eBooks-it.org Logo
eBooks-IT.org Inner Image

OReilly eBooks Page 29

Download free OReilly eBooks Page 29

Learning jQuery Deferreds

Taming Callback Hell with Deferreds and Promises
Learning jQuery Deferreds Image
Orchestrating asynchronous function calls in JavaScript often leads to callback hell, but there is a reliable way to avoid this painful state of affairs. With this concise and simple guide, you'll learn how to use jQuery deferreds and promises, an elegant approach for managing asynchronous calls in both client and server applications.This book contains 18 examples that use deferreds to solve progressively challenging real-world programming problems, along with 75 stimulating puzzles (and their solutions) that will help you understand how and when to use deferreds. Experienced JavaScript programmers will learn new tricks in a fun way, and become immersed in the practice of event-based programming.Understand the logic behind creating deferreds and retu...

Programming Elastic MapReduce

Using AWS Services to Build an End-to-End Application
Programming Elastic MapReduce Image
Although you don't need a large computing infrastructure to process massive amounts of data with Apache Hadoop, it can still be difficult to get started. This practical guide shows you how to quickly launch data analysis projects in the cloud by using Amazon Elastic MapReduce (EMR), the hosted Hadoop framework in Amazon Web Services (AWS).Authors Kevin Schmidt and Christopher Phillips demonstrate best practices for using EMR and various AWS and Apache technologies by walking you through the construction of a sample MapReduce log analysis application. Using code samples and example configurations, you'll learn how to assemble the building blocks necessary to solve your biggest data analysis problems.Get an overview of the AWS and Apache software tools...

Real-Time Communication with WebRTC

Peer-to-Peer in the Browser
Real-Time Communication with WebRTC Image
Deliver rich audio and video real-time communication and peer-to-peer data exchange right in the browser, without the need for proprietary plug-ins. This concise hands-on guide shows you how to use the emerging Web Real-Time Communication (WebRTC) technology to build a browser-to-browser application, piece by piece.The authors' learn-by-example approach is perfect for web programmers looking to understand real-time communication, and telecommunications architects unfamiliar with HTML5 and JavaScript-based client-server web programming. You'll use a ten-step recipe to create a complete WebRTC system, with exercises that you can apply to your own projects.Tour the WebRTC development cycle and trapezoid architectural modelUnderstand how and why VoIP is ...

Java 8 Lambdas

Pragmatic Functional Programming
Java 8 Lambdas Image
If you're a developer with core Java SE skills, this hands-on book takes you through the language changes in Java 8 triggered by the addition of lambda expressions. You'll learn through code examples, exercises, and fluid explanations how these anonymous functions will help you write simple, clean, library-level code that solves business problems.Lambda expressions are a fairly simple change to Java, and the first part of the book shows you how to use them properly. Later chapters show you how lambda functions help you improve performance with parallelism, write simpler concurrent code, and model your domain more accurately, including building better DSLs.Use exercises in each chapter to help you master lambda expressions in Java 8 quicklyExplore str...

Managing The Windows 2000 Registry

Managing The Windows 2000 Registry Image
The Windows 2000 Registry is the repository for all hardware, software, and application configuration settings, and Managing the Windows 2000 Registry is the system administrator's guide to maintaining, monitoring, and updating the Registry database. The book, which is an update of Managing the Windows NT Registry, addresses four main areas:What is the Registry? Where does it live on disk? How do system services access and use it? What do you do if it's damaged or corrupted? Every 2000 administrator faces questions like this, often in a desperate attempt to fix something that's broken.What tools are available? Detailed descriptions of Regedit, RegEdt32, the System Policy Editor, Group Policy Editor and selected Resource Kit utilities explain how to e...



2007 - 2017 © eBooks-IT.org