Databases & Big Data
epub, pdf |eng | 2015-01-26 | Author:EMC Education Services [EMC Education Services]
FIGURE 7-2 Example of a decision stump To illustrate how a decision tree works, consider the case of a bank that wants to market its term deposit products (such as ...
( Category:
Data Mining
March 3,2020 )
epub |eng | | Author:Suman Mukherjee & Saptaparna Mukherjee (Das)
Solution with SAP MII If we consider the integration requirement of pharmaceutical industries, SAP MII can provide the best solution for it. SAP MII has standard connectors available to connect ...
( Category:
Data Processing
March 3,2020 )
epub, mobi, pdf |eng | 2016-11-28 | Author:Gene Belitski [Belitski, Gene]
Note that the binding for twoByTwo did not bring any calculations to life, but it wrapped the future calculation into the Lazy type. Then, the first twoByTwo.Force() function performed the ...
( Category:
Data Modeling & Design
March 3,2020 )
epub |eng | | Author:Shishir K. Shandilya & Neal Wagner & Atulya K. Nagar
2 The Peculiarities of Event Correlation and Security Assessment The event correlation allows one to detect security incidents, as well as the chains of security events that led to these ...
( Category:
Databases & Big Data
March 2,2020 )
epub |eng | 2014-09-07 | Author:Jorgensen, Adam & Ball, Bradley & Wort, Steven & LoForte, Ross & Knight, Brian
SUMMARY In this chapter, you learned how to read query plans, how queries are processed in SQL Server, and how to identify potential performance improvements. You learned the steps a ...
( Category:
SQL Server
March 2,2020 )
epub |eng | 2014-05-10 | Author:Kalman Toth M.A. M.PHIL. [Toth M.A. M.PHIL., Kalman]
( Category:
SQL
March 2,2020 )
azw3 |eng | 2015-12-10 | Author:
Using HOT keys in combination with ALT key for Text Alignment ALT + H + …. AL - Align Left AC - Align Centre AR - Align Right AT - ...
( Category:
Data Processing
March 1,2020 )
epub, pdf |eng | 2014-02-28 | Author:Ben Jones
The Connected Scatterplot We haven’t yet strayed from the rule of thumb that time should be encoded on the x-axis increasing from left to right. An innovative way to encode ...
( Category:
Data Modeling & Design
March 1,2020 )
The InfoSec Handbook: An Introduction to Information Security by Rao Umesh Hodeghatta & Nayak Umesha
epub |eng | 2014-09-01 | Author:Rao, Umesh Hodeghatta & Nayak, Umesha [Rao, Umesh Hodeghatta]
Figure 8-4. Symmetric Key Distribution Center Asymmetric Key Cryptography There are two problems with symmetric key cryptography: Distribution of key – Secret key sharing among senders and receivers. If there ...
( Category:
Internet, Groupware, & Telecommunications
March 1,2020 )
epub |eng | 2015-02-28 | Author:Sam R. Alapati
( Category:
Databases & Big Data
March 1,2020 )
epub, pdf |eng | | Author:Sean T. Allen, Matthew Jankowski, Peter Pathirana
Figure 5.7. The command for deploying your topology to a Storm cluster After you execute the command in figure 5.7, your topology will be up and running on the Storm ...
( Category:
Software Development
March 1,2020 )
epub |eng | 2012-09-18 | Author:Toth, Kalman [Toth, Kalman]
( Category:
SQL Server
March 1,2020 )
epub |eng | 2016-10-18 | Author:Friedman, Ellen & Tzoumas, Kostas
Figure 4-3. Implementing continuous applications using a streaming architecture. The message transport (Kafka, MapR Streams) is shown here as a horizontal cylinder. It supplies streaming data to the stream processor ...
( Category:
Data Mining
March 1,2020 )
mobi |eng | 2014-12-23 | Author:Lucien Avramov & Maurizio Portolani
Endpoint Discovery ACI uses three methods to discover the presence of virtual endpoints. The first method of learning is control plane learning, which is achieved through an out-of-band handshake. vCenter ...
( Category:
Networks
March 1,2020 )
azw3, pdf |eng | 2016-03-09 | Author:Anita Graser [Graser, Anita]
After you click on OK, the selected statistics are appended to the polygon layer attribute table, as shown in the following screenshot. We can see that Big Mountain AFS is ...
( Category:
Databases & Big Data
March 1,2020 )
Categories
Access | Data Mining |
Data Modeling & Design | Data Processing |
Data Warehousing | MySQL |
Oracle | Other Databases |
Relational Databases | SQL |
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9780)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8304)
Azure Data and AI Architect Handbook by Olivier Mertens & Breght Van Baelen(6762)
Building Statistical Models in Python by Huy Hoang Nguyen & Paul N Adams & Stuart J Miller(6737)
Serverless Machine Learning with Amazon Redshift ML by Debu Panda & Phil Bates & Bhanu Pittampally & Sumeet Joshi(6622)
Data Wrangling on AWS by Navnit Shukla | Sankar M | Sam Palani(6407)
Driving Data Quality with Data Contracts by Andrew Jones(6347)
Machine Learning Model Serving Patterns and Best Practices by Md Johirul Islam(6112)
Learning SQL by Alan Beaulieu(5999)
Weapons of Math Destruction by Cathy O'Neil(5785)
Big Data Analysis with Python by Ivan Marin(5372)
Data Engineering with dbt by Roberto Zagni(4376)
Solidity Programming Essentials by Ritesh Modi(4024)
Time Series Analysis with Python Cookbook by Tarek A. Atwan(3885)
Pandas Cookbook by Theodore Petrou(3588)
Blockchain Basics by Daniel Drescher(3301)
Hands-On Machine Learning for Algorithmic Trading by Stefan Jansen(2911)
Feature Store for Machine Learning by Jayanth Kumar M J(2816)
Learn T-SQL Querying by Pam Lahoud & Pedro Lopes(2799)
Mastering Python for Finance by Unknown(2745)
