Detailed explanation of Redis data types: hash type and zset type

1. hash data type and structure 1.1 introduction to hash types Redis hash data structure is a key value pair (key value) set, which is a mapping table of field and value of string type. Redis itself is a key value database, so the hash data structure is equivalent to another layer of key value data in value. Therefore, the hash data structure ...

Posted by cricher on Sat, 01 Jan 2022 19:26:58 +0100

Alicloud server installation and deployment (ubuntu)

Set root password for the first timesudo passwd root1, Installing nginx1. Apt get installation commandsudo apt-get install nginxError: "Unable to locate package nginx"Solution: execute the command before installation to update the software sourcesudo apt-get updateLocation of nginx files after installation:/usr/sbin/nginx: main progra ...

Posted by alliance on Sat, 01 Jan 2022 05:25:51 +0100

Implementing Redis distributed lock from zero to one coding

Some students are so pissing. You can understand it. If you don't do it yourself, how can you understand it thoroughly? Let's do it together! Usage scenario and model selection The distributed multi node deployment mode makes it possible for shared variables to be operated at the same time. In case of data consistency requirements, global loc ...

Posted by oeb on Sat, 01 Jan 2022 03:03:06 +0100

Interview build rocket series, planted in cglib and jdk dynamic agent

Hello, I'm the technical interviewer of XX Baba company. Are you Zhang Xiaoshuai. The voice came from the other end of the phone Yes, hello. Xiaoshuai was secretly pleased that Dachang finally found me. "Let's have a telephone interview. Please introduce yourself first." “balabalabla...” Xiaoshuai gave a general descrip ...

Posted by dgwade on Fri, 31 Dec 2021 18:46:25 +0100

Redis foundation - master-slave replication

concept Master slave replication refers to copying data from one Redis server to other Redis servers. The former is called master / leader and the latter is called slave / follower. Data replication is unidirectional and can only be from master node to slave node. Master mainly writes, Slave mainly reads. By default, each Redis server ...

Posted by skaforey on Thu, 30 Dec 2021 20:39:25 +0100

This article explains the common methods and usage scenarios of Redis's five data types

preface Today, I will share five data structures of Redis and their use scenarios in actual combat 1, Redis data structure? We all know that redis is an indispensable middleware tool in large-scale systems. It can support high concurrency scenarios or distributed locks. This is inseparable from his design architecture and underlying ...

Posted by Wykster on Wed, 29 Dec 2021 19:00:46 +0100

Cache and Redis distributed lock for Java learning

Cache invalidation Cache penetration Content introduction Cache penetration refers to data that does not exist in the cache or database, but users constantly initiate requests, such as data with id of "- 1" or data with id of particularly large and nonexistent. At this time, the user is likely to be an attacker, and the attack ...

Posted by vikramjeet.singla on Wed, 29 Dec 2021 15:59:39 +0100

Redis introduction and simple use

1, Introduction (please skip those who don't want to see) Concept: redis is a high-performance NOSQL series non relational database What is Redis? Redis is an open-source high-performance key value database developed in C language. It officially provides test data. 50 concurrent 100000 requests are executed. The reading speed is 110000 ti ...

Posted by covert215 on Wed, 29 Dec 2021 14:57:39 +0100

Redis notes (Basic + Advanced)

About NoSQL overview 1, Development of NoSQL 1. Stand alone MySQL Era In the 1990s, the number of visits to a website was generally not too large, and a single database was enough. With the increase of users, the website has the following problems: When the data volume increases to a certain extent, the stand-alone database cannot be put do ...

Posted by caster001 on Tue, 28 Dec 2021 09:31:00 +0100

Development of Winform terminal and processing of client authorization information in ABP VNext framework

In the ABP VNext framework, even in all the cases it provides, there is no case introduction of Winform program, but a console program is provided in the microservice solution to understand the calling and processing of its IDS4. Because I have developed many Winform projects, the Winform client is included in the ABP rapid development framewor ...

Posted by thepreacher on Tue, 28 Dec 2021 01:57:03 +0100