TutorialsDetecting Cyberattacks with Pyshark and BytewaxEvery year, cyberattacks become more and more commonplace. Almost daily there are reports of ongoing cyberattacks cau...Written by Zander Matheson
TutorialsAnalyzing Crypto Order Books for Fun and for ProfitIn this example we are going to walk through how you can maintain a limit order book in real-time with very little ex...Written by Zander Matheson
TutorialsRunning your Dataflow in KubernetesIn earlier posts we have demonstrated how you can run Bytewax with multiple workers (threads) and with multiple proce...Written by Esteban Miccio
TutorialsProcessing Wikimedia Server-Sent Events With BytewaxUsing Server-Sent Events is an awesome way to create a data stream. In this post, we are going to subscribe to an exi...Written by Zander Matheson
TutorialsData Streams with Server-Sent EventsWhy are we talking about Server-Sent Events (SSE)? We will go into this in more depth in this post, but SSE can be a ...Written by Zander Matheson
TutorialsAnomaly Detection with Bytewax & RedpandaAnomaly detection is a common tool used in real-time systems to detect when systems change. Some examples are a manuf...Written by Zander Matheson
TutorialsHello world - a word count exampleIn this blog post, we will use Bytewax to do word count, stream processing's canonical hello world. We'll take the...Written by Zander Matheson