Redis, as a general cache model, is very popular because of its high performance. Redis version 2.x only supports stand-alone mode, and the cluster mode has been introduced since version 3.0.
Redis's Java ecological clients include Jedis, Redisson and lattice. Different clients have different capabilities and use methods. This paper ...
Posted on Mon, 01 Nov 2021 21:36:30 -0400 by LemonInflux
Every time we create a springboot Application, we will find that there will be an Application class (hereinafter referred to as the Application class directly) headed by the Application name in its directory structure, while other packages are under the same level or child level of this class, as sho ...
Posted on Wed, 24 Jun 2020 03:01:03 -0400 by msurabbott
This article mainly introduces the use of redis command line, the software version used: Java 1.8.0_191,Redis 5.0.8,Jedis 3.3.0.
1. Introduce dependency
2. Basic opera ...
Posted on Fri, 19 Jun 2020 22:43:17 -0400 by bsamson
In modern programming languages, programmers who are exposed to programming with too many threads know more or less about locks.Simply put, locks in multiple threads are mechanisms that ensure the consistency of shared resources when multiple threads modify shared resources in a multithreaded environment.Don't expand here.In a distributed env ...
Posted on Tue, 16 Jun 2020 13:17:31 -0400 by plasmahba
Redo is always easier than transform
Recently, I am working on a project to fully integrate an implementation system from another company (hereinafter referred to as the old system) into my own company's system (hereinafter referred to as the new system), which requires that the functions implemented ...
Posted on Sun, 14 Jun 2020 20:26:06 -0400 by BillyMako
Redo is always easier than transform
Recently, I am working on a project to fully integrate an implementation system from another company (hereinafter referred to as the old system) into my own company's system (hereinafter referred to as the new system), which requires that the functions implemented by the other party be fully implemented in t ...
Posted on Sun, 14 Jun 2020 19:46:59 -0400 by scorphus
Each operation will create a jedis object. After the execution, close the connection and release it. The corresponding is a Tcp connection.
jedis connection pool
A batch of jedis connection objects are generated in advance and put into the connection pool. When it is necessary to operate redis, the jedis objects are borrowed from ...
Posted on Thu, 07 May 2020 13:30:10 -0400 by sunsun
Missile intercept, precision defense.
Interceptor: a set of event based pluggable logic processing chains without modifying the application business logic;
An interceptor similar to spring MVC:
These are through the configuration of interceptors, inserted into the application, to achieve pluggable business logic modification;
Recently, the frequency of the project online is quite high, even working overtime for several days, the body is a little bit unable to bear the spirit and a little depressed, but the business side is pressing, so the construction period can only be hard on the scalp at present. When you are confused, what you write cannot be call ...
Posted on Tue, 21 Apr 2020 23:13:42 -0400 by mahendrakalkura
How do I delay tasks?
In a nutshell, go directly to today's topic. The main content of this article is as follows:
What are delayed tasks?
Considerably, tasks that need to be delayed are called delayed tasks.
The usage scenarios for delaying tasks are as follows:
The red envelope has not been checked for 24 hours and needs to be delayed in ...
Posted on Fri, 17 Apr 2020 18:11:56 -0400 by TheSeeker