This talk will focus on the design considerations and architecture of Druid, an open-source, distributed, column-oriented analytical data store. There will be a particular focus on how Druid can be used to ingest data in real-time on the write side and provide real-time access to data on the read side.
Speaker: Joshua Suereth From the abstract: “Erlang has made popular the notation of asynchronous message passing as means of distribution and Scaling. While the idea of “actors” is fundamentally simple, how do we, the software engineers, make use of this abstraction to develop real life, scalable systems? This talk designs a scalable distributed search service … Read More
From the abstract: “Stream processing has emerged in recent years as a very fast-growing paradigm in data science infrastructure. This rise can be partly attributed to some factors external to system design, such as business demands for near-realtime data or inability of hardware to manage an ever-growing data set. However, this paradigm also possesses many … Read More
From the abstract: “Ever wished the compiler could make asynchronous programming easier? Enter Scala Async. Do asynchronous I/O like ‘normal’ blocking I/O, program with Futures and Promises even more naturally! Scala Async makes it possible to ‘suspend’ at arbitrary points in a block of regular Scala code, and to ‘resume’ from that point later— all … Read More
From the abstract: “The Harvard Business Review declared Data Scientist ‘The sexiest job of the 21st Century’ So what is all the Big Data hype about? Can data really change the way we live our lives and go about business? Digital advertising is one of the fields on the forefront of exploring and exploiting Big … Read More
From the abstract: “This talk presents Slick, Typesafe’s library for accessing databases. Similar in nature to .NET’s LINQ API, Slick is a successor to the popular ScalaQuery library. With Slick, database queries can be expressed using Scala code – which is composable and more convenient than Java APIs like JPA, and safer than string-based query … Read More
From the abstract: “A growing body of disclosure law governing security breaches and data loss incidents, coupled with ‘the professional nature’ of the threats, is fueling an expanded focus on incident response, digital forensics, evidence collection, and proactive fraud detection. In addition, government and industry regulations require not only the aggregation of data and event … Read More