Tag

Data Integrity

0 views collected around this technical thread.

Architect
Architect
May 17, 2025 · Databases

Storing 2 Billion Phone Numbers: Why VARCHAR(20) Is Preferable to INT/BIGINT

The article explains why using a VARCHAR(20) column to store billions of phone numbers is safer and more flexible than INT or BIGINT, covering range limits, data integrity, query convenience, interview expectations, and common pitfalls such as insufficient field length, charset issues, missing indexes, and lack of encryption.

BIGINTData IntegrityDatabase Design
0 likes · 10 min read
Storing 2 Billion Phone Numbers: Why VARCHAR(20) Is Preferable to INT/BIGINT
IT Services Circle
IT Services Circle
Apr 28, 2025 · Databases

Choosing the Right Data Type for Storing Billions of Phone Numbers: INT vs VARCHAR

This article examines why storing 2 billion phone numbers using INT or BIGINT is problematic and argues for using VARCHAR(20) to preserve data integrity, support international formats, simplify queries, and avoid common pitfalls in database design and development.

Data IntegritySQLVARCHAR vs BIGINT
0 likes · 8 min read
Choosing the Right Data Type for Storing Billions of Phone Numbers: INT vs VARCHAR
Deepin Linux
Deepin Linux
Nov 1, 2024 · Fundamentals

Will Data Be Lost When a Process Crashes During File Write?

This article examines the conditions under which data may be lost when a Linux process crashes while writing a file, explaining page cache behavior, the roles of stdio versus system calls, dirty page handling, write‑back mechanisms, and strategies such as fflush, fsync, and direct I/O to ensure data integrity.

Data IntegrityFile I/OLinux
0 likes · 22 min read
Will Data Be Lost When a Process Crashes During File Write?
Selected Java Interview Questions
Selected Java Interview Questions
Oct 25, 2024 · Databases

Understanding Foreign Keys: Syntax, Operations, Advantages, Disadvantages, and Usage Scenarios

This article explains foreign key concepts in relational databases, showing how to create, modify, and drop foreign key constraints with SQL code, provides hands‑on exercises, discusses the pros and cons of using foreign keys, and outlines when they are appropriate or should be avoided.

DDLDMLData Integrity
0 likes · 6 min read
Understanding Foreign Keys: Syntax, Operations, Advantages, Disadvantages, and Usage Scenarios
Architect
Architect
Feb 6, 2024 · Frontend Development

Why Frontend and Backend Data Validation Are Both Essential and What to Validate

The article explains why both frontend and backend data validation are essential for web applications, outlines specific validation checks for each side, and discusses the combined benefits of improving security, data integrity, user experience, and system reliability.

BackendData IntegrityValidation
0 likes · 9 min read
Why Frontend and Backend Data Validation Are Both Essential and What to Validate
vivo Internet Technology
vivo Internet Technology
Jan 24, 2024 · Big Data

Evolution of Vivo's Trillions-Scale Data Architecture: Dual-Active Real-Time and Offline Computing

Vivo’s trillion‑scale data platform evolved into a dual‑active real‑time and offline architecture that leverages multi‑datacenter clusters, Kafka/Pulsar caching, a unified sorting layer, HBase‑backed dimension tables, and micro‑batch Spark jobs to deliver low‑cost, high‑performance processing, 99.9% availability, and 99.9995% data‑integrity.

Big DataData IntegrityHBase
0 likes · 16 min read
Evolution of Vivo's Trillions-Scale Data Architecture: Dual-Active Real-Time and Offline Computing
DataFunTalk
DataFunTalk
Jan 17, 2023 · Information Security

Community Anti‑Cheat Exploration and Practice in Xiaohongshu

This article examines Xiaohongshu's community anti‑cheat efforts, detailing the significance of fraud prevention, the black‑gray industry ecosystem, strategic defense frameworks, system architecture, and practical risk governance and detection methods for data‑inflation attacks.

CommunityData Integrityanti-cheat
0 likes · 15 min read
Community Anti‑Cheat Exploration and Practice in Xiaohongshu
IT Architects Alliance
IT Architects Alliance
Jan 13, 2023 · Databases

Database Design Fundamentals: Key Concepts, ER Diagrams, and Normal Forms

This article explains fundamental database design concepts, including candidate and primary keys, attributes, relations, ER diagram components, and detailed descriptions of the first, second, third, and BC normal forms with examples and how to resolve insertion, deletion, update, and redundancy anomalies.

Data IntegrityDatabase DesignER diagram
0 likes · 9 min read
Database Design Fundamentals: Key Concepts, ER Diagrams, and Normal Forms
FunTester
FunTester
Nov 8, 2022 · Databases

Comprehensive Guide to Database Testing: Concepts, Techniques, and Best Practices

Database testing ensures data integrity, security, and quality by validating data mapping, ACID properties, schema, triggers, stored procedures, and field constraints through both manual and automated methods, using SQL queries, CRUD operations, and specialized tools to verify that applications interact correctly with underlying databases.

ACIDData IntegrityDatabase Testing
0 likes · 13 min read
Comprehensive Guide to Database Testing: Concepts, Techniques, and Best Practices
php中文网 Courses
php中文网 Courses
May 19, 2021 · Databases

Fundamentals of Relational Databases: Key Concepts and Common Questions

This article provides a comprehensive overview of relational database fundamentals, covering common DBMS products, SQL language components, integrity constraints, transactions, locking, views, stored procedures, indexes, normalization, key differences, constraints, optimization techniques, storage engines, and performance strategies for high‑traffic sites.

Data IntegrityDatabase OptimizationIndexes
0 likes · 12 min read
Fundamentals of Relational Databases: Key Concepts and Common Questions
Architecture Digest
Architecture Digest
Feb 26, 2021 · Databases

Adding a Column to a Massive MySQL Table Safely

This article explains practical strategies for adding a new column to a MySQL table with tens of millions of rows, including creating a temporary table, copying data, renaming tables, and alternative replica‑based or third‑party methods to avoid long locks and potential crashes.

Data IntegrityMySQLadd column
0 likes · 4 min read
Adding a Column to a Massive MySQL Table Safely
Tencent Cloud Developer
Tencent Cloud Developer
Jul 2, 2020 · Blockchain

An Overview of Blockchain Technology, Value, and Applications by Tencent Cloud

The article explains blockchain as a decentralized, tamper‑proof distributed ledger built from a peer‑to‑peer network, block structure, consensus, cryptography and smart contracts, outlines its evolution from information to value internet, classifies public, consortium and private chains, and details Tencent Cloud’s BaaS platform, Zhixin Chain evidence services, and various technical solutions and use‑cases such as data integrity, supply‑chain traceability and asset tokenization.

BlockchainConsensusData Integrity
0 likes · 29 min read
An Overview of Blockchain Technology, Value, and Applications by Tencent Cloud
360 Quality & Efficiency
360 Quality & Efficiency
Oct 17, 2019 · Fundamentals

Why URL Encoding Is Essential for Reliable Web Requests

This article explains why URLs and their parameters must be encoded during testing, covering readability, completeness, reserved characters, non‑ASCII symbols, and unsafe characters, and provides practical examples to ensure reliable data transmission and correct parameter parsing.

Data IntegrityHTTPURL encoding
0 likes · 4 min read
Why URL Encoding Is Essential for Reliable Web Requests
DataFunTalk
DataFunTalk
Jun 6, 2019 · Artificial Intelligence

Design and Machine Learning Practices for Automotive Finance Risk Control

This article outlines the end‑to‑end design of automotive finance risk‑control processes, discusses key data integrity and customer segmentation considerations, and details machine‑learning modeling practices—including logistic regression, decision trees, GBDT, XGBoost, LightGBM and CatBoost—along with an automated platform to streamline model development and deployment.

Automotive FinanceData IntegrityGBDT
0 likes · 17 min read
Design and Machine Learning Practices for Automotive Finance Risk Control
Big Data Technology Architecture
Big Data Technology Architecture
May 15, 2019 · Big Data

Understanding HDFS: Blocks, Packets, Chunks, and Read/Write Processes

This article explains the core concepts of HDFS—including its block, packet, and chunk structures, their roles in data streaming, the detailed write and read workflows, and how checksums ensure data integrity—providing a comprehensive overview for anyone working with Hadoop distributed storage.

Big DataData IntegrityHDFS
0 likes · 7 min read
Understanding HDFS: Blocks, Packets, Chunks, and Read/Write Processes
Architects' Tech Alliance
Architects' Tech Alliance
Dec 21, 2018 · Information Security

Understanding Silent Data Corruption and Effective Data Protection Strategies

Silent data corruption, an often invisible yet pervasive threat to data integrity, can affect both on‑premises and cloud storage, and requires comprehensive detection, verification, and backup techniques such as ECC, CRC, RAID, ZFS/ReFS checksums, and specialized backup solutions to mitigate data loss.

Data IntegrityECCRAID
0 likes · 7 min read
Understanding Silent Data Corruption and Effective Data Protection Strategies
Architects' Tech Alliance
Architects' Tech Alliance
Aug 10, 2018 · Fundamentals

Understanding Silent Data Corruption and End-to-End Data Integrity with DIX and DIF

The article explains silent data corruption, its detection challenges, root causes, and how standards like T10 PI (DIF) and DIX provide end‑to‑end data integrity across applications, HBA cards, storage arrays, and disks, including implementation requirements and vendor support.

DIFDIXData Integrity
0 likes · 8 min read
Understanding Silent Data Corruption and End-to-End Data Integrity with DIX and DIF
Architects' Tech Alliance
Architects' Tech Alliance
Jun 23, 2018 · Fundamentals

ZFS File System: Architecture, Features, and Variants

This article reviews the history of Sun and Solaris, explains ZFS’s core design as a combined file system and volume manager, and details its key features such as metadata integrity, copy‑on‑write, snapshots, clones, storage pools, RAID‑Z, caching, compression, deduplication, and tunability.

Data IntegrityFile SystemRAID-Z
0 likes · 11 min read
ZFS File System: Architecture, Features, and Variants