Tech Freedom Circle
Author

Tech Freedom Circle

Crazy Maker Circle (Tech Freedom Architecture Circle): a community of tech enthusiasts, experts, and high‑performance fans. Many top‑level masters, architects, and hobbyists have achieved tech freedom; another wave of go‑getters are hustling hard toward tech freedom.

105
Articles
0
Likes
0
Views
0
Comments
Recent Articles

Latest from Tech Freedom Circle

100 recent articles max
Tech Freedom Circle
Tech Freedom Circle
Sep 25, 2025 · Artificial Intelligence

RAGFlow Primer Part 1: Introduction and Concept Deep Dive

This article provides a comprehensive technical overview of RAGFlow, an industrial‑grade Retrieval‑Augmented Generation platform, detailing its architecture, core components such as DeepDoc, intelligent chunking, embedding integration, multi‑stage retrieval, and agent workflow, while comparing it with traditional RAG shortcomings.

Agent WorkflowDeepDocIntelligent Chunking
0 likes · 32 min read
RAGFlow Primer Part 1: Introduction and Concept Deep Dive
Tech Freedom Circle
Tech Freedom Circle
Sep 25, 2025 · Artificial Intelligence

Inside RAGFlow: How Its Microservice Architecture Powers an Enterprise‑Grade Retrieval‑Augmented Generation Platform

This article provides a detailed technical walkthrough of RAGFlow's architecture, covering its microservice design, directory layout, layered structure, cloud‑native deployment, core modules such as DeepDoc, RAG engine, Agent system, and web UI, as well as multi‑tenant isolation, streaming responses, asynchronous task handling, concurrency controls, scalability strategies, and a complete request‑lifecycle example for document upload.

AI ArchitectureDeepDocDocker Compose
0 likes · 26 min read
Inside RAGFlow: How Its Microservice Architecture Powers an Enterprise‑Grade Retrieval‑Augmented Generation Platform
Tech Freedom Circle
Tech Freedom Circle
Sep 25, 2025 · Artificial Intelligence

RAGFlow Search Engine Deep Dive: Multi‑Path Retrieval, Fusion, and Reranking

The article provides a detailed technical analysis of RAGFlow's search engine, covering the Searcher class coordination, adaptive multi‑path retrieval (vector, keyword, and knowledge‑graph), intelligent fusion with weighted scoring, caching, performance monitoring, and both built‑in and model‑driven reranking to achieve high‑precision results.

Performance optimizationRAGFlowReranking
0 likes · 32 min read
RAGFlow Search Engine Deep Dive: Multi‑Path Retrieval, Fusion, and Reranking
Tech Freedom Circle
Tech Freedom Circle
Sep 25, 2025 · Artificial Intelligence

RAGFlow Deep Dive: Data Parsing and Knowledge Graph Construction

This article examines RAGFlow's end‑to‑end pipeline for turning diverse documents into structured knowledge, detailing the TaskExecutor factory, the DeepDoc layout‑aware parser, chunking strategies, embedding and storage mechanisms, and the GraphRAG‑based knowledge‑graph extraction that together enable high‑precision retrieval and reasoning.

ChunkingData ParsingDeepDoc
0 likes · 15 min read
RAGFlow Deep Dive: Data Parsing and Knowledge Graph Construction
Tech Freedom Circle
Tech Freedom Circle
Sep 24, 2025 · Backend Development

Designing a US Presidential Election Voting System: 1M TPS, 10M QPS, Immutable and Non‑Duplicate Votes

This article presents a comprehensive architectural design for a high‑throughput US presidential voting platform that must handle 1 million transactions per second and 10 million queries per second while guaranteeing vote immutability, one‑person‑one‑vote enforcement, real‑time result aggregation, and scalable storage using microservices, Kafka, Redis, Bloom filters, and blockchain anchoring.

High ConcurrencyMicroservicesblockchain
0 likes · 32 min read
Designing a US Presidential Election Voting System: 1M TPS, 10M QPS, Immutable and Non‑Duplicate Votes
Tech Freedom Circle
Tech Freedom Circle
Sep 23, 2025 · Backend Development

Designing a Billion‑User Social Graph for 100W QPS on JD

The article presents a complete backend design for JD's social‑relationship scenario handling 100 W QPS, covering data modeling, MySQL sharding, Redis structures, multi‑level caching, big‑key mitigation, write‑read path optimization, pagination, consistency guarantees, and query strategies for both "following" and "followers" lists.

0 likes · 21 min read
Designing a Billion‑User Social Graph for 100W QPS on JD
Tech Freedom Circle
Tech Freedom Circle
Sep 19, 2025 · Interview Experience

Designing a Rock‑Solid High‑Availability Solution for Unreliable Third‑Party Services

When third‑party services frequently fail, this article walks through a systematic high‑availability design—including an ACL anti‑corruption layer, strategy‑pattern master‑slave routing, precise rate limiting, circuit‑breaker fallback, full observability, async degradation, and mock testing—to keep external dependencies as stable as a mountain.

ACLcircuit breakerhigh availability
0 likes · 24 min read
Designing a Rock‑Solid High‑Availability Solution for Unreliable Third‑Party Services
Tech Freedom Circle
Tech Freedom Circle
Sep 18, 2025 · Backend Development

Master Spring Cloud Internals (Nacos, Sentinel, Load Balancing) to Ace Interviews and Land Offers

This article provides a systematic deep‑dive into Spring Cloud’s load‑balancing layers, Sentinel’s flow‑control mechanisms, Nacos’s AP/CP dual model, configuration‑file priority rules, and service‑offline handling, offering concrete examples and best‑practice recommendations for interview preparation.

Circuit BreakingConfiguration ManagementLoad Balancing
0 likes · 34 min read
Master Spring Cloud Internals (Nacos, Sentinel, Load Balancing) to Ace Interviews and Land Offers
Tech Freedom Circle
Tech Freedom Circle
Sep 16, 2025 · Backend Development

Redis Fuzzy Search Techniques and the Most Dangerous Commands to Avoid

The article explains how to perform fuzzy queries in Redis using KEYS, SCAN, and collection‑type scans, enumerates commands that can block the single‑threaded server such as KEYS *, HGETALL, LRANGE, and provides practical mitigation strategies like incremental scans, key sharding, and asynchronous deletion.

BlockingOptimizationPerformance
0 likes · 24 min read
Redis Fuzzy Search Techniques and the Most Dangerous Commands to Avoid