Tagged articles
3240 articles
Page 26 of 33
JavaEdge
JavaEdge
Sep 2, 2020 · Backend Development

How Redis Handles File and Time Events: Inside the Event Loop

This article explains Redis server's event-driven architecture, detailing how file events (read/write) and time events are processed, illustrated with state diagrams, pseudocode, and examples that show the interaction, scheduling, and impact on server performance.

File EventsServer ArchitectureTime Events
0 likes · 12 min read
How Redis Handles File and Time Events: Inside the Event Loop
MaGe Linux Operations
MaGe Linux Operations
Sep 2, 2020 · Backend Development

How to Run Celery Tasks with Redis Without a Web Framework

This guide explains how to configure Celery to use Redis as both broker and result backend, covering project layout, code setup, task definition, execution flow, task states, and common control operations for asynchronous Python workloads.

Async TasksPythonbackend-development
0 likes · 6 min read
How to Run Celery Tasks with Redis Without a Web Framework
JavaEdge
JavaEdge
Sep 1, 2020 · Backend Development

Why Redis Uses a Single Thread Model: File Event Handlers & I/O Multiplexing

This article explains how Redis implements a single‑threaded architecture by using a file event handler built on non‑blocking I/O multiplexing (select, epoll, evport, kqueue), detailing socket event abstraction, the I/O multiplexing program, event dispatcher, and the mapping of various socket operations to specific handlers.

I/O MultiplexingSingle Threadevent-handling
0 likes · 7 min read
Why Redis Uses a Single Thread Model: File Event Handlers & I/O Multiplexing
Java Architect Essentials
Java Architect Essentials
Aug 29, 2020 · Backend Development

Understanding Distributed Locks, Session Management, Maven Configuration, and Caching in Backend Architecture

This article explains the fundamentals of backend architecture, covering Maven's settings.xml, front‑back separation, various types of locks (thread, process, distributed), detailed Redis‑based and Zookeeper‑based distributed lock implementations with code examples, session handling in distributed systems, and key Spring‑Redis caching annotations.

BackendSessionZooKeeper
0 likes · 15 min read
Understanding Distributed Locks, Session Management, Maven Configuration, and Caching in Backend Architecture
Programmer DD
Programmer DD
Aug 27, 2020 · Backend Development

Unlocking Redisson: How Distributed Locks Work Under the Hood

This article walks through configuring Redisson with Maven, demonstrates a simple distributed lock example using Sentinel, lists the Redis commands and Lua script semantics involved, and provides a detailed source‑code analysis of the RLock interface, tryLock, unlock, and forceUnlock methods.

Luadistributed-lockmaven
0 likes · 13 min read
Unlocking Redisson: How Distributed Locks Work Under the Hood
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Aug 26, 2020 · Backend Development

Interview Experience and Technical Q&A for a Java Backend Position at Tencent Cloud (Xi'an)

The article shares the author's recent move to Xi'an, discusses the local job market, and provides detailed interview questions and answers on Java backend topics such as Redis replication, Kafka performance, MySQL transactions, and JVM garbage collection to help job seekers prepare effectively.

JVMKafkabackend-development
0 likes · 8 min read
Interview Experience and Technical Q&A for a Java Backend Position at Tencent Cloud (Xi'an)
Laravel Tech Community
Laravel Tech Community
Aug 24, 2020 · Databases

Step-by-Step Guide to Building and Managing a Redis Cluster

This article provides a detailed, step‑by‑step tutorial on building a six‑node Redis cluster on a single Linux machine, covering directory setup, configuration files, Ruby‑based cluster tools, instance startup, cluster creation, verification, online scaling, slot rebalancing, and using Redis for session sharing.

Clusterdatabaseredis
0 likes · 7 min read
Step-by-Step Guide to Building and Managing a Redis Cluster
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Aug 24, 2020 · Databases

Understanding Redis Deployment Modes: Standalone, Master‑Slave, Sentinel, and Cluster

This article provides a comprehensive guide to Redis deployment, covering standalone, master‑slave replication, Sentinel high‑availability, and cluster sharding modes, detailing their principles, advantages, drawbacks, and step‑by‑step configuration examples with Maven dependencies and Redis configuration files.

ClusterConfigurationDeployment
0 likes · 28 min read
Understanding Redis Deployment Modes: Standalone, Master‑Slave, Sentinel, and Cluster
Programmer DD
Programmer DD
Aug 23, 2020 · Backend Development

How Short URLs Work: Theory, Design, and a Java Implementation

This article explains why short URLs are used in spam SMS, outlines their benefits, describes the basic principle of mapping long URLs to short ones, and details service design choices such as storage, one‑to‑one mapping, high‑concurrency handling, distributed ID generation, and provides a Java implementation using Redis.

Distributed Systemsbackend-developmentredis
0 likes · 11 min read
How Short URLs Work: Theory, Design, and a Java Implementation
58 Tech
58 Tech
Aug 19, 2020 · Backend Development

Design and Implementation of a Testing Quality System for the 58.com SSP Advertising Platform

The article details the architecture of 58.com’s SSP advertising platform, identifies three key reliability challenges—data consistency, interface regression, and storage synchronization—and presents a three‑layer testing quality system comprising web‑layer validation, service‑layer automated testing, and data‑layer monitoring with concrete tools and future improvement plans.

SSPadvertising platformautomation
0 likes · 14 min read
Design and Implementation of a Testing Quality System for the 58.com SSP Advertising Platform
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Aug 18, 2020 · Backend Development

Implementing Scheduled Tasks in Java: Timer, ScheduledExecutorService, Spring Task, and Distributed Approaches

This article explains several ways to implement scheduled tasks in Java, covering the simple Timer class, the more robust ScheduledExecutorService, Spring's @Scheduled annotation, and distributed solutions using Redis ZSet and key‑space notifications, with code examples and practical considerations.

Distributed SchedulingScheduled TasksScheduledExecutorService
0 likes · 16 min read
Implementing Scheduled Tasks in Java: Timer, ScheduledExecutorService, Spring Task, and Distributed Approaches
Architect's Tech Stack
Architect's Tech Stack
Aug 18, 2020 · Databases

Understanding Redis Memory Limits and Eviction Policies

This article explains how to configure Redis's maximum memory usage, describes the built‑in eviction strategies such as noeviction, allkeys‑lru, volatile‑lru, random and ttl policies, shows how to query and set these policies via configuration files or runtime commands, and details the LRU and LFU algorithms used by Redis, including Java sample code and recent improvements in Redis 3.0 and 4.0.

LFULRUMemory Management
0 likes · 9 min read
Understanding Redis Memory Limits and Eviction Policies
ITPUB
ITPUB
Aug 14, 2020 · Databases

Designing Scalable Like/Comment Systems: MySQL vs Redis Strategies

This article explores practical database designs for app features like likes, comments, and collections, comparing MySQL partition‑plus‑cache approaches with Redis storage and caching solutions, detailing schema definitions, query examples, Redis commands for various scenarios, and discussing scalability and consistency trade‑offs.

Likes Systemmysqlredis
0 likes · 8 min read
Designing Scalable Like/Comment Systems: MySQL vs Redis Strategies
Selected Java Interview Questions
Selected Java Interview Questions
Aug 13, 2020 · Databases

Understanding Redis: From Basic Concepts to Advanced Features

This article explains Redis as an open‑source in‑memory data store used for caching, database, and messaging, walks through its evolution from simple HTTP caching to server‑side Redis, and details core features such as persistence, high availability, clustering, data types, transactions, Lua scripting, pipelining, and distributed locking.

ClusterData TypesPersistence
0 likes · 12 min read
Understanding Redis: From Basic Concepts to Advanced Features
21CTO
21CTO
Aug 12, 2020 · Backend Development

How to Build a High‑Performance Distributed Unique ID Generator with MySQL and Redis

This article explains the challenges of generating globally unique IDs in sharded databases, compares common solutions such as auto‑increment, UUID, Snowflake, and Redis, and presents a practical MySQL‑based design that uses table‑level auto‑increment combined with in‑memory segment allocation to achieve high concurrency, reliability, and performance.

System Designdistributed-idhigh concurrency
0 likes · 9 min read
How to Build a High‑Performance Distributed Unique ID Generator with MySQL and Redis
Architect
Architect
Aug 11, 2020 · Backend Development

Distributed Session, Transaction, and Lock Strategies in Java Applications

This article explains how to manage sessions, implement distributed transactions, and coordinate distributed locks in Java-based distributed systems, covering practical solutions with Tomcat‑Redis, Spring Session, CAP theory, XA, TCC, message‑based consistency, Redis locks, RedLock, and Zookeeper locks, complete with configuration and code examples.

Session ManagementZooKeeperjava
0 likes · 22 min read
Distributed Session, Transaction, and Lock Strategies in Java Applications
New Oriental Technology
New Oriental Technology
Aug 11, 2020 · Backend Development

Engineering Case Study of New Oriental Cloud Classroom Backend Architecture and Scaling During the Pandemic

The article details how New Oriental's Cloud Classroom backend, built with Java, Spring, MySQL, Redis, Kafka, Sentinel, and other modern technologies, scaled to support millions of users and a hundred‑fold surge in demand during the pandemic through architectural optimizations, distributed caching, traffic control, and rapid performance improvements.

Distributed SystemsKafkajava
0 likes · 7 min read
Engineering Case Study of New Oriental Cloud Classroom Backend Architecture and Scaling During the Pandemic
dbaplus Community
dbaplus Community
Aug 10, 2020 · Databases

Breaking the Loop: Mastering Redis Multi‑IDC Bidirectional Sync and Conflict Resolution

This article dives deep into the design and implementation details of Redis cross‑IDC bidirectional synchronization, covering copy‑loop elimination, conflict handling with Last Write Wins and Vector Clocks, tombstone usage, garbage collection strategies, and the challenges of TTL consistency across replicas.

Bidirectional SyncCRDTconflict resolution
0 likes · 13 min read
Breaking the Loop: Mastering Redis Multi‑IDC Bidirectional Sync and Conflict Resolution
macrozheng
macrozheng
Aug 10, 2020 · Backend Development

Mall Project Update: SpringBoot 2.3, Elasticsearch 7.6, Unified Swagger & Redis

This article outlines the latest upgrades to the open‑source Mall project, including migration to SpringBoot 2.3.0, support for Elasticsearch 7.6.2, enhanced ELK log collection, unified Swagger and Redis configurations, and updated deployment guides for Windows and Linux environments.

BackendDeploymentElasticsearch
0 likes · 10 min read
Mall Project Update: SpringBoot 2.3, Elasticsearch 7.6, Unified Swagger & Redis
macrozheng
macrozheng
Aug 7, 2020 · Backend Development

Why Redis Distributed Locks Still Let Flash Sales Oversell—and How to Fix It

This article analyzes a real‑world flash‑sale overselling incident caused by unsafe Redis distributed locks, explains the root causes such as lock expiration and non‑atomic stock checks, and presents safer lock implementations and atomic stock decrement strategies to prevent future overselling.

javaoversellingredis
0 likes · 12 min read
Why Redis Distributed Locks Still Let Flash Sales Oversell—and How to Fix It
Senior Brother's Insights
Senior Brother's Insights
Aug 6, 2020 · Backend Development

How to Achieve Automatic API Idempotency with Spring Boot, Redis, and Custom Annotations

This article explains how to implement automatic idempotency for Spring Boot APIs using Redis, a custom @AutoIdempotent annotation, token generation and validation, and an interceptor, providing step‑by‑step code examples, configuration details, and testing procedures to ensure each request is processed only once.

InterceptorSpring Bootannotation
0 likes · 12 min read
How to Achieve Automatic API Idempotency with Spring Boot, Redis, and Custom Annotations
Architecture Digest
Architecture Digest
Aug 4, 2020 · Information Security

Integrating Apache Shiro with Spring Boot for Authentication and Authorization

This guide demonstrates how to integrate Apache Shiro into a Spring Boot application, covering project setup, Maven dependencies, configuration of Redis-backed session and cache management, creation of utility and realm classes, and implementation of role‑based permission controls with example controllers and Postman testing.

AuthenticationAuthorizationShiro
0 likes · 22 min read
Integrating Apache Shiro with Spring Boot for Authentication and Authorization
Programmer DD
Programmer DD
Aug 3, 2020 · Backend Development

How I Cut Search API Latency from 150ms to 32ms in 10 Days

This article recounts a developer's step‑by‑step optimization of a search API—detailing four load‑test rounds, configuration tweaks, batch queries, caching, and code clean‑up—that ultimately reduced average response time from 150 ms to 32 ms, meeting a sub‑100 ms requirement.

API optimizationOpenSearchredis
0 likes · 7 min read
How I Cut Search API Latency from 150ms to 32ms in 10 Days
Java Backend Technology
Java Backend Technology
Jul 31, 2020 · Backend Development

Why Redis Distributed Locks Can Fail: Real-World Over‑Sale Case & Fixes

This article analyzes a real over‑selling incident caused by unsafe Redis distributed locks, explains the root causes such as lock expiration and non‑atomic stock checks, and presents safer lock implementations, atomic stock updates, and architectural improvements to prevent future failures.

distributed-lockhigh concurrencyjava
0 likes · 11 min read
Why Redis Distributed Locks Can Fail: Real-World Over‑Sale Case & Fixes
Ctrip Technology
Ctrip Technology
Jul 30, 2020 · Backend Development

Design and Implementation of a Distributed Ticket Order Cache System at Ctrip

This article describes how Ctrip's ticket order post‑service team identified scaling bottlenecks, selected Redis, designed a two‑level cache architecture, implemented active and passive caching strategies, tackled consistency and failure issues, and applied various optimizations to achieve over 90% cache hit rate and dramatically reduce database load.

CacheCtriporder service
0 likes · 14 min read
Design and Implementation of a Distributed Ticket Order Cache System at Ctrip
Programmer DD
Programmer DD
Jul 30, 2020 · Databases

Understanding Redis Cluster: Sharding, High Availability, and Hash Slot Mechanics

This article explains Redis Cluster’s automatic sharding, built‑in high availability, the role of the cluster bus ports, the limitations of traditional hash algorithms, and how consistent hashing with virtual nodes and the 16384‑slot hash slot mechanism enable efficient data distribution and low‑cost node scaling.

ClusterHash Slotconsistent hashing
0 likes · 3 min read
Understanding Redis Cluster: Sharding, High Availability, and Hash Slot Mechanics
MaGe Linux Operations
MaGe Linux Operations
Jul 29, 2020 · Backend Development

How to Build Safe Distributed Locks with Redis and Redisson

This article explains why simple SETNX/EXPIRE commands can cause deadlocks, shows how to achieve atomic lock operations with Lua scripts or the Redis SET command, and demonstrates how to use the Redisson library for re‑entrant, auto‑renewing distributed locks in Java.

Lua Scriptdistributed-lockredis
0 likes · 8 min read
How to Build Safe Distributed Locks with Redis and Redisson
Java Architecture Diary
Java Architecture Diary
Jul 28, 2020 · Databases

Unlock Redis 6.0 Client‑Side Caching with Lettuce: A Hands‑On Guide

This article explains Redis 6.0’s built‑in client‑side caching, demonstrates how to install Redis via Docker, configure Lettuce snapshot dependencies, write Java code to enable and test cache synchronization, monitor Redis commands, and outlines current limitations of Lettuce and Spring Boot support.

Client CacheDockerLettuce
0 likes · 7 min read
Unlock Redis 6.0 Client‑Side Caching with Lettuce: A Hands‑On Guide
Programmer DD
Programmer DD
Jul 28, 2020 · Databases

Designing Scalable Like/Comment Systems: MySQL vs Redis Strategies

This article explores the requirements and database design patterns for implementing likes, comments, and favorites in apps, comparing traditional MySQL schemas with Redis‑based storage and caching solutions, and discusses their trade‑offs, scalability, and data consistency considerations.

ConsistencyDatabase designlikes
0 likes · 8 min read
Designing Scalable Like/Comment Systems: MySQL vs Redis Strategies
dbaplus Community
dbaplus Community
Jul 27, 2020 · Databases

How We Replaced Expensive Redis Clusters with KVROCKS on SSDs

Facing a ten‑fold cost increase for public‑cloud Redis, Ctrip engineers evaluated Redis‑on‑SSD alternatives, chose KVROCKS, performed extensive protocol‑compatible modifications, benchmarked performance on standard and Optane SSDs, and demonstrated substantial cost savings while preserving Redis semantics.

Cost OptimizationKVROCKSRocksDB
0 likes · 13 min read
How We Replaced Expensive Redis Clusters with KVROCKS on SSDs
Programmer DD
Programmer DD
Jul 26, 2020 · Databases

Mastering Redis Memory Limits and Eviction Policies: Config, LRU, LFU Explained

Redis, an in‑memory key‑value store, lets you set a maximum memory limit via configuration files or runtime commands, choose among various eviction strategies such as noeviction, allkeys‑lru, volatile‑lru, and LFU, and understand how approximate LRU works, with Java code examples illustrating these concepts.

LFULRUMemory Management
0 likes · 10 min read
Mastering Redis Memory Limits and Eviction Policies: Config, LRU, LFU Explained
Laravel Tech Community
Laravel Tech Community
Jul 22, 2020 · Databases

Integrating Lua Scripts with Redis: Concepts, Benefits, Commands, and Installation Guide

This article provides a comprehensive overview of using Lua scripts with Redis, covering Lua basics, advantages of Lua scripting, detailed Redis‑Lua integration syntax, command usage, return‑type mappings, script management commands, and step‑by‑step instructions for installing Lua and executing example scripts.

InstallationLuadatabase
0 likes · 15 min read
Integrating Lua Scripts with Redis: Concepts, Benefits, Commands, and Installation Guide
Java Captain
Java Captain
Jul 20, 2020 · Information Security

Integrating Apache Shiro with Spring Boot: Configuration, Session Management, and Permission Control

This guide demonstrates how to integrate the lightweight Apache Shiro security framework into a Spring Boot application, covering environment setup, Maven dependencies, Redis-backed session and cache configuration, utility classes, core Shiro components, annotation‑based permission control, and Postman testing for token handling and dynamic permission updates.

ShiroSpring Bootjava
0 likes · 21 min read
Integrating Apache Shiro with Spring Boot: Configuration, Session Management, and Permission Control
MaGe Linux Operations
MaGe Linux Operations
Jul 16, 2020 · Databases

Master Redis Memory Limits and Eviction Policies: Config, LRU, LFU Explained

This article explains how to configure Redis's maximum memory usage, modify memory limits at runtime, understand the built‑in eviction strategies—including noeviction, allkeys‑lru, volatile‑lru, allkeys‑random, volatile‑random, and volatile‑ttl—how to query and set these policies, and the details of LRU and LFU algorithms with Java examples and performance comparisons.

LFULRUMemory Management
0 likes · 10 min read
Master Redis Memory Limits and Eviction Policies: Config, LRU, LFU Explained
Ctrip Technology
Ctrip Technology
Jul 16, 2020 · Databases

Design and Implementation of Bidirectional Redis Synchronization Across IDC: Cycle Break, LWW, Vector Clock, Tombstone, GC, and Expire

This article details Ctrip's practical design and implementation of a bidirectional Redis synchronization system across data centers, covering replication loop breaking, conflict resolution with Last Write Wins and Vector Clocks, tombstone handling, garbage collection strategies, and expiration policies to ensure data consistency.

CRDTData ConsistencyGarbage Collection
0 likes · 12 min read
Design and Implementation of Bidirectional Redis Synchronization Across IDC: Cycle Break, LWW, Vector Clock, Tombstone, GC, and Expire
Architecture Digest
Architecture Digest
Jul 16, 2020 · Databases

Redis 6.0 Client‑Side Caching and Tracking Feature Overview

This article explains Redis 6.0’s new client‑side caching feature, detailing the tracking command, its options such as BCAST, PREFIX, OPTIN, OPTOUT, NOLOOP and REDIRECT, and provides step‑by‑step examples using telnet and redis‑cli to demonstrate how invalidation messages are generated and handled.

Client Side CachingRESP3redis
0 likes · 12 min read
Redis 6.0 Client‑Side Caching and Tracking Feature Overview
Sohu Tech Products
Sohu Tech Products
Jul 15, 2020 · Backend Development

Design and Implementation of a High‑Performance Global Unique ID Generation Algorithm (Mist) and Service (Medis)

This article analyses the limitations of existing global unique ID solutions such as Snowflake, presents the design of a new high‑performance, time‑independent Mist algorithm with extended lifespan, and describes its practical Redis‑backed service Medis, including performance benchmarks and architectural considerations.

Distributed SystemsGolangglobal unique ID
0 likes · 14 min read
Design and Implementation of a High‑Performance Global Unique ID Generation Algorithm (Mist) and Service (Medis)
Laravel Tech Community
Laravel Tech Community
Jul 15, 2020 · Databases

Comprehensive Redis Interview Questions and Answers

This article provides a comprehensive overview of Redis, covering its definition, advantages over memcached, supported data types, memory consumption, eviction policies, clustering options, persistence mechanisms, distributed lock implementations, cache penetration and avalanche solutions, and best-use scenarios compared to other caching systems.

CachePersistenceclustering
0 likes · 26 min read
Comprehensive Redis Interview Questions and Answers
Programmer DD
Programmer DD
Jul 15, 2020 · Databases

Master Redis Expiration: Key Commands That Preserve or Reset TTL

This article explains how Redis handles key expiration, detailing which commands clear or keep TTL, how PERSIST and RENAME affect expiration, the impact of negative or past timestamps, and the lazy and periodic deletion strategies Redis uses to manage expired keys efficiently.

ExpirationLazy DeletionPeriodic Deletion
0 likes · 10 min read
Master Redis Expiration: Key Commands That Preserve or Reset TTL
Qunar Tech Salon
Qunar Tech Salon
Jul 14, 2020 · Backend Development

Distributed Lock Mechanisms and Their Redis Implementations

This article explains the concept of distributed locks, compares various implementation approaches such as Memcached, Zookeeper, Chubby, and Redis, and details single‑node and multi‑node Redis lock designs—including SETNX, SET with NX/EX options, Redisson, and the Redlock algorithm—while highlighting their advantages, pitfalls, and best‑practice recommendations.

Redlockconcurrencydatabase
0 likes · 14 min read
Distributed Lock Mechanisms and Their Redis Implementations
Top Architect
Top Architect
Jul 13, 2020 · Databases

Understanding Redis Distributed Locks: setnx, Redisson, and RedLock

This article explains the fundamentals and pitfalls of using Redis for distributed locking, covering the setnx command, the SET command with NX and PX options, Lua‑based lock scripts, Redisson’s lock implementations, and the RedLock algorithm, along with practical code examples.

LuaRedlockdistributed-lock
0 likes · 12 min read
Understanding Redis Distributed Locks: setnx, Redisson, and RedLock
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Jul 12, 2020 · Backend Development

Distributed ID Generation Techniques Discussed in an Interview with Java Implementations

During a technical interview, the candidate explains various distributed ID generation methods—including database auto‑increment, sharding, batch allocation, UUID, Redis atomic counters, and the Snowflake algorithm—analyzes their pros and cons, and provides Java code examples for Redis‑based and Snowflake ID generators.

distributed-idjavaredis
0 likes · 18 min read
Distributed ID Generation Techniques Discussed in an Interview with Java Implementations
Top Architect
Top Architect
Jul 8, 2020 · Information Security

kk-anti-reptile: Spring Boot Anti‑Crawler Component and Integration Guide

The article introduces kk-anti-reptile, a Spring Boot‑based anti‑crawler component that uses servlet filters, Redis, and configurable rule chains (IP and User‑Agent), explains its workflow, shows Maven and property configurations, and provides front‑end Axios interception code for handling 509 responses.

Information SecuritySpring Bootanti‑crawler
0 likes · 6 min read
kk-anti-reptile: Spring Boot Anti‑Crawler Component and Integration Guide
Laravel Tech Community
Laravel Tech Community
Jul 4, 2020 · Databases

Redisson 3.13.2 Released with New Features and Bug Fixes

Redisson version 3.13.2, a Java‑based Redis client with in‑memory data grid capabilities officially recommended by Redis, has been released, introducing sharding support via ShardedRedisson, new CLUSTERDOWN error handling, added configuration methods to RedisNode, and numerous bug fixes covering sentinel handling, cache clearing, SSL reconnection, and more.

Bug FixesDatabase clientIn-Memory Data Grid
0 likes · 2 min read
Redisson 3.13.2 Released with New Features and Bug Fixes
Architecture Digest
Architecture Digest
Jul 4, 2020 · Databases

Understanding Redis Locks: setnx, RedLock, and Redisson

This article explains the fundamentals of Redis locking mechanisms, including the setnx command, the RedLock algorithm, and how the Redisson Java client implements distributed locks with Lua scripts, highlighting pitfalls, best practices, and code examples for safe lock acquisition and release.

LuaRedlockjava
0 likes · 10 min read
Understanding Redis Locks: setnx, RedLock, and Redisson
Programmer DD
Programmer DD
Jul 4, 2020 · R&D Management

Why the Redis Founder Quit: Lessons on Open‑Source Maintenance Burnout

The article recounts Redis creator Salvatore Sanfilippo’s decision to step back from core development, explains his fatigue with open‑source maintenance, outlines the pressures he faced, and discusses how mature projects like Redis can continue thriving after a founder’s departure.

Project ManagementSalvatore Sanfilippomaintainer burnout
0 likes · 6 min read
Why the Redis Founder Quit: Lessons on Open‑Source Maintenance Burnout
MaGe Linux Operations
MaGe Linux Operations
Jul 3, 2020 · Databases

Step‑by‑Step Guide to Deploy a Redis Cluster on Linux

This tutorial walks you through compiling Redis from source, configuring six cluster nodes on ports 7000‑7005, adjusting system memory settings, creating startup scripts, launching the services, forming the cluster, verifying its status, and testing basic read/write operations, all with detailed command examples.

Clusterredis
0 likes · 9 min read
Step‑by‑Step Guide to Deploy a Redis Cluster on Linux
ITPUB
ITPUB
Jul 3, 2020 · Databases

Why Redis’s Founder Is Stepping Down and What It Means for the Database’s Future

The article recounts Salvatore Sanfilippo’s decision to relinquish his role as Redis’s benevolent dictator, outlines the new community‑driven governance model led by Yossi Gottlieb and Oran Agra, and reflects on his personal philosophy about code as artistic self‑expression while highlighting Redis’s continued prominence as a leading NoSQL database.

Database GovernanceNoSQLcommunity management
0 likes · 8 min read
Why Redis’s Founder Is Stepping Down and What It Means for the Database’s Future
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Jun 30, 2020 · Databases

Understanding Redis Eviction Policies: maxmemory, LRU, LFU, and Expiration Strategies

This article explains how Redis handles memory limits with the maxmemory setting, describes the six eviction policies—including noeviction, allkeys‑lru, volatile‑lru, allkeys‑random, volatile‑random, and volatile‑ttl—covers the LRU and LFU algorithms, and outlines the three key expiration deletion methods as well as RDB and AOF persistence handling.

LFULRUcaching
0 likes · 11 min read
Understanding Redis Eviction Policies: maxmemory, LRU, LFU, and Expiration Strategies
Open Source Tech Hub
Open Source Tech Hub
Jun 25, 2020 · Backend Development

Mastering Redis: Core Data Structures and Practical Commands Explained

This comprehensive guide explores Redis fundamentals, detailing its six primary data structures—strings, lists, hashes, sets, sorted sets, and streams—along with practical command examples, internal implementations, and usage patterns for high‑performance backend development.

CacheData StructuresMessage Queue
0 likes · 17 min read
Mastering Redis: Core Data Structures and Practical Commands Explained
Efficient Ops
Efficient Ops
Jun 25, 2020 · Cloud Native

How Xiaomi Scaled Redis with Kubernetes: Deploying Redis Cluster on K8s

This article explains how Xiaomi migrated tens of thousands of Redis instances from bare‑metal servers to Kubernetes, using Redis Proxy, StatefulSets, and Ceph storage to achieve resource isolation, automated deployment, dynamic scaling, and improved reliability while addressing latency, IP‑change, and security challenges.

CephKubernetesProxy
0 likes · 20 min read
How Xiaomi Scaled Redis with Kubernetes: Deploying Redis Cluster on K8s
Alibaba Cloud Developer
Alibaba Cloud Developer
Jun 24, 2020 · Backend Development

Choosing the Right Rate‑Limiting Algorithm: Simple Window, Sliding Window, Leaky Bucket, Token Bucket & Sliding Log

This article explains the purpose of flow control, compares various rate‑limiting algorithms—including simple window, sliding window, leaky bucket, token bucket, and sliding log—provides Java interface definitions and code examples, discusses their complexity, precision, smoothness, and suitability for single‑machine and distributed scenarios, and offers practical deployment tips using Sentinel, Nginx, Guava, Tair, and Redis.

Distributed Systemsalgorithmjava
0 likes · 31 min read
Choosing the Right Rate‑Limiting Algorithm: Simple Window, Sliding Window, Leaky Bucket, Token Bucket & Sliding Log
Top Architect
Top Architect
Jun 22, 2020 · Information Security

Implementing Token-Based Authentication, Anti‑DoS, and Repeat‑Submission Prevention in Spring Boot

This article explains how to design a secure token mechanism with timestamp validation, describes common DoS attack types, and provides practical Spring Boot code examples—including Redis configuration, token generation, interceptor logic, MD5 signing utilities, and ThreadLocal usage—to prevent repeat submissions and protect APIs.

DoS protectionSpring BootThreadLocal
0 likes · 21 min read
Implementing Token-Based Authentication, Anti‑DoS, and Repeat‑Submission Prevention in Spring Boot
dbaplus Community
dbaplus Community
Jun 18, 2020 · Databases

How a Hybrid Data Warehouse Transformed Banking Data Services

This article details the 2015 hybrid data‑warehouse design implemented at Guangdong Huaxing Bank, explaining its real‑time, historical, and archival layers, the data‑bus concept, and how mixing in‑memory, relational, and Hadoop technologies addressed modern banking data‑volume, latency, and unstructured‑data challenges.

BankingBig DataHadoop
0 likes · 20 min read
How a Hybrid Data Warehouse Transformed Banking Data Services
Beike Product & Technology
Beike Product & Technology
Jun 18, 2020 · Databases

Resolving Duplicate Income Splitting in a Financial System: Transaction Isolation, Spring Propagation, and Redis Lock

This article analyzes a financial system's duplicate income‑splitting bug caused by concurrent transactions, explains how MySQL isolation levels and Spring transaction propagation contributed to dirty reads, and presents two corrective approaches—adjusting transaction propagation and repositioning Redis locks—to ensure reliable data consistency.

databasemysqlredis
0 likes · 10 min read
Resolving Duplicate Income Splitting in a Financial System: Transaction Isolation, Spring Propagation, and Redis Lock
Java Backend Technology
Java Backend Technology
Jun 18, 2020 · Backend Development

How to Build a Reentrant Distributed Lock with Redis, ThreadLocal, and Lua

This article explains why redoing a system can be simpler than refactoring, then dives into implementing a reentrant distributed lock using Redis with both ThreadLocal and Redis Hash approaches, providing detailed Java code, Lua scripts, and practical tips for handling lock expiration and multi‑process reentrancy.

LuaSpring BootThreadLocal
0 likes · 17 min read
How to Build a Reentrant Distributed Lock with Redis, ThreadLocal, and Lua
Laravel Tech Community
Laravel Tech Community
Jun 17, 2020 · Databases

Best Practices for Using Alibaba Cloud Redis: Key Design, Command Usage, Client Integration, and Tools

This article outlines comprehensive development guidelines for Alibaba Cloud Redis, covering readable and concise key naming, avoiding big keys, proper command selection, safe client usage with connection pools, eviction policies, and practical code examples for deleting large hashes, lists, sets, and sorted sets.

Client IntegrationCommand UsageKey Design
0 likes · 11 min read
Best Practices for Using Alibaba Cloud Redis: Key Design, Command Usage, Client Integration, and Tools
Top Architect
Top Architect
Jun 15, 2020 · Backend Development

Redisson Distributed Lock: Maven Setup, Simple Usage, Redis Commands, Lua Script Semantics, and Source Code Analysis

This article presents a concise Redisson distributed‑lock example with Maven configuration, demonstrates basic lock usage, enumerates the Redis commands and Lua script semantics involved, and provides a detailed walkthrough of the relevant Java source code, highlighting key implementation details.

Luabackend-developmentdistributed-lock
0 likes · 14 min read
Redisson Distributed Lock: Maven Setup, Simple Usage, Redis Commands, Lua Script Semantics, and Source Code Analysis
Programmer DD
Programmer DD
Jun 14, 2020 · Backend Development

How Distributed Locks Prevent Over‑Allocation in Massive Red‑Packet Systems

This article explains why traditional locks fail in high‑concurrency scenarios like large‑scale red‑packet distribution, and demonstrates how distributed locking mechanisms using Redis and Zookeeper ensure correct total amounts while avoiding deadlocks and thundering‑herd problems.

ZooKeeperdistributed-lockredis
0 likes · 14 min read
How Distributed Locks Prevent Over‑Allocation in Massive Red‑Packet Systems
Architecture Digest
Architecture Digest
Jun 12, 2020 · Databases

How to Build a Redis Cluster with Docker: Step‑by‑Step Guide

This article provides a comprehensive, step‑by‑step tutorial on creating a Redis Cluster using Docker, covering the preparation of a base Redis image, building node images, configuring cluster settings, assigning hash slots, adding replica nodes for high availability, testing failover, and solving network connectivity issues for production deployments.

ClusterDockerReplication
0 likes · 26 min read
How to Build a Redis Cluster with Docker: Step‑by‑Step Guide
Architect's Tech Stack
Architect's Tech Stack
Jun 11, 2020 · Backend Development

Understanding Redis Distributed Locks: setnx, RedLock, and Redisson

This article explains how Redis can be used for distributed locking, covering the setnx command, the SET command with NX and PX options, common pitfalls, Lua‑based atomic unlock scripts, the Redisson client, and the RedLock algorithm for achieving reliable locks across multiple nodes.

Lua scriptingRedlockbackend-development
0 likes · 10 min read
Understanding Redis Distributed Locks: setnx, RedLock, and Redisson
Programmer DD
Programmer DD
Jun 11, 2020 · Backend Development

Mastering Redis Distributed Locks: From SETNX to RedLock and Redisson

This article explores Redis locking mechanisms, explaining the SETNX command, its limitations, the use of PX for timeouts, Lua scripts for atomic unlocks, and introduces Redisson’s advanced lock implementations including RedLock, while highlighting practical pitfalls and best‑practice recommendations for reliable distributed synchronization.

LuaRedlockredis
0 likes · 11 min read
Mastering Redis Distributed Locks: From SETNX to RedLock and Redisson
Liangxu Linux
Liangxu Linux
Jun 8, 2020 · Operations

How to Install and Configure Supervisor on CentOS 7 for Process Management

This guide walks through installing Supervisor on CentOS 7, configuring its core settings, creating program definitions for Tomcat and Redis, and managing services with supervisord and supervisorctl, providing a reliable solution for automatic process recovery on Linux/Unix systems.

CentOSSupervisorTomcat
0 likes · 10 min read
How to Install and Configure Supervisor on CentOS 7 for Process Management
Top Architect
Top Architect
Jun 8, 2020 · Databases

Best Practices and Development Guidelines for Using Alibaba Cloud Redis

This article outlines comprehensive development guidelines for Alibaba Cloud Redis, covering key naming conventions, value design, command best practices, client usage patterns, related tools, and detailed code examples for safely deleting large keys across various data structures.

Alibaba CloudCacheKey Design
0 likes · 12 min read
Best Practices and Development Guidelines for Using Alibaba Cloud Redis
Programmer DD
Programmer DD
May 31, 2020 · Backend Development

Memcached vs Redis: Which In‑Memory Cache Wins for Your Applications?

This article compares Memcached and Redis, covering their installation, shared features such as sub‑millisecond latency and language support, and key differences in data structures, persistence, replication, transactions, pub/sub, geospatial commands, scripting, and memory efficiency to help you choose the right cache solution.

ComparisonInstallationMemcached
0 likes · 9 min read
Memcached vs Redis: Which In‑Memory Cache Wins for Your Applications?
Top Architect
Top Architect
May 29, 2020 · Databases

Redis Scaling Strategies: Partitioning, Master‑Slave Replication, Sentinel, and Cluster

This article explains how to extend Redis beyond single‑node limits by using partitioning, master‑slave replication, Sentinel for automatic failover, and Redis Cluster with hash slots, detailing their usage, advantages, drawbacks, and configuration examples for building high‑availability and scalable in‑memory data stores.

ClusterPartitioningReplication
0 likes · 11 min read
Redis Scaling Strategies: Partitioning, Master‑Slave Replication, Sentinel, and Cluster
Selected Java Interview Questions
Selected Java Interview Questions
May 28, 2020 · Databases

Comprehensive Overview of Redis: Data Types, Structures, Use Cases, Persistence, Replication, and More

This article provides an in‑depth guide to Redis, covering its core data types, internal data structures, common usage scenarios, differences from Memcached, key expiration, eviction policies, persistence mechanisms, transactions, event handling, replication, Sentinel, sharding, and a practical forum system example.

Data TypesIn-Memory DatabasePersistence
0 likes · 23 min read
Comprehensive Overview of Redis: Data Types, Structures, Use Cases, Persistence, Replication, and More
ITPUB
ITPUB
May 26, 2020 · Databases

Master Redis: Core Data Types, Commands, and Advanced Features Explained

Redis is a high‑performance, open‑source key‑value store offering persistence, rich data structures, replication, pub/sub, transactions, and clustering; this guide explains its fundamentals, data types (string, hash, list, set, sorted set), essential commands, and advanced features such as persistence options, replication, Sentinel, and sharding.

Data StructuresPersistenceTransactions
0 likes · 16 min read
Master Redis: Core Data Types, Commands, and Advanced Features Explained