Previous | Next --- Slide 20 of 55
Back to Lecture Thumbnails
Martingale

Was the answer to the first question to use a hash function to map intermediate keys to reducers? (that way we dont saturate bandwidth for a single worker?)

Please log in to leave a comment.