Tagged articles
9 articles
Page 1 of 1
Top Architect
Top Architect
May 21, 2022 · Backend Development

Handling Duplicate Requests in Backend Services with Redis and Java

This article explains various techniques for detecting and preventing duplicate backend requests—using unique request IDs, business parameter hashing, MD5 summaries, and Redis SETNX with expiration—providing Java code examples and a complete deduplication utility.

BackendMD5Request ID
0 likes · 9 min read
Handling Duplicate Requests in Backend Services with Redis and Java
Java Backend Technology
Java Backend Technology
Jun 4, 2021 · Backend Development

How to Prevent Duplicate Requests in Java Services with Redis and MD5

This article explains why duplicate requests—especially write operations—can cause serious issues, outlines common duplication scenarios, and presents a complete server‑side solution using unique request IDs with Redis as well as business‑parameter hashing with MD5 to achieve reliable idempotency in Java back‑end systems.

BackendIdempotencyMD5
0 likes · 9 min read
How to Prevent Duplicate Requests in Java Services with Redis and MD5
Java Interview Crash Guide
Java Interview Crash Guide
May 31, 2021 · Backend Development

How to Prevent Duplicate Requests with Redis: A Complete Backend Deduplication Guide

This article explains why duplicate requests—especially write operations—can cause serious issues, outlines common duplication scenarios, and provides a comprehensive server‑side solution using unique request IDs, parameter hashing with MD5, and Redis SETNX with expiration to reliably detect and block repeats.

MD5deduplicationduplicate request
0 likes · 10 min read
How to Prevent Duplicate Requests with Redis: A Complete Backend Deduplication Guide
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Apr 25, 2021 · Backend Development

Designing Duplicate Request Filtering: Challenges, Solutions, and Best Practices

The article examines why duplicate request filtering is a complex backend problem, explores various causes, discusses client‑side and server‑side strategies such as request IDs, Redis checks, distributed locks, and request signing, and highlights practical pitfalls and security considerations.

Idempotencyduplicate requestrequest signing
0 likes · 9 min read
Designing Duplicate Request Filtering: Challenges, Solutions, and Best Practices
Java Architect Essentials
Java Architect Essentials
Feb 26, 2021 · Backend Development

How to Gracefully Prevent Duplicate Requests on the Server Side

This article explains why duplicate requests—especially write operations—can cause serious issues, outlines common causes such as replay attacks and client retries, and provides a comprehensive server‑side solution using unique request IDs, Redis, and MD5‑based parameter deduplication with Java code examples.

IdempotencyJavaMD5
0 likes · 9 min read
How to Gracefully Prevent Duplicate Requests on the Server Side
360 Tech Engineering
360 Tech Engineering
Dec 18, 2020 · Frontend Development

Cancelling Duplicate Axios Requests and Building a Reusable Wrapper

This guide explains the scenarios that cause duplicate HTTP requests in web applications, demonstrates two Axios cancellation techniques, and shows how to encapsulate the logic in a reusable module with request tracking, interceptor integration, npm linking, and open‑source contribution steps.

JavaScriptaxioscancellation
0 likes · 9 min read
Cancelling Duplicate Axios Requests and Building a Reusable Wrapper