|
|
|
|
Scaling Big Data with Hadoop and Solr
As data grows exponentially day-by-day, extracting information becomes a tedious activity in itself. Technologies like Hadoop are trying to address some of the concerns, while Solr provides high-speed faceted search. Bringing these two technologies together is helping organizations resolve the problem of information extraction from Big Data... | | Image Processing with ImageJ
Discover the incredible possibilities of ImageJ, from basic image processing to macro and plugin development
Overview
-
Learn how to process digital images using ImageJ and deal with a variety of formats and dimensions, including 4D images
-
Understand what histograms, region of interest, or...
| | Transient-Induced Latchup in CMOS Integrated Circuits
The book all semiconductor device engineers must read to gain a practical feel for latchup-induced failure to produce lower-cost and higher-density chips. Transient-Induced Latchup in CMOS Integrated Circuits equips the practicing engineer with all the tools needed to address this regularly occurring problem while becoming more proficient at... |
|
Drupal 6 Theming Cookbook
Themes are among the most powerful and flexible features available when it comes to the presentation of a website. The greatest strength of Drupal lies in its design which, when done correctly, allows developers and designers to customize and micromanage each and every aspect of the site. Furthermore, the Drupal theming system and its APIs... | | Accumulo: Application Development, Table Design, and Best Practices
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (Nsa) and based on Google’s BigTable data storage system. Written by former Nsa team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design,... | | Practical Unix & Internet Security, Second EditionThis book is a practical guide to UNIX security. For users, we explain what computer security is, describe some of the dangers that you may face, and tell you how to keep your data safe and sound. For administrators, we explain in greater detail how UNIX security mechanisms work and tell how to configure and administer your computer for maximum... |
|
|
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center
Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace. As it can deliver those services, efficiently and with quality, at compelling price levels, cloud computing is with us to stay. Ubiquitously and quite definitively, cloud... | | Architecting Mobile Solutions for the Enterprise
As far back as 1999, some smart guys predicted that mobile would become the primary focus of development in only a few years. Although it has taken a bit more time than expected, the era of mobile software has arrived at last. Why did it take so long? The answer is surprisingly simple: mobile software needed a critical mass of users ... | | Interpretation of Pulmonary Functions Tests: A Practical Guide
The first edition of Interpretation of Pulmonary Function Tests was well received and met our goal of appealing to a wide, varied audience of health professionals. In the second edition, we added a section to expand our discussion of lung mechanics. We emphasize the mechanical impairments faced ... |
|
|
Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 |