Summary Spark in Action teaches you the theory and skills you need to effectively handle batch and streaming data using Spark. Fully updated for Spark 2.0. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology Big data systems distribute datasets across clusters of machines, making it a challenge to efficiently query, stream, and interpret them. Spark can help. It is a processing system designed specifically for distributed data. It provides easy-to-use interfaces, along with the performance you need for production-quality analytics and machine learning. Spark 2 also adds improved programming APIs, better performance, and countless other upgrades. About the Book Spark in Action teaches you the theory and skills you need to effectively handle batch and streaming data using Spark. You'll get comfortable with the Spark CLI as you work through a few introductory examples. Then, you'll start programming Spark using its core APIs. Along the way, you'll work with structured data using Spark SQL, process near-real-time streaming data, apply machine learning algorithms, and munge graph data using Spark GraphX. For a zero-effort startup, you can download the preconfigured virtual machine ready for you to try the book's code. What's Inside Updated for Spark 2.0 Real-life case studies Spark DevOps with Docker Examples in Scala, and online in Java and Python About the Reader Written for experienced programmers with some background in big data or machine learning. About the Authors Petar Zečević and Marko Bonaći are seasoned developers heavily involved in the Spark community. Table of Contents PART 1 - FIRST STEPS Introduction to Apache Spark Spark fundamentals Writing Spark applications The Spark API in depth PART 2 - MEET THE SPARK FAMILY Sparkling queries with Spark SQL Ingesting data with Spark Streaming Getting smart with MLlib ML: classification and clustering Connecting the dots with GraphX PART 3 - SPARK OPS Running Spark Running on a Spark standalone cluster Running on YARN and Mesos PART 4 - BRINGING IT TOGETHER Case study: real-time dashboard Deep learning on Spark with H2O
No image available
No image available
No author available
· 2022
No image available
No image available
· 2015
Advances in cyber-physical systems (CPS), machine learning, big data techniques, and in cloud computing having been enabling ever more data to be collected about systems and their users, in search for unique features and interesting patterns. This, in turn, has been giving rise to the personalization trend, an approach where a cyber-physical system uses observed features and patterns in order to better adopt to users' needs, abilities, and pref- erences. Examples of personalized technologies are many, from buildings learning about inhabitants' daily routines and preferences [13], to music, video and shopping recommendation systems [19, 14, 1]. The personalization trend is expected to be particularly important for biomedical cyber- physical systems, where data about patients, and/or medical practitioners is expected to allow systems to better adapt to medical needs. Yet, this trend is not without risks. Any time data about users and systems is recorded, processed, and possibly stored for future analysis, security and privacy risks arise. Misusing the collected data gives rise to threats ranging from compromising or breaking systems to shaming, manipulating or even physically harming users. Moreover, in biomedical CPS, some biosignals or data about genetic material may contain not only the current information about patients, but may allow predictions to be made about patients' future, or their relatives. Security and privacy issues related to personalized CPS are thus front and center, and this dissertations focuses on those arising in biomedical cyber-physical systems. In doing so, we start from human components of such systems, and propose that users' idiosyncrasies, in the way users interact with systems, may expose these systems to potential security and privacy risks. At the same time, however, users' unique traits can be used to increase the systems' security, privacy and usability properties. To investigate the stated hypothesis, this dissertation focuses on three questions: (1) how do (how could) biomedical cyber-physical systems use users' idiosyncrasies, (2) what security and privacy vulnerabilities may arise from users' unique traits, and (3) how can users' idiosyncrasies be leveraged to increase systems' security and privacy? The question about possible vulnerabilities is answered by analyzing properties of brain-computer interfaces, an example of emerging neural engineering technology. The last question is answered in the context of the next generation teleoperated robotic systems, focusing specifically on surgical robots.
No image available
· 1931
No image available
No image available
No image available
No image available