Tag

hash algorithm

1 views collected around this technical thread.

Architecture Digest
Architecture Digest
Nov 18, 2022 · Backend Development

Design and Implementation of a Short URL Service

This article explains the value of short URLs, the HTTP redirection principle behind them, and provides detailed design and implementation strategies—including hash‑based and distributed‑ID approaches, base‑62 encoding, database storage, caching, indexing, and security measures—to build a scalable short‑link service.

HTTP redirectShort URLcaching
0 likes · 12 min read
Design and Implementation of a Short URL Service
Laravel Tech Community
Laravel Tech Community
Nov 13, 2022 · Backend Development

Design and Implementation of a Short URL Service

This article explains the value, underlying HTTP redirect mechanism, and detailed design approaches—including hash‑based and distributed‑ID generation, base‑62 encoding, database storage, caching, indexing, sharding, and rate‑limiting—to build a scalable short‑link service.

BackendDatabaseHTTP redirect
0 likes · 12 min read
Design and Implementation of a Short URL Service
php中文网 Courses
php中文网 Courses
May 23, 2022 · Information Security

Implementing the SHA-256 Hash Algorithm in PHP from Scratch

This article explains the theory behind cryptographic hash functions and provides a complete PHP implementation of the SHA‑256 algorithm, detailing each processing step—from converting strings to binary to final compression—along with supporting helper functions and reference tables.

Binary OperationsPHPSHA-256
0 likes · 19 min read
Implementing the SHA-256 Hash Algorithm in PHP from Scratch
JD Tech
JD Tech
Jan 20, 2022 · Backend Development

Consistent Hash Algorithm and Its Application in Dubbo Load Balancing

This article explains the principles of consistent hashing, its data‑skew issue, how virtual nodes mitigate that problem, and demonstrates the implementation and usage of ConsistentHashLoadBalance in Dubbo with detailed code analysis and practical load‑balancing examples.

BackendConsistent HashDubbo
0 likes · 14 min read
Consistent Hash Algorithm and Its Application in Dubbo Load Balancing
High Availability Architecture
High Availability Architecture
Oct 26, 2021 · Databases

Practical Guide to Horizontal Database Sharding: Design Principles, Common Schemes, and Expansion Strategies

This article explains the background, design criteria, and practical implementations of horizontal database sharding—including range, hash, gene, routing‑table, and consistent‑hash methods—while discussing common pitfalls, data‑skew mitigation, and both doubling and consistent‑hash expansion techniques for MySQL clusters.

Database ScalingMySQLSharding
0 likes · 24 min read
Practical Guide to Horizontal Database Sharding: Design Principles, Common Schemes, and Expansion Strategies
Laravel Tech Community
Laravel Tech Community
May 9, 2021 · Backend Development

Understanding Consistent Hashing: From Simple Modulo Hash to Optimizations

This article explains the drawbacks of a basic modulo hash algorithm for key distribution, demonstrates how consistent hashing resolves scaling and node‑failure issues, and discusses virtual‑node techniques to mitigate data skew and improve load balancing in distributed cache systems.

Data Skewconsistent hashingdistributed caching
0 likes · 5 min read
Understanding Consistent Hashing: From Simple Modulo Hash to Optimizations
Architecture Digest
Architecture Digest
Jul 1, 2020 · Backend Development

Design and Implementation of a Short URL Service

This article explains the concept of short URLs, compares three generation algorithms (auto‑increment ID, hash‑based, and random), analyzes their trade‑offs, and presents a complete backend design including database schema, caching strategy, redirection flow, and Java code examples for hash and base‑62 conversion.

BackendBase62Database Design
0 likes · 15 min read
Design and Implementation of a Short URL Service
Java Captain
Java Captain
May 16, 2020 · Fundamentals

Deep Dive into Java ThreadLocal: Data Structure, Hash Algorithm, Cleanup, and Usage

This article provides an in‑depth analysis of Java’s ThreadLocal mechanism, covering its weak‑reference key, internal ThreadLocalMap structure, hash algorithm, collision resolution, cleanup strategies, expansion logic, source code walkthroughs, and practical usage scenarios such as trace‑ID propagation in distributed systems.

ConcurrencyDistributed TracingGarbage Collection
0 likes · 27 min read
Deep Dive into Java ThreadLocal: Data Structure, Hash Algorithm, Cleanup, and Usage
360 Quality & Efficiency
360 Quality & Efficiency
Mar 8, 2019 · Artificial Intelligence

Implementing a Perceptual Hash Algorithm for UI Image Similarity in Android Automation

The article explains how to use a perceptual hash algorithm to generate image fingerprints, compare them to assess UI screen similarity, and integrate this method with UIAutomator for automated decision‑making in the 360 testing project, reducing computational complexity compared to naive double‑loop approaches.

AndroidUI automationhash algorithm
0 likes · 4 min read
Implementing a Perceptual Hash Algorithm for UI Image Similarity in Android Automation
Java Architect Essentials
Java Architect Essentials
Jul 11, 2018 · Backend Development

Understanding Java HashMap hashCode and Hash Algorithm

This article explains the fundamentals of binary operations, why hashCode is used, how Java's String hashCode is implemented, the rationale behind using the multiplier 31, and the detailed workings of HashMap's hash function, index calculation, capacity choices, and custom sizing recommendations.

HashCodeHashMapJava
0 likes · 13 min read
Understanding Java HashMap hashCode and Hash Algorithm