Херсонська область є одним із пілотних регіонів Програми USAID ЛЕВ. У кінці 2016 - на початку 2017 року ми опитали 75 малих та середніх підприємств області в рамках опитування "Щорічна оцінка ділового клімату в Україні". Загалом, в рамках дослідження було опитано більш, ніж 1800 МСП у 25 регіонах України. У цьому звіті, підготованому спеціально для Херсонської області, ми порівнюємо результати опитування МСП у Херсонській області та в Україні в цілому, а також результати 2016 та 2015 років.
Херсонська область є одним із пілотних регіонів Програми USAID ЛЕВ. У кінці 2016 - на початку 2017 року ми опитали 75 малих та середніх підприємств області в рамках опитування "Щорічна оцінка ділового клімату в Україні". Загалом, в рамках дослідження було опитано більш, ніж 1800 МСП у 25 регіонах України. У цьому звіті, підготованому спеціально для Херсонської області, ми порівнюємо результати опитування МСП у Херсонській області та в Україні в цілому, а також результати 2016 та 2015 років.
Malware en Android: Discovering, Reversing & ForensicsTelefónica
Índice del libro de la editorial 0XWord dedicado al malware de Android. Escrito por Miguel Ángel García del Moral trata de cubrir cómo funciona el malware en los markets de Android y cuáles son las técnicas para descubrirlo y analizarlo.
Download luận văn thạc sĩ ngành tài chính ngân hàng với đề tài: Giải pháp phát triển sản phẩm Ngoại hối phái sinh tại Ngân hàng Công thương việt Nam, cho các bạn có thể tham khảo
Índice del nuevo libro de 0xWord dedicado al mundo del hacking de los sistemas operativos OSX/macOS de Apple. Desde la configuración de seguridad a la explotación de vulnerabilidades. Más información en http://0xword.com/es/libros/91-macos-hacking.html
ГОСТ Р ИСО/МЭК 15910-2002 Процесс создания документации пользователя программ...Egor
ГОСТ Р ИСО/МЭК 15910-2002 Информационная технология. Процесс создания документации пользователя программного средства.
-------------------------------
Разработка технических заданий для сайтов, мобильных приложений, программного обеспечения. Написание документаций, инструкций, хелпов. Обращайтесь, контакты в профиле.
The document describes a Java framework called FJTask that supports fork/join parallel programming. FJTask is based on the work-stealing scheduler design from Cilk. It uses a pool of worker threads that each maintain a double-ended queue of tasks. When a worker finishes its tasks, it can "steal" tasks from other workers. FJTask provides lightweight executable tasks instead of using Java threads directly to reduce overhead. It implements efficient double-ended queues and work stealing to allow good parallel performance of fork/join programs in Java.
This document proposes and evaluates cooperative scans, a framework for improving disk bandwidth utilization and reducing latency for concurrent scan queries in a database management system (DBMS). It analyzes existing scheduling policies like normal, attach, and elevator scans and finds they do not fully exploit data sharing opportunities. The cooperative scans framework introduces a new relevance policy that dynamically schedules queries and their data requests based on the current system situation. Initial results on row storage show significant performance improvements over traditional policies. The document also discusses extending cooperative scans to column storage and related implementation challenges.
Malware en Android: Discovering, Reversing & ForensicsTelefónica
Índice del libro de la editorial 0XWord dedicado al malware de Android. Escrito por Miguel Ángel García del Moral trata de cubrir cómo funciona el malware en los markets de Android y cuáles son las técnicas para descubrirlo y analizarlo.
Download luận văn thạc sĩ ngành tài chính ngân hàng với đề tài: Giải pháp phát triển sản phẩm Ngoại hối phái sinh tại Ngân hàng Công thương việt Nam, cho các bạn có thể tham khảo
Índice del nuevo libro de 0xWord dedicado al mundo del hacking de los sistemas operativos OSX/macOS de Apple. Desde la configuración de seguridad a la explotación de vulnerabilidades. Más información en http://0xword.com/es/libros/91-macos-hacking.html
ГОСТ Р ИСО/МЭК 15910-2002 Процесс создания документации пользователя программ...Egor
ГОСТ Р ИСО/МЭК 15910-2002 Информационная технология. Процесс создания документации пользователя программного средства.
-------------------------------
Разработка технических заданий для сайтов, мобильных приложений, программного обеспечения. Написание документаций, инструкций, хелпов. Обращайтесь, контакты в профиле.
The document describes a Java framework called FJTask that supports fork/join parallel programming. FJTask is based on the work-stealing scheduler design from Cilk. It uses a pool of worker threads that each maintain a double-ended queue of tasks. When a worker finishes its tasks, it can "steal" tasks from other workers. FJTask provides lightweight executable tasks instead of using Java threads directly to reduce overhead. It implements efficient double-ended queues and work stealing to allow good parallel performance of fork/join programs in Java.
This document proposes and evaluates cooperative scans, a framework for improving disk bandwidth utilization and reducing latency for concurrent scan queries in a database management system (DBMS). It analyzes existing scheduling policies like normal, attach, and elevator scans and finds they do not fully exploit data sharing opportunities. The cooperative scans framework introduces a new relevance policy that dynamically schedules queries and their data requests based on the current system situation. Initial results on row storage show significant performance improvements over traditional policies. The document also discusses extending cooperative scans to column storage and related implementation challenges.
The document summarizes the state of the Python community and provides suggestions for improving engagement and participation. It discusses how the Python community is broader than just core developers and includes any contributors. It also suggests that python.org could better showcase exciting Python projects and real code examples to enthuse new users. Overall, the document encourages growing and engaging the community through conferences, documentation, and showcase of Python's capabilities.
This document discusses developing Comet applications in Java using popular Java web servers like Tomcat and Jetty. It provides an overview of Comet and different Comet styles like polling, long polling and streaming. It then describes how Tomcat and Jetty leverage non-blocking I/O to enable Comet and scalable implementations. Code examples are given showing how to create a Comet servlet for Tomcat that implements the CometProcessor interface and uses a MessageSender to push data to clients.
This document discusses event driven architecture (EDA) and domain driven design. It begins with an introduction to the speaker and an overview of EDA basics. It then describes problems with traditional SOA implementations, where domain logic gets split across many systems. The document proposes that exposing domain events on a shared event bus allows isolating cross-cutting functions to separate systems while keeping domain logic together. It provides examples of how this approach improves scalability and decouples systems. Finally, it outlines potential business benefits of using EDA like enabling complex event processing, business process management, and business activity monitoring on top of the domain events.
The document discusses trends and challenges facing information technology, including building a civic semantic web and waiving rights over linked data. It also discusses whether semantic technologies could permit meaningful brand relationships. The document contains a chart showing government department spending in the UK, with the Department of Health spending £105.7 billion, followed by local and regional government spending £34.3 billion, and the NHS spending £90.7 billion.
genpaxospublic-090703114743-phpapp01.pdfHiroshi Ono
This document summarizes an Erlang meeting held on July 3, 2009 in Tokyo. It discusses the gen_paxos Erlang module, which implements the Paxos consensus algorithm. Paxos is needed to solve problems like split-brains where data could become inconsistent without coordination between nodes. The document explains the key aspects of Paxos like its phases, data model in gen_paxos, and how nodes communicate through message passing in Erlang. It also provides references to related works and papers about Paxos.
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdfHiroshi Ono
The document discusses Scala and functional programming concepts. It provides examples of building a chat application in 30 lines of code using Lift, defining case classes and actors for messages. It summarizes that Scala is a pragmatically oriented, statically typed language that runs on the JVM and has a unique blend of object-oriented and functional programming. Functional programming concepts like immutable data structures, functions as first-class values, and for-comprehensions are demonstrated with examples in Scala.
This document is the introduction to "The Little Book of Semaphores" by Allen B. Downey. It provides an overview of the book, which uses examples and puzzles to teach synchronization concepts and patterns. The book aims to give students more practice with these challenging concepts than a typical operating systems course allows. It also discusses the book's licensing as free and open source documentation.
This document provides style guidelines for Scala developers at Twitter. It outlines recommendations for imports, implicit usage, reflection, comments, whitespace, logging, project layout, variable naming conventions, and ends by thanking people for attending.
This document introduces developing a Scala DSL for Apache Camel. It discusses using Scala features like implicit conversions, passing functions as parameters, and by-name parameters to build a DSL. It provides examples of simple routes in the Scala DSL and compares them to Java. It also covers tooling for Scala in Maven and Eclipse and caveats like interacting with Java generics. The goal is to learn basic Scala concepts and syntax for building a Scala DSL, using Camel as an example.
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdfHiroshi Ono
The document discusses alternative concurrency paradigms to shared-state concurrency for the JVM, including software transactional memory which allows transactions over shared memory, message passing concurrency using the actor model where actors communicate asynchronously via message passing, and dataflow concurrency where variables can only be assigned once. It provides examples of how these paradigms can be used to implement solutions like transferring funds between bank accounts more elegantly than with shared-state concurrency and locks.
This document discusses using TCP/IP for high performance computing (HPC) applications. It finds that while TCP/IP can achieve bandwidth of 1 Gbps over short distances with low latency, the bandwidth degrades significantly over wide area networks with higher latency. It investigates tuning TCP parameters like socket buffer sizes to improve performance over high latency networks.
Martin Odersky outlines the growth and adoption of Scala over the past 6 years and discusses Scala's future direction over the next 5 years. Key points include:
- Scala has grown from its first classroom use in 2003 to filling a full day of talks at JavaOne in 2009 and developing a large user community.
- Scala 2.8 will include new collections, package objects, named/default parameters, and improved tool support.
- Over the next 5 years, Scala will focus on concurrency and parallelism features at all levels from primitives to tools.
- Other areas of focus include extended libraries, performance improvements, and standardized compiler plugin architecture.
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdfHiroshi Ono
This document discusses alternative concurrency paradigms for the Java Virtual Machine (JVM). It begins with an agenda and discusses how Moore's Law no longer solves concurrency problems as processors are becoming multi-core. It then discusses the problems with shared-state concurrency and how separating identity and value can help. The document introduces software transactional memory, message passing concurrency using actors, and dataflow concurrency as alternative paradigms. It uses examples of bank account transfers to demonstrate how these paradigms can be implemented and discusses their advantages over shared-state concurrency.
This document contains the schedule for a conference with sessions on various topics in natural language processing and computational linguistics. The conference will take place from September 14-16. Each day consists of morning and afternoon sessions split into parallel tracks (1a and 1b). Sessions cover areas like semantics, parsing, sentiment analysis, and more. Keynote speakers include Ricardo Baeza-Yates, Kevin Bretonnel Cohen, Mirella Lapata, Shalom Lappin, and Massimo Poesio. Presentations are 20 minutes each with coffee breaks in the mornings and poster sessions in the afternoons.
The article discusses the Guardian's Datastore project, which makes data of public interest freely available online for reuse. Some key points:
- The Datastore contains datasets on topics like MPs' expenses, carbon emissions, and public opinion polls. This data was previously hard to access but the web now allows easy access to billions of statistics.
- Making this data open and machine-readable supports the Guardian's tradition of fact-checking and transparency. It also encourages others to analyze and build upon the data in new ways.
- An early example involved crowdsourcing the review of 500,000 pages of MPs' expenses, revealing new insights. Other Guardian datasets like music recommendations and university rankings are now available for others
genpaxospublic-090703114743-phpapp01.pdfHiroshi Ono
This document summarizes a presentation on Paxos and gen_paxos. It introduces Paxos as a distributed consensus algorithm that is robust to network failures and allows data replication across multiple nodes. It then describes the gen_paxos Erlang implementation of Paxos, including its data model, state machine approach, and messaging between nodes. Key aspects of Paxos like the prepare and propose phases are explained through examples. The document also provides context on applications of Paxos and references for further reading.
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdfHiroshi Ono
The document discusses Scala and functional programming concepts. It provides examples of building a chat application in 30 lines of code using Lift, defining messages as case classes, and implementing a chat server and comet component. It then summarizes that Scala is a pragmatically-oriented, statically typed language that runs on the JVM and provides a unique blend of object-oriented and functional programming. Traits allow for static and dynamic mixin-based composition. Functional programming concepts like immutable data structures, higher-order functions, and for-comprehensions are discussed.
29. 4 Google MapReduce Hadoop MapReduce
4
Google MapReduce Hadoop MapReduce
4.1 Google MapReduce
Google MapReduce [9]
4.1.1
Google MapReduce PC
• MapReduce
MapReduce PC
3
– Map
– Shuffle
– Reduce
MapReduce
•
GFS
•
26
30. 4.2. 4 Google MapReduce Hadoop MapReduce
4.1.2
Google MapReduce M
Map M Map Map PC
Map Map R
Reduce R Reduce Reduce PC
M Reduce R
MR Reduce Reduce M
Reduce
Google MapReduce MapReduce
MapReduce Map Reduce
Map Reduce
4.1.3 Hadoop MapReduce
Hadoop MapReduce Google MapReduce Hadoop MapReduce
JobTracker, TaskTracker
Hadoop HadoopStream-
ing MapReduce
HadoopStreaming[5] MapReduce
4.2
4.1 Google MapReduce Hadoop
Hadoop MapReduce
4.1: Google MapReduce Hadoop
Hadoop
MapReduce
Shuffle
Map Reduce
Map
27