Tagged articles
5000 articles
Page 19 of 50
php Courses
php Courses
May 16, 2024 · Backend Development

Using PHP fputs() to Write Data to Files

The article explains PHP's fputs() function, detailing its syntax, parameters, return values, and provides a complete example showing how to open a file with fopen(), write a string, handle the result, and close the file with fclose() to ensure proper resource management.

BackendPHPfile-handling
0 likes · 3 min read
Using PHP fputs() to Write Data to Files
Go Programming World
Go Programming World
May 16, 2024 · Backend Development

Using Monkey Patching with gomonkey for Unit Testing in Go

This article demonstrates how to apply Monkey Patching in Go using the gomonkey library to unit‑test a simple HTTP service, covering code examples, dependency analysis, patch creation, test execution parameters, and practical considerations such as inlining and concurrency limitations.

BackendGoHTTP
0 likes · 12 min read
Using Monkey Patching with gomonkey for Unit Testing in Go
Architect
Architect
May 15, 2024 · Backend Development

Hot‑Pluggable AOP in Spring: Dynamically Adding and Removing Advice

This article demonstrates how to implement a hot‑pluggable AOP solution in Spring by exposing endpoints that let users dynamically add or remove Advice, covering the underlying concepts, core implementation code, a demo service, and test scenarios that show logging being enabled and disabled at runtime.

BackendDynamicAdviceHotPluggable
0 likes · 10 min read
Hot‑Pluggable AOP in Spring: Dynamically Adding and Removing Advice
Selected Java Interview Questions
Selected Java Interview Questions
May 15, 2024 · Backend Development

retrofit-spring-boot-starter: A Lightweight HTTP Client Integration for Spring Boot

This article introduces retrofit-spring-boot-starter, a lightweight, type‑safe HTTP client starter that seamlessly integrates Retrofit into Spring Boot projects, outlines its key features, provides quick usage examples with Maven/Gradle dependencies, interface definitions, injection, configuration options, and advanced capabilities such as custom OkHttpClient injection, annotation‑based interceptors, connection‑pool management, logging, and retry mechanisms.

BackendConfigurationHTTP client
0 likes · 13 min read
retrofit-spring-boot-starter: A Lightweight HTTP Client Integration for Spring Boot
php Courses
php Courses
May 15, 2024 · Backend Development

Using PHP password_hash Function for Secure Password Hashing

This article explains how to securely hash passwords in PHP using the password_hash function, describes the underlying hash concept, provides example code for hashing and verifying passwords, and highlights automatic salting and best practices for protecting user credentials.

BackendPHPpassword_hash
0 likes · 4 min read
Using PHP password_hash Function for Secure Password Hashing
php Courses
php Courses
May 14, 2024 · Backend Development

Using PHP's file() Function to Read File Contents into an Array

This article explains PHP's file() function, detailing its syntax, parameters, and usage examples for reading a file into an array, including how to handle flags such as FILE_IGNORE_NEW_LINES to control line endings.

ArraysBackendFile Reading
0 likes · 4 min read
Using PHP's file() Function to Read File Contents into an Array
Programmer DD
Programmer DD
May 14, 2024 · Information Security

Why My Game Score Rankings Went Crazy: Lessons from RSA & AES API Encryption

The article recounts a real‑world incident where a game’s leaderboard showed absurd scores due to insecure API parameters, then explains RSA and AES fundamentals, demonstrates how to combine asymmetric and symmetric encryption for secure request handling, and provides Java code, custom annotations, and AOP logic to automate decryption on the server side.

AESAPI SecurityBackend
0 likes · 23 min read
Why My Game Score Rankings Went Crazy: Lessons from RSA & AES API Encryption
Tencent Cloud Developer
Tencent Cloud Developer
May 14, 2024 · Backend Development

Product Middle Platform Workflow Orchestration Engine: Use Cases, Architecture, and High‑Availability Solutions

Tencent’s product middle platform employs a self‑built, stateless workflow orchestration engine—configurable via drag‑and‑drop or DSL—to coordinate massive product processing and audit tasks, using load‑balancing, retry, rate‑limiting, circuit‑breaker and service isolation strategies that ensure high availability, performance, and horizontal scalability on TKE.

BackendDSLMicroservices
0 likes · 14 min read
Product Middle Platform Workflow Orchestration Engine: Use Cases, Architecture, and High‑Availability Solutions
Architect
Architect
May 13, 2024 · Backend Development

Push vs Pull: Designing a Scalable Feed Timeline with Redis and Cassandra

This article analyzes feed‑timeline architectures, compares pull‑based and push‑based models, proposes an online‑push/offline‑pull hybrid, and details practical implementations using Redis SortedSets, multi‑level caching with Cassandra, cursor‑based pagination, and large‑scale push task sharding.

Backendcachingcassandra
0 likes · 15 min read
Push vs Pull: Designing a Scalable Feed Timeline with Redis and Cassandra
Sanyou's Java Diary
Sanyou's Java Diary
May 13, 2024 · Backend Development

Mastering Idempotent Design: 8 Proven Strategies for Reliable APIs

This article explains the concept of idempotence, why it matters in distributed systems, how to handle timeout scenarios, design principles using globally unique IDs, and eight practical implementation patterns—including database tricks, token schemes, locking, and HTTP method considerations—to build robust, repeat‑safe APIs.

BackendHTTPIdempotence
0 likes · 21 min read
Mastering Idempotent Design: 8 Proven Strategies for Reliable APIs
Selected Java Interview Questions
Selected Java Interview Questions
May 12, 2024 · Backend Development

Optimizing Contract Signing with Strategy, Chain of Responsibility, and Composite Patterns in Java

This article explains how to improve a Java Spring Boot contract signing workflow by combining the Strategy pattern, Chain of Responsibility, and Composite patterns, detailing the process steps, project structure, code implementations, custom annotations, and dynamic bean injection to achieve a flexible and maintainable solution.

BackendChain of ResponsibilityDesign Patterns
0 likes · 13 min read
Optimizing Contract Signing with Strategy, Chain of Responsibility, and Composite Patterns in Java
Architect
Architect
May 11, 2024 · Backend Development

7 Common Cache Pitfalls and Practical Solutions

This article systematically examines seven typical cache problems—penetration, breakdown, avalanche, data inconsistency, big‑key, hot‑key, and low hit rate—explaining their root causes, illustrating concrete scenarios with diagrams and code, and presenting step‑by‑step mitigation techniques such as parameter validation, Bloom filters, locking, auto‑renewal, random expirations, high‑availability setups, and cache warm‑up.

BackendCacheData Consistency
0 likes · 22 min read
7 Common Cache Pitfalls and Practical Solutions
php Courses
php Courses
May 11, 2024 · Backend Development

Using PHP’s is_numeric() Function to Check Numeric Values

This article explains how PHP’s is_numeric() function determines whether a variable is numeric, demonstrates its usage with various data types, shows practical form‑validation examples, and highlights special cases developers should be aware of.

BackendPHPis_numeric
0 likes · 4 min read
Using PHP’s is_numeric() Function to Check Numeric Values
php Courses
php Courses
May 11, 2024 · Backend Development

Generating Heatmaps with Baidu Map API in PHP

This tutorial explains how to use the Baidu Map API together with PHP to prepare heat‑map data, create a HeatMap instance, add weighted points, generate the heat‑map image and finally display it on a web page using JavaScript.

BackendBaidu Map APIData visualization
0 likes · 5 min read
Generating Heatmaps with Baidu Map API in PHP
Code Ape Tech Column
Code Ape Tech Column
May 11, 2024 · Information Security

Hybrid RSA‑AES Encryption for Secure API Parameter Transmission in Java

This article recounts a leaderboard data breach caused by tampered Base64 request parameters, then details a hybrid RSA‑AES encryption strategy—using RSA to protect the AES key, IV and timestamp while AES encrypts the actual payload—along with Java implementations, key‑generation utilities, and a Spring AOP aspect for automatic decryption, providing a comprehensive guide to securing API communications.

API SecurityBackendjava
0 likes · 20 min read
Hybrid RSA‑AES Encryption for Secure API Parameter Transmission in Java
php Courses
php Courses
May 10, 2024 · Backend Development

Using PHP's array_search Function to Find Keys by Value

This article explains how to use PHP's array_search function to locate the key of a specific value in an array, covering its syntax, parameters, basic and strict mode examples, and important considerations such as handling duplicate values and type-sensitive searches.

Backendarray-manipulationarray_search
0 likes · 4 min read
Using PHP's array_search Function to Find Keys by Value
php Courses
php Courses
May 9, 2024 · Backend Development

Implementing User Authentication and Authorization in PHP

This article explains how to implement user authentication and role‑based authorization in PHP, covering password hashing with password_hash/password_verify, database queries for credential verification, and conditional logic for granting access based on user roles, with sample code snippets illustrating each step.

AuthenticationAuthorizationBackend
0 likes · 4 min read
Implementing User Authentication and Authorization in PHP
php Courses
php Courses
May 9, 2024 · Backend Development

Using PHP's substr() Function for String Manipulation

This article explains how to use PHP's substr() function to extract portions of a string, covering its syntax, parameters, and practical examples including specifying start positions, lengths, and negative offsets for flexible substring extraction.

BackendPHPString
0 likes · 4 min read
Using PHP's substr() Function for String Manipulation
macrozheng
macrozheng
May 8, 2024 · Backend Development

Mastering Spring’s @Autowired: Advanced Usage, Qualifiers, and Common Pitfalls

This article explores the default behavior of Spring's @Autowired annotation, how to resolve bean name conflicts, use @Qualifier and @Primary, apply @Autowired on constructors, methods, parameters, and collections, and troubleshoot common issues such as missing annotations, filter injection, component scanning, and circular dependencies.

AutowiredBackendSpring Boot
0 likes · 15 min read
Mastering Spring’s @Autowired: Advanced Usage, Qualifiers, and Common Pitfalls
php Courses
php Courses
May 8, 2024 · Backend Development

How to Use PHP's basename() Function to Extract File Names from Paths

This article explains the PHP basename() function, detailing its syntax, parameters, and behavior across operating systems, and demonstrates its usage through three practical examples that show how to retrieve file names from absolute and relative paths, with and without suffix removal.

Backendbasenamefile-path
0 likes · 4 min read
How to Use PHP's basename() Function to Extract File Names from Paths
php Courses
php Courses
May 8, 2024 · Backend Development

Using curl_multi_add_handle() in PHP to Manage Multiple cURL Handles

This article explains how PHP's curl_multi_add_handle() function can add multiple cURL handles to a single multi‑handle session, enabling efficient simultaneous network requests, with detailed syntax, parameters, and a complete example demonstrating initialization, execution, response retrieval, and cleanup.

BackendNetwork RequestsPHP
0 likes · 3 min read
Using curl_multi_add_handle() in PHP to Manage Multiple cURL Handles
JavaEdge
JavaEdge
May 7, 2024 · Backend Development

Mastering Product Management: Build SPU/SKU CRUD with Snowflake IDs in Java

This guide walks through implementing a complete product management module in a Java e‑commerce system, covering Snowflake distributed ID generation, database schema design for SPU and SKU tables, CRUD operations, category‑brand linking, audit workflow, status toggling, batch processing, and logical deletion, all with concrete code examples.

BackendCRUDe‑commerce
0 likes · 16 min read
Mastering Product Management: Build SPU/SKU CRUD with Snowflake IDs in Java
php Courses
php Courses
May 7, 2024 · Backend Development

Using PHP is_string() to Check if a Variable Is a String

This article explains the PHP is_string() function, its simple syntax, and demonstrates through example code how to check variables like $name, $age, and $city for string type, highlighting its usefulness for input validation and type safety.

Backendis_stringphp-functions
0 likes · 4 min read
Using PHP is_string() to Check if a Variable Is a String
Open Source Tech Hub
Open Source Tech Hub
May 6, 2024 · Backend Development

How to Build a Redis-Based Delayed Queue with Lua Scripts

This article explains the concept of delayed queues, compares them with scheduled tasks, outlines common business scenarios, and provides a complete Redis implementation using Sorted Sets, Lua scripts, and PHP code, including producer and consumer examples and performance considerations.

BackendMessage QueuePHP
0 likes · 17 min read
How to Build a Redis-Based Delayed Queue with Lua Scripts
Architect
Architect
May 6, 2024 · Backend Development

Designing Effective Multi‑Level Cache Architecture for Microservices

This article explains how to build a multi‑level caching system for microservice applications, covering client‑side HTTP caching, CDN and Nginx static‑resource caching, in‑process and distributed Redis caches, consistency challenges, and practical guidelines for when such a design is beneficial.

BackendCDNConsistency
0 likes · 16 min read
Designing Effective Multi‑Level Cache Architecture for Microservices
Top Architect
Top Architect
May 6, 2024 · Information Security

Designing Secure Third‑Party API Interfaces: Authentication, Signature, Token and Permission Management

This article presents a comprehensive design for secure third‑party API interfaces, covering API key generation (Access Key/Secret Key), request signing with timestamps and nonces, token handling, permission granularity, anti‑replay measures, HTTPS encryption, and practical RESTful endpoint examples with code snippets.

Access KeyBackendsignature
0 likes · 30 min read
Designing Secure Third‑Party API Interfaces: Authentication, Signature, Token and Permission Management
php Courses
php Courses
May 6, 2024 · Backend Development

Static Code Analysis with PHPStan: Benefits, Installation, and Integration

This article explains static code analysis, introduces PHPStan as a leading PHP static analysis engine, outlines its advantages, provides step‑by‑step installation and configuration instructions, describes level upgrades, and shows how to integrate it into development workflows to improve code quality and security.

BackendPHPStanSoftware Security
0 likes · 8 min read
Static Code Analysis with PHPStan: Benefits, Installation, and Integration
Selected Java Interview Questions
Selected Java Interview Questions
May 5, 2024 · Backend Development

Deploying Redis Sentinel with Portainer and Integrating It into Spring Boot

This tutorial walks through installing Portainer, using Docker‑compose to set up a Redis master‑slave‑sentinel architecture, creating a custom bridge network, testing failover, and finally configuring a Spring Boot application to connect to the Sentinel cluster with Lettuce and connection‑pool settings.

BackendDockerDocker Compose
0 likes · 14 min read
Deploying Redis Sentinel with Portainer and Integrating It into Spring Boot
Architect
Architect
May 4, 2024 · Information Security

How to Secure Third‑Party APIs with AK/SK, Tokens, and Signature Strategies

This article walks through a complete security design for third‑party APIs, covering API‑key generation, request signing with timestamps and nonces, token handling, permission granularity, database schema, and practical implementation details such as rate limiting, idempotency, and TLS encryption.

API SecurityAuthenticationBackend
0 likes · 34 min read
How to Secure Third‑Party APIs with AK/SK, Tokens, and Signature Strategies
IT Services Circle
IT Services Circle
May 4, 2024 · Backend Development

Common Backend Interface Optimization Techniques and Practices

This article shares a collection of practical backend performance‑optimization ideas—including batch database operations, asynchronous processing, caching, pre‑fetching, pooling, event‑driven callbacks, parallel remote calls, lock granularity, file‑based temporary storage, index tuning, deep‑pagination strategies, code‑level refactoring, data compression, NoSQL alternatives, thread‑pool configuration, and machine‑level troubleshooting—to dramatically reduce API latency and improve system scalability.

AsynchronousBackendthread pool
0 likes · 16 min read
Common Backend Interface Optimization Techniques and Practices
Java Captain
Java Captain
May 4, 2024 · Backend Development

Implementing a FIFO Export Queue for Large Data Exports in Java

This article explains how to design and implement a fixed‑size FIFO export queue in a Java Spring application to control concurrent MySQL data exports, detailing the related entities, code implementation with EasyExcel, a test controller, and observed results.

BackendExport Queueconcurrency
0 likes · 10 min read
Implementing a FIFO Export Queue for Large Data Exports in Java
Code Ape Tech Column
Code Ape Tech Column
May 4, 2024 · Backend Development

Understanding PageHelper Pagination Issues and ThreadLocal Management in MyBatis

This article analyzes common anomalies caused by the PageHelper pagination plugin in a Java backend project—such as duplicate user registration, limited query results, and password‑reset errors—traces them to ThreadLocal misuse, explains the internal workflow of startPage, getLocalPage, and clearPage, and offers practical recommendations to avoid these pitfalls.

BackendMyBatisThreadLocal
0 likes · 11 min read
Understanding PageHelper Pagination Issues and ThreadLocal Management in MyBatis
Go Programming World
Go Programming World
May 2, 2024 · Backend Development

Comprehensive Guide to Using Viper for Go Application Configuration

This article provides an in‑depth tutorial on Viper, a full‑featured Go configuration library, covering its features, usage scenarios, loading priorities, reading from files, environment variables, command‑line flags, remote stores, and best practices for managing application settings.

BackendDevOpsGo
0 likes · 22 min read
Comprehensive Guide to Using Viper for Go Application Configuration
Su San Talks Tech
Su San Talks Tech
May 1, 2024 · Backend Development

7 Common Cache Pitfalls and How to Avoid Them in Backend Systems

This article outlines seven typical cache issues—including cache penetration, breakdown, avalanche, data inconsistency, large keys, hot keys, and low hit rates—explains their causes, and provides practical solutions such as parameter validation, Bloom filters, locking, expiration randomization, key sharding, and cache warming to improve system reliability and performance.

BackendCacheDistributed Systems
0 likes · 20 min read
7 Common Cache Pitfalls and How to Avoid Them in Backend Systems
Architect
Architect
Apr 30, 2024 · Backend Development

Using CompletableFuture for Asynchronous Programming in Java: Examples and Best Practices

This article explains why asynchronous programming improves performance, compares serial and parallel implementations of a login flow, and demonstrates how to use Java's CompletableFuture API—including supplyAsync, runAsync, callbacks, composition, and error handling—to write efficient backend code.

AsynchronousBackendCompletableFuture
0 likes · 22 min read
Using CompletableFuture for Asynchronous Programming in Java: Examples and Best Practices
Java Tech Enthusiast
Java Tech Enthusiast
Apr 30, 2024 · Backend Development

How to Prevent Message Loss and Duplication in Message Queues

This article examines why messages can be lost or duplicated in typical queue systems, explains the failure points from producer to broker to consumer, and provides practical techniques such as synchronous flushing, broker clustering, database unique constraints, and Redis deduplication to achieve reliable, idempotent processing.

BackendIdempotencyKafka
0 likes · 7 min read
How to Prevent Message Loss and Duplication in Message Queues
php Courses
php Courses
Apr 30, 2024 · Backend Development

Using PHP array_push() to Append Elements to an Array

This tutorial explains the PHP array_push() function, its syntax, parameter details, and demonstrates how to add single or multiple elements to an array while retrieving the new array length, complete with code examples and expected output.

ArraysBackendPHP
0 likes · 4 min read
Using PHP array_push() to Append Elements to an Array
php Courses
php Courses
Apr 30, 2024 · Information Security

Using Cloudmersive Virus Scan API in PHP to Secure File Uploads

This guide explains how to integrate the Cloudmersive virus‑scan API into a PHP application to efficiently detect and block malicious scripts in uploaded files, preventing XSS attacks and ensuring safe file handling with configurable security parameters.

BackendCloudmersive APIPHP
0 likes · 5 min read
Using Cloudmersive Virus Scan API in PHP to Secure File Uploads
DeWu Technology
DeWu Technology
Apr 29, 2024 · Backend Development

Handling Non-Standard Collection Types in Dubbo RPC with Protostuff Serialization

When Dubbo RPC uses Protostuff serialization, DTO fields declared with ambiguous types that contain non‑standard collections such as subList results can trigger ClassNotFound or null errors during deserialization, so converting these to regular JDK collections (or switching to a more tolerant format like Hessian2/JSON) restores stability.

BackendDubboNon-standard collections
0 likes · 8 min read
Handling Non-Standard Collection Types in Dubbo RPC with Protostuff Serialization
Architecture Digest
Architecture Digest
Apr 29, 2024 · Backend Development

Implementing a FIFO Export Queue in Spring Boot for Large Data Exports

This article explains how to design and implement a fixed-size FIFO export queue in a Spring Boot backend, using synchronized methods, EasyExcel for large data exports, and a test controller to simulate concurrent export requests, while discussing performance considerations and future enhancements.

BackendExport QueueSpring Boot
0 likes · 10 min read
Implementing a FIFO Export Queue in Spring Boot for Large Data Exports
php Courses
php Courses
Apr 29, 2024 · Backend Development

Using PHP substr Function to Extract Substrings

This article explains how to use PHP's built‑in substr function to retrieve substrings by specifying start positions and lengths, covering basic syntax, parameter details, return values, and common examples such as extracting the last characters, specific ranges, and converting substrings to uppercase.

BackendPHPString Manipulation
0 likes · 4 min read
Using PHP substr Function to Extract Substrings
php Courses
php Courses
Apr 28, 2024 · Backend Development

Using array_pop() to Remove the Last Element from a PHP Array

This article explains the PHP array_pop() function, demonstrating how it removes and returns the last element of an array, showing example code, output, and best practices such as handling multiple removals and preserving the original array when needed.

BackendPHParray manipulation
0 likes · 3 min read
Using array_pop() to Remove the Last Element from a PHP Array
php Courses
php Courses
Apr 28, 2024 · Backend Development

Using PHP’s array_chunk() Function to Split Arrays

This article explains how the PHP array_chunk() function can divide a large array into smaller chunks of a specified size, describes its parameters, shows code examples for default behavior and key preservation, and demonstrates the resulting output.

ArrayBackendarray_chunk
0 likes · 4 min read
Using PHP’s array_chunk() Function to Split Arrays
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Apr 27, 2024 · Backend Development

Enabling Multiple @RequestBody Parameters in Spring MVC by Caching the Request Body

This article explains why Spring MVC cannot parse multiple @RequestBody annotations on a single handler method, analyzes the internal I/O stream closure that causes the failure, and provides a practical solution using a request‑body caching wrapper and a servlet filter to allow repeated reads of the request payload.

@RequestBodyBackendHTTP
0 likes · 9 min read
Enabling Multiple @RequestBody Parameters in Spring MVC by Caching the Request Body
JD Retail Technology
JD Retail Technology
Apr 26, 2024 · Operations

How Isolation Principles Boost System High Availability: Real-World Cases

This article explains the concept of high availability, defines the isolation principle, outlines its implementation across various layers, and presents concrete case studies—including vertical data‑center redesign, dual‑cluster Elasticsearch migration, traffic grouping, and hot‑cold data segregation—to illustrate how isolation improves system resilience.

BackendOperationsSystem Design
0 likes · 15 min read
How Isolation Principles Boost System High Availability: Real-World Cases
php Courses
php Courses
Apr 26, 2024 · Backend Development

PHP Password Encryption Methods: md5, password_hash, and crypt

This article explains three common PHP password encryption techniques—md5, password_hash, and crypt—providing detailed code examples and guidance on securely storing user passwords during registration and login processes.

BackendMD5crypt
0 likes · 5 min read
PHP Password Encryption Methods: md5, password_hash, and crypt
php Courses
php Courses
Apr 26, 2024 · Backend Development

Using PHP trim() to Remove Whitespace and Specified Characters

This article explains PHP's trim function, its syntax, optional character list parameter, and provides code examples showing how to remove surrounding spaces and custom characters, while also mentioning related ltrim and rtrim functions for one‑sided trimming.

.trimBackendPHP
0 likes · 3 min read
Using PHP trim() to Remove Whitespace and Specified Characters
php Courses
php Courses
Apr 26, 2024 · Information Security

Best Practices for Securing PHP Sessions

This article outlines essential strategies—including secure HttpOnly cookies, session ID regeneration, timeout handling, encrypted storage, user‑attribute verification, and permission checks—to harden PHP session management against hijacking, fixation, and unauthorized access.

BackendInformation Securitysession-security
0 likes · 6 min read
Best Practices for Securing PHP Sessions
Code Ape Tech Column
Code Ape Tech Column
Apr 26, 2024 · Backend Development

JDFrame/SDFrame: A JVM‑Level DataFrame‑Like Stream API for Java

This article introduces JDFrame/SDFrame, a Java library that provides a DataFrame‑style, semantic API for stream processing, covering quick start, dependency setup, comprehensive examples of filtering, aggregation, grouping, sorting, joining, and utility functions, along with code snippets and usage guidance.

BackendJDFrameSDFrame
0 likes · 16 min read
JDFrame/SDFrame: A JVM‑Level DataFrame‑Like Stream API for Java
php Courses
php Courses
Apr 25, 2024 · Backend Development

Using fopen() in PHP: Syntax, Parameters, and Practical Examples

This article explains PHP's fopen() function, detailing its syntax, parameters, and providing four practical examples for reading, writing, appending to files, and opening URLs, while emphasizing proper mode selection and resource cleanup.

BackendTutorialfile-handling
0 likes · 3 min read
Using fopen() in PHP: Syntax, Parameters, and Practical Examples
58 Tech
58 Tech
Apr 25, 2024 · Backend Development

Luban Full-Stack Low-Code Development Platform: Design, Implementation, and Case Studies

This article presents an in‑depth overview of the Luban full‑stack low‑code development platform, describing its goals, architecture, metadata design, drag‑and‑drop page creation, data visualization, API generation, multi‑tenant and multi‑environment support, version management, and real‑world case studies that demonstrate its efficiency and extensibility.

Backendarchitecturecase study
0 likes · 21 min read
Luban Full-Stack Low-Code Development Platform: Design, Implementation, and Case Studies
Su San Talks Tech
Su San Talks Tech
Apr 25, 2024 · Backend Development

Choosing the Right Message Queue: Kafka, RabbitMQ, RocketMQ, and ActiveMQ Compared

This article provides a comprehensive overview of four major message queue systems—Kafka, RabbitMQ, RocketMQ, and ActiveMQ—covering their fundamentals, architectures, key concepts, advantages, disadvantages, and guidance for selecting the most suitable solution based on throughput, reliability, scalability, and use‑case requirements.

BackendKafkaMessage Queue
0 likes · 18 min read
Choosing the Right Message Queue: Kafka, RabbitMQ, RocketMQ, and ActiveMQ Compared
php Courses
php Courses
Apr 24, 2024 · Backend Development

How to Use PHP fileatime() to Get a File's Last Access Time

This article explains the PHP fileatime() function, its syntax, parameters, return value, and provides practical examples for retrieving a file's last access timestamp, formatting it, and using it for file management tasks such as cleanup based on inactivity.

Backendfile access timefile management
0 likes · 5 min read
How to Use PHP fileatime() to Get a File's Last Access Time
php Courses
php Courses
Apr 24, 2024 · Backend Development

Key New Features in PHP 8: Named Parameters, Union Types, Match Expressions, and More

This article introduces the most important PHP 8 language features—including named arguments, union types, match expressions, the nullsafe operator, attributes, constructor property promotion, weak maps, static return types, throw expressions, the Stringable interface, get_debug_type, string helper functions, fdiv, and error‑suppression—providing explanations and code examples for each.

BackendCode Examplesfeatures
0 likes · 6 min read
Key New Features in PHP 8: Named Parameters, Union Types, Match Expressions, and More
21CTO
21CTO
Apr 23, 2024 · Information Security

Session vs Token Authentication: Which Is Right for Your Backend?

This article explains how session‑based and token‑based (JWT) authentication work in backend applications, compares their workflows, shows practical Express.js code examples, and helps you decide which method best fits your project's security and scalability needs.

AuthenticationBackendExpress
0 likes · 10 min read
Session vs Token Authentication: Which Is Right for Your Backend?
Top Architect
Top Architect
Apr 23, 2024 · Fundamentals

Guidelines for Front‑Back End Separation and API Specification (Version 1.0.0)

This article explains why front‑back end separation is needed, describes the evolution from MVC to SPA, outlines the principles of responsibility and concern separation, and provides a detailed API specification—including request/response formats, pagination, and special field handling—to improve collaboration and reduce integration effort.

Backendarchitecturefrontend
0 likes · 14 min read
Guidelines for Front‑Back End Separation and API Specification (Version 1.0.0)
Architect
Architect
Apr 23, 2024 · Backend Development

Cross-Thread Log Sampling for High-Throughput Java Services

This article examines the performance impact of excessive logging in high-throughput Java services and presents three practical approaches—ThreadLocal-style wrappers, explicit flag propagation, and a decoupled component with an extensible API—to achieve cross-thread request-level log sampling while preserving traceability.

AsynchronousBackendThreadLocal
0 likes · 9 min read
Cross-Thread Log Sampling for High-Throughput Java Services
Architecture Digest
Architecture Digest
Apr 23, 2024 · Backend Development

14 Practical Code Optimization Tips for Java Backend Development

This article presents fourteen actionable Java backend code‑optimization techniques—including configuration‑file management, Lombok’s @RequiredArgsConstructor, modularization, exception handling, database query reduction, null‑avoidance, strategic use of design patterns, IDE shortcuts, and efficient collection handling—to help developers write cleaner, more maintainable, and higher‑performance code.

BackendCode OptimizationLombok
0 likes · 7 min read
14 Practical Code Optimization Tips for Java Backend Development
php Courses
php Courses
Apr 23, 2024 · Backend Development

Using curl_multi_exec() in PHP to Execute Multiple cURL Requests Concurrently

This article introduces PHP’s curl_multi_exec() function, explains its prototype, parameters, return values, provides a complete example for concurrently sending multiple HTTP requests, and outlines important usage considerations for efficient backend network communication.

BackendPHPconcurrency
0 likes · 4 min read
Using curl_multi_exec() in PHP to Execute Multiple cURL Requests Concurrently
php Courses
php Courses
Apr 23, 2024 · Backend Development

Using PHP explode() to Split Strings into Arrays

This article explains how to use PHP's built-in explode() function to split strings into arrays, covering syntax, optional limit parameter, and multiple examples including comma-separated lists, space-separated words, and a note on using str_split for character-level splitting.

ArrayBackendPHP
0 likes · 4 min read
Using PHP explode() to Split Strings into Arrays
ITPUB
ITPUB
Apr 22, 2024 · Backend Development

How Meta Achieves Near‑Perfect Cache Consistency: Lessons from Polaris

This article explains Meta's approach to cache invalidation and consistency, detailing why ultra‑high consistency matters, how their Polaris monitoring system detects and resolves inconsistencies, and provides a simplified Python example that illustrates the underlying mechanisms and challenges.

BackendConsistencyDistributed Systems
0 likes · 12 min read
How Meta Achieves Near‑Perfect Cache Consistency: Lessons from Polaris
php Courses
php Courses
Apr 22, 2024 · Backend Development

Using PHP implode() to Join Array Elements into a String

This article explains how PHP's implode() function joins array elements into a string, covering its syntax, basic usage with custom delimiters, handling of nested arrays, and the special case of omitting the glue parameter, illustrated with clear code examples.

ArrayBackendPHP
0 likes · 4 min read
Using PHP implode() to Join Array Elements into a String
21CTO
21CTO
Apr 20, 2024 · Backend Development

Why Backend Development Is Harder Today Than 20 Years Ago

Over the past two decades, backend development has shifted from simple server‑side coding to a complex, multidisciplinary field, driven by soaring user expectations, massive system scale, an overwhelming array of technologies, and the need for cloud, container, and cross‑team collaboration skills.

BackendDistributed SystemsSoftware Architecture
0 likes · 9 min read
Why Backend Development Is Harder Today Than 20 Years Ago
Ops Development & AI Practice
Ops Development & AI Practice
Apr 19, 2024 · Backend Development

How to Add a Timeout to an Infinite Loop in Go

This guide shows how to protect a long‑running Go function that checks a RabbitMQ cluster by using time.After and a select statement to automatically stop the infinite loop after a configurable timeout, improving robustness and maintainability.

BackendGolangTimeout
0 likes · 5 min read
How to Add a Timeout to an Infinite Loop in Go
Ops Development & AI Practice
Ops Development & AI Practice
Apr 19, 2024 · Backend Development

How to Handle Mixed Quotes in Go Strings Without Errors

This guide explains four practical ways to embed both double quotes and backticks in Go strings—using backticks, double‑quoted literals with escaping, concatenation, and fmt.Sprintf—so developers can choose the most readable solution for their specific scenario.

BackendStringbackticks
0 likes · 4 min read
How to Handle Mixed Quotes in Go Strings Without Errors
Top Architect
Top Architect
Apr 19, 2024 · Backend Development

Design and Implementation of a Lightweight Maven Encryption and Agent Decryption Solution for Java Backend Applications

This article analyzes the challenges of protecting Java backend code and third‑party dependencies, evaluates existing tools such as ProGuard, jar‑protect, GraalVM and core‑lib/xjar, and proposes a lightweight Maven encryption and Java‑agent decryption scheme that limits performance impact to under 5% while safeguarding intellectual property.

Backendsecurity
0 likes · 9 min read
Design and Implementation of a Lightweight Maven Encryption and Agent Decryption Solution for Java Backend Applications
Architect's Guide
Architect's Guide
Apr 19, 2024 · Backend Development

API Gateway Design and Best Practices for Microservice Architectures

This article explains the role, core functions, design principles, and key considerations of API gateways in microservice architectures, compares popular gateway solutions, and provides guidance on achieving high performance, high availability, and scalability while ensuring security and operational efficiency.

BackendDesign PatternsScalability
0 likes · 22 min read
API Gateway Design and Best Practices for Microservice Architectures
21CTO
21CTO
Apr 18, 2024 · Backend Development

Why Rust Beats Node.js for Web Services: Lessons from Building JustFax

This article shares the author's experience building a fully Rust‑based web service called JustFax, covering its architecture, memory efficiency, safety, async handling, type safety benefits, and the challenges of Rust's complexity, borrow checker, compile times, and ecosystem compared to Node.js.

BackendType Safetymemory efficiency
0 likes · 7 min read
Why Rust Beats Node.js for Web Services: Lessons from Building JustFax
php Courses
php Courses
Apr 18, 2024 · Backend Development

Top PHP 7 Interview Questions and Answers for 2024

This article presents eight essential PHP 7 interview questions covering core feature innovations, performance improvements, scalar type declarations, null coalescing, the Throwable interface, the spaceship operator, anonymous classes, and enhanced error handling, with concise English explanations to help developers prepare for 2024 interviews.

BackendPHPinterview
0 likes · 7 min read
Top PHP 7 Interview Questions and Answers for 2024
php Courses
php Courses
Apr 18, 2024 · Backend Development

Why Build a Custom PHP Framework and Course Outline

This article explains the motivations for creating a custom PHP framework—such as meeting specific project needs, learning core concepts, ensuring long‑term maintainability, optimizing performance, improving usability, and enhancing security—while also presenting a detailed chapter and section outline for a self‑study course.

BackendFrameworkMVC
0 likes · 4 min read
Why Build a Custom PHP Framework and Course Outline
Code Ape Tech Column
Code Ape Tech Column
Apr 18, 2024 · Backend Development

Applying Spring Transaction Hooks for Asynchronous Kafka Message Publishing

This article explains how to use Spring's TransactionSynchronizationManager to detect active transactions and register synchronization callbacks so that Kafka messages are sent asynchronously after transaction commit, illustrated with a payment‑system logging scenario and complete Java code examples.

AsynchronousBackendKafka
0 likes · 10 min read
Applying Spring Transaction Hooks for Asynchronous Kafka Message Publishing
Architect
Architect
Apr 17, 2024 · Databases

How We Split a 500‑Million‑Row MySQL Table: Process, Pitfalls, and Lessons

Facing a 50‑million‑row financial transaction table that grew 6 million rows per month, the team analyzed the problem, set clear split goals, evaluated sharding middleware, designed a custom pagination algorithm, built a hybrid data‑migration plan, and executed a three‑stage rollout to safely replace the monolithic table with multiple 10‑million‑row shards.

BackendLarge Tablesdatabase migration
0 likes · 13 min read
How We Split a 500‑Million‑Row MySQL Table: Process, Pitfalls, and Lessons
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Apr 17, 2024 · Backend Development

Understanding Idempotence and Common Backend Solutions

The article explains the concept of idempotence in computing, illustrates typical duplicate‑request scenarios, and presents three practical backend solutions—unique database indexes, optimistic locking with version control, and a Redis‑based token mechanism—along with their advantages, trade‑offs, and implementation details.

BackendHTTPIdempotence
0 likes · 7 min read
Understanding Idempotence and Common Backend Solutions