Tagged articles
14 articles
Page 1 of 1
Alibaba Cloud Developer
Alibaba Cloud Developer
Oct 29, 2024 · Big Data

How We Scaled Billion‑Image Asset Ingestion with Dataworks: Lessons & Tricks

Facing the challenge of importing billions of image assets, we redesigned the pipeline using Dataworks open‑API, clustered tables, data sharding, cube tables, and custom key generation, achieving faster parallel processing, fault tolerance, and flexible attribute storage, and share practical insights on scheduling, view parametrization, and output services.

Image Processingcube tabledata ingestion
0 likes · 18 min read
How We Scaled Billion‑Image Asset Ingestion with Dataworks: Lessons & Tricks
Architecture Digest
Architecture Digest
Nov 18, 2022 · Backend Development

Design and Implementation of a Short URL Service

This article explains the value of short URLs, the HTTP redirection principle behind them, and provides detailed design and implementation strategies—including hash‑based and distributed‑ID approaches, base‑62 encoding, database storage, caching, indexing, and security measures—to build a scalable short‑link service.

HTTP redirectcachingdatabase indexing
0 likes · 12 min read
Design and Implementation of a Short URL Service
Laravel Tech Community
Laravel Tech Community
Nov 13, 2022 · Backend Development

Design and Implementation of a Short URL Service

This article explains the value, underlying HTTP redirect mechanism, and detailed design approaches—including hash‑based and distributed‑ID generation, base‑62 encoding, database storage, caching, indexing, sharding, and rate‑limiting—to build a scalable short‑link service.

HTTP redirectPerformance Optimizationhash algorithm
0 likes · 12 min read
Design and Implementation of a Short URL Service
php Courses
php Courses
May 23, 2022 · Information Security

Implementing the SHA-256 Hash Algorithm in PHP from Scratch

This article explains the theory behind cryptographic hash functions and provides a complete PHP implementation of the SHA‑256 algorithm, detailing each processing step—from converting strings to binary to final compression—along with supporting helper functions and reference tables.

Binary OperationsSHA-256cryptography
0 likes · 19 min read
Implementing the SHA-256 Hash Algorithm in PHP from Scratch
JD Tech
JD Tech
Jan 20, 2022 · Backend Development

Consistent Hash Algorithm and Its Application in Dubbo Load Balancing

This article explains the principles of consistent hashing, its data‑skew issue, how virtual nodes mitigate that problem, and demonstrates the implementation and usage of ConsistentHashLoadBalance in Dubbo with detailed code analysis and practical load‑balancing examples.

Consistent HashDubbohash algorithm
0 likes · 14 min read
Consistent Hash Algorithm and Its Application in Dubbo Load Balancing
Tencent Cloud Developer
Tencent Cloud Developer
Jan 19, 2022 · Information Security

Unveiling MD5: How It Works, Its Fixed Length, and Why It’s Vulnerable

This article explores the MD5 hashing algorithm in depth, detailing its fixed 128‑bit output, the padding and block processing steps defined in RFC 1321, the internal round functions, and the reasons it is considered irreversible yet vulnerable to collisions and various cracking techniques such as brute‑force, rainbow tables, and differential attacks.

MD5collision attackcryptography
0 likes · 15 min read
Unveiling MD5: How It Works, Its Fixed Length, and Why It’s Vulnerable
High Availability Architecture
High Availability Architecture
Oct 26, 2021 · Databases

Practical Guide to Horizontal Database Sharding: Design Principles, Common Schemes, and Expansion Strategies

This article explains the background, design criteria, and practical implementations of horizontal database sharding—including range, hash, gene, routing‑table, and consistent‑hash methods—while discussing common pitfalls, data‑skew mitigation, and both doubling and consistent‑hash expansion techniques for MySQL clusters.

consistent hashingdatabase scalinghash algorithm
0 likes · 24 min read
Practical Guide to Horizontal Database Sharding: Design Principles, Common Schemes, and Expansion Strategies
Laravel Tech Community
Laravel Tech Community
May 9, 2021 · Backend Development

Understanding Consistent Hashing: From Simple Modulo Hash to Optimizations

This article explains the drawbacks of a basic modulo hash algorithm for key distribution, demonstrates how consistent hashing resolves scaling and node‑failure issues, and discusses virtual‑node techniques to mitigate data skew and improve load balancing in distributed cache systems.

Data Skewconsistent hashingdistributed caching
0 likes · 5 min read
Understanding Consistent Hashing: From Simple Modulo Hash to Optimizations
Architecture Digest
Architecture Digest
Jul 1, 2020 · Backend Development

Design and Implementation of a Short URL Service

This article explains the concept of short URLs, compares three generation algorithms (auto‑increment ID, hash‑based, and random), analyzes their trade‑offs, and presents a complete backend design including database schema, caching strategy, redirection flow, and Java code examples for hash and base‑62 conversion.

Javabase62hash algorithm
0 likes · 15 min read
Design and Implementation of a Short URL Service
Java Captain
Java Captain
May 16, 2020 · Fundamentals

Deep Dive into Java ThreadLocal: Data Structure, Hash Algorithm, Cleanup, and Usage

This article provides an in‑depth analysis of Java’s ThreadLocal mechanism, covering its weak‑reference key, internal ThreadLocalMap structure, hash algorithm, collision resolution, cleanup strategies, expansion logic, source code walkthroughs, and practical usage scenarios such as trace‑ID propagation in distributed systems.

Distributed TracingGarbage CollectionJava
0 likes · 27 min read
Deep Dive into Java ThreadLocal: Data Structure, Hash Algorithm, Cleanup, and Usage
Aikesheng Open Source Community
Aikesheng Open Source Community
Jun 4, 2019 · Databases

How DBLE Maps Logical Shards to Physical Partitions Using a Hash Modulo

This article explains DBLE's hash‑based sharding algorithm that first computes a modulo to obtain a logical shard number and then directly maps it to a physical shard via a mapping table derived from partitionLength and partitionCount arrays, including configuration steps, development tips, operational guidance, and a comparison with MyCat.

DBLEDatabase MiddlewareMycat
0 likes · 7 min read
How DBLE Maps Logical Shards to Physical Partitions Using a Hash Modulo
360 Quality & Efficiency
360 Quality & Efficiency
Mar 8, 2019 · Artificial Intelligence

Implementing a Perceptual Hash Algorithm for UI Image Similarity in Android Automation

The article explains how to use a perceptual hash algorithm to generate image fingerprints, compare them to assess UI screen similarity, and integrate this method with UIAutomator for automated decision‑making in the 360 testing project, reducing computational complexity compared to naive double‑loop approaches.

Androidhash algorithmimage similarity
0 likes · 4 min read
Implementing a Perceptual Hash Algorithm for UI Image Similarity in Android Automation
Java Architect Essentials
Java Architect Essentials
Jul 11, 2018 · Backend Development

Understanding Java HashMap hashCode and Hash Algorithm

This article explains the fundamentals of binary operations, why hashCode is used, how Java's String hashCode is implemented, the rationale behind using the multiplier 31, and the detailed workings of HashMap's hash function, index calculation, capacity choices, and custom sizing recommendations.

Data StructuresHashMaphash algorithm
0 likes · 13 min read
Understanding Java HashMap hashCode and Hash Algorithm