Are you responsible for building Data pipelines for your organization or for your customers? Are you coming from a background where you worked on traditional ESB (Enterprise Service Bus), Middleware and ETL based systems but are no longer comfortable with modern trends in these domains? Or are you just interested in learning a technology that provides framework for message processing, stream processing, real time analytics, event sourcing, or acting as a central data bus for your organization. Apache Kafka is the leading distributed streaming and queuing technology for large-scale, always-on applications. Kafka has built-in features of horizontal scalability, high-throughput and low-latency. It is highly reliable, has high-availability, and allows geographically distributed data streams and stream processing applications. It’s used by pretty much all the big tech giants; LinkedIn, Netflix, Uber, Twitter, AirBnB and traditional names like Adidas, Goldman Sachs; the list goes on. Instaclustr is organizing a multi-part webinar series on Apache Kafka with an aim to help you in your journey of learning and making the best use of this technology. In part-1 of this series, we will start with the basics of Apache Kafka, Kafka ecosystem, overview of its architecture and explore concepts like brokers, topics, partitions, logs, producers, consumers, consumer groups, etc.


06:00 - 07:00 hs GMT+1


Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 825 webinars
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020