Tagged articles
16 articles
Page 1 of 1
dbaplus Community
dbaplus Community
Nov 15, 2023 · Databases

Scaling Bloom Filter for 800 Million OpenIDs in Redis

This article explains how to use a Bloom filter backed by Redis bitmap and Roaring Bitmap sharding to efficiently filter 800 million OpenID queries, covering memory planning, hash function selection, code implementation, and performance‑tuned batch write strategies.

BitmapRoaring Bitmapbackend optimization
0 likes · 13 min read
Scaling Bloom Filter for 800 Million OpenIDs in Redis
Top Architect
Top Architect
Jul 13, 2022 · Fundamentals

Understanding Bloom Filters, Counting Bloom Filters, and Cuckoo Filters

This article explains the motivation behind using filters to reduce database I/O, introduces Bloom filters and their bitmap implementation, discusses their limitations, then covers Counting Bloom filters and Cuckoo filters—including their hash structures, deletion support, performance trade‑offs, and practical improvements.

Counting BloomCuckoo FilterData Structures
0 likes · 13 min read
Understanding Bloom Filters, Counting Bloom Filters, and Cuckoo Filters
Ops Development Stories
Ops Development Stories
Sep 18, 2021 · Information Security

Secure Message Delivery: Symmetric & Asymmetric Encryption, Hashes, Signatures

Learn the fundamentals of information security through a myth-inspired scenario, covering how symmetric and asymmetric encryption, message digests, and digital signatures ensure confidentiality, integrity, and authenticity when transmitting a simple invitation, and explore a practical secure email system design.

Symmetric Cryptographydigital signaturesencryption
0 likes · 7 min read
Secure Message Delivery: Symmetric & Asymmetric Encryption, Hashes, Signatures
Tencent Cloud Developer
Tencent Cloud Developer
Jul 21, 2021 · Big Data

Bloom Filter: Introduction, Theory, Construction, Query, and Applications

The article explains Bloom filters—a probabilistic, space‑efficient data structure using multiple hash functions on a bit array to answer set‑membership queries with controllable false‑positive rates, detailing their construction, query process, optimal parameters, and common uses such as URL deduplication, cache protection, and spam filtering.

Big Databloom-filtercache optimization
0 likes · 8 min read
Bloom Filter: Introduction, Theory, Construction, Query, and Applications
Selected Java Interview Questions
Selected Java Interview Questions
Jan 23, 2021 · Information Security

Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange

This article provides a comprehensive introduction to cryptographic techniques, covering the goals of confidentiality, integrity and authentication, and detailing symmetric, asymmetric and hash algorithms, common implementations, their advantages and drawbacks, as well as key exchange methods and public key infrastructure.

PKIasymmetric encryptioncryptography
0 likes · 16 min read
Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 14, 2019 · Backend Development

Common Java Pitfalls and Performance Tips: NullPointerException, Spin Locks, Low Coupling, CPU Monitoring, and Hash Functions

This article explains typical Java issues such as NullPointerException, demonstrates using spin locks for efficient multithreading, emphasizes low‑coupling design, shows how to diagnose CPU spikes with Linux tools and jstack, and describes why hash functions have O(1) lookup with collision‑resolution strategies.

CPU MonitoringLow CouplingSpinlock
0 likes · 5 min read
Common Java Pitfalls and Performance Tips: NullPointerException, Spin Locks, Low Coupling, CPU Monitoring, and Hash Functions
Senior Brother's Insights
Senior Brother's Insights
Jul 30, 2018 · Blockchain

Why Blockchain Matters: From Hash Functions to Decentralized Ledgers

The article explains how blockchain, introduced by Satoshi Nakamoto in 2008, uses cryptographic hash functions, Merkle trees, proof‑of‑work, and digital signatures to create an immutable, trust‑minimized ledger, compares naïve and validated coin models, and contrasts public versus private blockchains while forecasting massive future growth.

DecentralizationMerkle TreeProof of Work
0 likes · 23 min read
Why Blockchain Matters: From Hash Functions to Decentralized Ledgers
Programmer DD
Programmer DD
Jul 9, 2018 · Blockchain

Understanding Blockchain: From Trust to Mining Explained for Developers

This comprehensive guide walks developers through the fundamental principles of blockchain, covering monetary trust, cryptographic primitives, Bitcoin's transaction model, block structure, proof‑of‑work mining, security challenges, alternative consensus mechanisms, and real‑world applications beyond cryptocurrency.

BitcoinBlockchainConsensus
0 likes · 29 min read
Understanding Blockchain: From Trust to Mining Explained for Developers
360 Quality & Efficiency
360 Quality & Efficiency
Mar 6, 2017 · Information Security

Understanding Hash Functions, Encryption Algorithms, and Their Java Implementation

This article explains the fundamentals of hash functions and encryption algorithms, illustrates Google’s SHA‑1 collision breakthrough, describes the classification of cryptographic methods, presents a detailed end‑to‑end encryption/decryption scenario, and shows how Java’s built‑in APIs and libraries support these techniques for secure data handling.

Javahash functions
0 likes · 8 min read
Understanding Hash Functions, Encryption Algorithms, and Their Java Implementation
21CTO
21CTO
Mar 30, 2016 · Fundamentals

Choosing the Right Hash Algorithm: Thomas Wang vs. MurmurHash

This article explains how to select appropriate hash functions for different key types, compares Thomas Wang's integer mix function with MurmurHash for strings, and details rehash strategies, load factor thresholds, and value storage structures in hash tables.

Data StructuresMurmurHashRehash
0 likes · 6 min read
Choosing the Right Hash Algorithm: Thomas Wang vs. MurmurHash
Architect
Architect
Jun 9, 2015 · Information Security

Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.

The article explains that general‑purpose hash functions like MD5 and SHA families are fast and vulnerable to brute‑force attacks, while bcrypt’s deliberately slow, work‑factor‑adjustable design makes it a far more secure choice for storing passwords.

Securitybcryptcryptography
0 likes · 4 min read
Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.