Tagged articles
146 articles
Page 1 of 2
Deepin Linux
Deepin Linux
May 3, 2026 · Backend Development

Master Lock‑Free Queues: Unlock the Core of High‑Concurrency Programming

This article demystifies lock‑free queues by explaining their low‑level implementation, atomic operations, memory barriers, and the four SPSC/MPMC models, while also covering ABA problems, false sharing avoidance, and practical C++ code examples to help developers truly understand high‑concurrency fundamentals.

CCASMPMC
0 likes · 44 min read
Master Lock‑Free Queues: Unlock the Core of High‑Concurrency Programming
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Feb 11, 2026 · Information Security

Mastering Single Sign-On: Cookie, Token, and CAS Approaches Explained

This article explains three core Single Sign-On architectures—same‑domain cookie/session, distributed token‑based (JWT/OAuth2), and Central Authentication Service—detailing their workflows, advantages, drawbacks, and ideal use cases, helping architects choose the right SSO solution for web, mobile, and micro‑service environments.

AuthenticationCASOAuth2
0 likes · 5 min read
Mastering Single Sign-On: Cookie, Token, and CAS Approaches Explained
Architect Chen
Architect Chen
Jan 8, 2026 · Information Security

How Single Sign-On (SSO) Simplifies Access Across Multiple Apps

Single Sign-On (SSO) lets users authenticate once and automatically gain access to all trusted applications, eliminating repeated logins and streamlining user experience across heterogeneous systems such as e‑commerce, payment, and collaboration platforms.

AuthenticationCASSSO
0 likes · 5 min read
How Single Sign-On (SSO) Simplifies Access Across Multiple Apps
Architect Chen
Architect Chen
Dec 25, 2025 · Information Security

Understanding Single Sign-On (SSO): Architecture, Components, and Workflow

This article explains the fundamentals of Single Sign-On (SSO), detailing its centralized authentication principle, the roles of CAS Server, CAS Client, and browser, and walks through the complete login flow with diagrams and code snippets for distributed systems.

AuthenticationCASDistributed Systems
0 likes · 4 min read
Understanding Single Sign-On (SSO): Architecture, Components, and Workflow
Top Architect
Top Architect
Nov 1, 2025 · Information Security

Mastering CAS SSO: Step‑by‑Step Guide to Build Single Sign‑On with Java

This article explains the concepts of Single Sign‑On (SSO) and the Central Authentication Service (CAS), then provides a detailed, code‑rich tutorial for setting up a CAS server, configuring clients, disabling HTTPS for development, and testing the end‑to‑end SSO workflow using Java and Spring.

AuthenticationCASJava
0 likes · 10 min read
Mastering CAS SSO: Step‑by‑Step Guide to Build Single Sign‑On with Java
Deepin Linux
Deepin Linux
Sep 27, 2025 · Fundamentals

Why Lock‑Free Queues Are the Secret to Scaling C++ Concurrency

Lock‑free queues replace costly mutexes with atomic operations, eliminating lock contention, deadlocks, and scalability limits, and this article explains their principles, classic implementations, C++ code examples, performance testing, and real‑world applications such as game engines and high‑throughput servers.

C++CASQueue
0 likes · 38 min read
Why Lock‑Free Queues Are the Secret to Scaling C++ Concurrency
Architect's Guide
Architect's Guide
Aug 24, 2025 · Information Security

Master Session Management and SSO: From Cookies to CAS with Java Code

This article explains traditional session mechanisms, the challenges of session handling in clustered environments, explores session sharing strategies, introduces single sign‑on concepts, compares CAS and OAuth2, and provides complete Java code examples for implementing SSO with Redis.

CASJavaSession Management
0 likes · 14 min read
Master Session Management and SSO: From Cookies to CAS with Java Code
Code Ape Tech Column
Code Ape Tech Column
Jun 12, 2025 · Information Security

How to Build Single Sign‑On (SSO) with CAS and Session Sharing in Java

This article explains why multiple independent login systems hurt user experience and security, reviews traditional session mechanisms and their limitations in clustered environments, and then presents two session‑sharing strategies and a complete CAS‑based SSO solution with Java code examples.

AuthenticationCASJava
0 likes · 15 min read
How to Build Single Sign‑On (SSO) with CAS and Session Sharing in Java
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
May 29, 2025 · Information Security

How Single Sign-On (SSO) Works: Architecture and Flow Explained

This article explains the fundamentals of Single Sign-On (SSO), detailing its cross‑system authentication mechanism, core components such as CAS Server, CAS Client, and User Agent, and walks through the step‑by‑step flow that enables users to log in once and access multiple trusted applications seamlessly.

AuthenticationCASSSO
0 likes · 4 min read
How Single Sign-On (SSO) Works: Architecture and Flow Explained
JD Tech Talk
JD Tech Talk
May 19, 2025 · Backend Development

Detailed Explanation of Java ConcurrentHashMap Source Code: Constructors, put, get, resize, and Concurrency Mechanisms

This article provides an in‑depth analysis of the Java ConcurrentHashMap implementation, covering its constructor logic, hash‑table sizing, the core put and get operations, element counting with addCount, multi‑threaded resizing via transfer, treeification of bins, removal, computeIfAbsent, and the design choices that forbid null keys and values to simplify concurrency handling.

CASConcurrentHashMapJava
0 likes · 36 min read
Detailed Explanation of Java ConcurrentHashMap Source Code: Constructors, put, get, resize, and Concurrency Mechanisms
Java Captain
Java Captain
May 4, 2025 · Backend Development

Understanding Java Counter Implementations: AtomicLong vs LongAdder

This article explains the principles, advantages, and drawbacks of Java's AtomicLong and LongAdder counters, describes the CAS operation and its ABA problem, and analyzes why Alibaba recommends LongAdder for high‑concurrency, high‑availability scenarios in distributed systems.

CASJavaatomiclong
0 likes · 7 min read
Understanding Java Counter Implementations: AtomicLong vs LongAdder
Java Tech Enthusiast
Java Tech Enthusiast
Apr 12, 2025 · Backend Development

Understanding AtomicLong vs LongAdder in Java Concurrency

In high‑concurrency Java applications, LongAdder—introduced in JDK 8 and using partitioned cells to reduce contention—generally outperforms the single‑value AtomicLong, which relies on CAS and can cause CPU waste under heavy load, so Alibaba advises LongAdder for scalable distributed counters, though memory usage and workload specifics must be considered.

BackendCASJava
0 likes · 7 min read
Understanding AtomicLong vs LongAdder in Java Concurrency
Xuanwu Backend Tech Stack
Xuanwu Backend Tech Stack
Mar 20, 2025 · Backend Development

Why Does Pointer Collision Cause Concurrency Bugs in Java and How to Fix It?

Pointer collision is an efficient memory allocation technique that can trigger severe concurrency problems in multithreaded Java environments, and this article explains the underlying causes, illustrates conflict scenarios, and presents common remedies such as CAS (Compare‑And‑Swap) and TLAB (Thread‑Local Allocation Buffer) with sample code.

CASJavaTLAB
0 likes · 6 min read
Why Does Pointer Collision Cause Concurrency Bugs in Java and How to Fix It?
Xuanwu Backend Tech Stack
Xuanwu Backend Tech Stack
Jan 21, 2025 · Fundamentals

Understanding CAS: Solving the ABA Problem and Other Pitfalls in Java Concurrency

This article explains the classic ABA issue in Java's Compare‑And‑Swap (CAS) operations, outlines why long spin loops and single‑variable limitations can degrade performance, and presents practical solutions such as AtomicStampedReference, LockSupport, ReentrantLock, and optimized data structures to mitigate these challenges.

ABA problemCASJava concurrency
0 likes · 4 min read
Understanding CAS: Solving the ABA Problem and Other Pitfalls in Java Concurrency
Architecture & Thinking
Architecture & Thinking
Oct 10, 2024 · Backend Development

How CAS Solves High-Concurrency Consistency Issues and the Hidden ABA Problem

This article examines typical high‑concurrency scenarios such as payment processing, online ordering, and cross‑bank transfers, introduces the Compare‑and‑Swap (CAS) approach to ensure strong consistency, explains the ABA problem it can cause, and presents application‑level and data‑layer strategies—including versioning and SQL examples—to mitigate it.

ABA problemCASDistributed Transactions
0 likes · 9 min read
How CAS Solves High-Concurrency Consistency Issues and the Hidden ABA Problem
Top Architect
Top Architect
Aug 29, 2024 · Backend Development

Implementing Single Sign-On (SSO) with CAS and Session Management in Java

This article explains traditional session mechanisms, challenges in clustered environments, and presents solutions such as session replication and centralized storage, then details the design and implementation of a CAS-based Single Sign-On system in Java, including code for user forms, controllers, filters, and configuration.

Backend DevelopmentCASJava
0 likes · 17 min read
Implementing Single Sign-On (SSO) with CAS and Session Management in Java
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Aug 13, 2024 · Backend Development

Understanding Java Atomic Variables and Their Applications in Concurrent Programming

This article provides a comprehensive guide to Java atomic variables, explaining their core concepts, underlying CAS mechanism, key classes such as AtomicInteger, AtomicLong, AtomicReference, and AtomicBoolean, and demonstrating practical code examples, use‑cases, performance benefits, limitations, and comparisons with traditional lock‑based synchronization.

Atomic VariablesCASconcurrency
0 likes · 21 min read
Understanding Java Atomic Variables and Their Applications in Concurrent Programming
Architect's Guide
Architect's Guide
Aug 12, 2024 · Information Security

Implementing Single Sign-On (SSO) with CAS and Session Management in Distributed Backend Systems

This article explains the challenges of multiple product logins, reviews traditional session mechanisms, discusses session sharing solutions in clustered environments, and presents a CAS‑based single sign‑on implementation with Java code examples, highlighting differences between CAS and OAuth2 for secure authentication.

BackendCASJava
0 likes · 13 min read
Implementing Single Sign-On (SSO) with CAS and Session Management in Distributed Backend Systems
DeWu Technology
DeWu Technology
Jul 24, 2024 · Backend Development

Mastering Unique Identifiers and Distributed Locks: From UUIDs to CAS

This article explores how various unique identifier schemes—random UUIDs, sequential numbers, hierarchical paths, and distributed ID generators—are applied across programming languages, file systems, databases, and networks, and explains when and how to enforce uniqueness using pre‑validation, database constraints, or distributed locks such as Redis and Zookeeper, while also linking these mechanisms to CAS‑based concurrency control.

Backend DevelopmentCASDistributed Systems
0 likes · 23 min read
Mastering Unique Identifiers and Distributed Locks: From UUIDs to CAS
Programmer Null's Self-Cultivation
Programmer Null's Self-Cultivation
Jul 10, 2024 · Information Security

Master Shiro Security: From Basics to CAS SSO Integration with SpringBoot

This comprehensive guide walks you through Shiro's core concepts, authentication and authorization mechanisms, various realm implementations, session management, distributed session handling with Redis, caching strategies, and step‑by‑step integration of CAS single sign‑on using SpringBoot and pac4j, complete with code samples.

CASJavaShiro
0 likes · 34 min read
Master Shiro Security: From Basics to CAS SSO Integration with SpringBoot
Top Architect
Top Architect
Jul 1, 2024 · Information Security

Understanding Single Sign-On (SSO) and CAS Authentication Flow

This article explains the concept, definitions, and three deployment types of Single Sign-On (SSO), introduces the Central Authentication Service (CAS) mechanism, and details step‑by‑step login and logout processes across multiple web applications, illustrating each flow with diagrams and examples.

AuthenticationCASSSO
0 likes · 12 min read
Understanding Single Sign-On (SSO) and CAS Authentication Flow
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Jun 7, 2024 · Fundamentals

Understanding Java CAS and AQS: Unlock Lock-Free Concurrency

This article explains the principles and implementation of Java's Compare-and-Swap (CAS) and AbstractQueuedSynchronizer (AQS), illustrating how CAS enables lock‑free algorithms and how AQS underpins high‑level synchronization constructs like ReentrantLock and CountDownLatch, while also providing practical step‑by‑step examples.

AQSCASJava
0 likes · 5 min read
Understanding Java CAS and AQS: Unlock Lock-Free Concurrency
Architecture & Thinking
Architecture & Thinking
Apr 2, 2024 · Operations

How to Ensure Data Consistency in High‑Concurrency Distributed Systems

This article explores the challenges of maintaining data consistency under high concurrency in distributed systems, reviewing common consistency issues, distributed lock implementations, optimistic and pessimistic strategies, CAS and ABA problems, and practical solutions such as Redis locks, Zookeeper, and transaction protocols.

CASData ConsistencyOptimistic Concurrency
0 likes · 15 min read
How to Ensure Data Consistency in High‑Concurrency Distributed Systems
IT Services Circle
IT Services Circle
Mar 17, 2024 · Backend Development

Understanding the volatile Keyword in Java Concurrency

This article explains the Java volatile keyword, covering its underlying principles, effects on visibility and instruction reordering, appropriate usage scenarios, limitations, and provides a practical code example demonstrating how volatile ensures thread visibility and prevents dead loops in multithreaded programs.

CASJavaatomic
0 likes · 6 min read
Understanding the volatile Keyword in Java Concurrency
Architect Chen
Architect Chen
Mar 3, 2024 · Information Security

How CAS Single Sign-On Works: Mechanisms, Components, and Real‑World Use Cases

This article explains the Central Authentication Service (CAS) single sign‑on system, detailing its token‑based architecture, the roles of the CAS server, client, and protected services, and outlines typical scenarios such as e‑commerce, enterprise intranets, online platforms, and cloud services.

AuthenticationCASSSO
0 likes · 7 min read
How CAS Single Sign-On Works: Mechanisms, Components, and Real‑World Use Cases
Architect
Architect
Feb 19, 2024 · Information Security

Mastering Single Sign-On: From Session Basics to CAS Implementation

This article walks through the fundamentals of HTTP session handling, the challenges of session sharing in clustered environments, and presents a step‑by‑step design of a Single Sign‑On solution using CAS, including concrete code examples, Redis‑based session storage, and a comparison with OAuth2.

AuthenticationCASJava
0 likes · 17 min read
Mastering Single Sign-On: From Session Basics to CAS Implementation
Java Architect Essentials
Java Architect Essentials
Oct 31, 2023 · Information Security

Understanding Traditional Session Mechanisms, Cluster Session Challenges, and SSO Solutions with CAS and OAuth2

The article explains why multiple independent systems hurt user experience, reviews traditional session and cookie based authentication, discusses session sharing problems in clustered environments, and presents centralized Redis storage and CAS‑based single sign‑on solutions with code examples and a comparison to OAuth2.

CASJavaOAuth2
0 likes · 16 min read
Understanding Traditional Session Mechanisms, Cluster Session Challenges, and SSO Solutions with CAS and OAuth2
Top Architect
Top Architect
Oct 16, 2023 · Information Security

Understanding SSO and OAuth2.0: Concepts, Processes, and Differences

This article explains the fundamentals of Single Sign‑On (SSO) and OAuth2.0, compares their token‑based authentication mechanisms, details typical implementation flows such as CAS, and clarifies the distinctions among SSO, OAuth2, JWT, Spring Security and Shiro, while also noting related promotional content.

CASOAuth2SSO
0 likes · 9 min read
Understanding SSO and OAuth2.0: Concepts, Processes, and Differences
Cognitive Technology Team
Cognitive Technology Team
Oct 5, 2023 · Backend Development

Lock‑Free Concurrency in Java: CAS, volatile and JUC Utilities

This article explains how Java achieves lock‑free concurrency using CAS and volatile for optimistic locking, discusses its advantages and drawbacks such as the ABA problem and contention hotspots, and presents solutions including versioned CAS classes and contention‑reduction techniques provided by the JUC package.

CASJUCJava
0 likes · 6 min read
Lock‑Free Concurrency in Java: CAS, volatile and JUC Utilities
Top Architect
Top Architect
Sep 18, 2023 · Information Security

Understanding Cookie‑Based Single Sign‑On and CAS Authentication Flow

This article reviews the shortcomings of simple cookie‑based single sign‑on, introduces a unified authentication center architecture, explains the Central Authentication Service (CAS) design and its deployment, and walks through the complete login process—including first, second, and cross‑domain accesses—highlighting key tickets, filters, and session handling.

CASJavaSSO
0 likes · 12 min read
Understanding Cookie‑Based Single Sign‑On and CAS Authentication Flow
Tencent Cloud Developer
Tencent Cloud Developer
Aug 17, 2023 · Backend Development

Java Memory Model and Concurrent Programming: Visibility, Ordering, and Atomicity

The article explains how the Java Memory Model addresses concurrency challenges by defining visibility, ordering, and atomicity guarantees through mechanisms such as volatile, synchronized, cache coherence, memory barriers, CAS operations, and happens‑before relationships, enabling correct and portable multi‑threaded programming.

CASConcurrent ProgrammingHappens-before
0 likes · 25 min read
Java Memory Model and Concurrent Programming: Visibility, Ordering, and Atomicity
ITPUB
ITPUB
May 26, 2023 · Databases

Mastering Redis Transactions: Commands, CAS Locks, and Common Pitfalls

This article explains why Redis offers transactions, introduces the five core transaction commands, demonstrates practical examples including WATCH and CAS optimistic locking, and discusses error handling and the reasons Redis does not support rollback.

CASTransactionsdatabase
0 likes · 9 min read
Mastering Redis Transactions: Commands, CAS Locks, and Common Pitfalls
Programmer DD
Programmer DD
Apr 24, 2023 · Information Security

Understanding SSO vs OAuth2.0: How Token‑Based Authentication Works

This article explains the concepts, workflows, and key differences between Single Sign‑On (SSO) and OAuth2.0, illustrating how token‑based authentication replaces passwords, detailing typical CAS‑based SSO steps, OAuth2.0 authorization‑code flow, and clarifying related terminology and grant types.

AuthorizationCASOAuth2.0
0 likes · 9 min read
Understanding SSO vs OAuth2.0: How Token‑Based Authentication Works
Top Architect
Top Architect
Mar 13, 2023 · Information Security

Understanding Single Sign‑On (SSO) and CAS Authentication Flows

This article explains the concept, background, and definition of Single Sign‑On (SSO), outlines three SSO deployment types, introduces the Central Authentication Service (CAS) with detailed ticket mechanisms, and provides step‑by‑step SSO and Single Logout (SLO) processes for multiple applications.

AuthenticationCASSSO
0 likes · 11 min read
Understanding Single Sign‑On (SSO) and CAS Authentication Flows
IT Architects Alliance
IT Architects Alliance
Jan 27, 2023 · Backend Development

Mastering Session Management and SSO: From Cookies to CAS with Redis

This article analyzes the limitations of traditional HTTP session mechanisms in single‑server and clustered environments, explains why session sharing is essential for multi‑system products, and presents practical solutions such as session replication and centralized Redis storage, followed by a detailed walkthrough of CAS‑based single sign‑on implementation with Java Spring code examples and a comparison to OAuth2.

AuthenticationCASJava
0 likes · 15 min read
Mastering Session Management and SSO: From Cookies to CAS with Redis
Top Architect
Top Architect
Nov 18, 2022 · Information Security

Step-by-Step Guide to Building CAS Single Sign-On (SSO) with Spring Boot

This article provides a comprehensive tutorial on implementing Single Sign-On using the Central Authentication Service (CAS), covering its concepts, features, architecture, environment setup, server and client configuration, and testing procedures with detailed code examples for Java developers.

CASJavaSSO
0 likes · 9 min read
Step-by-Step Guide to Building CAS Single Sign-On (SSO) with Spring Boot
IT Architects Alliance
IT Architects Alliance
Nov 17, 2022 · Backend Development

Cache Update Strategies and Concurrency Control: CAS, Distributed Locks, Asynchronous Updates, and Delayed Double Delete

This article examines cache update strategies in high‑concurrency systems, analyzing the trade‑offs of delete‑then‑write versus write‑then‑write approaches, illustrating race conditions, and presenting solutions such as CAS, distributed locks, asynchronous updates, and delayed double‑delete to maintain data consistency.

CASCacheConsistency
0 likes · 8 min read
Cache Update Strategies and Concurrency Control: CAS, Distributed Locks, Asynchronous Updates, and Delayed Double Delete
Top Architect
Top Architect
Nov 13, 2022 · Backend Development

Cache Update Strategies and Concurrency Control in Backend Systems

The article analyzes the challenges of keeping cache and database consistent after write operations, evaluates four update‑order strategies, discusses their concurrency pitfalls, and presents practical solutions such as CAS, distributed locks, asynchronous updates, and delayed double‑delete techniques.

BackendCASCache
0 likes · 8 min read
Cache Update Strategies and Concurrency Control in Backend Systems
Code Ape Tech Column
Code Ape Tech Column
Nov 7, 2022 · Information Security

Understanding Session-Based Authentication and Single Sign-On (SSO) with CAS and OAuth2

This article explains the challenges of multiple product systems, reviews traditional session mechanisms and their limitations in clustered environments, compares session replication and centralized storage using Redis, and details the design and implementation of Single Sign-On using CAS and OAuth2 with Java Spring code examples.

CASJavaOAuth2
0 likes · 13 min read
Understanding Session-Based Authentication and Single Sign-On (SSO) with CAS and OAuth2
Top Architect
Top Architect
Oct 17, 2022 · Backend Development

Understanding Java Locks: volatile, synchronized, monitor, CAS, and AQS

This article explains why locks are needed in Java, describes the fundamentals of volatile and synchronized, details the monitor‑based implementation of synchronized, introduces CAS operations, and outlines advanced lock mechanisms such as biased, lightweight, lock coarsening, elimination, and the AbstractQueuedSynchronizer framework.

AQSCASJava
0 likes · 11 min read
Understanding Java Locks: volatile, synchronized, monitor, CAS, and AQS
Architect's Guide
Architect's Guide
Oct 15, 2022 · Information Security

Understanding Session Mechanisms, Cluster Session Challenges, and SSO Solutions with a CAS Implementation

This article explains traditional HTTP session handling, the problems of session sharing in clustered and multi‑service environments, and presents practical SSO solutions—including session replication, centralized Redis storage, and a complete CAS‑based single sign‑on implementation with Java code examples.

CASJavaSession
0 likes · 14 min read
Understanding Session Mechanisms, Cluster Session Challenges, and SSO Solutions with a CAS Implementation
Top Architect
Top Architect
Aug 26, 2022 · Information Security

Understanding Session Management, SSO, and CAS Implementation in Java

This article explains the challenges of traditional session mechanisms in distributed systems, explores session sharing solutions such as replication and centralized storage, details the design and flow of Single Sign‑On (SSO) using CAS, compares CAS with OAuth2, and provides complete Java code examples for a demo implementation.

CASJavaSSO
0 likes · 14 min read
Understanding Session Management, SSO, and CAS Implementation in Java
JavaEdge
JavaEdge
Aug 25, 2022 · Databases

How to Prevent Lost Updates: Atomic Writes, Explicit Locks, and CAS

The article explains why concurrent write transactions cause lost updates, then details practical solutions such as atomic update statements, explicit row‑level locking, automatic lost‑update detection, compare‑and‑swap (CAS) techniques, and special considerations for multi‑replica databases.

CASConcurrency Controlatomic write
0 likes · 8 min read
How to Prevent Lost Updates: Atomic Writes, Explicit Locks, and CAS
IT Architects Alliance
IT Architects Alliance
Aug 4, 2022 · Information Security

Understanding Session Mechanisms, Distributed Session Challenges, and SSO Solutions with CAS Implementation

This article explains traditional session and authentication mechanisms, the problems of session sharing in clustered and multi‑service environments, and presents practical SSO solutions—including CAS‑based single sign‑on and its differences from OAuth2—accompanied by complete Java Spring code examples.

AuthenticationCASJava
0 likes · 16 min read
Understanding Session Mechanisms, Distributed Session Challenges, and SSO Solutions with CAS Implementation
Programmer DD
Programmer DD
Aug 4, 2022 · Backend Development

Mastering Single Sign-On: From Traditional Sessions to CAS & OAuth2

This article explains the limitations of traditional HTTP session mechanisms, explores session sharing strategies in clustered environments, and provides a detailed walkthrough of implementing Single Sign-On using CAS, including code samples and a comparison with OAuth2 authentication.

AuthenticationCASJava
0 likes · 18 min read
Mastering Single Sign-On: From Traditional Sessions to CAS & OAuth2
Architect
Architect
Aug 3, 2022 · Information Security

Understanding Session Mechanisms, Session Sharing, and SSO with CAS Implementation

This article explains the challenges of multiple system logins, reviews traditional HTTP session handling, presents session sharing solutions like replication and Redis‑based central storage, and details a CAS‑based single sign‑on implementation with code examples, while also comparing CAS to OAuth2.

CASJavaSession Management
0 likes · 13 min read
Understanding Session Mechanisms, Session Sharing, and SSO with CAS Implementation
Java Backend Technology
Java Backend Technology
Jul 31, 2022 · Backend Development

Mastering Single Sign-On (SSO) with CAS: From Session Basics to Full Demo

This article explains why unified authentication is essential for product suites, reviews traditional session mechanisms and their limitations in clustered environments, explores session‑sharing strategies, introduces CAS‑based SSO workflows, compares CAS with OAuth2, and provides a complete Spring Boot demo with code snippets and configuration details.

AuthenticationCASSSO
0 likes · 17 min read
Mastering Single Sign-On (SSO) with CAS: From Session Basics to Full Demo
Senior Brother's Insights
Senior Brother's Insights
Jul 21, 2022 · Backend Development

Mastering Java CAS: How AtomicInteger Achieves Lock‑Free Concurrency

This article explains the fundamentals of Compare‑And‑Swap (CAS), its implementation in Java through the Unsafe class, demonstrates AtomicInteger's lock‑free operations, and discusses CAS drawbacks such as spin‑wait overhead, single‑variable limitation, and the ABA problem with mitigation strategies.

ABA problemAtomicIntegerCAS
0 likes · 15 min read
Mastering Java CAS: How AtomicInteger Achieves Lock‑Free Concurrency
Architecture Digest
Architecture Digest
Jul 17, 2022 · Information Security

Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Java Backend

This tutorial explains what SSO and CAS are, outlines the required development environment, walks through downloading, building, and deploying the CAS Server, shows how to configure the server and client (including disabling HTTPS for testing), and demonstrates successful cross‑application authentication with code examples.

AuthenticationCASJava
0 likes · 7 min read
Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Java Backend
Top Architect
Top Architect
Jul 11, 2022 · Information Security

Implementing CAS Single Sign‑On with a Custom Authentication Filter in Spring Boot

This article explains how to integrate the CAS (Central Authentication Service) single sign‑on solution into a Spring Boot backend by adding necessary dependencies, configuring a series of CAS filters, creating a custom MyAuthenticationFilter to handle AJAX requests, and demonstrating a Vue.js frontend that interacts with the authentication flow, complete with screenshots of the login, ticket validation, and logout processes.

AuthenticationCASSecurity
0 likes · 14 min read
Implementing CAS Single Sign‑On with a Custom Authentication Filter in Spring Boot
IT Architects Alliance
IT Architects Alliance
Jun 3, 2022 · Information Security

Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Server and Client Configuration

This article provides a comprehensive tutorial on implementing Single Sign-On using the CAS (Central Authentication Service) framework, covering the concepts of SSO and CAS, required development environment, server-side deployment, client configuration, and end‑to‑end testing with detailed code examples.

AuthenticationCASJava
0 likes · 8 min read
Step-by-Step Guide to Setting Up CAS Single Sign-On (SSO) with Server and Client Configuration
Top Architect
Top Architect
May 29, 2022 · Information Security

Step‑by‑Step Guide to Building a CAS‑Based Single Sign‑On (SSO) System with Server and Client Configuration

This article provides a comprehensive tutorial on implementing Single Sign‑On using the open‑source CAS solution, covering the concepts of SSO and CAS, required development environment, server‑side deployment, client integration with Spring Boot, configuration details, and a complete end‑to‑end testing workflow.

AuthenticationCASJava
0 likes · 9 min read
Step‑by‑Step Guide to Building a CAS‑Based Single Sign‑On (SSO) System with Server and Client Configuration
Senior Brother's Insights
Senior Brother's Insights
May 24, 2022 · Fundamentals

Why Does Thread A Always Grab the Lock First? A Deep Dive into Java Synchronization, JVM Internals, and CPU Fundamentals

This article explores the evolution from early mechanical calculators to modern CPUs, explains thread states, synchronization mechanisms, memory barriers, volatile semantics, and JVM lock implementations, and reveals why Java's notify method consistently awakens a specific waiting thread.

CASCPU architectureJVM internals
0 likes · 39 min read
Why Does Thread A Always Grab the Lock First? A Deep Dive into Java Synchronization, JVM Internals, and CPU Fundamentals
Cognitive Technology Team
Cognitive Technology Team
May 22, 2022 · Fundamentals

Lock‑Free (Non‑Blocking) Algorithms and Their Implementation in Java

Lock‑free (non‑blocking) algorithms replace traditional locks with hardware primitives such as compare‑and‑swap (CAS) to ensure data consistency during concurrent access, offering superior scalability and eliminating deadlocks, and the article explains Java’s atomic variables, CAS‑based implementations, and how to address the ABA problem with AtomicStampedReference.

ABACASJava
0 likes · 5 min read
Lock‑Free (Non‑Blocking) Algorithms and Their Implementation in Java
Code Ape Tech Column
Code Ape Tech Column
May 17, 2022 · Fundamentals

Understanding Compare‑And‑Swap (CAS), Its Mechanisms, and Common Pitfalls

This article explains the fundamentals of the compare‑and‑swap (CAS) atomic primitive, how CPUs guarantee its atomicity through bus and cache locking, illustrates a Java spin‑lock implementation using CAS, and discusses typical issues such as single‑variable limitation, long spin times, and the ABA problem with mitigation strategies.

ABA problemCASJava
0 likes · 9 min read
Understanding Compare‑And‑Swap (CAS), Its Mechanisms, and Common Pitfalls
Selected Java Interview Questions
Selected Java Interview Questions
Jan 3, 2022 · Fundamentals

Understanding AtomicInteger: Optimistic Locking and CAS in Java

AtomicInteger provides a thread‑safe, lock‑free counter in Java by employing optimistic locking and CAS operations, offering higher efficiency than synchronized blocks; the article explains its motivation, usage examples, underlying Unsafe mechanisms, volatile semantics, and key methods such as incrementAndGet and compareAndSet.

AtomicIntegerCASJava
0 likes · 7 min read
Understanding AtomicInteger: Optimistic Locking and CAS in Java
ELab Team
ELab Team
Dec 24, 2021 · Information Security

Mastering SSO: JWT, Session, CAS & OAuth Explained with Real-World Implementation

This article explores the challenges of cross‑domain login state sharing, compares JWT, session‑cookie, and SSO solutions such as CAS and OAuth, details their structures, security considerations, and provides a step‑by‑step guide to building a simple SSO demo with code snippets and diagrams.

CASJWTOAuth
0 likes · 25 min read
Mastering SSO: JWT, Session, CAS & OAuth Explained with Real-World Implementation
JavaEdge
JavaEdge
Dec 11, 2021 · Backend Development

Master Java Locks: From Pessimistic to Optimistic and Beyond

This article explains the full spectrum of Java concurrency locks—including pessimistic, optimistic, exclusive, shared, fair, unfair, segment, reentrant, and spin locks—detailing their principles, typical use cases, implementation details, and code examples to help you ace interview questions.

CASJavaLocks
0 likes · 12 min read
Master Java Locks: From Pessimistic to Optimistic and Beyond
Java Tech Enthusiast
Java Tech Enthusiast
Nov 18, 2021 · Fundamentals

Pessimistic and Optimistic Locks in Java: Theory and Code Examples

The article compares Java's pessimistic locking mechanisms such as synchronized blocks and ReentrantLock with optimistic approaches like version checks, CAS‑based AtomicInteger and custom spin locks, illustrating each method through counter examples and discussing their performance trade‑offs and limitations.

CASJavaLocks
0 likes · 11 min read
Pessimistic and Optimistic Locks in Java: Theory and Code Examples
GrowingIO Tech Team
GrowingIO Tech Team
Sep 16, 2021 · Information Security

How GrowingIO Unified OAuth2, LDAP, and CAS for Seamless SSO Integration

GrowingIO’s server-side solution integrates three distinct authentication protocols—OAuth2, LDAP, and CAS—into a unified SSO flow, detailing each protocol’s process, the overall architecture, role of the IAM and Gateway components, and providing configuration and code examples for implementation.

AuthenticationCASLDAP
0 likes · 12 min read
How GrowingIO Unified OAuth2, LDAP, and CAS for Seamless SSO Integration
Wukong Talks Architecture
Wukong Talks Architecture
Aug 17, 2021 · Fundamentals

Core Java Multithreading Interview Questions and Concepts

This article compiles 16 classic Java multithreading interview questions covering high‑concurrency containers, CAS and ABA problems, volatile vs synchronized, the Java Memory Model, ThreadLocal drawbacks, AQS, thread‑pool architecture, queue types, sizing strategies, rejection policies, lifecycle management, and graceful shutdown techniques.

CASJMMJava
0 likes · 20 min read
Core Java Multithreading Interview Questions and Concepts
NetEase Smart Enterprise Tech+
NetEase Smart Enterprise Tech+
Jul 22, 2021 · Information Security

Mastering CAS-Based Single Sign-On: From Session Mechanics to Seamless Logout

This article explains a complete CAS-based single sign‑on solution, covering traditional session mechanisms, the CAS architecture, implementation of single sign‑on, session renewal, single logout, and practical extensions for multi‑system integration to ensure secure and seamless user experiences across enterprise applications.

AuthenticationCASSSO
0 likes · 12 min read
Mastering CAS-Based Single Sign-On: From Session Mechanics to Seamless Logout
New Oriental Technology
New Oriental Technology
May 31, 2021 · Backend Development

A Comprehensive Guide to Java Concurrency and Synchronization Mechanisms

This article provides an in-depth exploration of Java concurrency and synchronization mechanisms, detailing the evolution of the Java Memory Model, explaining core concepts like volatile, CAS, synchronized, and park/unpark, and illustrating their practical applications through code examples and JVM optimization insights.

CASJVM OptimizationJava concurrency
0 likes · 15 min read
A Comprehensive Guide to Java Concurrency and Synchronization Mechanisms