redis source code analysis

Read about redis source code analysis, The latest news, videos, and discussion topics about redis source code analysis from alibabacloud.com

Java Collection source code analysis (1), java Collection source code analysis

Java Collection source code analysis (1), java Collection source code analysis The Java Collection toolkit is located under the Java. util package and contains many common data structures, such as arrays, linked lists, stacks, que

Redis Design and Implementation [Part 1] data structure and Object-C source code reading (1)

APIs are binary-safe. All SDS APIs process the data stored in the buf array in binary mode, the program does not impose any restrictions, filters, or assumptions on the data, such as what the data is written and what the data is read. Redis uses the buf array of SDS to store binary data instead of characters. SDS is compatible with some C string functions. Ii. Linked List Keywords: Polymorphism When a list key contains a large number of elements,

Redis Dictionary (dict) rehash process source code parsing

of the following conditions is true: // 1) dict_can_resize true // 2) the ratio of the number of used nodes divided by the size of the hash table is greater than // dict_force_resize_ratio // call dictExpand to expand the hash table. // the size of the used nodes must be at least twice the size of the used nodes. // O (n) if (d-> ht [0]. used> = d-> ht [0]. size (dict_can_resize | d-> ht [0]. used/d-> ht [0]. size> dict_force_resize_ratio) {return dictExpand (d, d-> ht [0]. used * 2);} return

Cocos2d-x source code analysis: control source code analysis (control components controlButton)

Source code version from 3.1rc Reprinted please note Cocos2d-x source code analysis directory Http://blog.csdn.net/u011225840/article/details/31743129 1. the overall design of the inherited structure control is quite beautiful. The parent class control defines the basis and

Cocos2d-x source code analysis: Control source code analysis (control components controlbutton)

Source code version from 3.1rc Reprinted please note Cocos2d-x source code analysis directory Http://blog.csdn.net/u011225840/article/details/31743129 1. the overall design of the inherited structure control is quite beautiful. The parent class control defines the basis and

LAMP Ubuntu 12.04 LTS Build---Comes with memcache redis installation (source code)

directory: CD Php-redisPhpize (PS: This is a tool for compiling extensions under Php-dev, if not, quickly perform sudo apt-get install Php5-dev installation)If Libssl lacks first, heApt-get Install Libssl If it's still not.Then aptitude install Libssl Remember to choose N y y y is wrong../configureMakeMake installModify the php.ini file (/etc/php5/apache2/php.ini or/etc/php5/fpm/php.ini)Extension=redis.soRestart ApacheGo back to the test page and search for

BT source code learning experience (9): client source code analysis (Graphic Interface Analysis)

BT source code learning experience (9): client source code analysis (Graphic Interface Analysis)Author: Wolfenstein The client will start from btdownloadgui. py for analysis, so that yo

Redis source code compilation and installation

-error Yesrdbcompression yesrdbchecksum Yesdbfilename Dump.rdbdir/usr/local/redis/6380slave-serve-stale-data Yesslave-read-only Yesrepl-diskless-sync norepl-diskless-sync-delay 5repl-disable-tcp-nodelay noslave-priority 100appendonly noappendfilename "appendonly.aof" Appendfsync everysecno-appendfsync-on-rewrite Noauto-aof-rewrite-percentage 100auto-aof-rewrite-min-size 64mbaof-load-truncated Yeslua-time-limit 5000slowlog-log-slower-than 10000slowlog-

YII source code analysis, YII source code analysis

YII source code analysis, YII source code analysis This is the best YII source code analysis I

Analysis of Ruby source code layout and programming style, analysis of ruby source code Layout

Analysis of Ruby source code layout and programming style, analysis of ruby source code Layout Use the UTF-8 as the source file encoding. Each indentation level uses two spaces (also kn

Elastic-job Project source code analysis 3--talking about source code analysis

Introduction Today's content, and source analysis is irrelevant, but from the first two of the soft text, was inspired by the shallow thought (on my way to ride the Little Donkey) In writing this article, always like to ask you a few questions, why do "source code analysis.

Java list source code analysis, list source code analysis

Java list source code analysis, list source code analysis Three Data Structure linked lists, trees, and graphs. As one of them, the sequence table is the longest used in programming. The List interface is the implementation of seq

Tomcat source code analysis (1): tomcat source code analysis

Tomcat source code analysis (1): tomcat source code analysis During this time, I briefly looked at the Tomcat source code and made a note he

Exploring the principle and programming implementation of the SHA-1 algorithm in Redis source code

Exploring the principle and programming implementation of the SHA-1 algorithm in Redis source codeGuide The SHA-1 algorithm is short for the first generation of "Security Hash algorithm", and is essentially a Hash algorithm. SHA standards are mainly used for digital signatures to generate message digests, which were once considered to be the successor of the MD5 algorithm. Now the SHA family has five algori

Php-fpm Execution Process source code analysis, php-fpm source code analysis

Php-fpm Execution Process source code analysis, php-fpm source code analysis Author: zhanhailiang Date: Sapi \ fpm \ fpm_main.c: @ main; Fcgi_init ()-> fcgi_setup_signals (); set the signal processing method;Sigaction (SIGUSR1,

Blockchain tutorials ethereum source code analysis p2p-dial.go source code analysis

attempt.func (t *dialTask) dial(srv *Server, dest *discover.Node) bool { fd, err := srv.Dialer.Dial(dest) if err != nil { log.Trace("Dial error", "task", t, "err", err) return false } mfd := newMeteredConn(fd, false) srv.SetupConn(mfd, t.flags, dest) return true} Do methods of discovertask and waitexpiretask, func (t *discoverTask) Do(srv *Server) { // newTasks generates a lookup task whenever dynamic dials are // necessary. Lookups need to take some time,

Java Spring and Redis operations package source code

in multiple uses such as cache, message, queue (Redis native support publish/subscribe), any transient data, applications such as Web application sessions, Web page hits count etc. Spring-data-redis Package Redisservice operation package source code as follows: packagecom.yoodb.service;importjava.util.arraylist;impor

Distributed search elasticsearch source code analysis 2-Brief Analysis of index process source code

Elasticsearch provides a simple analysis of the index logic. Here we will only clarify the main context, and some details will be elaborated in future articles. If you call the elasticsearch index interface through Java APIs, you first construct a JSON string (represented as xcontent in ES, which is an abstraction of the content to be processed ), in indexrequest, specify the index to which the document will be indexed, its type, and the Document ID.

Redis Learning--jediscluster Source code interpretation

,jedisclusterscriptingcommands interface. These three interfaces provide an operation based on string type, that is, key is a string type. 3. Basiccommands is about the basic operation of the Redis service itself, such as Save,ping,bgsave. 4. Multikeybinaryjedisclustercommands and Multikeyjedisclustercommands interfaces A bulk operation of a byte array, and one is the bulk operation of a string. Jedisclustercommand in the Jediscluster client, Je

Nginx + Php-fpm + MySQL + Redis source code compilation and installation guide

Nginx + Php-fpm + MySQL + Redis source code compilation and installation guide Note: This tutorial includes the following three parts: 1. Compile and install Nginx in source code 2. Compile and install the source

Total Pages: 15 1 .... 5 6 7 8 9 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.