This document provides an overview of Redis, an open source in-memory data structure store. It discusses how Redis can be used as a data store, cache, and message broker. It explains Redis' core abstractions like strings, hashes, lists, sets, sorted sets; persistence options; replication; and pub/sub functionality. The document also provides information about Redis' performance, clients, and how it is well-suited for caching, analytics, and real-time applications.
As time goes on more OSes are getting Dom0 support, so there's a growing need to provide a platform independent set of tools from which to operate Xen. This talk will expose the different mechanisms used on NetBSD that diverge from the Linux approach, and how Xen is improving its userspace tools to provide a more platform independent support.
The talk also touches upon various features that BSD provides or plans to provide with Xen, thus presenting a coherent roadmap view of where we've come from, and what lies ahead.
What's in this talk:
Xen and BSD
Status updates from the world of BSD
Ecosystem/userbase
The presentation provides you with the necessary steps to follow when migrating to XtraDB Cluster.
Percona provides an in-depth review of your database and recommends appropriate changes by performing a complete MySQL health check in which we identify inefficiencies, find problems before they occur, and ensure that your MySQL database is in the best condition.
Actually any people and employers get high available in your applications, maintain ours environment always available not is easy task. In Open Source World exist tools that maje it possible. This appresentation is a module course UTAH NETWORXS about Hight Available and Performance Course. Utah Networxs is business school in Sao Paulo Brazil Work a Linux System for more than 17 years. Maked to Fabio Pires Directory Utah Networxs and Linux Specialist focusing Clusters and HA services.
This presentation is on the DRBD product. At eNovance, we're using it for several years. In those slides, you will find informations on how we use it, use cases and Ninja tricks.
This document has been realized with a lot of feedbacks and thanks to strong knowledges on that technology that eNovance is able to provide.
As time goes on more OSes are getting Dom0 support, so there's a growing need to provide a platform independent set of tools from which to operate Xen. This talk will expose the different mechanisms used on NetBSD that diverge from the Linux approach, and how Xen is improving its userspace tools to provide a more platform independent support.
The talk also touches upon various features that BSD provides or plans to provide with Xen, thus presenting a coherent roadmap view of where we've come from, and what lies ahead.
What's in this talk:
Xen and BSD
Status updates from the world of BSD
Ecosystem/userbase
The presentation provides you with the necessary steps to follow when migrating to XtraDB Cluster.
Percona provides an in-depth review of your database and recommends appropriate changes by performing a complete MySQL health check in which we identify inefficiencies, find problems before they occur, and ensure that your MySQL database is in the best condition.
Actually any people and employers get high available in your applications, maintain ours environment always available not is easy task. In Open Source World exist tools that maje it possible. This appresentation is a module course UTAH NETWORXS about Hight Available and Performance Course. Utah Networxs is business school in Sao Paulo Brazil Work a Linux System for more than 17 years. Maked to Fabio Pires Directory Utah Networxs and Linux Specialist focusing Clusters and HA services.
This presentation is on the DRBD product. At eNovance, we're using it for several years. In those slides, you will find informations on how we use it, use cases and Ninja tricks.
This document has been realized with a lot of feedbacks and thanks to strong knowledges on that technology that eNovance is able to provide.
This is to introduce the related components in SUSE Linux Enterprise High Availability Extension product to build High Available Storage (ha-lvm/drbd/iscsi/nfs, clvm, ocfs2, cluster-raid1).
Building High Availability Clusters with SUSE Linux Enterprise High Availabil...Novell
SUSE Linux Enterprise Server High Availability Extension provides a range of modules that can be assembled in multiple ways to build high availability clusters to host your critical business services. This session will examine some of the most common solutions and discuss best practices for setting up a new cluster.
More in detail, this session will discuss in a second step how to prepare a cluster with the SUSE Linux Enterprise High Availability Extension to make an SAP application highly available as certified by Novell and SAP. This scenario is not only from interest for companies looking into making their SAP environment highly available, but also for those that want to migrate from Unix to the SUSE Linux Enterprise platform.
Anatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxConJérôme Petazzoni
Containers are everywhere. But what exactly is a container? What are they made from? What's the difference between LXC, butts-nspawn, Docker, and the other container systems out there? And why should we bother about specific filesystems?
In this talk, Jérôme will show the individual roles and behaviors of the components making up a container: namespaces, control groups, and copy-on-write systems. Then, he will use them to assemble a container from scratch, and highlight the differences (and likelinesses) with existing container systems.
Linux Containers(LXC) allow running multiple isolated Linux instances (containers) on the same host.
Containers share the same kernel with anything else that is running on it, but can be constrained to only use a defined amount of resources such as CPU, memory or I/O.
A container is a way to isolate a group of processes from the others on a running Linux system.
Redis in Practice: Scenarios, Performance and Practice with PHPChen Huang
Knowledge sharing about Redis, mainly focusing on:
Why to use Redis? Comparison of some in-memory storages and their scenarios
How to make Redis faster? Consider time complexity, communication latency and serialization
Practice of replication and sentinel in PHP
This is to introduce the related components in SUSE Linux Enterprise High Availability Extension product to build High Available Storage (ha-lvm/drbd/iscsi/nfs, clvm, ocfs2, cluster-raid1).
Building High Availability Clusters with SUSE Linux Enterprise High Availabil...Novell
SUSE Linux Enterprise Server High Availability Extension provides a range of modules that can be assembled in multiple ways to build high availability clusters to host your critical business services. This session will examine some of the most common solutions and discuss best practices for setting up a new cluster.
More in detail, this session will discuss in a second step how to prepare a cluster with the SUSE Linux Enterprise High Availability Extension to make an SAP application highly available as certified by Novell and SAP. This scenario is not only from interest for companies looking into making their SAP environment highly available, but also for those that want to migrate from Unix to the SUSE Linux Enterprise platform.
Anatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxConJérôme Petazzoni
Containers are everywhere. But what exactly is a container? What are they made from? What's the difference between LXC, butts-nspawn, Docker, and the other container systems out there? And why should we bother about specific filesystems?
In this talk, Jérôme will show the individual roles and behaviors of the components making up a container: namespaces, control groups, and copy-on-write systems. Then, he will use them to assemble a container from scratch, and highlight the differences (and likelinesses) with existing container systems.
Linux Containers(LXC) allow running multiple isolated Linux instances (containers) on the same host.
Containers share the same kernel with anything else that is running on it, but can be constrained to only use a defined amount of resources such as CPU, memory or I/O.
A container is a way to isolate a group of processes from the others on a running Linux system.
Redis in Practice: Scenarios, Performance and Practice with PHPChen Huang
Knowledge sharing about Redis, mainly focusing on:
Why to use Redis? Comparison of some in-memory storages and their scenarios
How to make Redis faster? Consider time complexity, communication latency and serialization
Practice of replication and sentinel in PHP
Estudo comparativo entr bancos RDBMS, NoSQL e NewSQLOrlando Vitali
Uma analise teórica e pratica sobre as diferenças entre bancos de dados Relacionais, NoSQL e NewSQL desenvolvida como TCC para o curso de Ciências da Computação da UNESC
Redis: servidor de estructuras de datosAntonio Ognio
Una introducción a Redis, un servidor de estructuras de datos en red que actua como una base de datos no-relacional con almacenamiento principal en memoria RAM y estrategias de almacenamiento persistente basadas en disco.
Practical advices how to achieve persistence in Redis. Detailed overview of all cons and pros of RDB snapshots and AOF logging. Tips and tricks for proper persistence configuration with Redis pools and master/slave replication.
Sistemas NoSQL, surgimento, características e exemplosAricelio Souza
Introdução ao Movimento NoSQL; Suas principais características; Técnicas para implementação; Principais tipos; Teorema CAP; Principais produtos no mercado e seus principais utilizadores.
Based in Berlin, wooga is the leading European social games developer. Social games offer interesting scaling challenges—when they become popular, the user base can grow quickly, often by 50.000 people per day or more.
This case study recounts how we successfully scaled up two Facebook games to one million daily active users each, why we decided to replace MySQL (once partially, once fully) with Redis, what difficulties we encountered on the way and how we solved them.
As an in-memory database, Redis offers an order-of-magnitude reduction in query roundtrip latency, but also introduces new challenges: How can you guarantee durability of data in the case of server outages? How do you best structure your data when there are no ad-hoc query capabilities?
This talk will go into technical details of our backend architecture and discuss both its advantages and disadvantages, how it stacks up against other possible setups, and what lessons we have learned.
Curso impartido en Curso de Verano Big Data & Data Science, Universidade de Santiago de Compostela, CITIUS (http://www.citius.usc.es/), 18 de Julio 2013
Conceptos básicos de NoSQL. Introducción a Cassandra, CouchDB, MongoDB y Neo4j.
As presented at Confoo 2013.
More than some arcane NoSQL tool, Redis is a simple but powerful swiss army knife you can begin using today.
This talk introduces the audience to Redis and focuses on using it to cleanly solve common problems. Along the way, we'll see how Redis can be used as an alternative to several common PHP tools.
Banco de Dados Não Relacionais vs Banco de Dados Relacionaisalexculpado
Uma breve abordagem sobre o conceito de banco de dados não relacionais, tendo como ponto de origem os bancos relacionais atuais. Apresento de forma sucinta as vantagens e desvantagens dos dois.
Foi apresentado no Campus Universitário da UAN do Camama.
Noah Davis & Luke Melia of Weplay share a series of examples of Redis in the real world. In doing so, they cover a survey of Redis' features, approach, history and philosophy. Most examples are drawn from the Weplay team's experience using Redis to power features on Weplay.com, a social site for youth sports.
Seminário apresentado no IME-USP, 07/06/2010
----------------------------------------------------------------------
Com a Web 2.0, o volume de dados gerados e armazenados cresce exponencialmente a cada ano. A medida em que aplicações precisam lidar com esse grande volume, seus requisitos são revistos - por exemplo, às vezes pode ser necessário abrir mão da consistência dos dados para se atingir uma maior escalabilidade da aplicação.
Esse novo cenário propiciou o surgimento de novas tecnologias e o ressurgimento de outras. Os sistemas de gerenciamento de bancos de dados não-relacionais (também chamados informalmente de NoSQL), como os bancos orientados a documentos, bancos chave-valor e bancos de grafos, são uma dessas tecnologias. Inicialmente, essa movimentação começou em algumas das grandes empresas da Web 2.0, como Google e Amazon, mas rapidamente opções de software livre começaram a aparecer e se estabelecer.
Esse seminário tratará dos princípios por trás do uso de sistemas de gerenciamento de banco de dados não-relacionais, suas vantagens e desvantagens e seus principais tipos e aplicações.
This is from a 2 hour talk introducing in-memory databases. First a look at traditional RDBMS architecture and some of it's limitations, then a look at some in-memory products and finally a closer look at OrigoDB, the open source in-memory database toolkit for NET/Mono.
Presented at NSA User Group. Steps through recent activities and technologies in use across NSA and the IC. Specifically mentions data ingress/egress with JBoss Messaging and MRG-M, storage of data with XFS and GFS, and data presentation capabilities with JBoss Enterprise Middleware Portfolio. 15-20min on Security Automation with SCAP.
Run Cloud Native MySQL NDB Cluster in KubernetesBernd Ocklin
The more your database aligns with Cloud Native principles such as resilience, scaling, auto-healing and data consistency across all nodes, the better it also runs as DBaaS in Kubernetes. I walk through running databases in Kubernetes and demos manual deployment and deployment with an NDB operator.
This talk was given at the MySQL Dev Room FOSDEM 2021.
This session shows an overview of the features and architecture of SQL Server on Linux and Containers. It covers install, config, performance, security, HADR, Docker containers, and tools. Find the demos on http://aka.ms/bobwardms
What CloudStackers Need To Know About LINSTOR/DRBDShapeBlue
Philipp explains the best performing Open Source software-defined storage software available to Apache CloudStack today. It consists of two well-concerted components. LINSTOR and DRBD. Each of them also has its independent use cases, where it is deployed alone. In this presentation, the combination of these two is examined. They form the control plane and the data plane of the SDS. We will touch on: Performance, scalability, hyper-convergence (data-locality for high IO performance), resiliency through data replication (synchronous within a site, 2-way, 3-way, or more), snapshots, backup (to S3), encryption at rest, deduplication, compression, placement policies (regarding failure domains), management CLI and webGUI, monitoring interface, self-healing (restoring redundancy after device/node failure), the federation of multiple sites (async mirroring and repeatedly snapshot difference shipping), QoS control (noisy neighbors limitation) and of course: complete integration with CloudStack for KVM guests. It is Open Source software following the Unix philosophy. Each component solves one task, made for maximal re-usability. The solution leverages the Linux kernel, LVM and/or ZFS, and many Open Source software libraries. Building on these giant Open Source foundations, not only saves LINBIT from re-inventing the wheels, it also empowers your day 2 operation teams since they are already familiar with these technologies.
Philipp Reisner is one of the founders and CEO of LINBIT in Vienna/Austria. He holds a Dipl.-Ing. (comparable to MSc) degree in computer science from Technical University in Vienna. His professional career has been dominated by developing DRBD, a storage replication software for Linux. While in the early years (2001) this was writing kernel code, today he leads a company of 30 employees with locations in Austria and the USA. LINBIT is an Open Source company offering enterprise-level support subscriptions for its Open Source technologies.
-----------------------------------------
CloudStack Collaboration Conference 2022 took place on 14th-16th November in Sofia, Bulgaria and virtually. The day saw a hybrid get-together of the global CloudStack community hosting 370 attendees. The event hosted 43 sessions from leading CloudStack experts, users and skilful engineers from the open-source world, which included: technical talks, user stories, new features and integrations presentations and more.
Security regarding NoSQL Databases Still remain a question.Not much research done these databases,this paper concentrates on some of the major NoSQL databases and their flaws
Se guardiamo oltre la meccanica, il TDD è una tecnica complessa perché richiede molteplici skill. Da principiante dopo l’implementazione di poche storie ti imbatti nel problema dei test che si rompono ad ogni refactoring, è arrivato il momento di migliorare i propri skill di scrittura dei test. Nel talk analizzeremo la struttura dei test, quali sono le bad smell più comuni e come porvi rimedio.
E' una tecnica che, sfruttando uno "snapshot" dell'applicazione, permette da un lato di esprimere facilmente assert complesse e da l'altro di cambiare il metodo di scrittura dei test ritardando la definizione delle assert. In questa sessione, dopo una introduzione, vedremo come queste caratteristiche rendono Approval Tests un potente alleato per la scrittura di test di caratterizzazione per applicazioni legacy.
Async: scalabilità e responsiveness senza pari! @ CDaysMatteo Baglini
Per ottenere applicazioni scalabili con un consumo minimo di risorse e una UI sempre reattiva,
dobbiamo scrivere software che opera in maniera asincrona.
In questa sessione vedremo perchè è importante sfruttare questo tipo di programmazione e
quali strumenti mette a disposizione il .NET Framework.
http://www.communitydays.it/events/communitydays-2013/misc04/
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
3. Key Value
page:index <html><head>[...]
user:123:session xDrSdEwd4dSlZkEkj+
user:123:avatar 77u/PD94bWwgdm+
Everything is a «blob»
Commands, primarily, can GET and SET the values
3
4. Key Value Type
page:index <html><head>[...] String
events:timeline { «Joe logged», «File X Uploaded», …} List
logged:today { 1, 2, 3, 4, 5 } Set
time => 10927353
user:123:profile Hash
username => bmatte
joe ~ 1.3483
game:leaderboard smith ~ 293.45 Sorted Set
fred ~ 83.22
Different «data type/structure»
Rich set of specialized commands 4
5. Everything is stored in memory
Screamingly fast performance
Persistent via snapshot or append-only log file
Replication (only Master/Slave)
Extensible via embedded scripting engine (Lua)
Rich set of client libraries
High availability (In progress)
◦ Cluster (Fault tolerance, Multi-Node consistence)
◦ Sentinel (Monitoring, Notification, Automatic failover)
5
6. Created by Salvatore
Sanfilippo (@antirez)
First «public release»
in March 2009.
Since 2010 sponsored
by VMware.
Initially written to improve performance of Web
Analytics product LLOOGG out of his startup
6
7. Written in ANSI C
No external dependencies
Single thread (asynchronous evented I/O)
Works on all POSIX-like system
Exist unofficial build for Windows
Open-source BSD licensed
Community (list, IRC & wiki)
7
8. 1. A DSL for Abstract Data Types.
2. Memory storage is #1.
3. Fundamental data structures for a
fundamental API.
4. Code is like a poem.
5. We're against complexity.
6. Two levels of API.
7. We optimize for joy.
8
21. Sharing state across processes
◦ Distribute lock, Incremental ID, Time series,
User session.
Web Analytics
◦ User visit (day, week, month), Feature Tracking.
Caching
◦ String values can hold arbitrary data.
Rate limiting
◦ Limit number of API calls/minute.
21
30. Events Store or Notification
◦ Logs, Social Network Timelines, Notifications.
Fixed Data
◦ Last N activity.
Message Passing
◦ Durable MQ, Job Queue.
Circular list
30
36. Web Analytics
◦ Unique Page View, IP addresses visiting.
Relations
◦ Friends, Followers, Tags.
Caching Result
◦ Store result of expensive intersection of data.
36
42. Web Analytics
◦ Online users, Most visited pages.
Leaderbord
◦ Show top N.
Order by data
◦ Maintain a set of ordered data like user by age.
42
50. Dump data to disk after certain
conditions are met
50
51. Pro:
◦ RDB is a very compact single-file.
◦ RDB files are perfect for backups.
◦ RDB is very good for disaster recovery.
◦ RDB allows faster restarts with big datasets.
◦ RDB maximizes performances (backgr. I/O via fork(2)).
Contro:
◦ RDB is NOT good if you need to minimize the chance of
data loss in case Redis stops working (for example after
a power outage).
◦ Fork can be time consuming if the dataset is very big.
51
54. Pro:
◦ AOF is much more durable.
◦ AOF is an append only log, no seeks, nor corruption
problems (for example after a power outage).
◦ AOF contains a log of all the operations one after the
other in an easy to understand and parse format.
Contro:
◦ AOF files are usually bigger than the equivalent RDB.
◦ AOF can be slower then RDB depending on the exact
fsync policy.
54
55. Use both persistence methods if you want a degree of
data safety comparable to what any RDBMS can provide
you.
If you care a lot about your data, but still can live with a
few minutes of data lose in case of disasters, you can
simply use RDB alone.
There are many users using AOF alone, but we
discourage it since to have an RDB snapshot from time to
time is a great idea for doing database backups, for
faster restarts.
55
77. Scalability
◦ Multiple slaves for read-only queries.
Redundancy
◦ Data replication.
Slave of Slave
◦ Graph-like structure for more scalability e
redundancy.
77
85. «I see Redis definitely more as a flexible tool than
as a solution specialized to solve a specific
problem: his mixed soul of cache, store, and
messaging server shows this very well»
Salvatore Sanfilippo
85