Cassandra.Link
The best knowledge base on Apache Cassandra®
Helping platform leaders, architects, engineers, and operators build scalable real time data platforms.
A collection of 1475 posts
Introduction to cstar
10/5/2018
Spotify is a long time user of Apache Cassandra at very large scale. It is also a creative company which tries to open source most of the tools they build for internal needs. They released Cassandra R...
Customer Event Hub – a modern Customer 360° view with DataStax Enterp…
10/4/2018
Customer Event Hub – a modern Customer 360° view with DataStax Enterp… SlideShare Explore You Successfully reported this slideshow.Customer Event Hub – a modern Customer 360°...
tsarenkotxt/microservices
IntroductionPet microservices project.Docker Spring Boot Cassandra ZooKeeper Kafka REST API Developer EnvironmentBuild docker imageschmod +x ./docker-build.sh && ./docker-build.sh Rundocker-compose up...
Apache Cassandra in a Microservices Enterprise Platform
In this article we’ll explore how Apache Cassandra, the world’s most popular wide column store and 8th most popular database overall, will only grow as a cornerstone technology in a microservices plat...
DataStax and the New GDPR
10/3/2018
DataStax and the New GDPR | DataStax emailcall Customer ExperienceCustomer 360 Personalization & Recommendations Loyalty Programs Consumer Fraud Detection Enterprise OptimizationeCommerce Identity ...
GDPR and Cassandra - DZone Security
delete /dɪˈliːt/ — verb: remove or obliterate (written or printed matter), especially by drawing a line through it. Schrödinger’s Data As we all know, GDPR will be in force May 2018. After that, users...
Easy Cassandra scaling
Easy Cassandra scalingWith Terraform, Chef and RundeckPainting of Cassandra by Evelyn de Morgan — WikimediaWhen dealing with many Cassandra clusters, day-to-day operations can get complicated. At Tead...
Cassandra 4.0 Data Center Security Enhancements
Apache Cassandra versions 3.x and below have an all or nothing approach when it comes the datacenter user authorization security model. That is, a user has access to all datacenters in the cluster or ...