensive as a malloc in C, or a new in C++, and there is no easy way of creating many objects together, so you cannot take advantage of efficiencies you get using bulk allocation. Java Performance Tuning 2nd Edition
People loved the simplicity of the language, the portability of bytecodes, and the safety of garbage collection (versus traditional malloc/free memory management of other systems) Java Performance
If you want your allocation to persist past that, use my_malloc( ) Understanding MySQL Internals
With stacked graphs and a single metric view on every node at a cluster level, outliers will stick out easily. Monitoring with Ganglia
We could find the outliers in each grade as follows: MongoDB The Definitive Guide 2nd Edition
Finding outliers is an important part of data analysis because these records are typically the most interesting and unique pieces of data in the set. MapReduce Design Patterns
Trim Outliers from the Audioscrobbler dataset using Pig and datafu. Hadoop RealWorld Solutions Cookbook
There are always outliers that will cause your data to be skewed, and these outliers can significantly impede the progress of your MapReduce jobs. Hadoop in Practice
This will work for the majority of users, but there will be outliers that will have magnitudes of emails more in their inbox—so many, in fact, that a single row could outgrow the maximum file/region size and work against the region split facility. HBase:The Definitive Guide
Monitoring the network profile of jobs, detecting outliers, and tuning appropriately is usually required. Hadoop Operations
These outliers may be caused due to full garbage collections, database check pointing, network glitches, and so on. Java Performance
If you see high variance on each run you may want to run the test 3 or more times and discard the outliers (keeping the middle result) Lucene in Action 2nd Edition
Outliers are caused by, for example, exponential backoff on conflicts and Bigtable tablet unavailability. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications
We would like to acknowledge a few people who were helpful in bringing this system to production: David DeMaggd was responsible for the operation and rollout of LinkedIn’s Kafka infrastructure, John Fung was responsible for performance and quality testing, Rajappa Iyer and others on the data warehouse team helped with data model definition and conversion of the warehouse to use this pipeline as well as helping define SLAs and monitoring requirements. Building LinkedIn’s Real-time Activity Data1
The results of performance testing can verify whether the application will be able to comply with the proposed Service Level Agreements (SLAs) Pro Spring MVC
Many applications have Service Level Agreements, or SLAs, which define contractually how well they should perform. Jenkins The Definitive Guide
In an automated and auto-recovering environment such as Oozie, a traditional SLA may not be applicable, whereas some specific SLAs can make sense. Professional Hadoop Solutions
You don’t want to run MapReduce jobs on the same cluster that serves your low-latency queries, at least not when you expect to maintain OLTP-style service-level agreements (SLAs)! Your online access will suffer. HBase in Action
Access is less user-driven, and therefore, SLAs are geared more toward overall runtime, as opposed to per-request latencies. HBase:The Definitive Guide
Dynamo was born, as were many of the systems described in this chapter, from the need to honor strict requirements for realizing high performance under continuous growth, meeting service-level agreements (SLAs), remaining available under strenuous load and failures, gracefully handling those failures, and allowing horizontal scale. Cassandra The Definitive Guide
What Is Resource Management? In a perfect world, multiple groups of users, each with jobs with different service level agreements (SLAs), would be able to coexist on a shared system, blissfully unaware of one another. Hadoop Operations
Thus, given this code the Scala compiler will generate a class with two Int fields, one for numer and one for denom. Programming in Scala 2nd Edition
Instead, interfaces afford most of the benefits of multiple inheritance while avoiding the complexities and inefficiencies. Core Java Volume I Fundamentals 9th Edition
This module dives a little deeper into how the memory is being used and can help to point out memory inefficiencies. Monitoring with Ganglia
This leads to some inefficiencies since all topics would have at least two copies of the data, one for the real-time consumer and one for the batch log aggregation service. Building LinkedIn’s Real-time Activity Data1
Giraph leverages the resource management infrastructure of Hadoop and HDFS for data storage, but it works around the inefficiencies of using MapReduce for BSP. Professional Hadoop Solutions
Problem You want to determine if a job runs slowly due to inefficiencies in your code. Hadoop in Practice
The previous format had inefficiencies in the index strategy, read paths, and internal APIs. Hadoop in Action
These VMs may have huge inefficiencies, even in such basic operations as casting between different numeric types, as was the case with one development VM I used. Java Performance Tuning 2nd Edition
The SOAP Message Transmission Optimization Mechanism (MTOM) together with XML-binary Optimized Packaging (XOP) were proposed to address the inefficiencies encountered in the transmission of binary data in SOAP documents. Java Performance
In addition, our control over Bigtable’s implementation, and the other Google infrastructure upon which Bigtable depends, means that we can remove bottlenecks and inefficiencies as they arise. Bigtable - A Distributed Storage System for Structured Data
One of the inefficiencies of Percolator relative to a MapReduce-based system is the number of RPCs sent per work-unit. Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications
In his book Imperfect C++, Matthew Wilson uses an analogy of comparing the compiler to a batman. Scala in Depth
Matthew McCullough is an energetic 15 year veteran of enterprise software development, open source education, and co-founder of Ambient Ideas, LLC, a Denver consultancy. Jenkins The Definitive Guide
In particular, we owe a thank you to Matthew Sackman and Matthias Radestock, without whom the chapters on clustering and RabbitMQ internals would not have been possible. RabbitMQ in Action
Matthew's research interests include search engines, distributed computing, image processing, computer vision, and machine learning. Cassandra High Performance Cookbook
Additional thanks go to my friend, Matthew McCullough, for his early contributions to the chapter on Build Hooks. Gradle Beyond The Basics
Also thanks are due to Andrew Ryan, Matthew Welty and Paul Tuckfield for doing a lot of work on operations, monitoring and the statistics setup that makes these tasks easy. Apache Hadoop Goes Realtime at Facebook
To my children Kaitlyn, Jacob, Matthew, and Zachary: please stop growing up! I love you all so much and enjoy having such wonderful children. Java 7 Recipes A Problem-Solution Approach
It goes deeper than this, as explained in this introductory book by Matthew and Tim, but modeling by convention is truly a game changer for enterprise software development. Building and Testing with Gradle
If we want to make use of covariance or contravariance, stick to immutable classes, or expose your mutable class in an immutable interface. Scala in Depth
In the case of covariance, subtyping can go downward, as you saw in the example of List, but in contravariance it’s the opposite: subtypes go upward. Scala in Action
Sometimes covariance and contravariance are mixed in the same type. Programming in Scala 2nd Edition
Similarly, you can ask Scala to support contravariance on your types. Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine
A - prefix on the type symbol is used to indicate contravariance. Programming Scala
In this mode, I worry about view bounds, covariance and contravariance, implicit conversions, and so on. Beginning Scala
Contravariance of functions Assume we have an object f of type Function1[A,B] Steps in Scala An Introduction to Object-Functional Programming
In effect, the contravariance and covariance cancel each other out. Java SE 8 for the Really Impatient
In summary, what we require is a scheduler architecture that can accommodate both types of jobs, flexibly support job-specific policies, and also scale to an ever-growing amount of scheduling work. Omega - flexible, scalable schedulers for large compute clusters
For example, it has features that let you simulate real users more flexibly, by controlling such parameters as ramp-up time. High Performance MySQL 3rd Edition
With these tools in your toolbox, it’s simple to produce the artifacts you need and flexibly react to new requirements for your delivery process. Gradle in Action
Producers and consumers of information could now be completely decoupled and flexibly mixed on-the-fly. RabbitMQ in Action
A Sawzall program can flexibly specify the mapper part of a MapReduce, as long as the mappers are pure functions. FlumeJava - Easy, Efficient Data-Parallel Pipelines
Later, you will see how this simple fact makes it easy to scale flexibly as your. Elasticsearch The Definitive Guide
The design allows the intercomponent communication to be based on a local or remote call, which allows components to be placed very flexibly. Java Performance Tuning 2nd Edition
In the simplest kind of data file (using text format), fields can be flexibly interpreted as strings, numbers, timestamps, or other kinds of values. Cloudera Impala
By convention, we name the non-public version of any method method as doMethod.) Somewhat less flexibly, these methods need not be declared non-public if they are instead designed to be overridden in subclasses. Concurrent Programming in Java Design Principles and Pattern
One final note about enumerated types is that they are defined quite flexibly in Java. Pro JPA2
Complex event processing (CEP) systems support holistic processing of data from multiple sources. Professional Hadoop Solutions
If you are familiar withcomplex event processing (CEP), you can think of Storm tuples as events. Storm Blueprints Patterns for Distributed Real-time Computation
Drools also includes a module called Drools Fusion that essentially supports Complex Event Processing (CEP) Storm Real-Time Processing Cookbook
With a large physical network, we might use Complex Event Processing (CEP) to process streams of low-level network events, updating the graph only when the CEP solution raises a significant domain event. Graph Databases
Other containers already based on Spring DM, such as Oracle’s CEP product and SpringSource’s dm Server, will almost certainly support Blueprint as they move to the Spring DM 2.0 codebase. Spring Dynamic Modules in Action
Real time: Messages produced by the producer threads should be immediately visible to consumer threads; this feature is critical to event-based systems such as Complex Event Processing (CEP) systems. Apache Kafka
This style of application design makes it possible to introduce such concepts as complex event processing (CEP) ActiveMQ in Action
Should you use container-managed persistence (CMP) or bean-managed persistence (BMP)? This is one of the most frequently discussed questions about EJBs. Java Performance Tuning 2nd Edition
Container-managed persistence (CMP) allows enterprise developers to define relationships between entity beans. Java Performance
Both simultaneous multithreading (SMT) and chip multiprocessor (CMP) architectures target thread-level parallelism and should improve the performance of many of our servers. Web search for a planet the google cluster architecture
The term entity beans refers to objects that were created using EJB 2.1-style container-managed persistence (CMP) Pro JPA2
For example, out of the box you can only configure a build job that pulls the source code from a project hosted on CVS or Subversion and invoke an Ant script. Gradle in Action
Jenkins comes with support for Subversion and CVS out of the box, but you will need to install the Jenkins Git plugin to be able to complete the rest of this tutorial. Jenkins The Definitive Guide
It is relatively easy to set up (you only have to set it up once!) and has good integration with CVS, Subversion, Git (and other source control systems), and Bugzilla. Testable JavaScript
You can obviously easily use whatever version control system suits your environment, for example many people use Subversion or CVS for the same purpose. Pro Puppet
This tag is often used in conjunction with the automated version-numbering capabilities of a version control system, such as SCCS, RCS, or CVS. Java in a Nutshell 5th Edition
If the parameter slowmatch=true is provided, the framework will attempt to exclude recognizing the beginning and ending text if they are within a CDATA block. Pro Hadoop
In the example, we see one file with two fields; the identifier and some HTML data nested in the CDATA section. Solr 3.1 Cookbook
An NMTOKEN (or name token) is similar to CDATA, but most nonalphanumeric characters and internal whitespace are disallowed, and the parser removes leading and trailing whitespace. Core Java Volume II Advanced Features 9th Edition
You can also generate tags, text, cdata, and so on from Scala code: Beginning Scala
This interface represents a CDATA section in an XML document. Java in a Nutshell 5th Edition
In case it is absolutely necessary to include some XML markup verbatim in another XML document, then one can use a CDATA section. Steps in Scala An Introduction to Object-Functional Programming
In the following code, notice hand-coded JavaScript code (inside the CDATA tag) that will position the second, minute, and hour hands of the clock based on the current time of day. Java 7 Recipes A Problem-Solution Approach
Query strings can also be expressed as CDATA within the query element. Pro JPA2
In the example we see one file with two fields, the identifier and some HTML data nested in the CDATA section. Apache Solr 4 Cookbook
We choose tomonoid1 start with monoids because they are very simple and because they are ubiquitous. Functional Programming in Scala
Now think about how many times you’ve created a data transfer object (DTO) with only accessors for the purpose of wrapping some data. Scala in Action
Domain Objects or Data Transfer Objects? Most of the time you don’t need to rely on DTO for shipping data between different layers. Pro Spring 3
The DTO’s fields need to be public in order for data binding to work, so that’s what you do at C. Spring in Practice
This will contain the FixMessageDto object that is generated by the Emitter, as shown in the following code: Storm Blueprints Patterns for Distributed Real-time Computation
In the United States, the week starts with Sunday and ends with Saturday, whereas in Europe, the week starts with Monday and ends with Sunday. Core Java Volume I Fundamentals 9th Edition
During the 1980s, he specialized in database development in Europe. Pro Hadoop
Marc Meurrens put in a great deal of effort to publicize and make the electronic version of the 1st edition of the book available in Europe. Thinking in Java 4th Edition
It is now often hard to tell the inhabitant of one continent from another and today the inhabitants of the picturesque towns and villages in the Slovenian Alps or Balkan coastal towns are not readily distinguishable from the residents of other parts of Europe. Gradle in Action
For example, an application might store each end-user’s data in its own directory, which would enable user A’s data to have three replicas in Europe, and user B’s data to have five replicas in North America. Spanner - Google’s Globally-Distributed Database
It also includes the JVM’s default time zone, CET, which is Central Europe Time in our case. Java 8 in Action Lambdas, Streams and Functional-style Programming
He now works for Cloudera as a Solutions Architect to support Hadoop and HBase in and around Europe through technical support, consulting work, and training. HBase:The Definitive Guide
This input stream reader assumes the default character encoding used by the host system, such as the ISO 8859-1 encoding in Western Europe. Core Java Volume II Advanced Features 9th Edition
These animals are sociable and domesticated easily, and in Europe, a related species was once trained to catch fish for people to eat. Java Network Programming 4th Edition
This hornet can be found throughout Europe and much of Asia, adapting its hive-building techniques to different climates when necessary. Programming Hive
This hierarchical structure is broken up by the type of address (either .net, .com, .gov, .edu, .mil, or one of the newer addresses such as .info or .biz) or by the country (.au, .uk, among many others) Java Network Programming and Distributed Computing
As a matter of fact, due to the challenges and novelty, of Hadoop cluster performance tuning, the research community has recent projects and publications about learning and tuning the performance of a Hadoop cluster (for example, the starfish project at http://www.cs.duke.edu/starfish/) Hadoop Operations and Cluster Management Cookbook
This excellent paper describes the process in more detail: http://dig.cs.illinois.edu/papers/lambda-Refactoring.pdf. Java 8 in Action Lambdas, Streams and Functional-style Programming
For recipes in this chapter, we will use the Amazon product co-purchasing network metadata dataset available from http://snap.stanford.edu/data/amazon-meta.html. Hadoop MapReduce Cookbook
Metric Association (http://lamar.colostate.edu/~hillger), only three countries in the world have not yet officially adopted the metric system: Liberia, Myanmar (Burma), and the United States of America. Core Java Volume II Advanced Features 9th Edition
The name of any package that will be used outside your organization should begin with your organization’s Internet domain name with the top-level domain first, for example, edu.cmu, com.sun, gov.nsa. Effective Java 2nd Edition
For example, this fragment connects the channel to rama.poly.edu on port 19: Java Network Programming 4th Edition
For example, the JAVAR compiler (http://www.extreme.indiana.edu/hpjava/) is a prototype compiler that automatically parallelizes parts of a Java application to improve performance. Java Performance Tuning 2nd Edition
There is also a project to port Hive to Spark, called Shark (http://shark.cs.berkeley.edu/) Programming Hive
There are global objects java, javax, javafx, com, org, and edu that yield package and class objects via the dot notation. Java SE 8 for the Really Impatient
If you were using epochs, you could compute the value for midnight of the last seen date. HBase:The Definitive Guide
Map epochs allow communicating parties to agree on what the current distribution of data is, and to determine when their information. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.
The use of epochs and counters will become clear when we discuss Zab, the protocol we use to broadcast state updates to servers. ZooKeeper Distributed Process Coordination
These steps are necessary to guarantee that once the prospective leader completes Phase 1, none of the followers in Q accept proposals from earlier epochs. Zab High-performance broadcast for primary-backup systems
You have a payroll system that processes salaries for full-time employees in the United States and Canada: Scala in Action
Now all objects that require an Arm will get Mexico’s version instead of Canada’s without changing any other code. Testable JavaScript
Unlike JCE, however, there are still two different versions of JSSE: one for domestic use (use within the United States and Canada) and one for global use. Java Security 2nd Edition
Due to its reliability as a heavy draft horse, by the early twentieth century, the Clydesdale was exported to many countries, including Australia, New Zealand, Canada, and the United States. HBase:The Definitive Guide
Everyone on the planet, with the exception of the United States and Canada, uses ISO 216 paper sizes. Core Java Volume II Advanced Features 9th Edition
These small carnivores are found in all major waterways of the United States and Canada, and in almost every habitat except the tundra and the hot, dry regions of the southwestern United States. Java Network Programming 4th Edition
Our HR people often run queries with WHERE clauses that restrict the results to a particular country or to a particular first-level subdivision (e.g., state in the United States or province in Canada) Programming Hive
He is employed as an architect at Oracle in Ottawa, Canada, and lives with his wife Darleen, their four kids, and his wife’s dog. Pro JPA2
This update tells MongoDB to find a document where the username is smith, and then to set the value of the country property to Canada. MongoDB in Action
Joe has designed and deployed several clouds at Cybera, where, as a non-profit, they are building e-infrastructure to support entrepreneurs and local researchers in Alberta, Canada. OpenStack Operations Guide
Any Redis client can initiate a snapshot by calling the BGSAVE command. Redis in Action
Due to Windows’ limitations, Redis MinGW builds execute operations such as BGSAVE and BGREWRITEAOF in the foreground (thus blocking the Redis process) and Cygwin builds don’t use CoW, which makes background operations very slow, particularly for large database sizes. Redis Cookbook
Nova CLI The nova command provided by the OpenStack python-novaclient package is the basic command line utility for users interacting with OpenStack. bk-compute-adminguide-grizzly
The OpenStack python-novaclient package provides a basic command line utility, which uses the nova command. bk-admin-guide-cloud-latest
OpenStack command-line clients For scripting work, you can use a command-line client like the python-novaclient client. api-quick-start-onepager
You can create and manage flavors with the nova flavor-* commands provided by the python-novaclient package. admin-user-guide-trunk
For example, the Python bindings for the Compute API are bundled with the python-novaclient package. user-guide
View and update Compute quotas for a tenant (project) As an administrative user, you can use the nova quota-* commands, which are provided by the python-novaclient package, to view and update tenant quotas. OpenStack Operations Guide
Here we go into the details of feature extraction, including how to preprocess raw data into classifiable data and how to convert classifiable data into vectors that can be used by the Mahout classification algorithms. Mahout in Action
Use the getPlatformMXBean method with the MXBean type needed for the application. Java 7 New Features Cookbook
This MXBean interface defines methods for determining how many classes are currently loaded in the Java VM, how many have ever been loaded, and how many have ever been unloaded. Java in a Nutshell 5th Edition
To get rid of empty extents and repack collections efficiently, use the compact command: MongoDB The Definitive Guide 2nd Edition
Free block extents on disk are binned by size and sorted by location, allowing EBOFS to quickly locate free space near the write position or related data on disk, while also limiting long-term fragmentation. Ceph A Scalable, High-Performance Distributed File System
Its features are similar to those of ext4; for example, both have extents (grouping contiguous blocks together, reducing the number of blocks required to maintain per file) and the aforementioned delayed allocation. HBase:The Definitive Guide
Our prototype implementation exposes an object interface in which byte extents can be read or written (much like a file), as that was our initial requirement for Ceph. RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.
Similar to ext4, allocation is extent-based, but its extents are within allocation groups, each of which is responsible for maintaining its own inode table and space. Hadoop Operations
Technically, collections are allocated space inside each data file in chunks called extents. MongoDB in Action
Long-term investments in science and education benefit us all; in that spirit, all proceeds from the sales of this book will be donated to Scholarship America, a charity that to date has helped 1.7 million students follow their dreams of going to college. Monitoring with Ganglia
For example, an application might store each end-user’s data in its own directory, which would enable user A’s data to have three replicas in Europe, and user B’s data to have five replicas in North America. Spanner - Google’s Globally-Distributed Database
These small amphibians, only 1–1.5 inches long, can be found on the coastal plains of North America from North Carolina to central Florida and eastern Louisiana. Jenkins The Definitive Guide
In a recent study by the Tech America Foundation, it was noted that medical researchers have demonstrated that Big Data analytics can be used to aggregate information from cancer patients to increase treatment efficacy. Professional Hadoop Solutions
Java, and Java-related logos, marks and names are trademarks or trademarks of Oracle America, Inc. Java EE 7 Specification
Metric Association (http://lamar.colostate.edu/~hillger), only three countries in the world have not yet officially adopted the metric system: Liberia, Myanmar (Burma), and the United States of America. Core Java Volume II Advanced Features 9th Edition
For the purposes of this Agreement: "Independent Implementation" shall mean an tation of the Specification that neither derives from any of Specification Lead's source code or de materials nor, except with an appropriate and separate license from Specification Lead, ny of Specification Lead's source code or binary code materials; "Licensor Name Space" shall public class or interface declarations whose names begin with "java", "javax", "com.sun" and le” or their equivalents in any subsequent naming convention adopted by Oracle America, Inc. Java EE 7 Web Profile Specification
ISPs get their IP addresses from one of four regional Internet registries (the registry for North America is ARIN, the American Registry for Internet Numbers), which are in turn assigned IP addresses by the Internet Corporation for Assigned Names and Numbers (ICANN) Java Network Programming 4th Edition
If for example you look at a global projection of the Earth on Google maps, and compare it to the spherical projection in Google Earth, you will see Greenland in Google maps rectangular projection about the size of North America, whereas in Google Earth, it's about 1/3 the size. Lucene in Action 2nd Edition
The European hornet is the only hornet in North America, introduced to the continent when European settlers migrated to the Americas. Programming Hive
Table 8.2 Important flags for the Mahout dictionary-based vectorizer and their default values. Mahout in Action
Let’s look at the pros and cons of each compositional method in the following table: Scala in Depth
Using algebraic data types such as and , we can handle errors inOption Either a way that is modular, compositional, and simple to reason about. Functional Programming in Scala
Note that in most object-oriented languages, you would express this compositional dependency with member fields, especially if your language doesn’t support mixin composition, like Java. Programming Scala
Scala’s compositional rules are very powerful tools for defining very complex class hierarchies and for specifying the rules for composing classes as well as the rules for passing parameters into methods. Beginning Scala
The input itself can be as simple as _.isFolder is or it can be the outcome of a more compositional approach, for example. Steps in Scala An Introduction to Object-Functional Programming
A compositional approach to layering concurrency control is described in: Concurrent Programming in Java Design Principles and Pattern
The data was originally collected and labeled by Carnegie Group and Reuters in the course of developing the CONSTRUE text categorization system. Mahout in Action
You can achieve categorization by grouping the elements together inside an interface and creating an enumeration based on that interface. Thinking in Java 4th Edition
Some of the more popular ML techniques that are relevant to our discussion are collaborative filtering for providing item- and user-based recommendations, clustering (of seen content) based on similarities deduced, and categorization (of unseen content and users) for the purposes of shoe-horning that content and those users into existing clusters. Tika in Action
For example, suppose you wanted to move categorization code out of the main Database file and into its own. Programming in Scala 2nd Edition
The log type is important for later processing and categorization. Storm Real-Time Processing Cookbook
Here, each data entry includes an ID, title, categorization, similar items to this item, and information about users who has brought the item. Hadoop MapReduce Cookbook
Type A categorization of allowed states and operations on those states, including transformations from one state to another. Programming Scala
The LIMIT operator defies categorization because it’s certainly not a read/write operator but it’s not a true relational operator either. Hadoop in Action
The Dewey decimal system for categorizing items in a library collection is a classic example of a hierarchical categorization scheme. Lucene in Action 2nd Edition
When we have a nonfinal (mutable) field, each time a thread changes the value, we have to consider whether we have to put the change back to the memory or leave it in the registers/cache. Programming Concurrency on the JVM
Scala can’t optimize every tail recursion—it can optimize functions but not nonfinal methods. Scala in Action
This technique should be considered for every nonfinal public class that has a finalizer. Effective Java 2nd Edition
The visible initial default values of nonfinal fields are zero for scalars and null for references. Concurrent Programming in Java Design Principles and Pattern
The technical specification, conveniently available as an electronic document: http://java.sun.com/docs/books/jls. Thinking in Java 4th Edition
More information about where you can use annotations in your code can be found here: http://docs.oracle.com/javase/specs/jls/se8/html/jls-9.html#jls-9.7.4 Java 8 in Action Lambdas, Streams and Functional-style Programming
The existing chapters of the JLS and JVMS specify semantics that are at odds with optimizations performed by many existing JVMs. JSR-133 Java Memory Model and Thread
For the most part, this book uses technical terms as they are defined in The Java Language Specification, Third Edition [JLS] Effective Java 2nd Edition
Specification ("JLS") and the published API documentation should be consulted for more detailed and authoritative descriptions. Concurrent Programming in Java Design Principles and Pattern
When the tests are complete, we create a
with a specific ID and dump the JSON-ified version of all the messages and results in there. Testable JavaScript
The Deployer binds the persistence references to container-managed entity managers for persistence contexts of ified type and configured in accordance with their persistence unit, as d in the Java Persistence specification. Java EE 7 Specification
Don’t worry about these gory details, because the Spring DM distribution contains the OSGi-ified versions of all these log libraries. Spring Dynamic Modules in Action
It decrements this counter each time a FileSize message is received with the size for a directory. Programming Concurrency on the JVM
The thread decrements the entry count of the monitor associated with objectref. The Java Virtual Machine Specification Java SE 7 Edition
MyISAM’s index files contain a counter that MyISAM increments when the table is opened and decrements when it is closed. High Performance MySQL 3rd Edition
A dequeue method decrements the pointer and uses its previous value as a key for retrieving the data. Professional Hadoop Solutions
Usually, standard instructions such as increments and decrements can be made atomic on most architectures. Oracle JRockit The Definitive Guide
Similarly, the -- operator decrements its single numeric operand, which must be a variable, an element of an array, or a field of an object, by one. Java in a Nutshell 5th Edition
The hardlink decrements the reference count on the data on disk, and after all clusters have copied and deleted their respective pending hardlinks, the data is removed from the local disk. Hadoop Operations
You may be surprised to see steady decrements in the free memory available to your application when you were not expecting any change. Java Performance Tuning 2nd Edition
In this recipe, you have developed an application that increments and decrements the balance of a class that simulates a bank account. Java 7 Concurrency Cookbook
As each of the two threads finish executing, they call the CountDownLatch’s countDown() method, which decrements the latch’s value by one. Java 7 Recipes A Problem-Solution Approach
That’s why we still need the filters on lat and lon, to discard the results that shouldn’t be included. High Performance MySQL 3rd Edition
The getZOrderedCurve() method takes lat and lon strings as arguments. Hadoop RealWorld Solutions Cookbook
The principle field type in Solr for geospatial is LatLonType, which stores a single latitude-longitude pair. Solr 3 Enterprise Search Server
The expression int(loc.lat) converts loc.lat, a float, to an integer, thereby truncating it to the degree and making it suitable as an index value. Interpreting the Data Parallel Analysis with Sawzall
Each document contains one or more fields, each of which is modeled as a particular field type: string, tokenized text, boolean, date-time, lat/long, etc. Solr in action
Other missing types include XML, image, and geolocation (the lat-long variety) Hadoop in Action
It's based on the solr.LatLonType class which is specially designed for spatial search and is defined by a single attribute – subFieldSuffix. Apache Solr 4 Cookbook
The Ganglia reporting variable is gcTimeMillis() and is visible in the main reporting page for Ganglia, as shown in Figure 6-4 Pro Hadoop
The gc count metric is the number of garbage collections, and the gc time millis is the accumulated time spent in garbage collection since the last poll. HBase:The Definitive Guide
The setMillisToPopup is your estimation of the time the dialog box needs to pop up. Core Java Volume II Advanced Features 9th Edition
Its value was obtained using the getTimeInMillis method executed against an instance of the Calendar class. Java 7 New Features Cookbook
Unlike currentTimeMillis( ), the nanoTime() does not return a time relative to any defined. Java in a Nutshell 5th Edition
This value is set by the RpcTimeoutIn Millis element (rpc_timeout_in_ms in YAML) Cassandra The Definitive Guide
The value of this header uses the standard Java millis time value. ActiveMQ in Action
The current time in milliseconds can be obtained from a Calendar object by calling the getTimeInMillis() method against it. Java 7 Recipes A Problem-Solution Approach
You can get the length of a Duration in conventional units by calling toNanos, toMillis, toSeconds, toMinutes, toHours, or toDays. Java SE 8 for the Really Impatient
The millis field indicates that this query takes more than 14 seconds, and there’s an obvious reason for this. MongoDB in Action
Figure 5.3 shows how the content enricher collaborates with a repository to convert a simple string to a domain object. Spring Integration in Action
The mmodule structure defines everything that gmond needs to know about a module in order for gmond to be able to load the module, initialize it, and call each of the callback functions. Monitoring with Ganglia
The characters in the basic multilingual plane are represented as 16-bit values, called code units. Core Java Volume I Fundamentals 9th Edition
It’s not uncommon to face projects that use client-side languages like JavaScript that communicate with a mixed, multilingual backend like Java, Groovy, and Scala, which in turn calls off to a C++ legacy application. Gradle in Action
We'll look at multilingual data handling, configuring transaction log, and dive even deeper into how ElasticSearch caches work. Mastering ElasticSearch
To implement such a multilingual document database, you need a language detection tool like the one shown in figure 7.1 Tika in Action
There are some "ICU" Unicode classes for multilingual support, a Chinese stemmer, and a Polish stemmer. Solr 3 Enterprise Search Server
Handling multiple languages in a single index There are many examples where multilingual applications and multilingual searches are mandatory—for example, libraries having books in multiple languages. Solr 3.1 Cookbook
Multilingual support FIELD COLLAPSING / GROUPING Although Solr requires a flat, denormalized document, Solr allows you to treat multiple documents as a group based on some common property shared by all documents in a group. Solr in action
It defines several constant Attribute keys that are commonly used with multilingual text and input methods. Java in a Nutshell 5th Edition
In addition non-daemon software related to R (including Rhipe and RHadoop) needs to be installed. Hadoop in Practice
When generating files with the keystone-mange pki_setup command, your best option is to run as the pki user. bk-compute-adminguide-grizzly
It is beyond the scope of this book to go deeper into the internals of the SSL protocol or the PKI (Public Key Infrastructure), but for this to work you need to supply tomcat with a keystore, which contains a private/public key pair and a certificate for that public key. Pro Spring MVC
Such a setup is often referred to as public key infrastructure or PKI. RabbitMQ in Action
Enterprise Security Integration Most businesses have all sorts of security infrastructure in their enterprises, ranging from Public Key Infrastructure (PKI) components for authentication, Active Directory instances, Security Token Services, Attribute Services, and Policy Servers used for authenticating users, providing authorization credentials, and making and enforcing access control decisions. Professional Hadoop Solutions
Debug PKI middleware If you receive an Invalid OpenStack Identity Credentials message when you talk to an OpenStack service, it might be caused by the changeover from UUID tokens to PKI tokens in the Grizzly release. bk-admin-guide-cloud-latest
If the Openstack cloud is configured to use public-key infrastructure (PKI) tokens, the Python script output looks something like this: user-guide
These lines are segmented into lists of new immutable strings representing input fields. Mahout in Action
MariaDB offers a segmented key cache that avoids this problem. High Performance MySQL 3rd Edition
Figure 5.3 shows how a buffer is segmented into three areas by the two pointers. Netty in Action MEAP V08
Consider having an algorithm that uses segmented collections instead of a. Java Threads 3rd Edition
Production networks typically have network silos where your Hadoop clusters are segmented away from other production applications. Hadoop in Practice
Second, the application was segmented into stages: one for parsing, one for rules, and a final stage for binning/collating the data, all via the SubAssembly base class described earlier. Hadoop:The Definitive Guide 3rd Edition
More specifically, they wanted to know how their users are segmented, the characteristics and differences of each segment, and to classify each user for targeted marketing. Hadoop in Action
Locking is required for updates to a ConcurrentHashMap, but the internal data structure is segmented so that only the segment being updated is locked, and reads and writes can proceed concurrently in other segments. Java in a Nutshell 5th Edition
Assuming you've worked out what the maximum heap size should be, then growing the JVM memory can be considered as pure overhead, requiring multiple system calls and resulting in segmented system memory allocation. Java Performance Tuning 2nd Edition
Finally, those tokens are added to the index in a segmented architecture. Lucene in Action 2nd Edition
This HList trait is a marker trait for constructing HLists. Scala in Depth
In an email exchange, Alan Kay discusses the meaning of OOP. Programming Concurrency on the JVM
Alan Kay summarized five basic characteristics of Smalltalk, the first successful objectoriented language and one of the languages upon which Java is based. Thinking in Java 4th Edition
Baron dedicates this edition to the memory of Alan Rimm-Kaufman, whose great love and encouragement are never forgotten. High Performance MySQL 3rd Edition
Alan has a degree, two Master's, and a teaching qualification. Jenkins Continuous Integration Cookbook
The success of this campaign was greatly due to the work of Alan Turing, who with his colleagues broke the German encryption algorithm known as Enigma. Java Security 2nd Edition
Alan Kay, the inventor of Smalltalk, remarked that in this way the simplest object has the same construction principle as a full computer: it combines data with. Programming in Scala 2nd Edition
Scott Hassan and Alan Steremberg have been critical to the development of Google. The anatomy of a large-scale hypertextual Web search engine
For a more detailed guide, see Programming Pig by Alan Gates (O’Reilly, 2011) Hadoop:The Definitive Guide 3rd Edition
If so, turn to one of the many books on the topic; we recommend Learning SQL by Alan Beaulieu (O’Reilly, 2005) or the opinionated classic, A Guide to the SQL Standard, Fourth Edition, by C. Core Java Volume II Advanced Features 9th Edition
About the Author Alan Gates is an original member of the engineering team that took Pig from a Yahoo! Labs research project to a successful Apache open source project. Programming Pig
However, in a professional application, you should check the resolution of the user’s screen and write code that resizes the frames accordingly: A window that looks nice on a laptop screen will look like a postage stamp on a high-resolution screen. Core Java Volume I Fundamentals 9th Edition
The advantage of tmpfs is that it resizes the actual memory usage for the RAM disk, based on utilization. Monitoring with Ganglia
Notice that you don’t have to specify (or think about) the size of the Map because it resizes itself automatically. Thinking in Java 4th Edition
If you update this variable (even if you set it to its current value), MySQL immediately deletes all cached queries, resizes the cache to the specified size, and reinitializes the cache’s memory. High Performance MySQL 3rd Edition
This speeds up resizes down considerably since large runs of zeros won't have to be rsynced. bk-compute-adminguide-grizzly
When the JVM adaptively resizes the young generation space, the screen area associated with the young generation spaces updates accordingly. Java Performance
Solution Create an application that allows the user to view text with the ability to word wrap when the user resizes the window. Java 7 Recipes A Problem-Solution Approach
Subtype rules for the reference types in the Java programming language are specified recursively with isJavaAssignable. The Java Virtual Machine Specification Java SE 7 Edition
The count( ) method gets the Class of its argument, and uses isAssignableFrom( ) to perform a runtime check to verify that the object that you’ve passed actually belongs to the hierarchy of interest. Thinking in Java 4th Edition
The previous tag tells Spring to scan the package as specified but omit the classes that were assignable to the type as specified in the expression (can be either a class or an interface) Pro Spring 3
The run-time type of the exception is BlewIt which is not assignable to a variable of type RuntimeException, but is assignable to a variable of type BlewIt, so the output of the example is: The Java Language Specification Java SE 7 Edition
EventBus will call the registered subscriber handler methods, taking arguments that are assignable to the event object type. Getting Started with Google Guava
It has a single method, is, which takes an implicit Manifest as a parameter and tests to see whether the class of in is assignable from the class contained by the Manifest and accessed using the erasure method. Beginning Scala
The type of each expression must be assignable to the element type of the array, of course. Java in a Nutshell 5th Edition
Their methods are intrinsically stateless — they do not rely on any assignable fields of any object. Concurrent Programming in Java Design Principles and Pattern
Now that you’ve annotated CDPlayer’s constructor with @Autowired, you can be assured that Spring will automatically inject it with a bean assignable to CompactDisc. Spring in Action 4th Edition
Core to that are relational databases (e.g., Oracle, MySQL, SQL Server, Teradata, and Netezza) that have been used for decades to serve and store huge amounts of data across all industries. Apache Sqoop Cookbook
This is clearly highlighted by the balance sheets of companies like Oracle, Vertica, Teradata, and others. HBase in Action
As well as the built-in Sqoop connectors, various third-party connectors are available for data stores, ranging from enterprise data warehouses (including Netezza, Teradata, and Oracle) to NoSQL stores (such as Couchbase) Hadoop:The Definitive Guide 3rd Edition
One of the key aims of Tenzing has been to have performance comparable to traditional MPP database systems such as Teradata, Netezza and Vertica. Tenzing - A SQL Implementation On The MapReduce Framework
Free connectors exist for Teradata, Netezza, SQL Server, and Oracle (from Quest Software), and are available for download from their respective company websites. Hadoop Operations
Capturing System Performance and Status It is important to capture as much information about the system under test (SUT) as possible while the benchmark runs. High Performance MySQL 3rd Edition
A typical setup requires a System Under Test (SUT), consisting of network infrastructure, application servers, and a database server, all residing on different machines. Oracle JRockit The Definitive Guide
One important aspect to consider is defining the boundaries of the system under test (SUT, commonly pronounced as “sut”) Java Performance
Since the instruction list has monotonically increasing offsets, the merge of the two lists is not defined unless every stack map frame offset has a corresponding instruction offset and the stack map frames are in monotonically increasing order. The Java Virtual Machine Specification Java SE 7 Edition
This arrangement allows the metadata concerning what has been consumed from a particular partition by a given consumer group to be a simple eight-byte monotonically increasing message id recording the last message in that partition that has been acknowledged. Building LinkedIn’s Real-time Activity Data1
Each database has a single .ns file and several data files, which have monotonically increasing numeric extensions. MongoDB The Definitive Guide 2nd Edition
Spanner depends on the following monotonicity invariant: within each Paxos group, Spanner assigns timestamps to Paxos writes in monotonically increasing order, even across leaders. Spanner - Google’s Globally-Distributed Database
You can mitigate any congestion in a single region brought on by monotonically increasing keys by randomizing the key values so that they are not in sorted order. Professional Hadoop Solutions
As a specific case, assume that the Map function generates k key-value pairs from a single input record, and that the Combine function monotonically reduces the number of key-value pairs. Incoop MapReduce for Incremental Computations
In fact, you’ll always be writing to the end of a table, because timestamps are monotonically increasing in nature. HBase in Action
If a znode is created with the sequential flag set, then the value of a monotonically increasing counter (maintained by the parent znode) is appended to its name. Hadoop:The Definitive Guide 3rd Edition
If each thread can complete the increment( ) method in its entirety without the other thread executing, then all is fine, and the counter monotonically increases. Java Performance Tuning 2nd Edition
All values are totals since the start of monitoring and hence will increase monotonically. Java Performance
Thus, given this code the Scala compiler will generate a class with two Int fields, one for numer and one for denom. Programming in Scala 2nd Edition
Projects such as Apache UIMA and Mahout provide open source tools for such applications, and Tika can be used to easily extend the scope of the applications from plain text to any kind of digital documents. Tika in Action
Instead of using UIMA in this way, consider performing this processing external to Solr and cache the results to avoid re-computation as you adjust your indexing process. Solr 3 Enterprise Search Server
But this autoconfiguration of the fabric by the app is going to cause problems this morning because Rolf had a late night of quashing the final bugs in Dog Walker 10.0 and made a typo. RabbitMQ in Action
Command-line interface (CLI)—Spring Boot’s CLI takes advantage of the Groovy programming language along with autoconfiguration to further simplify Spring application development. Spring in Action 4th Edition
Developing in Python with Couchdbkit A number of CouchDB libraries are available for the Python programming language, and in this section you will use the Couchdbkit library to connect to CouchDB from your Python applications. Beginning CouchDB
SO_KEEPALIVE: This option’s value it is a boolean indicating if the connection should be kept alive or not. Pro Java 7 NIO.2
The keepalive socket option is controversial; its use is a topic that some developers feel very strongly about. Java Network Programming and Distributed Computing
Depending on if keepalive is used close the Channel after the write completes. Netty in Action MEAP V08
While a client transaction remains open, it sends keepalive messages to prevent participant leaders from timing out its transaction. Spanner - Google’s Globally-Distributed Database
The session has a heartbeat keepalive mechanism that, once it fails to report, is declared lost by ZooKeeper and the associated ephemeral nodes are deleted. HBase:The Definitive Guide
The keepalive protocol enables a client to determine if its server has crashed without closing the socket and vice versa. Java in a Nutshell 5th Edition
These methods turn SO_KEEPALIVE on and off and determine its current state: Java Network Programming 4th Edition
With the failover protocol, the ActiveMQ client will instantiate a periodic keepalive protocol, so that it can detect whether the broker is no longer reachable (connection or broker lost) ActiveMQ in Action
Similarly, a special keepalive can be sent to inform one stage that another still exists. Concurrent Programming in Java Design Principles and Pattern
There are no guarantees about which (if any) messages are combined, the groupings presented to the combiner, or the order of combining, so combiners should only be enabled for commutative and associative operations. Pregel - A System for Large-Scale Graph Processing
In some cases, there is significant repetition in the intermediate keys produced by each map task, and the userspecified Reduce function is commutative and associative. MapReduce - Simplied Data Processing on Large Clusters
For Reducers that first combine all the values with a given key using an associative, commutative operation, a separate userdefined Combiner function can be specified to perform partial combining of values associated with a given key during the Map phase. FlumeJava - Easy, Efficient Data-Parallel Pipelines
Due to the associative and commutative properties, a combiner can be used to vastly cut down on the number of intermediate key/value pairs that need to be shuffled to the reducers. MapReduce Design Patterns
First, if the querying operations are commutative across records, the order in which the records are processed is unimportant. Interpreting the Data Parallel Analysis with Sawzall
It is important to understand the commutative versus associative nature of your data model, together with any other concerns that are in your streams and inherent models before designing your topology. Storm Real-Time Processing Cookbook
However, the combiner only works with commutative and associative functions. Hadoop MapReduce Cookbook
Multiplication is a commutative operation if the operand expressions have no side effects. The Java Language Specification Java SE 7 Edition
Commutative property—Recall from basic math that the commutative property means the order of operation is irrelevant. Hadoop in Action
This strategy applies whenever the accumulation step is commutative and associative with respect to results, so tasks can be processed in any order. Concurrent Programming in Java Design Principles and Pattern
In the cloud, virtualized GPUs will provide thin clients such as smartphones and tablets and access to a high-performance graphics experience. Monitoring with Ganglia
HTTP/HTTPS15 is one of the most used protocols these days, and with the success of smartphones it gets more attention with each passing day. Netty in Action MEAP V08
With the same amount of configuration, you can connect most modern smartphones and tablets to the calendar. Jenkins Continuous Integration Cookbook
One of the strong points of a real-time notification service like Notifo is that notification messages can be sent to the same users on different devices: smartphones and desk top clients, in particular. Jenkins The Definitive Guide
The majority of “smartphones” send probes regularly when the device is active and is running a geographical application (such as maps, navigation, traffic reports, and so on) Professional Hadoop Solutions
Introduction With the increasing adoption of Smartphones and tablets, mobile applications have taken a center stage. Selenium Testing Tools Cookbook
Along with our increasingly interconnected world caused by the web and shrinking, cheaper computers (like smartphones), this has catalyzed an exponential growth of data, and a demand for more predictability and speed by savvier users. A Little Riak Book
The goal of JavaFX is to be used across many types of devices such as mobile devices, smartphones, TVs, tablet computers, and desktops. Java 7 Recipes A Problem-Solution Approach
Home users are expected to migrate away from PCs to tablets and smartphones. Java SE 8 for the Really Impatient
Working with Android Android devices are becoming commonplace with owners of smartphones and tablets. Selenium 2 Testing Tools Beginner's Guide
This module is actually an abstract class named handler and a structure called a handlerton. Understanding MySQL Internals
It can run multiple simultaneous proxies, set upload and download speeds, blacklist and whitelist sites, and even add custom DNS. Testable JavaScript
You use these @InitBinder methods to whitelist the form fields: Spring in Practice
Additionally, you might proxy Solr requests to ensure the parameters meet a whitelist, to include their values. Solr 3 Enterprise Search Server
For example, you might have public access to one of your containers, but what you really want to restrict it to is a set of IPs based on a whitelist. OpenStack Operations Guide
We use this to get the list of online region servers by invoking the hbase zkcli ls command. HBase Administration Cookbook
When you run the zkCli.sh command for the first time and if you see stack traces as follows: Web Crawling and Data Mining with Apache Nutch
Verify ZooKeeper configuration with the following command: zkCli.sh -server master:2181 Hadoop Operations and Cluster Management Cookbook
To do this, we use the zkServer and zkCli tools that come with the ZooKeeper distribution under bin/ ZooKeeper Distributed Process Coordination
We used the zkcli.sh script provided with the standard Solr 4.0 distribution and placedit in the cloud-scripts directory by default. Apache Solr 4 Cookbook
Automated testing is an essential instrument for ensuring the correctness of your application’s functionality, and is a direct enabler for effective refactorings. Gradle in Action
Selecting Books and Delivery Options We have to repeat the refactorings we performed in the previous part for our selecting books view state. Pro Spring MVC
We describe three simple refactorings that use lambdas, method references, and streams, which you can apply to your code to improve its readability: Java 8 in Action Lambdas, Streams and Functional-style Programming
Among the most important of these benefits are verifiable properties of program abstractions, safe refactorings, and better documentation. Programming in Scala 2nd Edition
It can reverseengineer an existing database schema into its XML change log, and track the version of that change log against running instances of the database scheme to determine whether any new database refactorings must be applied. Gradle Beyond The Basics
Migrations provide a structured, step-wise approach to applying a set of database refactorings to a database so that it can be responsibly evolved to meet the changing needs of the applications that use it. Graph Databases
At the time of this writing, all the Scala plugins for these IDEs support syntax highlighting, project management, limited support for automated refactorings, etc. Programming Scala
These two kinds of tunings and refactorings are often equally challenging to carry out, but have opposite effects. Concurrent Programming in Java Design Principles and Pattern
Other frameworks for data structures consider a map as a collection of pairs, or as a collection of values indexed by the keys.) However, you can obtain views of the map—objects that implement the Collection interface or one of its subinterfaces. Core Java Volume I Fundamentals 9th Edition
Note that a variable is not guaranteed to always refer to a subtype of its declared type, but only to subclasses or subinterfaces of the declared type. The Java Language Specification Java SE 7 Edition
It is composed of objects whose classes implement the Node interface and its various subinterfaces. Core Java Volume II Advanced Features 9th Edition
These subinterfaces may impose membership restrictions or ordering constraints on the elements of the collection but still provide the same basic methods. Java in a Nutshell 5th Edition
One or both of the arguments implement the Observable interface or one of its subinterfaces. Java SE 8 for the Really Impatient
The Collection interface is very general and allows for a multitude of Collection subinterfaces and implementation classes. Pro JPA2
涉及文献数目:163
1、A Little Riak Book
2、ActiveMQ in Action
3、Apache Flume Distributed Log Collection for Hadoop
4、Apache Hadoop Goes Realtime at Facebook
5、Apache Hadoop YARN Yet Another Resource Negotiator
6、Apache Kafka
7、Apache Solr 4 Cookbook
8、Apache Sqoop Cookbook
9、Beginning CouchDB
10、Beginning Scala
11、Bigtable - A Distributed Storage System for Structured Data
12、Building LinkedIn’s Real-time Activity Data1
13、Building and Testing with Gradle
14、Cassandra A Decentralized Structured Storage System
15、Cassandra High Performance Cookbook
16、Cassandra The Definitive Guide
17、Ceph A Scalable, High-Performance Distributed File System
18、Chubby - The lock service for loosely-coupled distributed systems
19、Cloudera Impala
20、Concurrent Programming in Java Design Principles and Pattern
21、Core Java Volume I Fundamentals 9th Edition
22、Core Java Volume II Advanced Features 9th Edition
23、CouchDB The Definitive Guide
24、Dapper a Large-Scale Distributed Systems Tracing Infrastructure
25、Data Structures and Algorithm Analysis in Java 3rd Edition
26、Deploying OpenStack
27、Dremel - Interactive Analysis of WebScale Datasets
28、Effective Java 2nd Edition
29、Elasticsearch The Definitive Guide
30、Elasticsearch in Action MEAP V07 cHAPTER 1
31、FlumeJava - Easy, Efficient Data-Parallel Pipelines
32、Functional Programming Patterns in Scala and Clojure
33、Functional Programming in Scala
34、Fundamental Networking in Java
35、GFS - The Google File System
36、Getting Started with CouchDB
37、Getting Started with Google Guava
38、Gradle Beyond The Basics
39、Gradle Effective Implementation Guide
40、Gradle in Action
41、Graph Databases
42、HBase Administration Cookbook
43、HBase in Action
44、HBase:The Definitive Guide
45、Hadoop Beginners Guide
46、Hadoop MapReduce Cookbook
47、Hadoop Operations
48、Hadoop Operations and Cluster Management Cookbook
49、Hadoop RealWorld Solutions Cookbook
50、Hadoop in Action
51、Hadoop in Practice
52、HadoopDB An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads
53、Hadoop:The Definitive Guide 3rd Edition
54、High Performance MySQL 3rd Edition
55、Hive A Petabyte Scale Data Warehouse Using Hadoop
56、Incoop MapReduce for Incremental Computations
57、Interpreting the Data Parallel Analysis with Sawzall
58、JSR-133 Java Memory Model and Thread
59、Java 7 Concurrency Cookbook
60、Java 7 New Features Cookbook
61、Java 7 Recipes A Problem-Solution Approach
62、Java 8 in Action Lambdas, Streams and Functional-style Programming
63、Java EE 7 Essentials
64、Java EE 7 Specification
65、Java EE 7 Web Profile Specification
66、Java Network Programming 4th Edition
67、Java Network Programming and Distributed Computing
68、Java Performance
69、Java Performance Tuning 2nd Edition
70、Java SE 8 for the Really Impatient
71、Java Security 2nd Edition
72、Java Threads 3rd Edition
73、Java in a Nutshell 5th Edition
74、Jenkins Continuous Integration Cookbook
75、Jenkins The Definitive Guide
76、Kafka a Distributed Messaging System for Log Processing
77、Lucene in Action 2nd Edition
78、Mahout in Action
79、Managing Infrastructure with Puppet
80、MapReduce - Simplied Data Processing on Large Clusters
81、MapReduce Design Patterns
82、MapReduce a flexible data processing tool
83、Mastering ElasticSearch
84、Megastore - Providing Scalable, Highly Available Storage for Interactive Services
85、Mesos A Platform for Fine-Grained Resource Sharing in the Data Center
86、MongoDB The Definitive Guide 2nd Edition
87、MongoDB in Action
88、Monitoring with Ganglia
89、Netty in Action MEAP V08
90、NoSQL Distilled
91、Omega - flexible, scalable schedulers for large compute clusters
92、OpenStack Operations Guide
93、Oracle JRockit The Definitive Guide
94、Percolator - Large-scale Incremental Processing Using Distributed Transactions and Notifications
95、Performance Testing With JMeter 2.9
96、PowerDrill - Processing a Trillion Cells per Mouse Click
97、Pregel - A System for Large-Scale Graph Processing
98、Pro Hadoop
99、Pro JPA2
100、Pro Java 7 NIO.2
101、Pro Puppet
102、Pro Spring 3
103、Pro Spring MVC
104、Pro Spring Security
105、Professional Hadoop Solutions
106、Programming Concurrency on the JVM
107、Programming Hive
108、Programming Pig
109、Programming Scala
110、Programming Scala Tackle Multi-Core Complexity on the Java Virtual Machine
111、Programming in Scala 2nd Edition
112、RADOS A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters.
113、RabbitMQ in Action
114、Redis Cookbook
115、Redis in Action
116、Resilient Distributed Datasets - A Fault-Tolerant Abstraction for In-Memory Cluster Computing
117、SQL Antipatterns
118、Scala for the Impatient
119、Scala in Action
120、Scala in Depth
121、Scalable IO in Java
122、Scaling CouchDB
123、Scaling MongoDB
124、Selenium 2 Testing Tools Beginner's Guide
125、Selenium Testing Tools Cookbook
126、Solr 3 Enterprise Search Server
127、Solr 3.1 Cookbook
128、Solr in action
129、Sonar Code Quality Testing Essentials
130、Spanner - Google’s Globally-Distributed Database
131、Spring Batch in Action
132、Spring Data Modern Data Access for Enterprise Java
133、Spring Dynamic Modules in Action
134、Spring Integration in Action
135、Spring Roo in Action
136、Spring Security 3.1
137、Spring in Action 4th Edition
138、Spring in Practice
139、Steps in Scala An Introduction to Object-Functional Programming
140、Storage Architecture and Challenges
141、Storm Blueprints Patterns for Distributed Real-time Computation
142、Storm Real-Time Processing Cookbook
143、Tenzing - A SQL Implementation On The MapReduce Framework
144、Testable JavaScript
145、The Definitive Guide to MongoDB
146、The Hadoop Distributed File System
147、The Java Language Specification Java SE 7 Edition
148、The Java Virtual Machine Specification Java SE 7 Edition
149、The Little Redis Book
150、The anatomy of a large-scale hypertextual Web search engine
151、Thinking in Java 4th Edition
152、Tika in Action
153、Understanding MySQL Internals
154、Web Crawling and Data Mining with Apache Nutch
155、Web search for a planet the google cluster architecture
156、Zab High-performance broadcast for primary-backup systems
157、ZeroMQ
158、ZooKeeper Distributed Process Coordination
159、admin-user-guide-trunk
160、api-quick-start-onepager
161、bk-admin-guide-cloud-latest
162、bk-compute-adminguide-grizzly
163、user-guide