7 Windowed computations
In this chapter
- standard windowing strategies
- time stamps in events
- windowing watermark and late events
“The attention span of a computer is only as long as its power cord.”
—Unknown
In the previous chapters, we built a streaming job to detect fraudulent credit card transactions. There could be many analyzers that use different models, but the basic idea is to compare the transaction with the previous activities on the same card. Windowing is designed for this type of work, and we are going to learn the windowing support in streaming systems in this chapter.
Slicing up real-time data
As the popularity of the team’s new product has grown so has the attention of new types of hackers. A group of hackers has started a new ...
Get Grokking Streaming Systems now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.