About streams and tables in Kafka and Stream Processing, part 1

About streams and tables in Kafka and Stream Processing, part 1 * Michael G. Noll is an active contributor to Open Source projects, including Apache Kafka and Apache Storm.
 
 
The article will be useful first of all to those who only get acquainted with Apache Kafka and /or stream processing[Stream Processing].

 
 
In this article, perhaps in the first of the mini-series, I want to explain the concepts of Streams [Streams] and Tables [Tables] in stream processing and, in particular, in Apache Kafka . I hope you will have a better theoretical idea and ideas that will help you solve your current and future tasks better and /or faster.
 
 
Contents:
 
 
* Motivation
 
* Streams ...[/Tables][/Streams][/Stream]
+ 0 -

How users teach Yandex to warn about telephone spam

All those who have flashed their number on the Internet, filled in a questionable questionnaire in offline or who simply were not lucky to get into numerous bases are familiar with the telephone spam. Today we will tell the readers of Habrahabra about how, through user feedback and machine learning, we taught the Yandex application to warn about unwanted calls.
 
 
How users teach Yandex to warn about telephone spam
 
 
Calls from unfamiliar numbers are always a difficult choice. Is this a long-awaited courier or another operator calling with a "unique" promotional offer? To solve this problem, there are mobile applications that work on the basis of directories ...
+ 0 -

We manage copying Active Directory attributes when duplicating user accounts

We manage copying Active Directory attributes when duplicating user accounts
 
Many companies use additional Active Directory attributes that are copied together with duplication of the user account. But there are lots of examples when it is inconvenient. Therefore, in this article I will tell you how to avoid such behavior or change it to suit your needs. Excel instead of PowerShell: requests to AD and system reports "on the knee" .
 
We turn logs as we want - analysis of logs on Windows systems .
 
Cross-pollination: we manage Linux from under Windows, and vice versa .
  Many companies use additional Active Directory attributes that are copied together with duplication of the user account. But there are lots of examples when it is inconvenient. Therefore, in this article I will tell you how to avoid such behavior or change it to suit your needs. Excel instead of PowerShell: requests to AD and system reports "on the knee" .  We turn logs as we want - analysis of logs on Windows systems .  Cross-pollination: we manage Linux from under Windows, and vice versa . ...
+ 0 -