Data Analytics with Hadoop: O'Reilly Ebook

...

Download This book is meant as a survey of the Hadoop ecosystem and distributed computation intended to arm data scientists, statisticians, programmers, and folks who are interested in Hadoop with just enough knowledge to make them dangerous.

Use this book as a guide as you dip your toes into the world of Hadoop and find the tools and techniques that interest you the most, be it Spark, Hive, Machine Learning, ETL, Relational Databases, or one of the other many topics related to cluster computing.

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    Google Reportedly Still Working On Mixed VR, AR Headset

    They are empowered While Google may be retooling its virtual reality roadmap, the company is still dedicated to producing a standalone headset that blends the boundaries between VR and augmented reality.An unnamed Google spokesman has told technology blog Engadget that the search giant is still working on a secretive device that would blur the boundaries between virtual reality (VR) and augmented reality (AR).
  • 5300c769af79e

    Fender Releases Its Own Guitar Tuner App and It Works Very Well

    When I got older, he passed that same guitar down to me, and I still have it to this day.Anyway, point being, a name like Fender carries much weight with guitarists, and players will be happy to learn that the company has released an official guitar tuner application for Android.
  • 5300c769af79e

    The Benefits of Open Networking and Software Defined Storage

    Download this whitepaper to learn how Open Networking with Software-Defined Storage (SDS) optimizes the use of hardware and software to support the needs of a wide range of applications as well as improving automation, management, and monitoring.The information submitted is collected by both UBM and our sponsor Cumulus Networks.
  • 5300c769af79e

    4 Major Vulnerabilities Discovered In HTTP/2 Protocol

    The team took an in-depth look at HTTP/2 server implementations from Apache, Microsoft, NGINX, Jetty, and nghttp2.The security researchers discovered exploitable vulnerabilities in all major HTTP/2 mechanisms that it reviewed.