Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scaling Big Data with Hadoop and Solr
Scaling Big Data with Hadoop and Solr

As data grows exponentially day-by-day, extracting information becomes a tedious activity in itself. Technologies like Hadoop are trying to address some of the concerns, while Solr provides high-speed faceted search. Bringing these two technologies together is helping organizations resolve the problem of information extraction from Big Data...

Image Processing with ImageJ
Image Processing with ImageJ

Discover the incredible possibilities of ImageJ, from basic image processing to macro and plugin development

Overview

  • Learn how to process digital images using ImageJ and deal with a variety of formats and dimensions, including 4D images
  • Understand what histograms, region of interest, or...
Transient-Induced Latchup in CMOS Integrated Circuits
Transient-Induced Latchup in CMOS Integrated Circuits

The book all semiconductor device engineers must read to gain a practical feel for latchup-induced failure to produce lower-cost and higher-density chips. Transient-Induced Latchup in CMOS Integrated Circuits equips the practicing engineer with all the tools needed to address this regularly occurring problem while becoming more proficient at...

Drupal 6 Theming Cookbook
Drupal 6 Theming Cookbook

Themes are among the most powerful and flexible features available when it comes to the presentation of a website. The greatest strength of Drupal lies in its design which, when done correctly, allows developers and designers to customize and micromanage each and every aspect of the site. Furthermore, the Drupal theming system and its APIs...

Accumulo: Application Development, Table Design, and Best Practices
Accumulo: Application Development, Table Design, and Best Practices

Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (Nsa) and based on Google’s BigTable data storage system. Written by former Nsa team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design,...

Practical Unix & Internet Security, Second Edition
Practical Unix & Internet Security, Second Edition
This book is a practical guide to UNIX security. For users, we explain what computer security is, describe some of the dangers that you may face, and tell you how to keep your data safe and sound. For administrators, we explain in greater detail how UNIX security mechanisms work and tell how to configure and administer your computer for maximum...
Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be sufficiently accurate in some applications, there are certainly many other cases, where...
Mastering Statistical Process Control: A Handbook for Performance Improvement Using SPC Cases
Mastering Statistical Process Control: A Handbook for Performance Improvement Using SPC Cases
Mastering Statistical Process Control shows how to understand business or process performance more clearly and more effectively. This practical book is based on a rich and varied selection of case studies from across industry and commerce, including material from the manufacturing, extractive and service sectors. It will enable readers to...
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center

Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace. As it can deliver those services, efficiently and with quality, at compelling price levels, cloud computing is with us to stay. Ubiquitously and quite definitively, cloud...

Architecting Mobile Solutions for the Enterprise
Architecting Mobile Solutions for the Enterprise
As far back as 1999, some smart guys predicted that mobile would become the primary focus of development in only a few years. Although it has taken a bit more time than expected, the era of mobile software has arrived at last. Why did it take so long? The answer is surprisingly simple: mobile software needed a critical mass of users...
Interpretation of Pulmonary Functions Tests: A Practical Guide
Interpretation of Pulmonary Functions Tests: A Practical Guide
The first edition of Interpretation of Pulmonary Function Tests was well received and met our goal of appealing to a wide, varied audience of health professionals. In the second edition, we added a section to expand our discussion of lung mechanics. We emphasize the mechanical impairments faced...
unlimited object storage image
Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy