Tagged articles
950 articles
Page 10 of 10
ITPUB
ITPUB
Jan 25, 2017 · Databases

Master Oracle Hit Ratios and Memory Tuning with Practical SQL Queries

This guide explains how to calculate and interpret key Oracle hit ratios—including library cache, shared pool, buffer cache, data buffer, sort memory, and PGA—provides exact SQL statements for each metric, and offers tuning thresholds and actions to improve database performance.

Database TuningHit RatioMemory Management
0 likes · 7 min read
Master Oracle Hit Ratios and Memory Tuning with Practical SQL Queries
ITPUB
ITPUB
Jan 21, 2017 · Databases

How Redis Implements LRU Eviction: Deep Dive with Python Example

This article explains Redis's LRU eviction mechanism, starting with a brief LRU overview, presenting a Python LRU cache implementation, then detailing Redis's internal LRU clock, object fields, maxmemory policies, and both active and passive eviction processes, highlighting configuration impacts on performance.

Cache EvictionLRUMemory Management
0 likes · 15 min read
How Redis Implements LRU Eviction: Deep Dive with Python Example
Tencent Cloud Developer
Tencent Cloud Developer
Dec 26, 2016 · Databases

Analysis of Redis Design: Network Model, Data Structures, Memory Management, Persistence, and Clustering

The article dissects Redis’s architecture by examining its single‑threaded reactor network model, core data structures and memory‑management tactics, AOF/RDB persistence mechanisms, and master‑slave, Sentinel, and Cluster multi‑node strategies, highlighting how each design choice balances speed, memory usage, and system complexity.

Event-drivenMemory ManagementPersistence
0 likes · 16 min read
Analysis of Redis Design: Network Model, Data Structures, Memory Management, Persistence, and Clustering
Meituan Technology Team
Meituan Technology Team
Dec 9, 2016 · Big Data

Memory Usage Analysis of HDFS NameNode Core Data Structures

The article quantitatively breaks down HDFS NameNode memory consumption, showing that the Namespace tree and BlocksMap together dominate heap usage (≈53 GB in large clusters), provides detailed per‑object size estimates for NetworkTopology, INode and block structures, and proposes a simple formula to predict total heap requirements and tuning recommendations.

Big DataHDFSMemory Management
0 likes · 13 min read
Memory Usage Analysis of HDFS NameNode Core Data Structures
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Nov 17, 2016 · Operations

Why Large Redis Instances Cause Disasters and How to Prevent Them

This article examines the operational challenges of oversized Redis instances—including slow failover, prolonged slave resynchronization, network‑induced avalanches, and persistence blocking—and offers practical mitigation strategies such as key expiration, data compression, and using high‑performance alternatives like Pika.

Database operationsMemory ManagementPerformance Optimization
0 likes · 9 min read
Why Large Redis Instances Cause Disasters and How to Prevent Them
ITPUB
ITPUB
Nov 14, 2016 · Fundamentals

How Linux Kernel Turns malloc Calls into Physical Memory: A Simple Guide

This article explains Linux kernel memory management by describing how user‑level malloc allocates virtual memory, how page tables map virtual to physical addresses, and how the hardware‑triggered page‑fault mechanism ultimately provides the needed physical pages.

KernelMemory ManagementPage Fault
0 likes · 9 min read
How Linux Kernel Turns malloc Calls into Physical Memory: A Simple Guide
ITPUB
ITPUB
Nov 4, 2016 · Databases

Understanding MySQL’s DYNAMIC_STRING: Structure, Initialization, and Manipulation

The article explains MySQL’s DYNAMIC_STRING structure, detailing its fields, how to initialize it with init_dynamic_string, and how functions like dynstr_append_mem, dynstr_trunc, dynstr_realloc, and dynstr_append_os_quoted manage dynamic resizing, truncation, and OS‑quote handling for safe string operations.

CDynamic StringMemory Management
0 likes · 8 min read
Understanding MySQL’s DYNAMIC_STRING: Structure, Initialization, and Manipulation
dbaplus Community
dbaplus Community
Oct 30, 2016 · Databases

Memcached vs Redis: Architecture, Memory Management & Persistence

This article provides a detailed comparison of Memcached and Redis by examining their service models, event loops, memory allocation strategies, database structures, persistence mechanisms (RDB and AOF), transaction support, and publish‑subscribe features, highlighting the design choices, trade‑offs, and implementation nuances of each key‑value caching system.

MemcachedMemory ManagementPersistence
0 likes · 35 min read
Memcached vs Redis: Architecture, Memory Management & Persistence
Java Backend Technology
Java Backend Technology
Oct 10, 2016 · Fundamentals

Handles vs Direct Pointers: How Java Accesses Objects Efficiently

This article explains Java's object access mechanisms, detailing how references in the stack point to objects in the heap and type data in the method area, and compares the handle pool approach with direct pointer access, highlighting their respective performance and GC advantages.

Direct PointersJavaMemory Management
0 likes · 4 min read
Handles vs Direct Pointers: How Java Accesses Objects Efficiently
Java Backend Technology
Java Backend Technology
Oct 9, 2016 · Backend Development

Understanding JVM Memory Areas: A Deep Dive into Java Runtime Data

This article explains the JVM as Java's operating system, outlines its class loading process, and provides a detailed walkthrough of each runtime memory region—including program counter, stacks, heap, method area, and direct memory—highlighting their purposes and related error conditions.

Backend DevelopmentJavaMemory Management
0 likes · 13 min read
Understanding JVM Memory Areas: A Deep Dive into Java Runtime Data
ITPUB
ITPUB
Oct 9, 2016 · Fundamentals

Why the Linux Kernel Thrives: Architecture, Modularity, and Extensibility Explained

The article explains how the Linux kernel’s flexible architecture and highly modular design enable massive volunteer contributions, seamless extensibility, and cross‑platform portability by detailing its position in the system, core functions, subsystem interactions, key data structures, and the benefits of its layered, dependency‑driven design.

Kernel ArchitectureMemory ManagementOperating Systems
0 likes · 19 min read
Why the Linux Kernel Thrives: Architecture, Modularity, and Extensibility Explained
MaGe Linux Operations
MaGe Linux Operations
Oct 6, 2016 · Fundamentals

Understanding Linux’s Three‑Tier Physical Memory and Virtual Page Table Architecture

This article explains Linux’s hardware‑independent three‑tier physical memory model (node, zone, page) and the three‑level virtual memory page‑table hierarchy (PGD, PMD, PTE), including key macros, structure definitions, and the macros used to walk the tables from a virtual address to a physical page.

LinuxMemory ManagementVirtual Memory
0 likes · 6 min read
Understanding Linux’s Three‑Tier Physical Memory and Virtual Page Table Architecture
Meituan Technology Team
Meituan Technology Team
Sep 23, 2016 · Fundamentals

Understanding G1 Garbage Collector: Key Concepts, Regions, SATB, RSet, and Pause Prediction Model

The G1 Garbage‑First collector is a server‑side, region‑based Java GC designed for multi‑processor, large‑memory systems that concurrently marks objects using SATB, tracks cross‑region references with RSets, and employs a pause‑prediction model to meet user‑specified pause‑time goals while maintaining high throughput.

Garbage CollectionJVMJava
0 likes · 15 min read
Understanding G1 Garbage Collector: Key Concepts, Regions, SATB, RSet, and Pause Prediction Model
ITPUB
ITPUB
Sep 9, 2016 · Backend Development

How Linux Parses Memory Tags from U‑Boot and Adjusts Boot Parameters

This article explains the two-stage process by which the Linux kernel parses memory information passed from U‑Boot—first via ATAG tags and then through the boot command line—detailing the relevant code, data structures, and practical methods for modifying memory size on embedded platforms.

Boot ParametersKernelLinux
0 likes · 9 min read
How Linux Parses Memory Tags from U‑Boot and Adjusts Boot Parameters
ITPUB
ITPUB
Sep 2, 2016 · Databases

How to Switch Oracle 11g Between ASMM and AMM – Step-by-Step

This guide demonstrates how to switch Oracle Database 11g between Automatic Shared Memory Management (ASMM) and Automatic Memory Management (AMM), covering environment setup, parameter adjustments, spfile/pfile handling, restart procedures, and troubleshooting, with concrete SQL commands and shared‑memory observations.

AMMASMMDatabase Administration
0 likes · 8 min read
How to Switch Oracle 11g Between ASMM and AMM – Step-by-Step
Meituan Technology Team
Meituan Technology Team
Aug 26, 2016 · Big Data

Memory Architecture and Analysis of Hadoop HDFS NameNode

The article dissects Hadoop 2.4.1’s HDFS NameNode memory architecture, detailing how the Namespace, BlockManager, NetworkTopology, and LeaseManager consume the heap, exposing scaling problems when metadata reaches hundreds of millions of inodes and blocks, and recommending file merging, block‑size tuning, federation, or external KV stores to mitigate heap pressure.

Big DataHDFSMemory Management
0 likes · 17 min read
Memory Architecture and Analysis of Hadoop HDFS NameNode
Tencent Music Tech Team
Tencent Music Tech Team
Jul 20, 2016 · Mobile Development

Overview of Android TV Development

Android TV, now dominating China’s rapidly expanding smart‑TV market, offers a large shared screen experience and extensive I/O options, while development mirrors Android phone projects using Android Studio and Gradle, with debugging on boxes or tablets, and requires careful handling of limited CPU/memory, background‑process behavior, and wired‑network connectivity.

Android TVDebuggingMemory Management
0 likes · 8 min read
Overview of Android TV Development
Efficient Ops
Efficient Ops
Jun 5, 2016 · Operations

Mastering Linux Swap: How Swappiness, kswapd, and Watermarks Control Memory

This article explains Linux swap fundamentals, the role of swappiness, kswapd behavior, memory watermarks, and related kernel parameters, providing practical guidance on configuring swap priority, zone reclaim, and other settings to optimize system performance under various workloads.

LinuxMemory ManagementSwap
0 likes · 20 min read
Mastering Linux Swap: How Swappiness, kswapd, and Watermarks Control Memory
Architect
Architect
May 25, 2016 · Big Data

How Flink Manages Memory to Overcome JVM Limitations

The article explains how Flink tackles JVM memory challenges by using proactive memory management, a custom serialization framework, cache‑friendly binary operations, and off‑heap memory techniques to reduce GC pressure, avoid OOM, and improve performance in big‑data workloads.

Big DataFlinkJVM
0 likes · 17 min read
How Flink Manages Memory to Overcome JVM Limitations
Efficient Ops
Efficient Ops
May 3, 2016 · Operations

Do You Really Understand Linux’s free Command and Cache Behavior?

This article demystifies the Linux free command, explains the distinction between buffer and page caches, shows how various caches are reclaimed—or not—through practical tests with tmpfs, shared memory, and mmap, and provides actionable tips for accurately interpreting memory usage on RHEL 6 systems.

LinuxMemory Managementfree command
0 likes · 15 min read
Do You Really Understand Linux’s free Command and Cache Behavior?

Understanding the G1 (Garbage‑First) Garbage Collector in Java

The article explains the design, operation, and performance characteristics of Java's G1 (Garbage‑First) collector, covering its parallelism, generational approach, space‑efficiency, pause‑time predictability, implementation details, execution phases, benchmark results, and practical recommendations for choosing a collector.

G1Garbage CollectionJVM
0 likes · 16 min read
Understanding the G1 (Garbage‑First) Garbage Collector in Java
Java Captain
Java Captain
Apr 9, 2016 · Fundamentals

Key Java Fundamentals: JVM, JRE, JDK, Environment Variables, Data Types, Memory, and More

This article provides concise explanations of core Java concepts including the differences between JVM, JRE and JDK, the roles of PATH and CLASSPATH, variable usage, operators, naming rules, data types, type conversion, Java architecture tiers, cross‑platform nature, signed number representations, functions, overloading, arrays, and memory structure.

Data TypesJREJVM
0 likes · 6 min read
Key Java Fundamentals: JVM, JRE, JDK, Environment Variables, Data Types, Memory, and More
Architect
Architect
Dec 10, 2015 · Databases

Understanding Redis maxmemory Configuration and Approximate LRU Eviction Policies

Redis provides a configurable maxmemory setting to limit memory usage, and offers several eviction policies—including allkeys‑lru, volatile‑lru, and random strategies—implemented via an approximate LRU algorithm whose behavior can be tuned with maxmemory‑samples, allowing administrators to balance performance and memory reclamation.

LRUMemory Managementeviction
0 likes · 11 min read
Understanding Redis maxmemory Configuration and Approximate LRU Eviction Policies
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
Nov 25, 2015 · Backend Development

Mastering Node.js Memory: How V8 Manages Heap, Garbage Collection, and Leak Detection

This article explains Node.js memory architecture, how the V8 engine allocates and frees memory across code, stack, and heap, demonstrates using process.memoryUsage() to monitor RSS, heapTotal and heapUsed, describes V8’s Scavenge and Mark‑Sweep garbage collectors, and provides practical techniques for detecting and debugging memory leaks with heap snapshots and profiling tools.

DebuggingGarbage CollectionMemory Management
0 likes · 12 min read
Mastering Node.js Memory: How V8 Manages Heap, Garbage Collection, and Leak Detection
21CTO
21CTO
Nov 8, 2015 · Backend Development

Inside PHP: Unveiling the Engine, Extensions, SAPI and Memory Management

This article explores PHP's underlying architecture, covering its design philosophy, four‑layer system (Zend engine, extensions, SAPI, and applications), execution flow with opcodes, core data structures like HashTable, and the internal representation of variables via zval, providing deep insight for backend developers.

Memory ManagementPHPZend engine
0 likes · 16 min read
Inside PHP: Unveiling the Engine, Extensions, SAPI and Memory Management
Architect
Architect
Nov 4, 2015 · Backend Development

Optimizing Web Server Performance: Reducing Concurrency Pressure, Memory and CPU Usage

The article explains why modern web systems face ever‑increasing concurrent connections, analyzes how front‑end techniques and server‑side configurations such as Apache MPM modes, Nginx, sendfile, and epoll can reduce memory and CPU consumption, and offers practical recommendations for efficient backend architecture.

ApacheCPU optimizationMemory Management
0 likes · 17 min read
Optimizing Web Server Performance: Reducing Concurrency Pressure, Memory and CPU Usage
21CTO
21CTO
Oct 11, 2015 · Frontend Development

Unveiling JavaScript Closures: How Scope Chains and Memory Work Under the Hood

This article demystifies JavaScript closures by explaining when they are created, how the scope chain and lexical environments operate, why closures persist in memory, and how nested functions and the garbage collector interact, illustrated with clear code examples and diagrams.

Memory ManagementScope Chainclosure
0 likes · 16 min read
Unveiling JavaScript Closures: How Scope Chains and Memory Work Under the Hood
WeChat Client Technology Team
WeChat Client Technology Team
Sep 28, 2015 · Fundamentals

Mastering C# Memory Management and WP Leak Detection Techniques

This article explains C#'s managed and unmanaged resource handling, memory regions, garbage‑collection algorithms, generational GC, finalizers, the IDisposable pattern, value vs. reference types, and practical methods for discovering and pinpointing memory leaks in Windows Phone applications.

CGarbage CollectionIDisposable
0 likes · 16 min read
Mastering C# Memory Management and WP Leak Detection Techniques
21CTO
21CTO
Sep 21, 2015 · Operations

How to Tame High Concurrency: Cutting Web Server Memory and CPU Usage

This article explains why modern web systems face exploding concurrent connections, how richer page interactions and higher browser limits increase server load, and presents front‑end caching, request merging, Apache/Nginx memory‑saving modes, sendfile, and epoll techniques to reduce both memory and CPU consumption.

ApacheCPU optimizationMemory Management
0 likes · 19 min read
How to Tame High Concurrency: Cutting Web Server Memory and CPU Usage
Tencent TDS Service
Tencent TDS Service
Jun 4, 2015 · Mobile Development

Turning Sporadic iOS Wild‑Pointer Crashes into Deterministic Failures

This article explains how to convert rare, non‑reproducible Obj‑C wild‑pointer crashes into consistently repeatable crashes by delaying memory release, retaining freed memory in a custom queue, and safely managing it under memory‑pressure conditions.

Crash ReproductionMemory ManagementObjective‑C
0 likes · 8 min read
Turning Sporadic iOS Wild‑Pointer Crashes into Deterministic Failures
MaGe Linux Operations
MaGe Linux Operations
Mar 18, 2015 · Fundamentals

Unlocking Java Memory: How Garbage Collection Works and Why It Matters

This article explores Java's garbage collection mechanisms, detailing why memory reclamation is essential, the design considerations, various algorithms such as mark‑sweep, copy, and compact, the roles of different collectors like Serial, Parallel, CMS, and G1, and how they impact performance.

GC AlgorithmsGarbage CollectionJVM
0 likes · 8 min read
Unlocking Java Memory: How Garbage Collection Works and Why It Matters
MaGe Linux Operations
MaGe Linux Operations
Dec 15, 2014 · Fundamentals

Mastering JVM Garbage Collectors: Which One Fits Your Application?

This article explains the main JVM garbage collectors—including Serial, ParNew, Parallel Scavenge, Serial Old, Parallel Old, CMS, and G1—detailing their algorithms, use cases, advantages, and configuration options, and provides visual diagrams and parameter tables for clear understanding.

Garbage CollectionJVMJava
0 likes · 8 min read
Mastering JVM Garbage Collectors: Which One Fits Your Application?
Baidu Tech Salon
Baidu Tech Salon
May 28, 2014 · Game Development

C++ Performance Optimization Techniques for Ray Tracing

The article outlines 27 C++ performance optimization techniques for ray tracing, emphasizing profiling hot paths, minimizing branches and memory accesses, using inline and reference passing, aligning data, loop unrolling, avoiding unnecessary temporaries, and simplifying math to exploit cache locality and modern CPU parallelism.

Amdahl's LawC++ optimizationCode Efficiency
0 likes · 12 min read
C++ Performance Optimization Techniques for Ray Tracing