Why do I need a bloom filter
Imagine how you would handle the following scenario:
Whether the mobile phone number is registered repeatedly
Has the user participated in a second kill activity
Forge requests for a large number of id query records that do not exist. At this time, the cache misses. How to avoid cache penetration
To solv ...
Posted by bogdaniel on Mon, 06 Dec 2021 20:40:19 -0800
Recently, I want to make a redis second killing scene with a page for my students. Many of them are java on the internet. Because recently my students are also learning python, I want to write a page with python's related web framework and implement the redis cache database to support second killing scene.
The effect of the page is as follows: ...
Posted by wyrd33 on Sat, 04 Dec 2021 09:54:45 -0800
redis setnx expiration time_ Several implementations of redis locking
We often encounter some problems such as repeated requests and concurrency in our work, and locking resources is a good means. Today, let's sort out several implementations of using redis as a distributed lock.
redis can be used for several commands: I ...
1, Basic introduction, installation and principle of Redis
1. Basic introduction:
① Redis is a NoSQL database (non relational database) 💨 Official website
② Redis (remote dictionary server), which means remote dictionary server, can reach 15w qps on a single machine. It is suitable for caching and persistence.
③ Redis is a high-p ...
Posted by bltesar on Fri, 03 Dec 2021 15:16:46 -0800
1, Redis common commands
Redis is generally installed on linux, which is divided into server and client.
Start Redis server
Enter the following command on the terminal to start the Redis server:
Start Redis client
Enter the following command on the terminal to start Redis client:
#If the password is set, use the follow ...
Posted by NikLP on Fri, 03 Dec 2021 00:12:24 -0800
Official account is official account. Official account is like subscription. When the official account is released, the message will be sent to all users who are concerned about the public number. Users will be able to see the new articles. The publish subscription of redis is similar. A user subscribes to a channel through sub ...
Posted by mariolopes on Thu, 02 Dec 2021 13:57:10 -0800
With the continuous development of Internet technology and the increasing number of users, more and more business scenarios need to use distributed systems. In distributed systems, accessing shared resources requires a mutual exclusion mechanism to prevent mutual interference and ensure consistency. At this time, distributed locks are needed.
Posted by bobbybrown on Wed, 01 Dec 2021 03:49:26 -0800
Business scenario 1
Automatic dialogue of semantic recognition language in the field of artificial intelligence. The trial behavior of trial users is limited to 10 calls per minute
1. Design a counter to record the call times, which is used to control the service execution times. Take the user id as the key and the usage times as th ...
Posted by mightymouse on Tue, 30 Nov 2021 17:52:40 -0800
This article is based on spring cloud. After users send and cancel their likes, they first store them in Redis, and then read the likes from Redis every two hours and write them into the database for persistent storage.
The like function is available in many systems, but despite the small function, there are many things to consider if you want ...
Posted by eerikk2 on Tue, 30 Nov 2021 07:25:17 -0800