Tagged articles
3240 articles
Page 3 of 33
JavaGuide
JavaGuide
Nov 16, 2025 · Backend Development

ByteDance Backend Interview: Java OOM, ThreadPool Tuning, Redis & MQ

ByteDance’s recent salary announcements show higher offers up to 40K, while the company’s rigorous backend interview covers Java heap OOM analysis, JVM tuning, thread‑pool configuration, Redis expiration strategies, MQ usage, network request flow, and algorithm challenges, providing a comprehensive technical deep‑dive for candidates.

JVMJavaMessageQueue
0 likes · 24 min read
ByteDance Backend Interview: Java OOM, ThreadPool Tuning, Redis & MQ
Tech Freedom Circle
Tech Freedom Circle
Nov 15, 2025 · Databases

How to Prevent Order Loss in a 100k TPS Flash Sale When the Master DB Crashes – 5 Practical Solutions

The article dissects a high‑traffic flash‑sale interview question—how to guarantee zero order loss at 100,000 TPS when the master MySQL instance fails—by explaining the underlying performance‑consistency conflict, the three skills interviewers assess, and presenting five concrete, code‑driven solutions ranging from MySQL parameter tuning to semi‑sync replication, local message tables, group replication, and Redis‑Kafka traffic shaping.

Data ConsistencyGroup ReplicationKafka
0 likes · 28 min read
How to Prevent Order Loss in a 100k TPS Flash Sale When the Master DB Crashes – 5 Practical Solutions
JavaGuide
JavaGuide
Nov 12, 2025 · Backend Development

Shopee Backend 2023 Salary Offers and In-Depth Interview Guide

Shopee’s 2023 backend positions offer competitive salaries ranging from 23.5k to 32k in Shenzhen, and the article provides a comprehensive interview guide covering network models, TCP handshake, HTTP/HTTPS differences, MySQL isolation levels, foreign keys, slow query optimization, JWT authentication, RBAC, and Redis sorted sets.

BackendJWTShopee
0 likes · 31 min read
Shopee Backend 2023 Salary Offers and In-Depth Interview Guide
JD Tech
JD Tech
Nov 11, 2025 · Databases

How JIMDB’s Big‑Hot Key Strategy Boosts Cache Performance by 80%

JIMDB, a Redis‑based distributed cache, introduces the Big‑Hot Key concept and a multi‑layer proactive governance framework that dynamically identifies resource‑intensive keys, automatically mitigates them, and delivers up to an 80% performance gain while dramatically improving system stability.

Big-Hot KeyJimdbdistributed cache
0 likes · 39 min read
How JIMDB’s Big‑Hot Key Strategy Boosts Cache Performance by 80%
JD Retail Technology
JD Retail Technology
Nov 11, 2025 · Backend Development

JIMDB’s Big-Hot Key Solution: Optimizing Distributed Cache Performance

JIMDB, a high‑performance Redis‑based distributed cache, introduces the “Big‑Hot Key” concept to dynamically identify keys that strain CPU or bandwidth, and implements a multi‑layer active governance framework—including real‑time detection, server‑side caching, circuit‑breaker, and client‑side consistency—to dramatically reduce resource consumption and boost throughput.

JimdbPerformance OptimizationResource Management
0 likes · 41 min read
JIMDB’s Big-Hot Key Solution: Optimizing Distributed Cache Performance
MaGe Linux Operations
MaGe Linux Operations
Nov 9, 2025 · Backend Development

How to Stop Redis Cache Penetration, Breakdown, and Avalanche – Proven Solutions Inside

This comprehensive guide explains the causes of Redis cache penetration, breakdown, and avalanche, and provides production‑tested solutions such as Bloom filters, distributed locks, logical expiration, random TTL, cache pre‑warming, multi‑level caching, high‑availability deployment, monitoring, and backup strategies.

Spring Bootbloom-filterhigh availability
0 likes · 42 min read
How to Stop Redis Cache Penetration, Breakdown, and Avalanche – Proven Solutions Inside
Ray's Galactic Tech
Ray's Galactic Tech
Nov 9, 2025 · Databases

Mastering Redis Expiration: Strategies, Java Implementation, and Best Practices

Redis uses multiple expiration and eviction mechanisms—including lazy deletion, periodic scanning, and memory eviction—to balance performance and memory usage, and this guide explains each strategy, shows how to configure them, and provides Java/Jedis code examples for setting TTLs, handling large objects, preventing cache avalanches, and monitoring stats.

CacheExpirationJava
0 likes · 7 min read
Mastering Redis Expiration: Strategies, Java Implementation, and Best Practices
Java Companion
Java Companion
Nov 9, 2025 · Databases

Why Big Companies Avoid SET for User Data: A Redis Storage Guide

The article compares storing user objects in Redis using plain SET with JSON versus using HASH fields, providing code demos, benchmark results, memory and concurrency analysis, and practical guidelines on when to choose each approach for optimal performance and safety.

HashJavaString
0 likes · 9 min read
Why Big Companies Avoid SET for User Data: A Redis Storage Guide
Ray's Galactic Tech
Ray's Galactic Tech
Nov 9, 2025 · Backend Development

Hybrid Push‑Pull Timeline Architecture: Scaling Social Feeds for Billions

To serve billions of users with real‑time timelines, modern social platforms combine push‑based delivery for regular users and pull‑based retrieval for high‑profile accounts, employing hot‑cold separation, Kafka fan‑out, Redis caching, and scalable storage strategies to balance write and read loads.

Kafkapush-pullredis
0 likes · 9 min read
Hybrid Push‑Pull Timeline Architecture: Scaling Social Feeds for Billions
MaGe Linux Operations
MaGe Linux Operations
Nov 8, 2025 · Backend Development

Mastering Redis Cache: Prevent Penetration, Breakdown, and Avalanche with Proven Solutions

This comprehensive guide explains the three major Redis cache issues—penetration, breakdown, and avalanche—detailing their causes, impacts, and production‑ready solutions such as Bloom filters, distributed locks, logical expiration, random TTL, multi‑level caching, high‑availability setups, monitoring, backup, and best‑practice recommendations.

Performance OptimizationSpring Bootbloom-filter
0 likes · 56 min read
Mastering Redis Cache: Prevent Penetration, Breakdown, and Avalanche with Proven Solutions
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Nov 8, 2025 · Databases

Prevent Redis Cache Penetration: Bloom Filters, Empty‑Value Caching, and Rate Limiting

This article explains Redis cache penetration, its causes such as malicious attacks and faulty business logic, and presents four mitigation strategies—Bloom filters, caching empty values, rate limiting, and authentication with validation—to protect database performance and system stability.

Empty Cachebloom-filtercache-penetration
0 likes · 4 min read
Prevent Redis Cache Penetration: Bloom Filters, Empty‑Value Caching, and Rate Limiting
Architect
Architect
Nov 7, 2025 · Backend Development

Mastering Idempotency: 4 Proven Strategies for Reliable APIs

This article explains four practical idempotency solutions—token tokens, database unique indexes, distributed locks, and request content digests—detailing their concepts, core keywords, and providing ready‑to‑copy Spring Boot code examples, along with implementation tips and a comparison table to help you choose the right approach for high‑concurrency APIs.

Database IndexIdempotencySpring Boot
0 likes · 10 min read
Mastering Idempotency: 4 Proven Strategies for Reliable APIs
dbaplus Community
dbaplus Community
Nov 5, 2025 · Databases

Why KEYS Is Dangerous in Redis and How SCAN or Indexing Solves It

The article explains why using the KEYS command in Redis is a blocking operation that can cripple production systems, demonstrates the safe, incremental SCAN approach, and proposes an index‑based architecture or replica scans for high‑frequency or offline key‑lookup scenarios.

KEYSSCANdatabase
0 likes · 8 min read
Why KEYS Is Dangerous in Redis and How SCAN or Indexing Solves It
MaGe Linux Operations
MaGe Linux Operations
Nov 5, 2025 · Databases

Deploy Redis Sentinel for High Availability in 30 Minutes – Step‑by‑Step Guide

Learn how to set up Redis Sentinel for high‑availability caching, covering prerequisites, anti‑patterns, detailed configuration of master, replicas and Sentinel nodes, firewall rules, monitoring, failover testing, troubleshooting, performance tuning, backup, rollback and best practices—all achievable within a 30‑minute deployment.

LinuxReplicationfailover
0 likes · 38 min read
Deploy Redis Sentinel for High Availability in 30 Minutes – Step‑by‑Step Guide
Xiao Liu Lab
Xiao Liu Lab
Nov 4, 2025 · Information Security

7 Essential Redis Security Baselines to Harden Your Production Deployments

This guide details seven critical Redis hardening steps—including timeout, syslog, strong password, non‑root execution, strict file permissions, trusted bind addresses, and command renaming—to transform insecure default settings into a verifiable, production‑ready security baseline.

ConfigurationHardeningLinux
0 likes · 13 min read
7 Essential Redis Security Baselines to Harden Your Production Deployments
Architect
Architect
Nov 4, 2025 · Operations

How to Accurately Track API Calls per Minute: 5 Proven Monitoring Strategies

This article explores why precise per‑minute API call statistics are essential for performance bottleneck detection, capacity planning, security alerts, billing, and troubleshooting, and presents five practical implementations—including fixed‑window counters, sliding windows, AOP‑based interception, Redis time‑series storage, and Micrometer‑Prometheus integration—along with their trade‑offs and capacity‑planning guidelines.

API monitoringJavaMetrics
0 likes · 25 min read
How to Accurately Track API Calls per Minute: 5 Proven Monitoring Strategies
Tech Freedom Circle
Tech Freedom Circle
Nov 4, 2025 · Backend Development

Designing a Non‑Intrusive Spring Cloud SaaS Multi‑Tenant Component for Full‑Stack Data Isolation

The article presents a step‑by‑step, code‑driven design of a Spring Cloud SaaS multi‑tenant solution that balances resource sharing and strict data isolation by using a shared‑database, shared‑schema approach with tenant_id filtering, ThreadLocal context, MyBatis‑Plus interceptors, Redis key prefixing, Sa‑Token session segregation, and Spring Boot auto‑configuration.

Sa-TokenSaaSSpring Boot
0 likes · 16 min read
Designing a Non‑Intrusive Spring Cloud SaaS Multi‑Tenant Component for Full‑Stack Data Isolation
JavaGuide
JavaGuide
Nov 4, 2025 · Backend Development

JD Backend Salary Ranges 2024 & How to Ace the Interview

The article shares recent JD backend salary data ranging from 24k to 32k RMB per month, explains the compensation structure, and provides a step‑by‑step interview preparation guide covering project presentation, JWT, Redis, thread pools, MySQL‑Elasticsearch sync, isolation levels and performance analysis.

Backend DevelopmentInterview PreparationJD
0 likes · 21 min read
JD Backend Salary Ranges 2024 & How to Ace the Interview
Architect's Guide
Architect's Guide
Nov 4, 2025 · Backend Development

Mastering Redis Cache Eviction: Strategies, Pitfalls, and Solutions

Explore Redis cache eviction policies, understand how strategies like allkeys‑lru, volatile‑ttl, and noeviction work, and learn practical solutions for cache penetration, breakdown, and avalanche—including Bloom filters, mutex locks, and staggered expirations—to keep your backend resilient under high load.

BackendCache Evictioncache-penetration
0 likes · 10 min read
Mastering Redis Cache Eviction: Strategies, Pitfalls, and Solutions
JD Cloud Developers
JD Cloud Developers
Oct 30, 2025 · Backend Development

How a Massive Cache Key Crashed a Double‑11 System and How to Prevent It

During a Double‑11 promotion, an oversized Redis cache key caused a cascade of failures—cache miss, network bandwidth saturation, and a full‑blown cache avalanche—prompting the team to implement big‑key mitigation, compression, lock‑based cache back‑source, and monitoring measures to safeguard future deployments.

BackendBig KeyCache
0 likes · 8 min read
How a Massive Cache Key Crashed a Double‑11 System and How to Prevent It
vivo Internet Technology
vivo Internet Technology
Oct 29, 2025 · Databases

Why Did Redis Keys Suddenly Disappear? A Deep Dive into Memory Exhaustion and Client Buffer Overflow

This article analyzes a production incident where Redis failed to retrieve keys at 2 AM, tracing the root cause to a short‑term memory write‑full condition caused by massive GET request bursts that overflowed client output buffers, and outlines both emergency fixes and long‑term mitigations.

Client Buffer OverflowKey EvictionMemory Management
0 likes · 10 min read
Why Did Redis Keys Suddenly Disappear? A Deep Dive into Memory Exhaustion and Client Buffer Overflow
Tech Freedom Circle
Tech Freedom Circle
Oct 25, 2025 · Databases

Designing a 10 WQPS Redis Counter Component: A Systematic Timer Solution

This article presents a complete, step‑by‑step analysis of a high‑concurrency Redis counter component that supports up to 100 000 QPS, covering business pain points, architectural design, two core counting strategies, sharding, local batch optimization, code walkthroughs, and performance benchmark results.

CounterSliding WindowSpring Boot
0 likes · 33 min read
Designing a 10 WQPS Redis Counter Component: A Systematic Timer Solution
JavaGuide
JavaGuide
Oct 25, 2025 · Interview Experience

Microstrategy: A 9‑5‑Friendly Foreign Tech Company with Strong Java Interview Process

The article introduces Microstrategy, a US‑based BI firm with a large Hangzhou R&D center, outlines its generous 9‑5‑style work environment, details the interview stages—including written test, technical and non‑technical rounds—and provides concrete advice on self‑introduction, project presentation, system design, Canal‑MySQL sync, XXL‑Job video transcoding, Redis, MongoDB, SQL injection, Java exceptions, OOP concepts, and interview puzzles.

Backend DevelopmentCanalJava interview
0 likes · 18 min read
Microstrategy: A 9‑5‑Friendly Foreign Tech Company with Strong Java Interview Process
Ray's Galactic Tech
Ray's Galactic Tech
Oct 24, 2025 · Databases

Beyond Caching: 10 Powerful Redis Patterns for Distributed Systems

This guide explores ten practical Redis non‑cache patterns—including distributed locks, message queues, leaderboards, real‑time counters, Bloom filters, session stores, distributed counters, rate limiting, unique ID generation, and delay queues—detailing their data structures, key commands, and typical application scenarios.

Data StructuresNon‑Cache Patternsredis
0 likes · 6 min read
Beyond Caching: 10 Powerful Redis Patterns for Distributed Systems
Efficient Ops
Efficient Ops
Oct 21, 2025 · Operations

Deploy n8n with Docker: Fast Setup, Production Config, and Database Guide

This guide explains what n8n is, compares it with Coze and Dify, and provides step‑by‑step instructions for quick installation via npx or Docker, detailed multi‑stage Dockerfile, production environment settings, database, SSL, Redis, monitoring, and backup strategies for reliable workflow automation.

PostgreSQLn8nproduction deployment
0 likes · 8 min read
Deploy n8n with Docker: Fast Setup, Production Config, and Database Guide
JavaGuide
JavaGuide
Oct 21, 2025 · Backend Development

Xiaohongshu’s Explosive Salaries and a Complete Backend Interview Guide

The article reveals Xiaohongshu’s unusually high 2023 campus recruitment packages—over 51 w annual total—while also providing an extensive backend interview preparation guide covering TCP vs UDP differences, design patterns, workflow versus rule engines, message‑queue selection, and Redis data structures and eviction policies.

Backend DevelopmentDesign PatternsInterview Preparation
0 likes · 32 min read
Xiaohongshu’s Explosive Salaries and a Complete Backend Interview Guide
Ray's Galactic Tech
Ray's Galactic Tech
Oct 20, 2025 · Backend Development

Pessimistic, Optimistic & Distributed Locks: Core Concepts, Scenarios & Tips

This article explains the fundamental ideas behind pessimistic, optimistic, and distributed locking, compares their strengths and weaknesses, outlines typical application scenarios such as inventory deduction, banking transfers, and cache protection, and provides concrete implementation examples using SQL row locks, version fields, CAS, Redis WATCH, and Lua scripts.

concurrencylockingoptimistic lock
0 likes · 8 min read
Pessimistic, Optimistic & Distributed Locks: Core Concepts, Scenarios & Tips
Qunar Tech Salon
Qunar Tech Salon
Oct 20, 2025 · Databases

Why Traditional DB Inspections Fail and AI-Powered Anomaly Detection Helps

This article examines the limitations of traditional threshold‑based database inspections, introduces AI‑driven anomaly detection techniques such as DoubleRollingAggregate, SeasonalAD, and LevelShiftAD, and details practical implementations, tuning strategies, and real‑world use cases for MySQL and Redis monitoring.

Database Monitoringanomaly detectionmachine learning
0 likes · 23 min read
Why Traditional DB Inspections Fail and AI-Powered Anomaly Detection Helps
Code Ape Tech Column
Code Ape Tech Column
Oct 20, 2025 · Backend Development

Unlock Redis Performance: Master Lua Scripting in Spring Boot

This tutorial explains how to integrate Lua scripts with Spring Boot and Redis, covering Lua fundamentals, advantages, real‑world use cases, step‑by‑step implementation in Spring Boot, performance gains, error handling, security measures, and best practices for reliable backend development.

Backend DevelopmentLua scriptingPerformance Optimization
0 likes · 21 min read
Unlock Redis Performance: Master Lua Scripting in Spring Boot
dbaplus Community
dbaplus Community
Oct 19, 2025 · Databases

How PostgreSQL 18 Made My Redis Cache Redundant (And What You Can Learn)

After disabling Redis in production and carefully testing on PostgreSQL 18, the author reduced p95 latency, simplified the system, and lowered operational overhead by replacing the cache with a covering index, a generated column, and a materialized view, while providing detailed query examples, configuration tweaks, and performance measurements.

Database OptimizationPostgreSQLindexing
0 likes · 10 min read
How PostgreSQL 18 Made My Redis Cache Redundant (And What You Can Learn)
Java Web Project
Java Web Project
Oct 19, 2025 · Databases

How to Install and Use RedisInsight for Redis Monitoring and Management

This guide walks through RedisInsight’s key features, step‑by‑step Linux installation, environment‑variable configuration, service startup, Kubernetes deployment via a yaml manifest, and basic UI operations for monitoring Redis memory, connections, and data, illustrated with concrete commands and screenshots.

CLIDatabase MonitoringInstallation
0 likes · 6 min read
How to Install and Use RedisInsight for Redis Monitoring and Management
JavaGuide
JavaGuide
Oct 19, 2025 · Backend Development

Java Backend Guide: @Autowired vs @Resource, MySQL Engines, Redis, JVM OOM

The article shares ZTE salary offers and interview tips, then dives into technical deep‑dives on Spring bean injection annotations, compares MySQL InnoDB and MyISAM, explains Redis usage patterns, and walks through JVM OutOfMemoryError diagnosis with concrete code and tooling examples.

BackendJVMJava
0 likes · 21 min read
Java Backend Guide: @Autowired vs @Resource, MySQL Engines, Redis, JVM OOM
Code Wrench
Code Wrench
Oct 18, 2025 · Backend Development

Master High‑Performance Queues in Go: Kafka, RabbitMQ & Redis Compared

This article explains how to build a high‑throughput, low‑latency, and scalable queue system in Go by leveraging Kafka, RabbitMQ, and Redis, covering core concepts, practical code examples, performance optimizations, and guidance on choosing the right solution for different workloads.

GoKafkaMessage Queue
0 likes · 11 min read
Master High‑Performance Queues in Go: Kafka, RabbitMQ & Redis Compared
Ray's Galactic Tech
Ray's Galactic Tech
Oct 17, 2025 · Backend Development

Prevent Redis Cache Avalanche, Penetration & Breakdown: A Practical High‑Availability Guide

This guide explains the three major Redis cache failure patterns—avalanche, penetration, and breakdown—detailing their causes and offering concrete mitigation techniques such as staggered TTLs, empty‑object caching, Bloom filters, logical expiration, distributed locks, high‑availability clusters, and comprehensive monitoring to ensure robust high‑availability systems.

Cachecache-avalanchecache-breakdown
0 likes · 7 min read
Prevent Redis Cache Avalanche, Penetration & Breakdown: A Practical High‑Availability Guide
Tech Freedom Circle
Tech Freedom Circle
Oct 16, 2025 · Databases

Redis Crash Interview: How to Recover a Failed Node and Estimate Data Loss

This article walks through a systematic emergency response for Redis outages, explains how Redis Cluster promotes a replica, quantifies the typical data‑loss window from hundreds of milliseconds to several seconds, and provides detailed persistence configurations (RDB, AOF, and hybrid) to minimise downtime and data loss.

AOFClusterPersistence
0 likes · 35 min read
Redis Crash Interview: How to Recover a Failed Node and Estimate Data Loss
Ray's Galactic Tech
Ray's Galactic Tech
Oct 14, 2025 · Databases

Master Redis Key Naming: Best Practices for Scalable and Maintainable Data

Effective Redis key naming is essential for building robust, scalable applications; this guide outlines clear conventions—meaningful names, colon-separated namespaces, concise keys, proper ordering, TTL usage—and provides concrete examples across data types, common pitfalls, and a universal key template to improve readability, maintenance, and performance.

Database designKey NamingScalability
0 likes · 6 min read
Master Redis Key Naming: Best Practices for Scalable and Maintainable Data
Ray's Galactic Tech
Ray's Galactic Tech
Oct 13, 2025 · Information Security

How to Implement Dynamic IP Blocking in Nginx: 3 Proven Methods

This guide explains three practical ways to achieve dynamic IP blocking in Nginx—using Fail2ban, Lua with Redis, and Nginx's built‑in limit modules—detailing configuration steps, code examples, advantages, drawbacks, and best‑practice recommendations for various deployment scenarios.

Fail2banIP blockingLua
0 likes · 7 min read
How to Implement Dynamic IP Blocking in Nginx: 3 Proven Methods
Su San Talks Tech
Su San Talks Tech
Oct 13, 2025 · Backend Development

Essential Microservice Architecture Components Explained

This article outlines the key building blocks of a microservice architecture—including Nginx as the traffic entry, Spring Cloud Gateway, service registration, Redis caching, MySQL persistence, Elasticsearch, message queues, ELK logging, distributed scheduling, and object storage—providing practical guidance on design choices and high‑availability setups.

ELKElasticsearchMinio
0 likes · 9 min read
Essential Microservice Architecture Components Explained
Su San Talks Tech
Su San Talks Tech
Oct 13, 2025 · Databases

Boost High-Concurrency Performance with Redis Batch Query Techniques

This article explores four powerful Redis batch query methods—MGET, HMGET, pipeline, and Lua scripting—detailing their advantages, usage examples in Spring Boot, and practical considerations such as network latency reduction, client simplification, transaction performance, and atomic execution to enhance system efficiency under high-concurrency workloads.

LuaMGETPipeline
0 likes · 11 min read
Boost High-Concurrency Performance with Redis Batch Query Techniques
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 12, 2025 · Backend Development

Building a High‑Performance Content Moderation System with Trie, Aho‑Corasick, Redis, and Go

This article details how to design and implement a scalable, low‑cost content moderation pipeline that combines a local Trie + Aho‑Corasick engine, Redis‑based hot‑updates, MySQL persistence, and third‑party machine‑review fallback to achieve millisecond‑level response, high accuracy, and controllable costs.

Aho-CorasickBackendGo
0 likes · 34 min read
Building a High‑Performance Content Moderation System with Trie, Aho‑Corasick, Redis, and Go
IT Services Circle
IT Services Circle
Oct 11, 2025 · Databases

Crack Backend Interviews: Redis, MySQL Locks, MQs & XiaoHongShu Salary Secrets

The article combines a surprising look at XiaoHongShu's record‑breaking graduate salaries with a comprehensive backend interview guide covering Redis advantages and drawbacks, common data structures, persistence and high‑availability, MySQL lock types, optimistic vs. pessimistic locking, message‑queue fundamentals, RabbitMQ vs. Kafka differences, deadlock avoidance, and a sample algorithm question.

Database LocksSalary Insightsbackend interview
0 likes · 19 min read
Crack Backend Interviews: Redis, MySQL Locks, MQs & XiaoHongShu Salary Secrets
Architect
Architect
Oct 9, 2025 · Databases

How to Implement Pagination and Fuzzy Search in Redis Efficiently

This article explains how to achieve conditional queries and pagination in Redis using Sorted Sets and Hashes, outlines the implementation steps for pagination, fuzzy multi‑condition search, their combination, and discusses performance optimizations such as expiration and real‑time data handling.

HashSorted Setfuzzy-search
0 likes · 11 min read
How to Implement Pagination and Fuzzy Search in Redis Efficiently
Architecture Digest
Architecture Digest
Oct 7, 2025 · Backend Development

Prevent Duplicate Submissions in SpringBoot: 4 Proven Solutions

This article explains why front‑end debouncing is insufficient for preventing duplicate orders, then walks through four backend strategies—local cache with AOP, Redis atomic operations, database unique indexes, and token verification—providing core principles, code examples, and pros/cons for each.

Database IndexSpringBootToken
0 likes · 18 min read
Prevent Duplicate Submissions in SpringBoot: 4 Proven Solutions
Open Source Tech Hub
Open Source Tech Hub
Oct 4, 2025 · Databases

Why Is Redis So Fast? Deep Dive into Its Architecture and Persistence

This article explains what Redis is, why it delivers microsecond‑level performance through in‑memory storage, single‑threaded event handling, and highly optimized C code, and it covers its persistence options, memory management techniques, and practical use cases such as caching and real‑time leaderboards.

In-Memory DatabasePersistenceredis
0 likes · 12 min read
Why Is Redis So Fast? Deep Dive into Its Architecture and Persistence
Architect
Architect
Oct 3, 2025 · Backend Development

How to Build a Scalable Netty TCP Client with Redis Queue and Spring Boot

This article walks through a complete Netty TCP client demo for IoT messaging, covering project architecture, module layout, business flow, detailed code explanations—including a local BlockingQueue replacement for RocketMQ, thread‑safe client creation with Redis locks, and testing endpoints—providing a practical reference for building robust socket‑based services.

IoTJavaNetty
0 likes · 20 min read
How to Build a Scalable Netty TCP Client with Redis Queue and Spring Boot
IT Services Circle
IT Services Circle
Oct 3, 2025 · Fundamentals

Master Network Fundamentals: From TCP/IP Layers to SYN Flood Defense

This article combines a post‑holiday job‑hunting update for Kingsoft WPS with a comprehensive interview guide covering OSI and TCP/IP models, HTTP connection handling, TCP three‑way handshake, SYN‑flood mitigation, Redis Bloom filters, CAP theorem, and I/O multiplexing techniques such as epoll.

BackendSecurityTCP/IP
0 likes · 30 min read
Master Network Fundamentals: From TCP/IP Layers to SYN Flood Defense
Ma Wei Says
Ma Wei Says
Oct 2, 2025 · Databases

Essential Redis Best Practices: Keys, Memory, Security, and Performance

This guide outlines practical Redis best‑practice rules covering key naming conventions, data‑size limits, expiration strategies, script and transaction usage, client connection handling, and security measures to help you build fast, stable, and secure production systems.

Key DesignMemory ManagementSecurity
0 likes · 9 min read
Essential Redis Best Practices: Keys, Memory, Security, and Performance
IT Services Circle
IT Services Circle
Oct 2, 2025 · Backend Development

Cracking Baidu's C++/PHP Interview: Key Questions, Answers, and QuickSort Code

This article examines the diminishing premium of overseas degrees, suggests one‑year master programs for career advancement, and then provides a comprehensive Baidu interview guide covering C++/PHP fundamentals, memory allocation, networking protocols, process vs thread, Redis performance, and a complete quicksort implementation in C++.

CMemory ManagementQuickSort
0 likes · 13 min read
Cracking Baidu's C++/PHP Interview: Key Questions, Answers, and QuickSort Code
ITPUB
ITPUB
Oct 2, 2025 · Backend Development

Master Multi-Level Caching with JetCache: Boost Performance and Consistency

JetCache, an open‑source Java caching library, combines local (Caffeine) and distributed (Redis) caches into a multi‑level system, offering annotation‑driven lazy loading, automatic refresh, consistency strategies, cache pre‑warming, monitoring, and safeguards against penetration, avalanche, and memory leaks.

CaffeineJavaJetCache
0 likes · 13 min read
Master Multi-Level Caching with JetCache: Boost Performance and Consistency
Ops Community
Ops Community
Oct 1, 2025 · Databases

Why Did Redis Memory Spike 10×? Uncover the Hidden Config Mistake

A sudden Redis memory surge from 2 GB to 20 GB was traced to a misconfigured list-compress-depth parameter, revealing how uncompressed lists and queue backlogs can cause ten‑fold memory growth, and outlining step‑by‑step diagnostics, compression fixes, and long‑term optimization strategies.

ConfigurationList CompressionMemory Management
0 likes · 24 min read
Why Did Redis Memory Spike 10×? Uncover the Hidden Config Mistake
Open Source Tech Hub
Open Source Tech Hub
Oct 1, 2025 · Backend Development

How to Build a High‑Performance Lightweight PHP Queue Using Redis Streams

This guide introduces a lightweight, high‑performance PHP queue library built on Redis 5.0+ Streams, detailing its features such as high concurrency, delayed tasks, multi‑producer/consumer support, ACK handling, message replay, audit mode, and provides step‑by‑step installation, configuration, and usage examples with code snippets.

BackendMessage QueuePHP
0 likes · 7 min read
How to Build a High‑Performance Lightweight PHP Queue Using Redis Streams
Code Wrench
Code Wrench
Sep 30, 2025 · Backend Development

Mastering Go-Redis: High‑Performance Caching, Locks, and Queues

This tutorial walks through why Redis is essential for Go services, how to choose and install the go‑redis client, and provides step‑by‑step code for connections, common commands, cache‑aside, distributed locks, leaderboards, and lightweight queues, followed by performance tuning and best‑practice recommendations.

Gocachingdistributed-lock
0 likes · 8 min read
Mastering Go-Redis: High‑Performance Caching, Locks, and Queues
JD Tech
JD Tech
Sep 26, 2025 · Operations

Avoiding High‑Availability Pitfalls: Real‑World JD Lessons and Solutions

This article examines common high‑availability challenges across applications, databases, caches, message queues, containers, and GC, presenting real JD engineering cases, root‑cause analyses, and practical mitigation strategies to help engineers design more resilient systems.

Message Queuedatabasefault tolerance
0 likes · 37 min read
Avoiding High‑Availability Pitfalls: Real‑World JD Lessons and Solutions
Cognitive Technology Team
Cognitive Technology Team
Sep 25, 2025 · Backend Development

How to Accurately Count Valid Entries in Redisson RMapCache

This article explains why Redisson's RMapCache.size() includes expired entries, demonstrates how to obtain the exact number of currently valid key‑value pairs using keySet().size() or readAllEntrySet().size(), and provides performance tips and a real‑world e‑commerce use case.

Cache MonitoringJavaRMapCache
0 likes · 10 min read
How to Accurately Count Valid Entries in Redisson RMapCache
Tech Freedom Circle
Tech Freedom Circle
Sep 25, 2025 · Artificial Intelligence

Inside RAGFlow: How Its Microservice Architecture Powers an Enterprise‑Grade Retrieval‑Augmented Generation Platform

This article provides a detailed technical walkthrough of RAGFlow's architecture, covering its microservice design, directory layout, layered structure, cloud‑native deployment, core modules such as DeepDoc, RAG engine, Agent system, and web UI, as well as multi‑tenant isolation, streaming responses, asynchronous task handling, concurrency controls, scalability strategies, and a complete request‑lifecycle example for document upload.

AI ArchitectureDeepDocDocker Compose
0 likes · 26 min read
Inside RAGFlow: How Its Microservice Architecture Powers an Enterprise‑Grade Retrieval‑Augmented Generation Platform
Java Tech Enthusiast
Java Tech Enthusiast
Sep 24, 2025 · Backend Development

Essential Java Interview Questions Every Backend Engineer Must Master

This guide compiles high‑frequency Java interview questions—from core language concepts and collections to JVM tuning, MySQL indexing, Redis caching, Spring frameworks, micro‑services, and MQ reliability—providing a comprehensive reference for candidates targeting small‑to‑mid‑size companies.

JVMJavamysql
0 likes · 11 min read
Essential Java Interview Questions Every Backend Engineer Must Master
Raymond Ops
Raymond Ops
Sep 22, 2025 · Databases

Master‑Slave, Sentinel, and Sharding: Complete Guide to Redis Cluster Architectures

This article explains Redis’s three clustering options—master‑slave replication, Sentinel high‑availability, and sharding—detailing their architectures, setup steps, synchronization mechanisms, advantages, drawbacks, and common interview questions, helping readers choose and implement the right solution for high‑performance, scalable data storage.

ClusterReplicationhigh availability
0 likes · 18 min read
Master‑Slave, Sentinel, and Sharding: Complete Guide to Redis Cluster Architectures
MaGe Linux Operations
MaGe Linux Operations
Sep 22, 2025 · Databases

Redis Ops Survival Guide: From Data Loss Nightmares to Mastering High‑Availability

This comprehensive guide walks you through real‑world Redis failure stories, explains why Redis is a critical backbone for modern applications, and provides step‑by‑step high‑availability designs, troubleshooting mind maps, monitoring setups, security hardening, automation scripts, cloud‑native deployments, and future‑proofing tips for engineers.

high availabilityperformance tuningredis
0 likes · 35 min read
Redis Ops Survival Guide: From Data Loss Nightmares to Mastering High‑Availability
IT Services Circle
IT Services Circle
Sep 22, 2025 · Information Security

JWT vs Token+Redis: Which Authentication Strategy Wins for Your Apps?

This article provides a comprehensive comparison of JWT and Token‑Redis authentication schemes, covering their underlying principles, Java implementations, advantages and disadvantages, performance and security trade‑offs, suitable use‑cases, and practical guidance for choosing the optimal solution in modern web and mobile applications.

AuthenticationJWTJava
0 likes · 15 min read
JWT vs Token+Redis: Which Authentication Strategy Wins for Your Apps?
MaGe Linux Operations
MaGe Linux Operations
Sep 20, 2025 · Databases

Master Redis Memory Troubleshooting: From Basics to Advanced Solutions

This comprehensive guide walks you through diagnosing and resolving Redis memory issues, covering the underlying architecture, common pitfalls such as memory leaks and fragmentation, practical diagnostic commands, automated monitoring scripts, and optimization techniques to prevent costly outages and improve performance.

Memory ManagementPerformance Optimizationredis
0 likes · 26 min read
Master Redis Memory Troubleshooting: From Basics to Advanced Solutions
Architecture Digest
Architecture Digest
Sep 19, 2025 · Backend Development

Mastering Message Idempotency: From Simple Checks to State‑Machine Solutions

This article explores the challenges of duplicate message consumption in distributed systems, explains why naive de‑duplication fails under high concurrency, and presents four progressively robust idempotency strategies—from database pessimistic locks and local message tables to a state‑machine approach with Redis or MySQL, highlighting their trade‑offs.

Backend DevelopmentDistributed SystemsIdempotency
0 likes · 11 min read
Mastering Message Idempotency: From Simple Checks to State‑Machine Solutions
macrozheng
macrozheng
Sep 18, 2025 · Fundamentals

How Bitmaps and Bloom Filters Slash Memory Usage for Massive Datasets

This article explains how using a bitmap can reduce the memory needed to store billions of integers from about 15 GB to under 500 MB, describes the bitmap concept, introduces Bloom filters, outlines their principles, advantages, common use cases, and provides Java and Redis code examples for implementation.

BitmapData StructuresJava
0 likes · 11 min read
How Bitmaps and Bloom Filters Slash Memory Usage for Massive Datasets
IT Services Circle
IT Services Circle
Sep 17, 2025 · Backend Development

Ace ByteDance Java Interview: Concurrency, Thread Pools, Redis & MySQL Deep Dive

This article walks through essential ByteDance Java interview topics, covering thread safety fundamentals, thread‑pool configuration, Redis performance tricks, Zset and skip‑list internals, memory‑policy handling, cache‑consistency patterns, and MySQL transaction ACID properties, providing code examples and best‑practice recommendations.

Cache ConsistencyJava concurrencyMySQL transaction
0 likes · 25 min read
Ace ByteDance Java Interview: Concurrency, Thread Pools, Redis & MySQL Deep Dive
Java Tech Enthusiast
Java Tech Enthusiast
Sep 16, 2025 · Backend Development

Master Java Concurrency & Redis: Thread Safety, Pools, and Data Consistency

This article explains Java thread‑safety concepts, how to use and configure ThreadPoolExecutor, Redis performance tricks, Zset internal structures, memory‑eviction policies, node‑failure handling, cache‑DB consistency patterns, and MySQL transaction ACID properties with MVCC differences, providing practical code examples throughout.

JavaThreadPooldatabase
0 likes · 25 min read
Master Java Concurrency & Redis: Thread Safety, Pools, and Data Consistency
Tech Freedom Circle
Tech Freedom Circle
Sep 16, 2025 · Backend Development

Redis Fuzzy Search Techniques and the Most Dangerous Commands to Avoid

The article explains how to perform fuzzy queries in Redis using KEYS, SCAN, and collection‑type scans, enumerates commands that can block the single‑threaded server such as KEYS *, HGETALL, LRANGE, and provides practical mitigation strategies like incremental scans, key sharding, and asynchronous deletion.

BlockingSCANdangerous-commands
0 likes · 24 min read
Redis Fuzzy Search Techniques and the Most Dangerous Commands to Avoid
DevOps Coach
DevOps Coach
Sep 14, 2025 · Operations

How We Cut Redis Costs by 95% with AWS ElastiCache Serverless for Argo CD

This article details Kaltura's migration of Argo CD's built‑in Redis to AWS ElastiCache Serverless for Valkey, explaining the cost, performance, and operational challenges of the default setup, the step‑by‑step migration process, and the substantial savings and reliability gains achieved.

Argo CDCost OptimizationElastiCache
0 likes · 11 min read
How We Cut Redis Costs by 95% with AWS ElastiCache Serverless for Argo CD
MaGe Linux Operations
MaGe Linux Operations
Sep 14, 2025 · Databases

Mastering Redis Persistence: RDB vs AOF Deep Dive and Real‑World Optimizations

After a midnight outage that erased 6 GB of cache, this comprehensive guide explores Redis persistence mechanisms—RDB snapshots and AOF logs—detailing their trade‑offs, configuration nuances, performance impacts, and practical optimization techniques to ensure data safety, fast recovery, and compliance in production environments.

AOFPersistenceRDB
0 likes · 22 min read
Mastering Redis Persistence: RDB vs AOF Deep Dive and Real‑World Optimizations
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Sep 14, 2025 · Backend Development

5 Common Redis Cache Anti‑Patterns and How to Fix Them

This article examines five frequent Redis cache anti‑patterns—cache avalanche, unbounded local cache, stale data, missing invalidation, and oversized objects—explaining their pitfalls with code examples and showing concrete fixes that dramatically improve latency, throughput, and memory usage.

Anti‑PatternCacheCaffeine
0 likes · 15 min read
5 Common Redis Cache Anti‑Patterns and How to Fix Them
Architect's Guide
Architect's Guide
Sep 12, 2025 · Databases

Mastering Redis: From Basics to Advanced Caching Strategies

This article provides a comprehensive overview of Redis, covering its core concepts, features, data types, caching patterns in Spring Boot, common cache pitfalls and solutions, performance reasons, eviction policies, persistence options, replication, and Sentinel high‑availability mechanisms.

In-Memory DatabaseReplicationperformance
0 likes · 12 min read
Mastering Redis: From Basics to Advanced Caching Strategies
Architecture Digest
Architecture Digest
Sep 11, 2025 · Databases

Master RedisInsight: Install, Configure, and Deploy Redis GUI on Kubernetes

This guide explains how Redis, a high‑performance in‑memory database, works with the RedisInsight visual tool, covering its key features, step‑by‑step installation on Linux, environment‑variable configuration, service startup, Kubernetes deployment via YAML, and basic usage for monitoring, data manipulation, and memory analysis.

Database ManagementInstallationKubernetes
0 likes · 8 min read
Master RedisInsight: Install, Configure, and Deploy Redis GUI on Kubernetes
IT Services Circle
IT Services Circle
Sep 11, 2025 · Fundamentals

How Ruby’s Community Turned Git and Redis into Industry Titans

This article recounts how the Ruby and Rails community propelled Git from a Linux‑kernel‑only tool to the dominant version‑control platform and helped Redis gain widespread adoption, illustrating the powerful influence of a vibrant developer ecosystem on technology evolution.

GitGitHubRuby
0 likes · 10 min read
How Ruby’s Community Turned Git and Redis into Industry Titans
macrozheng
macrozheng
Sep 11, 2025 · Backend Development

Track Online Users with Redis ZSET in Spring Boot

This guide explains how to implement an online user counting feature using Redis sorted sets (ZSET) in a Spring Boot application, covering user identification via tokens or browser fingerprinting, adding, querying, and cleaning up entries with zadd, zrangeByScore, zremrangeByScore, and zrem commands.

Backend DevelopmentFingerprintJSOnline Users
0 likes · 8 min read
Track Online Users with Redis ZSET in Spring Boot
Tech Freedom Circle
Tech Freedom Circle
Sep 11, 2025 · Backend Development

How to Optimize a Redis Big Key Online Without Disrupting Existing Services (Interview Answer)

The article explains what a Redis big key is, why it harms performance, typical scenarios that generate big keys, and provides a step‑by‑step online optimization plan—including key sharding, dual‑write synchronization, progressive migration with HSCAN, gray‑scale traffic switch, non‑blocking deletion using UNLINK, and monitoring with rollback procedures—to answer the interview question confidently.

BackendBig KeyData Migration
0 likes · 16 min read
How to Optimize a Redis Big Key Online Without Disrupting Existing Services (Interview Answer)
Su San Talks Tech
Su San Talks Tech
Sep 11, 2025 · Databases

Why Redis Handles Millions of Requests: Deep Dive into Its High‑Performance Architecture

This article explains how Redis achieves ultra‑high concurrency by combining a single‑threaded event‑driven core, highly optimized in‑memory data structures, efficient I/O multiplexing, smart memory management, asynchronous persistence, and scalable clustering, allowing it to comfortably serve hundreds of thousands of simultaneous requests.

Event-drivenMemory OptimizationPersistence
0 likes · 16 min read
Why Redis Handles Millions of Requests: Deep Dive into Its High‑Performance Architecture
dbaplus Community
dbaplus Community
Sep 10, 2025 · Databases

Inside Redis: How Commands Are Processed by Its Event‑Driven Engine

Redis, the high‑performance in‑memory key‑value store, uses a single‑threaded event‑driven architecture that handles client connections, command parsing, execution, and reply transmission; this article explains its deployment modes, core modules, and step‑by‑step command processing flow, including code snippets and key data structures.

BackendCommand ExecutionEvent-driven
0 likes · 14 min read
Inside Redis: How Commands Are Processed by Its Event‑Driven Engine
macrozheng
macrozheng
Sep 10, 2025 · Backend Development

How to Build a Scalable Non‑Intrusive Traffic‑Control System with OpenResty, Lua, and Redis

This article explains how to evaluate system performance bottlenecks, choose between hard and soft rate‑limiting, and implement a non‑intrusive, high‑concurrency traffic‑control solution using OpenResty, Lua scripts, and Redis, covering architecture design, queue management, rate limiting, resource release, and performance testing.

Backend ArchitectureLuaOpenResty
0 likes · 18 min read
How to Build a Scalable Non‑Intrusive Traffic‑Control System with OpenResty, Lua, and Redis
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Sep 8, 2025 · Databases

Redis Million‑Level Concurrency: Memory, Data Structures & Replication

Redis achieves million‑level concurrency by storing all data in memory, leveraging ultra‑fast read/write speeds, employing optimized data structures such as strings, hashes, lists, sets and sorted sets, using I/O multiplexing to handle many connections in a single thread, and scaling through master‑slave replication for high availability.

Data StructuresI/O MultiplexingIn-Memory Database
0 likes · 4 min read
Redis Million‑Level Concurrency: Memory, Data Structures & Replication
Java Backend Technology
Java Backend Technology
Sep 8, 2025 · Backend Development

How to Track Online Users with Redis ZSET: A Step‑by‑Step Guide

This article explains how to implement an online‑user counting feature using Redis sorted sets (zset) by leveraging the four core commands zadd, zrangeByScore, zremrangeByScore, and zrem, with Java/Spring code examples and optional browser‑fingerprinting for unauthenticated visitors.

JavaOnline UsersZSet
0 likes · 7 min read
How to Track Online Users with Redis ZSET: A Step‑by‑Step Guide