You are viewing a plain text version of this content. The canonical link for it is here.
Posted to user@zookeeper.apache.org by Mark Vigeant <ma...@riskmetrics.com> on 2009/11/13 17:57:36 UTC
Zookeeper Presentation
Hey Everyone,
I'm supposed to give a presentation next week about the basic functionality and uses of zookeeper. I was wondering if anybody out there had:
1) A similar presentation that I could use at a starting point for inspiration
2) A cool project they worked on in zookeeper that I can cite as an example of the strength and usefulness of zookeeper.
I'm going to also show them the example code and run a few things through the terminal. I am also an HBase user so that is also something I can use to talk about.
Thanks a lot for your time and help!
Mark Vigeant
RiskMetrics Group, Inc.
This email message and any attachments are for the sole use of the intended recipients and may contain proprietary and/or confidential information which may be privileged or otherwise protected from disclosure. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not an intended recipient, please contact the sender by reply email and destroy the original message and any copies of the message as well as any attachments to the original message.
RE: Zookeeper Presentation
Posted by Mark Vigeant <ma...@riskmetrics.com>.
Thanks a lot Ted, this is very helpful!
-----Original Message-----
From: Ted Dunning [mailto:ted.dunning@gmail.com]
Sent: Friday, November 13, 2009 1:38 PM
To: zookeeper-user@hadoop.apache.org
Subject: Re: Zookeeper Presentation
Here is a talk I just gave at HPTS about our search system. The key scaling
technology is Katta and Katta is entirely dependent on ZK.
http://www.hpts.ws/session7/dunning.pdf
let me know if you need to hear the talk track.
On Fri, Nov 13, 2009 at 8:57 AM, Mark Vigeant
<ma...@riskmetrics.com>wrote:
> 2) A cool project they worked on in zookeeper that I can cite as an
> example of the strength and usefulness of zookeeper.
--
Ted Dunning, CTO
DeepDyve
This email message and any attachments are for the sole use of the intended recipients and may contain proprietary and/or confidential information which may be privileged or otherwise protected from disclosure. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not an intended recipient, please contact the sender by reply email and destroy the original message and any copies of the message as well as any attachments to the original message.
Re: Zookeeper Presentation
Posted by Ted Dunning <te...@gmail.com>.
Here is a talk I just gave at HPTS about our search system. The key scaling
technology is Katta and Katta is entirely dependent on ZK.
http://www.hpts.ws/session7/dunning.pdf
let me know if you need to hear the talk track.
On Fri, Nov 13, 2009 at 8:57 AM, Mark Vigeant
<ma...@riskmetrics.com>wrote:
> 2) A cool project they worked on in zookeeper that I can cite as an
> example of the strength and usefulness of zookeeper.
--
Ted Dunning, CTO
DeepDyve
RE: Zookeeper Presentation
Posted by Mark Vigeant <ma...@riskmetrics.com>.
Thanks Ben!
-----Original Message-----
From: Benjamin Reed [mailto:breed@yahoo-inc.com]
Sent: Friday, November 13, 2009 12:09 PM
To: zookeeper-user@hadoop.apache.org
Subject: Re: Zookeeper Presentation
there are a bunch of presentations you can grab at
http://wiki.apache.org/hadoop/ZooKeeper/ZooKeeperPresentations
ben
Mark Vigeant wrote:
> Hey Everyone,
>
> I'm supposed to give a presentation next week about the basic functionality and uses of zookeeper. I was wondering if anybody out there had:
>
>
> 1) A similar presentation that I could use at a starting point for inspiration
>
> 2) A cool project they worked on in zookeeper that I can cite as an example of the strength and usefulness of zookeeper.
>
> I'm going to also show them the example code and run a few things through the terminal. I am also an HBase user so that is also something I can use to talk about.
>
> Thanks a lot for your time and help!
>
> Mark Vigeant
> RiskMetrics Group, Inc.
>
> This email message and any attachments are for the sole use of the intended recipients and may contain proprietary and/or confidential information which may be privileged or otherwise protected from disclosure. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not an intended recipient, please contact the sender by reply email and destroy the original message and any copies of the message as well as any attachments to the original message.
>
This email message and any attachments are for the sole use of the intended recipients and may contain proprietary and/or confidential information which may be privileged or otherwise protected from disclosure. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not an intended recipient, please contact the sender by reply email and destroy the original message and any copies of the message as well as any attachments to the original message.
Re: Zookeeper Presentation
Posted by Benjamin Reed <br...@yahoo-inc.com>.
there are a bunch of presentations you can grab at
http://wiki.apache.org/hadoop/ZooKeeper/ZooKeeperPresentations
ben
Mark Vigeant wrote:
> Hey Everyone,
>
> I'm supposed to give a presentation next week about the basic functionality and uses of zookeeper. I was wondering if anybody out there had:
>
>
> 1) A similar presentation that I could use at a starting point for inspiration
>
> 2) A cool project they worked on in zookeeper that I can cite as an example of the strength and usefulness of zookeeper.
>
> I'm going to also show them the example code and run a few things through the terminal. I am also an HBase user so that is also something I can use to talk about.
>
> Thanks a lot for your time and help!
>
> Mark Vigeant
> RiskMetrics Group, Inc.
>
> This email message and any attachments are for the sole use of the intended recipients and may contain proprietary and/or confidential information which may be privileged or otherwise protected from disclosure. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not an intended recipient, please contact the sender by reply email and destroy the original message and any copies of the message as well as any attachments to the original message.
>