< Return
Course Introduction
Chapter1 Chapter One
1-1 Course Introduction
1-2 Introduction to database-introduction
1-3 Database Introduction-Features
1-4 Overview and installation
1-5 Relevant knowledge introduction
1-6 key operation
1-7 Common data types-string string (1)
1-8 Common data types-string string (2)
1-9 Common data types-List
1-10 Common data types-Set collection
Chapter2 Chapter two
2-1 Common data types-Hash hash
2-2 Common data types-Zset ordered set
2-3 Configuration detailed file
2-4 publish and subscribe
2-5 New data type - Bitmaps
2-6 New data type -HyperLogLog
2-7 New data type - Geospatial
2-8 Jedis operation test
2-9 Jedis case-simulating verification code sending
2-10 SpringBoot integration
2-11 Transaction and lock mechanism-basic operations
Chapter3 third chapter
3-1 Transaction and lock mechanism-transaction conflict
3-2 Transactions and Locking Mechanism-Demonstrates optimistic locking and transaction features
3-3 Transaction and lock mechanism - flash sale case - basic implementation
3-4 Transaction and lock mechanism - flash sale case - ab tool simulates concurrency
3-5 Transaction and lock mechanism - flash sale case - overselling and overtime problem solving
3-6 Transaction and Lock Mechanism - Flash Sale Case - Solving Inventory Legacy Issues
3-7 Persistence Operation-RDB (1)
3-8 Persistence Operation-RDB (2)
3-9 Persistence operation-AOF
Chapter4 Chapter Four
4-1 Introduction to master-slave replication
4-2 Master-slave replication-build-master-slave
4-3 Master-slave replication-replication principle and one master and two slaves
4-4 Master-slave replication-passing on the fire from generation to generation and focusing on the guest
4-5 Master-Slave Replication-Sentinel Mode
4-6 Cluster-Introduction
4-7 Cluster-Build rdis cluster
4-8 Cluster - Cluster Operations and Failure Recovery
4-9 Cluster - Jedis development for clusters
4-10 Application problem solving-cache penetration
Chapter5 chapter Five
5-1 Application problem solving-cache breakdown
5-2 Application problem solving-cache avalanche
5-3 Application problem solving-distributed lock (setting lock and expiration time)
5-4 Application problem solving - distributed lock (UUID prevents accidental deletion)
5-5 Application problem solving - distributed lock (LUA guarantees deletion atomicity)
5-6 New feature introduction
5-7 Course summary
- Course Recommendations
- Courseware download
There are currently no materials available for download for this course
Students who have watched this course are also learning
Let's briefly talk about starting a business in PHP
Quick introduction to web front-end development
Large-scale practical Tianlongbabu development of Mini version MVC framework imitating the encyclopedia website of embarrassing things
Getting Started with PHP Practical Development: PHP Quick Creation [Small Business Forum]
Login verification and classic message board
Computer network knowledge collection
Quick Start Node.JS Full Version
The front-end course that understands you best: HTML5/CSS3/ES6/NPM/Vue/...[Original]
Write your own PHP MVC framework (40 chapters in depth/big details/must read for newbies to advance)

















