Tagged articles
86 articles
Page 1 of 1
Coder Trainee
Coder Trainee
Feb 14, 2026 · Backend Development

Using RedisTemplate to Manage String and Hash Data in Spring

This article demonstrates how to encapsulate common RedisTemplate operations—such as deleting single or multiple keys, setting expiration, checking existence, and performing String and Hash CRUD actions—by providing concrete Java code examples and step‑by‑step method implementations.

CacheHashRedisTemplate
0 likes · 4 min read
Using RedisTemplate to Manage String and Hash Data in Spring
Coder Trainee
Coder Trainee
Feb 13, 2026 · Databases

Understanding Redis Commands and Its Five Data Types

This article explains how to access the Redis CLI on Linux, connect to remote servers, and provides detailed examples of common commands for each of Redis's five data types—String, List, Set, Sorted Set, and Hash—highlighting key syntax and usage patterns.

Data TypesHashList
0 likes · 4 min read
Understanding Redis Commands and Its Five Data Types
Java Companion
Java Companion
Nov 9, 2025 · Databases

Why Big Companies Avoid SET for User Data: A Redis Storage Guide

The article compares storing user objects in Redis using plain SET with JSON versus using HASH fields, providing code demos, benchmark results, memory and concurrency analysis, and practical guidelines on when to choose each approach for optimal performance and safety.

HashStringdata modeling
0 likes · 9 min read
Why Big Companies Avoid SET for User Data: A Redis Storage Guide
Architect
Architect
Oct 9, 2025 · Databases

How to Implement Pagination and Fuzzy Search in Redis Efficiently

This article explains how to achieve conditional queries and pagination in Redis using Sorted Sets and Hashes, outlines the implementation steps for pagination, fuzzy multi‑condition search, their combination, and discusses performance optimizations such as expiration and real‑time data handling.

HashSorted Setfuzzy-search
0 likes · 11 min read
How to Implement Pagination and Fuzzy Search in Redis Efficiently
JD Tech Talk
JD Tech Talk
Jun 27, 2025 · Frontend Development

Why Your Updated Frontend Code Isn’t Showing & How to Fix Cache Issues

This article explains why newly deployed front‑end pages often still display old content due to browser, Nginx, or CDN caching, and provides a three‑step method—including proper cache‑control headers, hash‑named assets, and version‑based fallback—to ensure users always see the latest version.

DeploymentHashNginx
0 likes · 10 min read
Why Your Updated Frontend Code Isn’t Showing & How to Fix Cache Issues
Top Architect
Top Architect
May 24, 2025 · Databases

Implementing Pagination and Multi‑Condition Fuzzy Search in Redis

This article explains how to use Redis Sorted Sets and Hashes to achieve efficient pagination, fuzzy multi‑condition queries, and their combination, while also discussing performance‑optimisation strategies such as temporary ZSet expiration and data‑freshness handling, before concluding with a brief promotional segment.

HashSorted Setdatabase
0 likes · 12 min read
Implementing Pagination and Multi‑Condition Fuzzy Search in Redis
Architect's Must-Have
Architect's Must-Have
May 16, 2025 · Databases

Understanding Database Indexes: Structures, Types, and Trade‑offs

This article explains the fundamentals of database indexes, covering their purpose, underlying structures such as hash tables, B‑Tree and B+‑Tree, the advantages and drawbacks, and the various index types in MySQL including clustered, non‑clustered, primary, secondary, unique, prefix, and full‑text indexes.

B-treeHashindex
0 likes · 9 min read
Understanding Database Indexes: Structures, Types, and Trade‑offs
Python Crawling & Data Mining
Python Crawling & Data Mining
Apr 18, 2025 · Information Security

Master Android Encryption: From MD5 to RSA with Java Code

This tutorial explains why encryption matters in Android reverse engineering, distinguishes standard and custom algorithms, lists common hash, symmetric, and asymmetric methods, and provides complete Java code examples for Hex, Base64, MD5, SHA‑1, MAC, DES, 3DES, AES, and RSA, all runnable in Android Studio.

Hashasymmetriccryptography
0 likes · 20 min read
Master Android Encryption: From MD5 to RSA with Java Code
Architect's Guide
Architect's Guide
Mar 18, 2025 · Databases

Strategies for Splitting Large Keys and Values in Redis

The article explains why large keys, oversized values, massive key counts, and huge Bitmaps or Bloom filters degrade Redis performance and provides practical splitting techniques—using multiple keys, hashes, bucketed hashing, and bitmap partitioning—to reduce memory pressure and improve response times.

BitmapHashbloom-filter
0 likes · 8 min read
Strategies for Splitting Large Keys and Values in Redis
ITPUB
ITPUB
Sep 23, 2024 · Databases

Master PostgreSQL Table Partitioning: Types, Commands, and Best Practices

This guide explains PostgreSQL table partitioning, covering its definition, benefits, drawbacks, the three partition types (RANGE, LIST, HASH), step‑by‑step SQL commands for creating partitions, indexes, and managing them, and concludes with practical recommendations for effective use.

HashListPartitioning
0 likes · 10 min read
Master PostgreSQL Table Partitioning: Types, Commands, and Best Practices
Top Architect
Top Architect
Sep 21, 2024 · Databases

Implementing Pagination and Multi‑Condition Fuzzy Query in Redis

This article explains how to implement pagination, multi‑condition fuzzy search, and their combination using Redis Sorted Sets and Hashes, discusses performance optimizations and expiration strategies, and also contains promotional material for ChatGPT services and a community offering.

HashSorted Setdatabase
0 likes · 12 min read
Implementing Pagination and Multi‑Condition Fuzzy Query in Redis
Java Tech Enthusiast
Java Tech Enthusiast
Sep 3, 2024 · Databases

Implementing Pagination and Multi‑Condition Fuzzy Search in Redis

By leveraging Redis sorted sets for ordered pagination and hash fields with HSCAN for multi‑condition fuzzy matching, the article shows how to build a cached query pipeline that creates temporary ZSets keyed by pattern, supports efficient page retrieval, and uses expirations and refresh strategies to balance freshness and performance.

HashZSetfuzzy-search
0 likes · 9 min read
Implementing Pagination and Multi‑Condition Fuzzy Search in Redis
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Jun 25, 2024 · Frontend Development

Frontend and Backend Interaction Methods for File Upload, Object APIs, and Large File Handling

This article explains how the frontend can upload files to the backend using base64 or binary Blob transmission, introduces key JavaScript objects such as files, Blob, FormData, and FileReader, and provides practical code examples for validation, preview, chunked uploading, progress tracking, and resumable uploads with hash verification.

Base64FormDataHash
0 likes · 10 min read
Frontend and Backend Interaction Methods for File Upload, Object APIs, and Large File Handling
Ops Development & AI Practice
Ops Development & AI Practice
May 12, 2024 · Cloud Native

How to Efficiently Detect Changes in Complex Kubernetes Operator Objects

This article explains how to efficiently detect changes in complex Kubernetes Operator objects by comparing current and desired states using methods such as reflect.DeepEqual, hash‑based comparison, JSON Patch generation, deep copying, and custom comparison functions, and offers best‑practice guidance for reliable controller implementations.

Change DetectionDeepEqualGo
0 likes · 8 min read
How to Efficiently Detect Changes in Complex Kubernetes Operator Objects
Architect's Guide
Architect's Guide
Nov 24, 2023 · Databases

Implementing Conditional Query and Pagination with Redis

This article explains how to use Redis' Sorted Set and Hash structures to achieve efficient pagination, multi‑condition fuzzy queries, and their combination, while also discussing performance optimizations such as expiration handling and data synchronization strategies.

Fuzzy QueryHashZSet
0 likes · 10 min read
Implementing Conditional Query and Pagination with Redis
IT Architects Alliance
IT Architects Alliance
Nov 17, 2023 · Databases

How to Implement Conditional Queries and Pagination in Redis

This article explains how to achieve conditional fuzzy queries and pagination in Redis by leveraging Sorted Sets and Hashes, detailing command usage, data modeling, combination strategies, and performance optimizations such as expiration and real‑time updates.

Fuzzy QueryHashSorted Set
0 likes · 8 min read
How to Implement Conditional Queries and Pagination in Redis
Architect
Architect
Nov 14, 2023 · Databases

Implementing Pagination and Multi‑Condition Fuzzy Query in Redis

This article explains how to use Redis Sorted Sets for efficient pagination, leverages Hashes and HSCAN for multi‑condition fuzzy searches, and combines both techniques with optimization strategies such as temporary ZSet expiration and real‑time update handling to build a practical caching‑layer query solution.

CacheFuzzy QueryHash
0 likes · 10 min read
Implementing Pagination and Multi‑Condition Fuzzy Query in Redis
Architecture Digest
Architecture Digest
Jul 18, 2023 · Databases

Implementing Conditional Query and Pagination in Redis

This article explains how to use Redis Sorted Sets and Hashes to achieve pagination, fuzzy multi‑condition queries, and their combination, while also discussing performance optimizations such as expiration and update strategies for generated ZSet collections.

HashZSetfuzzy-search
0 likes · 8 min read
Implementing Conditional Query and Pagination in Redis
Top Architect
Top Architect
Jul 5, 2023 · Databases

Implementing Pagination and Multi‑Condition Fuzzy Query in Redis

This article explains how to achieve efficient pagination and multi‑condition fuzzy searches in Redis by leveraging Sorted Sets for ordered paging, Hashes with HSCAN for pattern matching, and combining both techniques with caching and expiration strategies to optimize performance.

CacheFuzzy QueryHash
0 likes · 9 min read
Implementing Pagination and Multi‑Condition Fuzzy Query in Redis
NiuNiu MaTe
NiuNiu MaTe
May 17, 2023 · Databases

Mastering Redis HSET: Basics, Commands, and Internal Encoding

This article introduces Redis HSET, covering its definition, suitable use cases, common commands for creating, reading, updating, and deleting hash fields, as well as the underlying encoding mechanisms (ziplist vs hashtable) and best practices, including the deprecation of HMSET.

CacheHSETHash
0 likes · 7 min read
Mastering Redis HSET: Basics, Commands, and Internal Encoding
Selected Java Interview Questions
Selected Java Interview Questions
Nov 1, 2022 · Databases

Understanding MySQL Unique Index Pitfalls and Practical Solutions

This article examines why a MySQL InnoDB table with a unique index can still store duplicate rows—especially when indexed columns contain NULL values or when logical deletion is used—and presents several practical strategies such as adjusting delete status, adding timestamp or auxiliary ID fields, using hash columns, and leveraging proper bulk‑insert techniques to enforce uniqueness effectively.

Database designHashLogical Delete
0 likes · 13 min read
Understanding MySQL Unique Index Pitfalls and Practical Solutions

Probability Algorithms in Big Data: BloomFilter and Count-min Sketch Applications

The article explains how space‑efficient probabilistic structures such as BloomFilter and Count‑min Sketch enable large‑scale data deduplication, join pruning, real‑time idempotent filtering, and approximate top‑K analytics by trading modest accuracy loss for dramatically reduced storage and faster computation.

Big DataBloomFilterCount-Min Sketch
0 likes · 12 min read
Probability Algorithms in Big Data: BloomFilter and Count-min Sketch Applications
ITPUB
ITPUB
Jul 20, 2022 · Databases

Master Redis Memory: 7 Proven Techniques to Store More Data with Less RAM

This article explains how Redis stores key‑value pairs, dives into the underlying dict, dictEntry and redisObject structures, and presents seven practical memory‑saving tricks—including key shortening, encoding tweaks, object sharing, bitmap usage, hash consolidation, fragmentation cleanup, and 32‑bit deployment—to dramatically reduce RAM consumption while preserving performance.

BitmapData StructuresHash
0 likes · 19 min read
Master Redis Memory: 7 Proven Techniques to Store More Data with Less RAM
Python Crawling & Data Mining
Python Crawling & Data Mining
Jun 1, 2022 · Information Security

How to Implement Common Encryption Algorithms (MD5, SHA, DES, AES, RSA) in Android

This tutorial explains why learning encryption algorithms is essential for Android reverse engineering, distinguishes standard and non‑standard algorithms, and provides complete Java code examples for Hex/Base64 encoding, message‑digest (MD5, SHA‑1, MAC), symmetric ciphers (DES, 3DES, AES) and asymmetric RSA, all runnable in an Android Studio project.

Hashasymmetricsymmetric
0 likes · 19 min read
How to Implement Common Encryption Algorithms (MD5, SHA, DES, AES, RSA) in Android
JavaEdge
JavaEdge
Feb 10, 2022 · Backend Development

Designing Scalable Short‑URL Services: From Hashes to Base‑62 ID Encoding

This article examines short‑URL system design, comparing hash‑based, MySQL, and Redis storage strategies, and proposes an optimized solution using auto‑increment IDs with high‑base (62) encoding and lightweight encryption to reduce storage and improve lookup performance.

HashID encodingSystem Design
0 likes · 8 min read
Designing Scalable Short‑URL Services: From Hashes to Base‑62 ID Encoding
Java Backend Technology
Java Backend Technology
Dec 9, 2021 · Big Data

How to Efficiently Find Common URLs in Billions of Records

This article explains how to handle the massive‑data problem of intersecting two files containing billions of URLs by using hash‑based divide‑and‑conquer techniques, file partitioning, and in‑memory hash lookups to achieve scalable performance beyond naive O(m·n) approaches.

HashURL intersectionalgorithm
0 likes · 8 min read
How to Efficiently Find Common URLs in Billions of Records
Programmer DD
Programmer DD
May 20, 2021 · Backend Development

Counting Web Page Visits with Redis: Hash, Bitset, and HyperLogLog Techniques

This article explains three Redis-based techniques—Hash, Bitset, and HyperLogLog—for efficiently counting daily page visits, detailing command usage, memory trade‑offs, and accuracy considerations, helping backend engineers implement scalable visitor statistics in high‑traffic environments like large e‑commerce platforms.

BitsetHashHyperLogLog
0 likes · 6 min read
Counting Web Page Visits with Redis: Hash, Bitset, and HyperLogLog Techniques
Laravel Tech Community
Laravel Tech Community
May 17, 2021 · Backend Development

hash_update() – Adding Data to an Active Hash Context

hash_update() is a PHP function that appends a string of data to an active hash computation context created by hash_init(), takes a resource context and a string data as parameters, and returns TRUE upon successful update of the hash digest.

HashPHPhash_update
0 likes · 1 min read
hash_update() – Adding Data to an Active Hash Context
Laravel Tech Community
Laravel Tech Community
May 14, 2021 · Backend Development

PHP hash_init: Initialize Incremental Hashing Context

The article explains PHP's hash_init function, detailing its purpose to initialize an incremental hashing context, describing its parameters (algorithm name, options, key), return value, and provides a complete example demonstrating how to compute an MD5 hash using hash_update and hash_final.

HashPHPincremental hashing
0 likes · 2 min read
PHP hash_init: Initialize Incremental Hashing Context
Laravel Tech Community
Laravel Tech Community
May 8, 2021 · Backend Development

hash_copy() – Copying a Hash Context in PHP

The article explains PHP’s hash_copy() function, detailing its purpose of duplicating a hash context, the required $context parameter, the returned resource, and provides a complete example with code and expected output for demonstration.

HashPHPhash_copy
0 likes · 2 min read
hash_copy() – Copying a Hash Context in PHP
Laravel Tech Community
Laravel Tech Community
May 7, 2021 · Information Security

hash_algos() – Returns List of Registered Hash Algorithms in PHP

The PHP function hash_algos() returns an indexed array of all supported hash algorithm names, allowing developers to retrieve the available algorithms for cryptographic operations; the documentation includes its signature, return description, a usage example, and a sample output listing algorithms such as md5, sha1, and crc32.

Hashsecurity
0 likes · 2 min read
hash_algos() – Returns List of Registered Hash Algorithms in PHP
Open Source Linux
Open Source Linux
Apr 17, 2020 · Blockchain

What Is Blockchain? A Simple Guide to Distributed Databases, Mining, and Forks

This article provides a clear, beginner‑friendly explanation of blockchain technology, covering its nature as a decentralized distributed database, the structure of blocks and hashes, the mining process with difficulty adjustment, and how forks are resolved, while highlighting its advantages and limitations.

BlockchainConsensusHash
0 likes · 11 min read
What Is Blockchain? A Simple Guide to Distributed Databases, Mining, and Forks
Sohu Tech Products
Sohu Tech Products
Apr 8, 2020 · Fundamentals

Brute‑Force and Simple Hash‑Based Substring Search (Rabin‑Karp) Explained with Examples

This article explains the brute‑force (BF) substring search algorithm, demonstrates its step‑by‑step operation with examples, then introduces a simple hash‑based sliding‑window method (a basic Rabin‑Karp approach), provides Java code, and shows how to compute and update hashes efficiently to locate a pattern in a main string.

HashRabin-Karpalgorithm
0 likes · 7 min read
Brute‑Force and Simple Hash‑Based Substring Search (Rabin‑Karp) Explained with Examples
macrozheng
macrozheng
Feb 22, 2020 · Blockchain

What Is Blockchain? A Beginner’s Guide to Blocks, Mining, and Applications

This article explains blockchain fundamentals, describing its structure as a decentralized distributed database, the composition of blocks, hash functions, the mining process, Bitcoin’s application, and the technology’s key advantages and drawbacks, providing a concise beginner’s overview.

BitcoinBlockchainDecentralization
0 likes · 8 min read
What Is Blockchain? A Beginner’s Guide to Blocks, Mining, and Applications
ITPUB
ITPUB
Dec 21, 2019 · Databases

How to Count Website Visits with Redis: Hash, Bitset, and HyperLogLog

This article explains three Redis‑based techniques—using hash tables, bitsets, and the HyperLogLog probabilistic algorithm—to accurately count daily page views, detailing the required commands, implementation steps, advantages, and limitations for high‑traffic sites.

BitsetHashHyperLogLog
0 likes · 6 min read
How to Count Website Visits with Redis: Hash, Bitset, and HyperLogLog
JD Retail Technology
JD Retail Technology
Dec 9, 2019 · Databases

Memory Optimization in Redis Using zipList and Hash Bucketing

This article explains how to dramatically reduce Redis memory consumption—by up to 90%—through converting long string keys to integers, leveraging zipList‑encoded hashes, and distributing millions of key‑value pairs across many hash buckets while maintaining query performance.

Data StructuresHashMemory Optimization
0 likes · 11 min read
Memory Optimization in Redis Using zipList and Hash Bucketing
Big Data Technology & Architecture
Big Data Technology & Architecture
Nov 6, 2019 · Databases

Understanding Hash Functions, Hash Tables, and Their Implementation in Redis

This article explains the concept of hash functions and hash tables, illustrates how they map data to array indices, discusses collision resolution methods, and details Redis's internal dictionary implementation, including zipmap optimization, operation complexities, and practical usage differences between hashes and sets.

Data StructuresHashMemory Optimization
0 likes · 8 min read
Understanding Hash Functions, Hash Tables, and Their Implementation in Redis
21CTO
21CTO
Oct 29, 2019 · Blockchain

What Is Blockchain? A Simple Guide to Its Core Concepts and Mining

This article provides a clear, beginner‑friendly explanation of blockchain as a decentralized distributed database, covering its essential structure, hash‑based immutability, mining difficulty, fork resolution, and why its practical use cases remain limited.

BlockchainHashMining
0 likes · 12 min read
What Is Blockchain? A Simple Guide to Its Core Concepts and Mining
ITPUB
ITPUB
May 27, 2019 · Databases

Mastering Redis Data Types: Practical Tips and Real-World Use Cases

This article introduces Redis as an open‑source in‑memory store, outlines its core data structures—strings, hashes, lists, sets, sorted sets, bitmaps, hyperloglogs, and geospatial indexes—and provides concrete command examples, application scenarios, and best‑practice guidelines for effective usage.

CacheData StructuresHash
0 likes · 7 min read
Mastering Redis Data Types: Practical Tips and Real-World Use Cases
Architect's Tech Stack
Architect's Tech Stack
Apr 27, 2019 · Databases

Hybrid Hash‑Range Sharding Strategy with Group‑Based Allocation

This article presents a hybrid sharding approach that combines range partitioning to assign ID ranges to groups and hash modulo on the total number of tables to achieve uniform data distribution while avoiding hotspots and eliminating the need for data migration during scaling.

Distributed SystemsHashScalability
0 likes · 7 min read
Hybrid Hash‑Range Sharding Strategy with Group‑Based Allocation
dbaplus Community
dbaplus Community
Nov 25, 2018 · Backend Development

Mastering Load Balancing: 5 Core Strategies Explained with Code

This article introduces the concept of load balancing as a key high‑availability technique, explains five common strategies—round robin, weighted round robin, least connections, fastest response, and hash—provides code examples, compares their pros and cons, and outlines health‑check methods to ensure reliable service.

HashLeast ConnectionsRound Robin
0 likes · 10 min read
Mastering Load Balancing: 5 Core Strategies Explained with Code
JD Tech
JD Tech
Oct 25, 2018 · Information Security

Common Encryption Methods for Frontend Development

This article introduces the most frequently used encryption techniques in frontend development—including Base64 encoding, hash functions, salting, slow hash algorithms, key‑hashing, XOR, symmetric and asymmetric encryption, digital signatures, and practical CryptoJS usage—explaining their principles, appropriate scenarios, and providing ready‑to‑use code examples.

HashJavaScriptcrypto
0 likes · 14 min read
Common Encryption Methods for Frontend Development
21CTO
21CTO
Sep 21, 2018 · Big Data

Master Massive Data Processing: Key Techniques from Hash Maps to MapReduce

This comprehensive guide explores essential strategies for handling massive datasets, covering hash-based structures, bucket partitioning, heap and quicksort techniques, trie trees, Bloom filters, external sorting, and MapReduce, and demonstrates how to efficiently solve common interview problems such as top‑K queries and duplicate removal.

Data StructuresHashHeap
0 likes · 35 min read
Master Massive Data Processing: Key Techniques from Hash Maps to MapReduce
ITPUB
ITPUB
Feb 3, 2018 · Blockchain

What Exactly Is a Blockchain? A Beginner’s Guide to Public and Private Chains

This article demystifies blockchain by explaining its fundamental structure of linked blocks, how hashes ensure integrity, the differences between public and private blockchains, and illustrates smart contract use cases such as automated rent payments, providing clear examples and visual diagrams for beginners.

BlockchainHashdistributed ledger
0 likes · 9 min read
What Exactly Is a Blockchain? A Beginner’s Guide to Public and Private Chains
ITPUB
ITPUB
Jan 14, 2018 · Blockchain

What Is Blockchain? A Simple Guide to Blocks, Hashes, Mining, and Forks

This tutorial explains blockchain as a special distributed database, covering its core concepts such as block structure, hash immutability, mining difficulty, dynamic difficulty adjustment, and chain forks, while highlighting its advantages, limitations, and typical use cases like cryptocurrencies.

BlockchainHashMining
0 likes · 12 min read
What Is Blockchain? A Simple Guide to Blocks, Hashes, Mining, and Forks
JD Retail Technology
JD Retail Technology
Jan 12, 2018 · Blockchain

Understanding the Relationship Between Blockchain and Bitcoin

This article explains how blockchain technology underpins Bitcoin, covering basic concepts such as distributed ledgers, cryptographic hash functions, digital signatures, hash pointers, Merkle trees, and the structure of Bitcoin's blockchain, while also highlighting broader applications and future considerations.

BitcoinBlockchainDecentralization
0 likes · 8 min read
Understanding the Relationship Between Blockchain and Bitcoin
ITPUB
ITPUB
Jan 6, 2018 · Blockchain

What Is Blockchain? A Simple, Step‑by‑Step Guide to Its Core Concepts

This article provides a clear, beginner‑friendly explanation of blockchain, covering its nature as a decentralized database, the role of blocks and hashes, mining mechanics, difficulty adjustment, and how forks are resolved, while highlighting both strengths and limitations of the technology.

BlockchainHashMining
0 likes · 13 min read
What Is Blockchain? A Simple, Step‑by‑Step Guide to Its Core Concepts
Architecture Digest
Architecture Digest
Jan 4, 2018 · Blockchain

A Beginner's Guide to Blockchain: Fundamentals and Mechanics

This article provides a clear, beginner‑friendly explanation of blockchain technology, covering its nature as a decentralized database, block structure, hashing, mining difficulty, dynamic adjustment, forks, and practical limitations, while illustrating concepts with diagrams and real‑world examples.

BlockchainHashMining
0 likes · 10 min read
A Beginner's Guide to Blockchain: Fundamentals and Mechanics
Architecture Digest
Architecture Digest
Apr 17, 2017 · Backend Development

Java Load Balancing Algorithms: Round Robin, Random, Source‑IP Hash, Weighted Round Robin, Weighted Random, and Least Connections

This article explains the concept of load balancing and provides Java implementations of several common algorithms—including Round Robin, Random, Source‑IP Hash, Weighted Round Robin, Weighted Random, and a discussion of Least Connections—highlighting their principles, advantages, drawbacks, and concurrency considerations.

BackendHashRound Robin
0 likes · 14 min read
Java Load Balancing Algorithms: Round Robin, Random, Source‑IP Hash, Weighted Round Robin, Weighted Random, and Least Connections
21CTO
21CTO
Nov 4, 2015 · Information Security

Master PHP Encryption: From MD5 to OpenSSL Asymmetric Techniques

This article explains PHP's various encryption methods, covering one-way hash functions like MD5 and SHA1, symmetric algorithms, the rarely used crypt() function, and detailed implementations of asymmetric encryption with OpenSSL, including key generation, encryption, decryption, and practical code examples.

HashOpenSSLPHP
0 likes · 15 min read
Master PHP Encryption: From MD5 to OpenSSL Asymmetric Techniques
Java High-Performance Architecture
Java High-Performance Architecture
Sep 4, 2015 · Backend Development

Master Nginx Load Balancing: Round Robin, Least Conn, Least Time, IP & Generic Hash

This guide outlines the five primary Nginx load‑balancing methods—Round Robin, Least Connections, Least Time (header or last_byte), IP Hash, and generic Hash—explaining how each algorithm works and showing the corresponding upstream configuration syntax for assigning server weights and parameters.

BackendHashLeast Connections
0 likes · 3 min read
Master Nginx Load Balancing: Round Robin, Least Conn, Least Time, IP & Generic Hash