Explore >> Select a destination


You are here

ketanvijayvargiya.com
| | highlyscalable.wordpress.com
7.4 parsecs away

Travel
| | Statistical analysis and mining of huge multi-terabyte data sets is a common task nowadays, especially in the areas like web analytics and Internet advertising. Analysis of such large data sets often requires powerful distributed data stores like Hadoop and heavy data processing with techniques like MapReduce. This approach often leads to heavyweight high-latencyanalytical processes and...
| | www.jamesridgway.co.uk
5.8 parsecs away

Travel
| | Querying large datasets can often be challenging, especially when performance is a key concern. Achieving performance at scale often comes with an element of trade-off in how a system is designed to achieve the desired functionality and performance at scale. A bloom filter is one example of a probabilistic data
| | lsd.gnunet.org
18.7 parsecs away

Travel
| | This document contains the R 5 N DHT technical specification. R 5 N is a secure distributed hash table (DHT) routing algorithm and data structure for decentralized applications. It features an open peer-to-peer overlay routing mechanism which supports ad-hoc permissionless participation and support for topologies in restricted-route environments. Optionally, the paths data takes through the overlay can be recorded, allowing decentralized applications to use the DHT to discover routes. This document defines the normative wire format of protocol messages, routing algorithms, cryptographic routines and security considerations for use by implementers. This specification was developed outside the IETF and does not have IETF consensus. It is published here to guid...
| | blog.luke.wf
46.2 parsecs away

Travel
| I've been thinking a lot recently about information security and passwords. It's widely agreed that two-factor authentication, which combi...