Tagged articles
255 articles
Page 3 of 3
Architect's Tech Stack
Architect's Tech Stack
Sep 30, 2020 · Backend Development

Implementing API Idempotency with Redis Token Mechanism in Spring Boot

This article explains the concept of API idempotency, reviews common solutions, and provides a complete Spring Boot implementation using a Redis‑based token mechanism, custom @ApiIdempotent annotation, interceptor, and supporting services, along with testing and important concurrency considerations.

APIIdempotencyInterceptor
0 likes · 14 min read
Implementing API Idempotency with Redis Token Mechanism in Spring Boot
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Sep 20, 2020 · Backend Development

General Idempotent Implementation for Backend Services

This article explains the concepts, challenges, and practical implementations of idempotency in backend systems, covering simple database‑record checks, concurrency handling with locks, a reusable idempotent component with multi‑level storage, annotation support, automatic key generation, and sample Java code.

Idempotencyannotation
0 likes · 11 min read
General Idempotent Implementation for Backend Services
dbaplus Community
dbaplus Community
Sep 16, 2020 · Backend Development

How to Solve Distributed Transactions, Idempotency, and Async Messaging in Microservices

This article shares practical strategies for handling distributed transactions, idempotent operations, and asynchronous message ordering in microservice architectures, covering pitfalls of RPC inside transactions, compensation patterns, local message tables, and state‑driven messaging to achieve reliable consistency without sacrificing performance.

CompensationIdempotencyLocal Message Table
0 likes · 25 min read
How to Solve Distributed Transactions, Idempotency, and Async Messaging in Microservices
Java Backend Technology
Java Backend Technology
Sep 13, 2020 · Backend Development

How to Build a Robust Idempotent Framework for Distributed Systems

This article explains why idempotency is essential, presents simple database‑based and concurrency‑safe implementations, and then details a generic, annotation‑driven idempotent framework with multi‑level storage, code examples, and deployment guidelines for Java backend services.

BackendDistributed SystemsIdempotency
0 likes · 12 min read
How to Build a Robust Idempotent Framework for Distributed Systems
Top Architect
Top Architect
Aug 16, 2020 · Backend Development

Implementing API Idempotency in Spring Boot Using Redis and Token Mechanism

This article explains how to achieve API idempotency in a Spring Boot application by generating unique tokens, storing them in Redis, and using a custom @ApiIdempotent annotation with an interceptor to prevent duplicate requests, including code examples, configuration, and testing procedures.

APIIdempotencyInterceptor
0 likes · 14 min read
Implementing API Idempotency in Spring Boot Using Redis and Token Mechanism
macrozheng
macrozheng
Jul 20, 2020 · Backend Development

How to Prevent Duplicate Submissions in Java: Simple Backend Solutions

This article explores practical methods to prevent duplicate submissions in Java applications, starting with a simple front‑end button disabling technique and progressing through several backend strategies—including HashMap, fixed‑size array, double‑checked locking, and Apache Commons LRUMap—complete with code samples and performance considerations.

BackendIdempotencyJava
0 likes · 17 min read
How to Prevent Duplicate Submissions in Java: Simple Backend Solutions
Programmer DD
Programmer DD
Jul 11, 2020 · Backend Development

How to Build a Reliable Email Service with RabbitMQ and Spring Boot

This article walks through creating a robust email‑sending system using Spring Boot and RabbitMQ, covering message confirmation, consumer idempotency, retry mechanisms, scheduled re‑delivery, and detailed code examples to ensure reliable delivery even under failure conditions.

EmailIdempotencyMessage Retry
0 likes · 16 min read
How to Build a Reliable Email Service with RabbitMQ and Spring Boot
Top Architect
Top Architect
Jun 8, 2020 · Backend Development

Ensuring Idempotency with Unique IDs: UUID, Snowflake, and Distributed ID Generation

The article explains why idempotency is essential for reliable services, describes how unique identifiers such as UUIDs, Snowflake IDs, and database‑generated keys can be used to achieve it, and offers practical guidance on shared storage, avoiding unnecessary queries, and handling duplicate requests in distributed systems.

IdempotencyUnique IDdatabase
0 likes · 8 min read
Ensuring Idempotency with Unique IDs: UUID, Snowflake, and Distributed ID Generation
Architecture Digest
Architecture Digest
May 11, 2020 · Backend Development

Ensuring Idempotency in Distributed Systems: Unique ID Generation Strategies

The article explains why idempotency is essential for reliable service calls, discusses using unique identifiers such as UUIDs and Snowflake algorithms, compares centralized and client‑side ID generation, and offers practical storage and query‑optimisation techniques to prevent duplicate orders and resource waste.

Distributed SystemsIdempotencyUnique ID
0 likes · 6 min read
Ensuring Idempotency in Distributed Systems: Unique ID Generation Strategies
21CTO
21CTO
May 2, 2020 · Backend Development

Master Distributed Caching, Rate Limiting, Locks & Idempotency with Alibaba Tools

This article introduces Alibaba's distributed‑tools component, explaining how to configure Redis/Tair cache, implement fixed‑window rate limiting, use a high‑performance distributed lock template, and apply idempotency mechanisms with annotations and templates to ensure reliable microservice operations.

IdempotencySpringBootcaching
0 likes · 15 min read
Master Distributed Caching, Rate Limiting, Locks & Idempotency with Alibaba Tools
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Mar 22, 2020 · Backend Development

API Design Specification Guidelines for Backend Development

This article provides comprehensive API design guidelines covering routing naming conventions, request methods, parameter structures, security measures, response formats, signature design, logging platform setup, and idempotency strategies to help backend developers create consistent and reliable interfaces.

BackendIdempotencySecurity
0 likes · 6 min read
API Design Specification Guidelines for Backend Development
Big Data Technology & Architecture
Big Data Technology & Architecture
Feb 27, 2020 · Fundamentals

Message Queue Usage, Advantages, Disadvantages, and High‑Availability Design

The article explains why message queues are used, outlines their core scenarios—decoupling, asynchronous processing, and traffic shaping—compares Kafka, ActiveMQ, RabbitMQ, and RocketMQ, and details how to ensure high availability, reliability, idempotency, ordering, and scalability in production systems.

IdempotencyKafkaMessage Queue
0 likes · 34 min read
Message Queue Usage, Advantages, Disadvantages, and High‑Availability Design
Big Data Technology & Architecture
Big Data Technology & Architecture
Feb 11, 2020 · Backend Development

Message Queue Interview Guide: Benefits, Drawbacks, High Availability, Idempotency, Ordering and Design Strategies

This article provides a comprehensive interview‑oriented overview of message queues, explaining why they are used, their core advantages and disadvantages, comparing Kafka, RabbitMQ, ActiveMQ and RocketMQ, and detailing high‑availability, reliability, idempotency, ordering, backlog handling and architectural design considerations.

IdempotencyKafkaMessage Queue
0 likes · 33 min read
Message Queue Interview Guide: Benefits, Drawbacks, High Availability, Idempotency, Ordering and Design Strategies
Architecture Digest
Architecture Digest
Jan 21, 2020 · Backend Development

Implementing Idempotent Requests with Local Locks, AOP, and Redis in Java

This article explains the concept of idempotency in web services, analyzes common causes of duplicate submissions, and presents multiple backend solutions—including frontend button disabling, PRG pattern, session flags, local locks using ConcurrentHashMap, AOP interceptors, and distributed Redis locks—accompanied by complete Java code examples.

Idempotencyspring
0 likes · 13 min read
Implementing Idempotent Requests with Local Locks, AOP, and Redis in Java
Architecture Digest
Architecture Digest
Jan 7, 2020 · Backend Development

Ensuring 100% Message Delivery with RabbitMQ: Reliability Steps and Idempotent Design

This article explains how to achieve guaranteed 100% message delivery in RabbitMQ by leveraging its acknowledgment mechanisms, implementing producer‑side confirmation steps, designing compensation and retry logic, and ensuring consumer‑side idempotency through unique identifiers and various ID‑generation strategies.

Distributed SystemsIdempotencyMessage Delivery
0 likes · 7 min read
Ensuring 100% Message Delivery with RabbitMQ: Reliability Steps and Idempotent Design
Java Captain
Java Captain
Jan 6, 2020 · Backend Development

Implementing API Idempotency with Redis Token Mechanism in Spring Boot

This article explains how to achieve interface idempotency in a Spring Boot application by generating a unique token for each request, storing it in Redis, validating the token via a custom annotation and interceptor, and provides complete code examples and testing guidance.

IdempotencyInterceptorJava
0 likes · 16 min read
Implementing API Idempotency with Redis Token Mechanism in Spring Boot
Senior Brother's Insights
Senior Brother's Insights
Dec 25, 2019 · Backend Development

Ensuring Idempotency in Distributed Systems: Strategies and Best Practices

The article explains why idempotent operations are essential in high‑traffic systems, defines idempotency, and presents a comprehensive set of techniques—including unique indexes, token validation, pessimistic and optimistic locking, distributed locks, select‑plus‑insert patterns, state‑machine design, and API safeguards—to guarantee consistent outcomes even under repeated requests.

Idempotencydatabasedistributed-lock
0 likes · 9 min read
Ensuring Idempotency in Distributed Systems: Strategies and Best Practices
Programmer DD
Programmer DD
Dec 9, 2019 · Backend Development

How to Ensure Idempotency in Distributed Systems: Strategies and Code Examples

This article explains the importance of idempotent operations in backend systems, defines the concept, and presents practical techniques such as unique indexes, token mechanisms, pessimistic and optimistic locking, distributed locks, state‑machine design, and API patterns, complete with code snippets and diagrams.

BackendDistributed SystemsIdempotency
0 likes · 10 min read
How to Ensure Idempotency in Distributed Systems: Strategies and Code Examples
Selected Java Interview Questions
Selected Java Interview Questions
Nov 1, 2019 · Backend Development

Implementing Idempotency for API Requests in Backend Development

The article explains how to improve system scalability through hardware and software architecture enhancements, defines idempotency and its importance for preventing duplicate processing, and describes a practical implementation using unique request identifiers to ensure consistent responses for repeated API calls.

APIIdempotencyMicroservices
0 likes · 4 min read
Implementing Idempotency for API Requests in Backend Development
High Availability Architecture
High Availability Architecture
Sep 20, 2019 · Backend Development

Ensuring Idempotency and Preventing Double Payments in a Distributed Payments System

The article explains how Airbnb’s payment platform uses a generic idempotency library called Orpheus, combined with Java lambda‑driven transaction composition, to guarantee data consistency, avoid double charges, and handle retries in a low‑latency micro‑service architecture.

Database TransactionsDistributed SystemsIdempotency
0 likes · 19 min read
Ensuring Idempotency and Preventing Double Payments in a Distributed Payments System
Programmer DD
Programmer DD
Aug 11, 2019 · Backend Development

Ensuring API Idempotency with Spring Boot, Redis, and Token Interceptor

This article explains the concept of idempotency, lists common solutions, and demonstrates a practical implementation using Spring Boot, Redis, and a token‑based mechanism with custom annotations and interceptors, including full code examples, testing steps, and important pitfalls to avoid.

APIIdempotencyInterceptor
0 likes · 11 min read
Ensuring API Idempotency with Spring Boot, Redis, and Token Interceptor
Youzan Coder
Youzan Coder
Aug 9, 2019 · Backend Development

How Youzan Built a Scalable Task Center: Architecture, Idempotency, and Dynamic Config

This article explains why a task center is essential for merchants, outlines its goals, and details the backend architecture—including atomic APIs, Apollo-driven dynamic configuration, idempotent control, workflow orchestration, caching, and asynchronous logging—while also sharing future enhancements.

Backend ArchitectureDynamic ConfigurationIdempotency
0 likes · 8 min read
How Youzan Built a Scalable Task Center: Architecture, Idempotency, and Dynamic Config
dbaplus Community
dbaplus Community
Jul 4, 2019 · Databases

How Tencent’s TDSQL Multi‑Source Sync Achieves High‑Performance, Consistent Data Distribution

This article explains the financial‑industry driven requirements for real‑time data sync, describes the TDSQL‑MULTISRCSYNC architecture—including producer, store, and consumer components—and details core designs such as row‑hash concurrency, idempotent binlog handling, and a lock‑based ordering mechanism that ensure high throughput and consistency.

Database ReplicationIdempotencyKafka
0 likes · 13 min read
How Tencent’s TDSQL Multi‑Source Sync Achieves High‑Performance, Consistent Data Distribution
Java High-Performance Architecture
Java High-Performance Architecture
May 15, 2019 · Databases

How to Achieve Distributed Transaction Consistency with Message Queues

This article explains how to handle distributed transactions in microservice architectures by using eventual consistency with message middleware, discusses the pitfalls of combining database updates and message sending in a single transaction, and presents a reliable solution involving a message table, background processing, ACK mechanisms, and deduplication.

Distributed TransactionsIdempotencyMicroservices
0 likes · 5 min read
How to Achieve Distributed Transaction Consistency with Message Queues
Tencent Cloud Developer
Tencent Cloud Developer
May 14, 2019 · Operations

Handling Connection Loss and Session Expiry in ZooKeeper-based Distributed Locks

When using ZooKeeper‑based distributed locks, applications must detect CONNECTIONLOSS and SESSIONEXPIRED events, verify the master znode to confirm leadership, relinquish duties on session expiry, and design idempotent tasks to avoid split‑brain or duplicate execution caused by network partitions or quorum delays.

IdempotencyZooKeeperconnection loss
0 likes · 10 min read
Handling Connection Loss and Session Expiry in ZooKeeper-based Distributed Locks
Java Backend Technology
Java Backend Technology
May 6, 2019 · Backend Development

Ensuring Zero Message Loss in RabbitMQ: Persistence, Confirm & Idempotency

This article explains how to guarantee that order service messages are reliably delivered to RabbitMQ by using durable queues, the confirm mechanism, early persistence with Redis and scheduled retries, and idempotent processing techniques to achieve near‑100% message safety in high‑concurrency environments.

Confirm MechanismDistributed SystemsIdempotency
0 likes · 10 min read
Ensuring Zero Message Loss in RabbitMQ: Persistence, Confirm & Idempotency
Programmer DD
Programmer DD
Jan 18, 2019 · Backend Development

Mastering Compensation: When to Rollback vs Retry in Distributed Systems

This article explains the purpose of compensation mechanisms in microservice architectures, compares rollback and retry approaches, outlines their implementation details, discusses idempotency concerns, and provides practical best‑practice recommendations for building resilient distributed systems.

CompensationDistributed SystemsIdempotency
0 likes · 12 min read
Mastering Compensation: When to Rollback vs Retry in Distributed Systems
21CTO
21CTO
Dec 31, 2018 · Backend Development

Designing Robust APIs: Principles, Practices, and Real-World Examples

This article explores core API design principles—clear mental models, simplicity, multiple implementations—and offers concrete best‑practice guidance, from documentation and resource modeling to idempotency, compatibility, batch updates, and error handling, illustrated with the classic POSIX File API.

CompatibilityIdempotencySoftware Architecture
0 likes · 21 min read
Designing Robust APIs: Principles, Practices, and Real-World Examples
Alibaba Cloud Native
Alibaba Cloud Native
Dec 28, 2018 · Backend Development

Essential API Design Principles and Practical Guidelines

This article explores why API design is crucial for large‑scale software systems, outlines fundamental design principles, presents detailed best‑practice recommendations, and discusses compatibility, idempotency, error handling, and versioning with concrete examples such as the POSIX File API.

CompatibilityDocumentationIdempotency
0 likes · 21 min read
Essential API Design Principles and Practical Guidelines
Architect's Tech Stack
Architect's Tech Stack
Dec 22, 2018 · Backend Development

Understanding Idempotency: Concepts, Examples, and Implementation Techniques

This article explains the mathematical and programming concept of idempotency, provides real‑world examples such as duplicate form submissions and payment requests, and details practical techniques—including query/select operations, unique indexes, token mechanisms, pessimistic and optimistic locks, distributed locks, and API design—to ensure idempotent behavior in backend systems.

Distributed SystemsIdempotencydatabase
0 likes · 9 min read
Understanding Idempotency: Concepts, Examples, and Implementation Techniques
Hujiang Technology
Hujiang Technology
Nov 26, 2018 · Backend Development

Ensuring Distributed Final Consistency: Heavy and Light Approaches, Principles and Practices

The article explains distributed final consistency challenges, compares heavyweight transaction frameworks with lightweight techniques such as idempotency, retries, state machines, recovery logs, and async verification, and outlines CAP, BASE principles and practical implementation steps for backend systems.

BASECAP theoremConsistency
0 likes · 14 min read
Ensuring Distributed Final Consistency: Heavy and Light Approaches, Principles and Practices
360 Tech Engineering
360 Tech Engineering
Jul 19, 2018 · Backend Development

Understanding Idempotency in Software Systems and How to Ensure It

The article explains the concept of idempotency, why it is critical for data consistency in backend services, and presents practical techniques such as unique business identifiers, locking, optimistic concurrency, deduplication tables, distributed locks, token mechanisms, and payment buffering to achieve reliable idempotent operations.

Distributed SystemsIdempotency
0 likes · 5 min read
Understanding Idempotency in Software Systems and How to Ensure It
360 Quality & Efficiency
360 Quality & Efficiency
Jul 6, 2018 · Backend Development

Understanding Idempotency and How to Ensure It in Backend Systems

The article explains the mathematical definition of idempotency, its importance in preventing duplicate operations such as repeated payments or order creation, and presents practical strategies—including unique business IDs, optimistic locking, deduplication tables, distributed locks, token mechanisms, and payment buffering—to achieve reliable idempotent behavior in backend services.

BackendIdempotencyToken
0 likes · 6 min read
Understanding Idempotency and How to Ensure It in Backend Systems
JD Tech
JD Tech
Jun 11, 2018 · Backend Development

Message Queue (MQ) Usage Scenarios, Patterns, and Pitfalls

Message queues enable asynchronous, decoupled communication between systems, and this article explains core scenarios such as decoupling, peak‑shaving, achieving eventual consistency, broadcast consumption, and retry handling, while highlighting implementation details, pull‑mode code, and important considerations like idempotency and consumption monitoring.

DecouplingIdempotencyRetry
0 likes · 10 min read
Message Queue (MQ) Usage Scenarios, Patterns, and Pitfalls
dbaplus Community
dbaplus Community
Jun 5, 2018 · Backend Development

Designing Highly Available Service Layers: Stateless, Timeouts, Async & Idempotency

This article explains how to build a highly available service layer by vertically splitting business domains, adopting stateless architecture, configuring timeout policies, using asynchronous calls with message queues, ensuring idempotent operations, and applying service degradation techniques to handle traffic spikes and failures.

AsynchronousBackendIdempotency
0 likes · 13 min read
Designing Highly Available Service Layers: Stateless, Timeouts, Async & Idempotency
Java Captain
Java Captain
May 30, 2018 · Backend Development

Key Points for Revisiting Message Queue Middleware: Usage, Drawbacks, Selection, High Availability, Idempotency, Reliability, and Ordering

This article reviews essential concepts of message queue middleware, covering why to use it, its drawbacks, selection criteria, high‑availability designs, preventing duplicate consumption, ensuring reliable transmission, and maintaining message order, providing a concise study guide for developers and architects.

BackendIdempotencyMQ
0 likes · 21 min read
Key Points for Revisiting Message Queue Middleware: Usage, Drawbacks, Selection, High Availability, Idempotency, Reliability, and Ordering
Architecture Digest
Architecture Digest
Apr 23, 2018 · Backend Development

Designing High‑Concurrency Architecture: Principles, Idempotency, Rate Limiting and a Token‑Bucket Demo

The article explains how to design a backend architecture that can handle millions of concurrent requests by applying principles such as service decomposition, high availability, idempotent business logic, and various rate‑limiting algorithms—including sliding window, leaky bucket and token bucket—with a runnable Java demo.

Backend ArchitectureIdempotencyToken Bucket
0 likes · 11 min read
Designing High‑Concurrency Architecture: Principles, Idempotency, Rate Limiting and a Token‑Bucket Demo
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Nov 29, 2017 · Databases

Case Study: Resolving a One‑Cent Discrepancy Caused by Distributed‑Lock Timeout and Concurrency Issues in Alibaba’s Financial System

This article analyzes a real Alibaba internal financial‑system incident where a one‑cent accounting error arose from concurrent database writes after a distributed‑lock timeout, details the root‑cause investigation, and presents two remediation strategies—adjusting timeout settings and strengthening idempotent controls—to prevent similar issues.

AlibabaIdempotencyconcurrency
0 likes · 7 min read
Case Study: Resolving a One‑Cent Discrepancy Caused by Distributed‑Lock Timeout and Concurrency Issues in Alibaba’s Financial System
Alibaba Cloud Developer
Alibaba Cloud Developer
Nov 27, 2017 · Backend Development

How a 0.01‑Yuan Mistake Exposed Distributed Lock Flaws in Alibaba’s Backend

A tiny 0.01‑yuan discrepancy in an Alibaba product revealed duplicate settlement records, exposing a distributed‑lock timeout and concurrency issue that led to double commits, and the article walks through the root‑cause analysis, reverse engineering of the process, and two remediation strategies focusing on timeout adjustments and idempotency controls.

AlibabaIdempotencyconcurrency
0 likes · 8 min read
How a 0.01‑Yuan Mistake Exposed Distributed Lock Flaws in Alibaba’s Backend
21CTO
21CTO
Oct 22, 2017 · Operations

How to Build Highly Available Systems: Fault Tolerance and Scalability Strategies

This article explains why high availability is critical for internet services, outlines key techniques such as stateless design, service discovery, heartbeat checks, idempotent operations, load balancing, throttling, caching, and micro‑service architecture, and discusses the operational challenges and monitoring tools needed to maintain resilient, scalable systems.

IdempotencyMicroservicesScalability
0 likes · 8 min read
How to Build Highly Available Systems: Fault Tolerance and Scalability Strategies
Architecture Digest
Architecture Digest
Oct 22, 2017 · Operations

Ensuring High Availability in Internet Services: Stateless Design, Service Discovery, Idempotency, Rate Limiting, and Microservices

The article discusses how to achieve high availability for large‑scale internet services by adopting stateless architecture, service discovery and registration, heartbeat monitoring, idempotent design, retry mechanisms, rate limiting, caching, and micro‑service decomposition to handle machine failures, network glitches, and high concurrency.

IdempotencyMicroservicesScalability
0 likes · 9 min read
Ensuring High Availability in Internet Services: Stateless Design, Service Discovery, Idempotency, Rate Limiting, and Microservices
Dada Group Technology
Dada Group Technology
Aug 25, 2017 · Backend Development

Designing a High‑Availability Inventory System: Stock Pre‑allocation, Idempotency, Concurrency Control, and Rollback Strategies

The article describes how JD Daojia's inventory system serves millions of stores by using health‑monitoring platforms, pre‑allocation policies, idempotent order processing, distributed locks, and rollback mechanisms to ensure stability, prevent overselling, and handle high‑concurrency scenarios such as flash‑sales.

Idempotencydistributed-lockinventory
0 likes · 11 min read
Designing a High‑Availability Inventory System: Stock Pre‑allocation, Idempotency, Concurrency Control, and Rollback Strategies
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Apr 9, 2017 · Backend Development

Mastering Distributed Locks and Idempotency for High‑Concurrency Systems

This article explores the challenges of mutual exclusion and idempotency in distributed environments, explains the underlying principles of locks in multi‑threaded and multi‑process contexts, and presents practical implementations using Zookeeper, Redis, Tair, and the Cerberus and GTIS frameworks to ensure reliable, scalable operations.

Distributed SystemsIdempotencyZooKeeper
0 likes · 35 min read
Mastering Distributed Locks and Idempotency for High‑Concurrency Systems
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Apr 7, 2017 · Backend Development

Ensuring Idempotency in High‑Concurrency Systems: Strategies and Best Practices

To prevent duplicate operations such as repeated inserts, updates, or message sends in high‑traffic applications, this article explains the concept of idempotency and outlines practical techniques—including read‑only APIs, MVCC with optimistic locking, deduplication tables, distributed locks, safe deletes, unique indexes, UUID‑based request tracking, and state‑machine safeguards.

BackendIdempotencydatabase
0 likes · 5 min read
Ensuring Idempotency in High‑Concurrency Systems: Strategies and Best Practices
Architecture Digest
Architecture Digest
Apr 1, 2017 · Backend Development

Distributed Consistency and Transactional Messaging Solutions

This article explains the challenges of achieving consistency in distributed systems and presents practical solutions such as two‑phase commit, asynchronous assurance, compensating transactions, message retry mechanisms, idempotent designs, and a custom Redis‑based delayed queue (DelayQ) with a transactional proxy (TMQProxy) to provide reliable transactional messaging.

Distributed SystemsIdempotencyMessage Retry
0 likes · 19 min read
Distributed Consistency and Transactional Messaging Solutions
Architecture Digest
Architecture Digest
Mar 9, 2017 · Backend Development

Common Design Issues and Best Practices for Distributed System Interfaces

The article outlines key challenges in distributed API design—including date formatting, decimal precision, response structures, idempotency, security, and naming consistency—and provides practical recommendations to improve usability, scalability, and maintainability across backend services.

BackendDistributed SystemsIdempotency
0 likes · 12 min read
Common Design Issues and Best Practices for Distributed System Interfaces
Meituan Technology Team
Meituan Technology Team
Oct 1, 2016 · Backend Development

Analysis of Mutual Exclusion and Idempotency Issues in Distributed Systems and Their Solutions

The article examines how distributed systems face mutual‑exclusion and idempotency challenges, explains traditional thread and process synchronization, then details distributed‑lock techniques (e.g., Zookeeper, Redis, Tair, Cerberus) and global‑ID‑based idempotent services, emphasizing the importance of external storage, fault‑tolerance, and proper lock granularity for reliable high‑throughput applications.

IdempotencyJava concurrencyZooKeeper
0 likes · 36 min read
Analysis of Mutual Exclusion and Idempotency Issues in Distributed Systems and Their Solutions
High Availability Architecture
High Availability Architecture
Jul 15, 2016 · Backend Development

High‑Availability Architecture for Weibo Paid Reading and Tipping Services

The article describes the high‑availability, high‑concurrency backend architecture of Weibo's paid reading and tipping platform, covering layered design, database sharding, asynchronous processing, monitoring, idempotency, distributed transaction handling, and security measures for a large‑scale internet‑finance system.

BackendIdempotencySecurity
0 likes · 8 min read
High‑Availability Architecture for Weibo Paid Reading and Tipping Services