Solved

Best Data algorithm book for the experts.

Posted on 2013-11-06
4
387 Views
Last Modified: 2013-11-10
I planning to invent a new algorithm which should read the 25 tb data in less than a minute. I know it's tough job ,but like to start my R&D on this.
0
Comment
4 Comments
 
LVL 27

Expert Comment

by:d-glitch
ID: 39627943
An advanced design needs to start with a rigorous specification.

What is this 25 TB of data, and how it stored?
What hardware and interface are you using to read it?
What do you hope to do with it once you have read it?
What is so special about 1 minute?  Is 59 seconds really much better than 61?

You might need to develop new massively parallel hardware before you can start to work on the algorithm.

You could start looking here:
     http://www.amazon.com/Introduction-Algorithms-Thomas-H-Cormen/dp/0262033844
0
 
LVL 33

Expert Comment

by:sarabande
ID: 39628033
the maximum ssd size to date is 2 tb (http://www.thessdreview.com/our-reviews/solidata-k8-1920e-2tb-ssd-review/)  it reads 230 MB per second. so you need a rack of 13 sata drives and - given you are the only user of the system - you theoretically could read 25 tb sequentially within two minutes. reading parallel you could achieve your goal if you overcome the bottlenecks current hardware surely has. as you can't store all the data in memory (beside you use hundreds or thousands of units what arises new issues) you would need to evaluate the data while reading.

Sara
0
 
LVL 84

Expert Comment

by:ozo
ID: 39628107
You could have 25 thousand Raspberry Pi's, each reading 1gb per minute.
What does that have to do with algorithms?
0
 
LVL 40

Accepted Solution

by:
evilrix earned 500 total points
ID: 39628172
By far the best book I've read, related to algorithm design.

The Algorithm Design Manual, 2nd Edition, Steven Skiena
http://www.algorist.com/
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows you how to optimize memory allocations in C++ using placement new. Applicable especially to usecases dealing with creation of large number of objects. A brief on problem: Lets take example problem for simplicity: - I have a G…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Video by: Grant
The goal of this video is to provide viewers with basic examples to understand and use nested-loops in the C programming language.
The goal of this video is to provide viewers with basic examples to understand and use conditional statements in the C programming language.

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now