From 25661736ff4c72e54ee4cc8704722eac7a1879c0 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Wed, 9 Oct 2024 15:11:29 +0600 Subject: [PATCH] chore: update roadmap content json (#7377) Co-authored-by: kamranahmedse <4921183+kamranahmedse@users.noreply.github.com> --- public/roadmap-content/ai-engineer.json | 10 +- public/roadmap-content/api-design.json | 10 + public/roadmap-content/frontend.json | 5 - public/roadmap-content/full-stack.json | 48 +- public/roadmap-content/postgresql-dba.json | 24 +- public/roadmap-content/python.json | 317 ++-- public/roadmap-content/react.json | 26 +- public/roadmap-content/redis.json | 1609 ++++++++++++++--- .../roadmap-content/software-architect.json | 20 +- 9 files changed, 1661 insertions(+), 408 deletions(-) diff --git a/public/roadmap-content/ai-engineer.json b/public/roadmap-content/ai-engineer.json index 84a9be1e8..cfc2eb20b 100644 --- a/public/roadmap-content/ai-engineer.json +++ b/public/roadmap-content/ai-engineer.json @@ -71,8 +71,14 @@ }, "d7fzv_ft12EopsQdmEsel": { "title": "Pre-trained Models", - "description": "", - "links": [] + "description": "Pre-trained models are Machine Learning (ML) models that have been previously trained on a large dataset to solve a specific task or set of tasks. These models learn patterns, features, and representations from the training data, which can then be fine-tuned or adapted for other related tasks. Pre-training provides a good starting point, reducing the amount of data and computation required to train a new model from scratch.\n\nVisit the following resources to learn more:", + "links": [ + { + "title": "Pre-trained models: Past, present and future", + "url": "https://www.sciencedirect.com/science/article/pii/S2666651021000231", + "type": "article" + } + ] }, "1Ga6DbOPc6Crz7ilsZMYy": { "title": "Benefits of Pre-trained Models", diff --git a/public/roadmap-content/api-design.json b/public/roadmap-content/api-design.json index b23f14576..1e2f61572 100644 --- a/public/roadmap-content/api-design.json +++ b/public/roadmap-content/api-design.json @@ -244,6 +244,11 @@ "url": "https://aws.amazon.com/route53/what-is-dns/", "type": "article" }, + { + "title": "DNS Record Crash Course for Web Developers", + "url": "https://dev.to/chrisachard/dns-record-crash-course-for-web-developers-35hn", + "type": "article" + }, { "title": "DNS explained in 100 seconds", "url": "https://www.youtube.com/watch?v=UVR9lhUGAyU", @@ -269,6 +274,11 @@ "title": "What is a RESTul API?", "url": "https://aws.amazon.com/what-is/restful-api/", "type": "article" + }, + { + "title": "Understanding RESTful APIs", + "url": "https://www.youtube.com/watch?v=lsMQRaeKNDk", + "type": "video" } ] }, diff --git a/public/roadmap-content/frontend.json b/public/roadmap-content/frontend.json index 8a1b4eac8..6b250c7de 100644 --- a/public/roadmap-content/frontend.json +++ b/public/roadmap-content/frontend.json @@ -45,11 +45,6 @@ "title": "What is HTTP?", "description": "HTTP (Hypertext Transfer Protocol) is the foundation of data communication on the World Wide Web. It's an application-layer protocol that defines how messages are formatted and transmitted between web browsers and servers. HTTP operates on a request-response model: clients (usually web browsers) send requests to servers, which then respond with the requested data. The protocol is stateless, meaning each request is independent of any previous requests. HTTP supports various methods (GET, POST, PUT, DELETE, etc.) for different types of interactions with resources. HTTPS is the secure version of HTTP, using encryption to protect data in transit. HTTP/2 and HTTP/3 are more recent versions, offering improved performance through features like multiplexing and header compression. Understanding HTTP is crucial for web development, as it underpins how web applications communicate and function.\n\nVisit the following resources to learn more:", "links": [ - { - "title": "HTTP Crash Course", - "url": "https://www.youtube.com/watch?v=qgZiUvV41TI", - "type": "course" - }, { "title": "Everything you need to know about HTTP", "url": "https://cs.fyi/guide/http-in-depth", diff --git a/public/roadmap-content/full-stack.json b/public/roadmap-content/full-stack.json index fea882925..2913673bb 100644 --- a/public/roadmap-content/full-stack.json +++ b/public/roadmap-content/full-stack.json @@ -137,6 +137,11 @@ "title": "Git", "description": "[Git](https://git-scm.com/) is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency.\n\nVisit the following resources to learn more:", "links": [ + { + "title": "Visit Dedicated Git & Github Roadmap", + "url": "https://roadmap.sh/git-github", + "type": "article" + }, { "title": "Learn Git with Tutorials, News and Tips - Atlassian", "url": "https://www.atlassian.com/git", @@ -220,7 +225,7 @@ "description": "CSS Framework that provides atomic CSS classes to help you style components e.g. `flex`, `pt-4`, `text-center` and `rotate-90` that can be composed to build any design, directly in your markup.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Tailwind Website", + "title": "Tailwind CSS Website", "url": "https://tailwindcss.com", "type": "article" }, @@ -307,7 +312,12 @@ "description": "Node.js is an open-source and cross-platform JavaScript runtime environment. It is a popular tool for almost any kind of project! Node.js runs the V8 JavaScript engine, Google Chrome's core, outside the browser. This allows Node.js to be very performant. A Node.js app runs in a single process, without creating a new thread for every request. Node.js provides a set of asynchronous I/O primitives in its standard library that prevent JavaScript code from blocking and generally, libraries in Node.js are written using non-blocking paradigms, making blocking behavior the exception rather than the norm.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Official Website", + "title": "Visit Dedicated Node.js Roadmap", + "url": "https://roadmap.sh/nodejs", + "type": "article" + }, + { + "title": "Node.js Website", "url": "https://nodejs.org/en/about/", "type": "article" }, @@ -356,6 +366,11 @@ "title": "Learn REST: A RESTful Tutorial", "url": "https://restapitutorial.com/", "type": "article" + }, + { + "title": "What Is A RESTful API? Explanation of REST & HTTP", + "url": "https://www.youtube.com/watch?v=Q-BpqyOT3a8", + "type": "video" } ] }, @@ -409,11 +424,21 @@ "title": "Redis", "description": "Redis is an open source (BSD licensed), in-memory **data structure store** used as a database, cache, message broker, and streaming engine. Redis provides data structures such as [strings](https://redis.io/topics/data-types-intro#strings), [hashes](https://redis.io/topics/data-types-intro#hashes), [lists](https://redis.io/topics/data-types-intro#lists), [sets](https://redis.io/topics/data-types-intro#sets), [sorted sets](https://redis.io/topics/data-types-intro#sorted-sets) with range queries, [bitmaps](https://redis.io/topics/data-types-intro#bitmaps), [hyperloglogs](https://redis.io/topics/data-types-intro#hyperloglogs), [geospatial indexes](https://redis.io/commands/geoadd), and [streams](https://redis.io/topics/streams-intro). Redis has built-in [replication](https://redis.io/topics/replication), [Lua scripting](https://redis.io/commands/eval), [LRU eviction](https://redis.io/topics/lru-cache), [transactions](https://redis.io/topics/transactions), and different levels of [on-disk persistence](https://redis.io/topics/persistence), and provides high availability via [Redis Sentinel](https://redis.io/topics/sentinel) and automatic partitioning with [Redis Cluster](https://redis.io/topics/cluster-tutorial).\n\nVisit the following resources to learn more:", "links": [ + { + "title": "Visit Dedicated Redis Roadmap", + "url": "https://roadmap.sh/redis", + "type": "article" + }, { "title": "Redis Website", "url": "https://redis.io/", "type": "article" }, + { + "title": "Redis Documentation", + "url": "https://redis.io/docs/latest/", + "type": "article" + }, { "title": "Explore top posts about Redis", "url": "https://app.daily.dev/tags/redis?ref=roadmapsh", @@ -632,6 +657,11 @@ "title": "Monit", "description": "When it comes to monitoring the health of your applications, there are several different options available. My favorite monitoring stack is Prometheus and Grafana, but it can be a bit overwhelming to set up and configure. If you're looking for a simpler solution, **Monit** is a great alternative that can be utilized to monitor and manage system resources such as services, processes, files, directories, devices, and network connections, making your application more reliable and resilient to issues like crashes, unresponsiveness, or resource exhaustion.\n\nSome of the key features of Monit are:\n\n* **Automatic Recovery:** Monit can automatically restart a service or process if it fails, making your application more resistant to unexpected issues.\n* **Alert Notifications:** Monit can send email notifications when a problem is detected or when a certain condition is met, keeping you informed about the health of your application.\n* **Event Logging:** All events detected by Monit are stored in a log for easy troubleshooting and analysis.\n* **Resource Limit Monitoring:** Monit can monitor the resource utilization (CPU, memory, network, etc.) of a process or service and take action if a specific limit is exceeded.\n* **Flexible Configuration:** Monit uses a simple, human-readable configuration syntax that allows you to tailor its behavior to your needs.\n* **Web Interface:** Monit provides a built-in web interface for remotely monitoring your application's status and manage services.\n\nHave a look at the following resources to learn more about Monit:", "links": [ + { + "title": "Monit Website", + "url": "https://mmonit.com/monit/", + "type": "article" + }, { "title": "Monit documentation", "url": "https://mmonit.com/monit/documentation/", @@ -654,7 +684,7 @@ "type": "article" }, { - "title": "Official Website", + "title": "PostgreSQL Website", "url": "https://www.postgresql.org/", "type": "article" }, @@ -705,6 +735,11 @@ "url": "https://github.com/features/actions", "type": "opensource" }, + { + "title": "Visit Dedicated Git & Github Roadmap", + "url": "https://roadmap.sh/git-github", + "type": "article" + }, { "title": "Github Actions Documentation", "url": "https://docs.github.com/en/actions", @@ -712,7 +747,7 @@ }, { "title": "Explore top posts about GitHub", - "url": "https://app.daily.dev/tags/github?ref=roadmapsh", + "url": "https://app.daily.dev/tags/github-actions?ref=roadmapsh", "type": "article" }, { @@ -772,6 +807,11 @@ "title": "Terraform", "description": "Terraform is an extremely popular open source Infrastructure as Code (IaC) tool that can be used with many different cloud and service provider APIs. Terraform focuses on an immutable approach to infrastructure, with a terraform state file center to tracking the status of your real world infrastructure.\n\nVisit the following resources to learn more:", "links": [ + { + "title": "Visit Dedicated Terraform Roadmap", + "url": "https://roadmap.sh/terraform", + "type": "article" + }, { "title": "Terraform Website", "url": "https://www.terraform.io/", diff --git a/public/roadmap-content/postgresql-dba.json b/public/roadmap-content/postgresql-dba.json index 9c4d23915..306ef9382 100644 --- a/public/roadmap-content/postgresql-dba.json +++ b/public/roadmap-content/postgresql-dba.json @@ -20,8 +20,8 @@ "type": "article" }, { - "title": "Explore top posts about Backend Development", - "url": "https://app.daily.dev/tags/backend?ref=roadmapsh", + "title": "Explore top posts about Relational Databases", + "url": "https://app.daily.dev/tags/relational-databases?ref=roadmapsh", "type": "article" } ] @@ -505,8 +505,14 @@ }, "ANUgfkADLI_du7iRvnUdi": { "title": "Learn SQL", - "description": "SQL stands for Structured Query Language. It is a standardized programming language designed to manage and interact with relational database management systems (RDBMS). SQL allows you to create, read, edit, and delete data stored in database tables by writing specific queries.", - "links": [] + "description": "SQL stands for Structured Query Language. It is a standardized programming language designed to manage and interact with relational database management systems (RDBMS). SQL allows you to create, read, edit, and delete data stored in database tables by writing specific queries.\n\nVisit the following resources to learn more:", + "links": [ + { + "title": "Visit Dedicated SQL Roadmap", + "url": "https://roadmap.sh/sql", + "type": "article" + } + ] }, "KMdF9efNGULualk5o1W0_": { "title": "For Schemas", @@ -702,6 +708,11 @@ "title": "Grouping", "description": "Grouping is a powerful technique in SQL that allows you to organize and aggregate data based on common values in one or more columns. The `GROUP BY` clause is used to create groups, and the `HAVING` clause is used to filter the group based on certain conditions.\n\nLearn more from the following resources:", "links": [ + { + "title": "PostgreSQL GROUP BY CLAUSE", + "url": "https://www.postgresql.org/docs/current/sql-select.html#SQL-GROUPBY", + "type": "article" + }, { "title": "PostgreSQL GROUP BY", "url": "https://www.postgresqltutorial.com/postgresql-tutorial/postgresql-group-by/", @@ -716,6 +727,11 @@ "title": "PostgreSQL - HAVING", "url": "https://www.postgresqltutorial.com/postgresql-tutorial/postgresql-having/", "type": "article" + }, + { + "title": "PostgreSQL Group BY", + "url": "https://www.youtube.com/watch?v=SI-bPx4jaGc", + "type": "video" } ] }, diff --git a/public/roadmap-content/python.json b/public/roadmap-content/python.json index 99e972912..969c1e9ee 100644 --- a/public/roadmap-content/python.json +++ b/public/roadmap-content/python.json @@ -32,7 +32,7 @@ }, "dEFLBGpiH6nbSMeR7ecaT": { "title": "Variables and Data Types", - "description": "Variables\n---------\n\nVariables are used to store information to be referenced and manipulated in a computer program. They also provide a way of labeling data with a descriptive name, so our programs can be understood more clearly by the reader and ourselves. It is helpful to think of variables as containers that hold information. Their sole purpose is to label and store data in memory. This data can then be used throughout your program.\n\nVisit the following resources to learn more:", + "description": "Variables are used to store information to be referenced and manipulated in a computer program. They also provide a way of labeling data with a descriptive name, so our programs can be understood more clearly by the reader and ourselves. It is helpful to think of variables as containers that hold information. Their sole purpose is to label and store data in memory. This data can then be used throughout your program.\n\nVisit the following resources to learn more:", "links": [ { "title": "Variables in Python", @@ -49,11 +49,6 @@ "url": "https://www.w3schools.com/python/python_datatypes.asp", "type": "article" }, - { - "title": "Basic Data Types in Python", - "url": "https://realpython.com/python-data-types/", - "type": "article" - }, { "title": "Python for Beginners: Data Types", "url": "https://thenewstack.io/python-for-beginners-data-types/", @@ -68,33 +63,28 @@ }, "NP1kjSk0ujU0Gx-ajNHlR": { "title": "Conditionals", - "description": "Conditional Statements in Python perform different actions depending on whether a specific condition evaluates to true or false. Conditional Statements are handled by IF-ELIF-ELSE statements and MATCH-CASE statements in Python.\n\nVisit the following resources to learn more:", + "description": "Conditional Statements in Python perform different actions depending on whether a specific condition evaluates to true or false. Conditional Statements are handled by _if-elif-else_ statements and MATCH-CASE statements in Python.\n\nVisit the following resources to learn more:", "links": [ - { - "title": "Python Conditional Statements: IF…Else, ELIF & Switch Case", - "url": "https://www.guru99.com/if-loop-python-conditional-structures.html", - "type": "article" - }, { "title": "Conditional Statements in Python", "url": "https://realpython.com/python-conditional-statements/", "type": "article" }, { - "title": "How to use a match statement in Python", - "url": "https://learnpython.com/blog/python-match-case-statement/", + "title": "Python Conditional Statements", + "url": "https://www.guru99.com/if-loop-python-conditional-structures.html", "type": "article" }, { - "title": "W3Schools - Python Conditions and If statements", - "url": "https://www.w3schools.com/python/python_conditions.asp", + "title": "How to Use a Match Statement in Python", + "url": "https://learnpython.com/blog/python-match-case-statement/", "type": "article" } ] }, "R9DQNc0AyAQ2HLpP4HOk6": { "title": "Type Casting", - "description": "Typecasting\n-----------\n\nThe process of converting the value of one data type (integer, string, float, etc.) to another data type is called type conversion. Python has two types of type conversion: Implicit and Explicit.\n\nVisit the following resources to learn more:", + "description": "The process of converting the value of one data type (integer, string, float, etc.) to another data type is called type conversion. Python has two types of type conversion: Implicit and Explicit.\n\nVisit the following resources to learn more:", "links": [ { "title": "Type Conversion and Casting", @@ -127,11 +117,6 @@ "url": "https://www.programiz.com/python-programming/exception-handling", "type": "article" }, - { - "title": "Python Try Except", - "url": "https://www.w3schools.com/python/python_try_except.asp", - "type": "article" - }, { "title": "Exception Handling in Python", "url": "https://www.youtube.com/watch?v=V_NXT2-QIlE", @@ -141,23 +126,23 @@ }, "-DJgS6l2qngfwurExlmmT": { "title": "Functions, Builtin Functions", - "description": "In programming, a function is a reusable block of code that executes a certain functionality when it is called. Functions are integral parts of every programming language because they help make your code more modular and reusable.\n\nIn Python, you define a function with the `def` keyword, then write the function identifier (name) followed by parentheses and a colon.\n\nVisit the following resources to learn more:", + "description": "In programming, a function is a reusable block of code that executes a certain functionality when it is called. Functions are integral parts of every programming language because they help make your code more modular and reusable. In Python, we define a function with the `def` keyword, then write the function identifier (name) followed by parentheses and a colon.\n\nExample\n-------\n\n def greet(name):\n print(f\"Hello, {name}!\")\n \n greet(\"Roadmap.sh\") \n \n\nVisit the following resources to learn more:", "links": [ { - "title": "Python Functions - W3Schools", - "url": "https://www.w3schools.com/python/python_functions.asp", + "title": "Built-in Functions in Python", + "url": "https://docs.python.org/3/library/functions.html", "type": "article" }, { - "title": "Built-in Functions in Python", - "url": "https://docs.python.org/3/library/functions.html", + "title": "Python Functions - W3Schools", + "url": "https://www.w3schools.com/python/python_functions.asp", "type": "article" } ] }, "UT_SR7G-LYtzqooWrEtF1": { "title": "Lists", - "description": "**Lists:** are just like dynamic sized arrays, declared in other languages (vector in C++ and ArrayList in Java). Lists need not be homogeneous always which makes it the most powerful tool in Python.\n\n**Tuple:** A Tuple is a collection of Python objects separated by commas. In some ways, a tuple is similar to a list in terms of indexing, nested objects, and repetition but a tuple is immutable, unlike lists that are mutable.\n\n**Set:** A Set is an unordered collection data type that is iterable, mutable, and has no duplicate elements. Python’s set class represents the mathematical notion of a set.\n\n**Dictionary:** In python, Dictionary is an ordered (since Py 3.7) \\[unordered (Py 3.6 & prior)\\] collection of data values, used to store data values like a map, which, unlike other Data Types that hold only a single value as an element, Dictionary holds key:value pair. Key-value is provided in the dictionary to make it more optimized.\n\nVisit the following resources to learn more:", + "description": "**Lists:** A list is just like dynamic sized arrays, declared in other languages (vector in C++ and ArrayList in Java). Lists need not be homogeneous always which makes it the most powerful tool in Python.\n\n**Tuple:** A Tuple is a collection of Python objects separated by commas. In some ways, a tuple is similar to a list in terms of indexing, nested objects, and repetition but a tuple is immutable, unlike lists that are mutable.\n\n**Set:** A Set is an unordered collection data type that is iterable, mutable, and has no duplicate elements. Python’s set class represents the mathematical notion of a set.\n\n**Dictionary:** In python, Dictionary is an ordered (since Py 3.7) \\[unordered (Py 3.6 & prior)\\] collection of data values, used to store data values like a map, which, unlike other Data Types that hold only a single value as an element, Dictionary holds key:value pair. Key-value is provided in the dictionary to make it more optimized.\n\nVisit the following resources to learn more:", "links": [ { "title": "Tuples vs. Lists vs. Sets in Python", @@ -197,13 +182,13 @@ "description": "Python Set is an unordered collection of data types that is iterable, mutable, and has no duplicate elements. The order of elements in a set is undefined though it may consist of various elements. The major advantage of using a set, as opposed to a list, is that it has a highly optimized method for checking whether a specific element is contained in the set.\n\nVisit the following resources to learn more:", "links": [ { - "title": "An W3Schools - Python Sets", - "url": "https://www.w3schools.com/python/python_sets.asp", + "title": "An In-Depth Guide to Working with Python Sets", + "url": "https://learnpython.com/blog/python-sets/", "type": "article" }, { - "title": "An In-Depth Guide to Working with Python Sets", - "url": "https://learnpython.com/blog/python-sets/", + "title": "An W3Schools - Python Sets", + "url": "https://www.w3schools.com/python/python_sets.asp", "type": "article" }, { @@ -217,6 +202,11 @@ "title": "Dictionaries", "description": "In Python, a dictionary is a built-in data type that allows you to store key-value pairs. Each key in the dictionary is unique, and each key is associated with a value. Dictionaries are unordered collections, meaning the order of items is not guaranteed.\n\nLearn more from the following resources:", "links": [ + { + "title": "Dictionaries in Python", + "url": "https://docs.python.org/3/tutorial/datastructures.html#dictionaries", + "type": "article" + }, { "title": "W3 Schools - Dictionaries", "url": "https://www.w3schools.com/python/python_dictionaries.asp", @@ -301,22 +291,22 @@ "description": "Python is a high-level, interpreted, general-purpose programming language. Its design philosophy emphasizes code readability with the use of significant indentation. Python is dynamically-typed and garbage-collected.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Official Website: Python", + "title": "Python Website", "url": "https://www.python.org/", "type": "article" }, { - "title": "Tutorial Series: How to Code in Python", - "url": "https://www.digitalocean.com/community/tutorials/how-to-write-your-first-python-3-program", + "title": "Python - Wiki", + "url": "https://en.wikipedia.org/wiki/Python_(programming_language)", "type": "article" }, { - "title": "Python Wikipedia", - "url": "https://en.wikipedia.org/wiki/Python_(programming_language)", + "title": "Tutorial Series: How to Code in Python", + "url": "https://www.digitalocean.com/community/tutorials/how-to-write-your-first-python-3-program", "type": "article" }, { - "title": "Googles Python Class", + "title": "Google's Python Class", "url": "https://developers.google.com/edu/python", "type": "article" }, @@ -325,11 +315,6 @@ "url": "https://www.w3schools.com/python", "type": "article" }, - { - "title": "Python", - "url": "https://www.kaggle.com/learn/python", - "type": "article" - }, { "title": "Explore top posts about Python", "url": "https://app.daily.dev/tags/python?ref=roadmapsh", @@ -341,6 +326,11 @@ "title": "Data Structures & Algorithms", "description": "A data structure is a named location that can be used to store and organize data. And, an algorithm is a collection of steps to solve a particular problem. Learning data structures and algorithms allow us to write efficient and optimized computer programs.\n\nVisit the following resources to learn more:", "links": [ + { + "title": "Visit Dedicated DSA Roadmap", + "url": "https://roadmap.sh/data-structures-and-algorithms", + "type": "article" + }, { "title": "Learn DS & Algorithms", "url": "https://www.programiz.com/dsa", @@ -425,13 +415,13 @@ "description": "Hash Table, Map, HashMap, Dictionary or Associative are all the names of the same data structure. It is a data structure that implements a set abstract data type, a structure that can map keys to values.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Hash Tables and Hashmaps in Python", - "url": "https://www.edureka.co/blog/hash-tables-and-hashmaps-in-python/", + "title": "Build a Hash Table in Python", + "url": "https://realpython.com/python-hash-table/", "type": "article" }, { - "title": "Build a Hash Table in Python", - "url": "https://realpython.com/python-hash-table/", + "title": "Hash Tables and Hashmaps in Python", + "url": "https://www.edureka.co/blog/hash-tables-and-hashmaps-in-python/", "type": "article" }, { @@ -480,7 +470,7 @@ }, "YNptpfK9qv2ovmkUXLkJT": { "title": "Sorting Algorithms", - "description": "Sorting refers to arranging data in a particular format. Sorting algorithm specifies the way to arrange data in a particular order. Most common orders are in numerical or lexicographical order.\n\nThe importance of sorting lies in the fact that data searching can be optimized to a very high level, if data is stored in a sorted manner.\n\nVisit the following resources to learn more:", + "description": "Sorting refers to arranging data in a particular format. Sorting algorithm specifies the way to arrange data in a particular order. Most common orders are in numerical or lexicographical order. The importance of sorting lies in the fact that data searching can be optimized to a very high level, if data is stored in a sorted manner.\n\nVisit the following resources to learn more:", "links": [ { "title": "Sorting Algorithms in Python", @@ -503,6 +493,11 @@ "title": "Builtin", "description": "Python has a rich standard library of built-in modules that provide a wide range of functionality. Some of the most commonly used built-in modules include: sys, os, math, datetime, random, re, itertools, etc.\n\nVisit the following resources to learn more:", "links": [ + { + "title": "Python Module Index", + "url": "https://docs.python.org/3/py-modindex.html", + "type": "article" + }, { "title": "Python Modules", "url": "https://www.digitalocean.com/community/tutorials/python-modules", @@ -554,8 +549,13 @@ }, "pIluLJkySqn_gI_GykV6G": { "title": "Decorators", - "description": "decorator is a design pattern in Python that allows a user to add new functionality to an existing object without modifying its structure. Decorators are usually called before the definition of a function you want to decorate.\n\nVisit the following resources to learn more:", + "description": "Decorator is a design pattern in Python that allows a user to add new functionality to an existing object without modifying its structure. Decorators are usually called before the definition of a function you want to decorate.\n\nVisit the following resources to learn more:", "links": [ + { + "title": "Learn Decorators in Python", + "url": "https://pythonbasics.org/decorators/", + "type": "article" + }, { "title": "Python Decorators", "url": "https://www.datacamp.com/tutorial/decorators-python", @@ -659,7 +659,7 @@ }, "S0FLE70szSVUPI0CDEQK7": { "title": "Inheritance", - "description": "Inheritance allows us to define a class that inherits all the methods and properties from another class.\n\nVisit the following resources to learn more:", + "description": "Inheritance is a fundamental concept in object-oriented programming (OOP) that allows one class to inherit the properties and behavior of another class.\n\nVisit the following resources to learn more:", "links": [ { "title": "Python Inheritance", @@ -691,10 +691,10 @@ }, "qeCMw-sJ2FR4UxvU9DDzv": { "title": "Package Managers", - "description": "Package managers allow you to manage the dependencies (external code written by you or someone else) that your project needs to work correctly.\n\n`PyPI` and `Pip` are the most common contenders but here are some other options available as well:", + "description": "Package managers allow you to manage the dependencies (external code written by you or someone else) that your project needs to work correctly.\n\n`PyPI` and `Pip` are the most common contenders but there are some other options available as well.\n\nVisit the following resources to learn more:", "links": [ { - "title": "PIPX", + "title": "pypa/pipx", "url": "https://github.com/pypa/pipx", "type": "opensource" }, @@ -710,7 +710,7 @@ "description": "PyPI, typically pronounced pie-pee-eye, is a repository containing several hundred thousand packages. These range from trivial Hello, World implementations to advanced deep learning libraries.\n\nVisit the following resources to learn more:", "links": [ { - "title": "PyPI Official Website", + "title": "PyPI Website", "url": "https://pypi.org/", "type": "article" }, @@ -735,6 +735,11 @@ "title": "Pip", "description": "The standard package manager for Python is pip. It allows you to install and manage packages that aren’t part of the Python standard library.\n\nVisit the following resources to learn more:", "links": [ + { + "title": "pip Documentation", + "url": "https://pip.pypa.io/en/stable/installation/", + "type": "article" + }, { "title": "Using Pythons pip to Manage Your Projects Dependencies", "url": "https://realpython.com/what-is-pip/", @@ -754,10 +759,10 @@ }, "uh67D1u-Iv5cZamRgFEJg": { "title": "Conda", - "description": "Conda is an open source package management system and environment management system that runs on Windows, macOS, and Linux. Conda quickly installs, runs and updates packages and their dependencies. Conda easily creates, saves, loads and switches between environments on your local computer. It was created for Python programs, but it can package and distribute software for any language.\n\nConda as a package manager helps you find and install packages. If you need a package that requires a different version of Python, you do not need to switch to a different environment manager, because conda is also an environment manager. With just a few commands, you can set up a totally separate environment to run that different version of Python, while continuing to run your usual version of Python in your normal environment.\n\nVisit the following resources to learn more:", + "description": "Conda is an open source package management system and environment management system that runs on Windows, macOS, and Linux. Conda quickly installs, runs and updates packages and their dependencies. Conda easily creates, saves, loads and switches between environments on your local computer. It was created for Python programs, but it can package and distribute software for any language.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Conda Docs", + "title": "Conda Documentation", "url": "https://docs.conda.io/en/latest/", "type": "article" } @@ -778,6 +783,11 @@ "title": "List Comprehensions", "description": "List comprehensions are a concise way to create a list using a single line of code in Python. They are a powerful tool for creating and manipulating lists, and they can be used to simplify and shorten code.\n\nVisit the following resources to learn more:", "links": [ + { + "title": "Python List Comprehensions", + "url": "https://docs.python.org/3/tutorial/datastructures.html#list-comprehensions", + "type": "article" + }, { "title": "Python - List Comprehension", "url": "https://www.w3schools.com/python/python_lists_comprehension.asp", @@ -792,17 +802,12 @@ "title": "Python List Comprehensions Quiz - CodeGuage", "url": "https://www.codeguage.com/courses/python/lists-list-comprehensions-quiz", "type": "article" - }, - { - "title": "Python List Comprehensions", - "url": "https://docs.python.org/3/tutorial/datastructures.html#list-comprehensions", - "type": "article" } ] }, "jnLIVRrWxcX3yq3Op91Vr": { "title": "Generator Expressions", - "description": "Generator expressions are a concise way to create a generator using a single line of code in Python. They are similar to list comprehensions, but instead of creating a list, they create a generator object that produces the values on-demand, as they are needed.\n\nGenerator expressions are a useful tool for efficiently producing large sequence of values, as they allow you to create the generator without creating the entire sequence in memory at once. This tends to use less memory, especially for large sequences.\n\nVisit the following resources to learn more:", + "description": "Generator expressions are a concise way to create a generator using a single line of code in Python. They are similar to list comprehensions, but instead of creating a list, they create a generator object that produces the values on-demand, as they are needed. Generator expressions are a useful tool for efficiently producing large sequence of values, as they allow you to create the generator without creating the entire sequence in memory at once. This tends to use less memory, especially for large sequences.\n\nVisit the following resources to learn more:", "links": [ { "title": "Python Generator Expressions", @@ -818,20 +823,31 @@ }, "4GU5HNi3W8yFkImVY9ZpW": { "title": "Paradigms", - "description": "Python is a multi-paradigm programming language, which means that it supports several programming paradigms. Some of the main paradigms supported by Python are:\n\n* Imperative programming: This paradigm focuses on telling the computer what to do, step by step. Python supports imperative programming with features such as variables, loops, and control structures.\n* Object-oriented programming (OOP): This paradigm is based on the idea of objects and their interactions. Python supports OOP with features such as classes, inheritance, and polymorphism.\n* Functional programming: This paradigm is based on the idea of functions as first-class citizens, and it emphasizes the use of pure functions and immutable data. Python supports functional programming with features such as higher-order functions, lambda expressions, and generators.\n* Aspect-oriented programming: This paradigm is based on the idea of separating cross-cutting concerns from the main functionality of a program. Python does not have built-in support for aspect-oriented programming, but it can be achieved using libraries or language extensions.\n\nPython's support for multiple paradigms makes it a versatile and flexible language, and it allows developers to choose the paradigm that best fits their needs.", - "links": [] + "description": "Python is a multi-paradigm programming language, which means that it supports several programming paradigms. Some of the main paradigms supported by Python are:\n\n* Imperative programming: This paradigm focuses on telling the computer what to do, step by step. Python supports imperative programming with features such as variables, loops, and control structures.\n* Object-oriented programming (OOP): This paradigm is based on the idea of objects and their interactions. Python supports OOP with features such as classes, inheritance, and polymorphism.\n* Functional programming: This paradigm is based on the idea of functions as first-class citizens, and it emphasizes the use of pure functions and immutable data. Python supports functional programming with features such as higher-order functions, lambda expressions, and generators.\n* Aspect-oriented programming: This paradigm is based on the idea of separating cross-cutting concerns from the main functionality of a program. Python does not have built-in support for aspect-oriented programming, but it can be achieved using libraries or language extensions.\n\nVisit the following resources to learn more:", + "links": [ + { + "title": "Python Paradigms", + "url": "https://opensource.com/article/19/10/python-programming-paradigms", + "type": "article" + } + ] }, "KAXF2kUAOvtBZhY8G9rkI": { "title": "Context Manager", - "description": "Context managers are a contruct in Python that allows you to set up context for a block of code, and then automatically clean up or relase resources when the block is exited. It is most commonly used with the `with` statement.\n\nVisit the following resources to learn more:", + "description": "Context Managers are a construct in Python that allows you to set up context for a block of code, and then automatically clean up or release resources when the block is exited. It is most commonly used with the `with` statement.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Context managers in Python", + "title": "Context Libraries", + "url": "https://docs.python.org/3/library/contextlib.html", + "type": "article" + }, + { + "title": "Context Managers in Python", "url": "https://www.freecodecamp.org/news/context-managers-in-python/", "type": "article" }, { - "title": "Context managers", + "title": "Context Managers", "url": "https://book.pythontips.com/en/latest/context_managers.html", "type": "article" } @@ -839,10 +855,10 @@ }, "0-ShORjGnQlAdcwjtxdEB": { "title": "Learn a Framework", - "description": "Frameworks automate the common implementation of common solutions which gives the flexibility to the users to focus on the application logic instead of the basic routine processes.\n\nFrameworks make the life of web developers easier by giving them a structure for app development. They provide common patterns in a web application that are fast, reliable and easily maintainable. Visit the following resources to learn more:", + "description": "Frameworks automate the common implementation of common solutions which gives the flexibility to the users to focus on the application logic instead of the basic routine processes. Frameworks make the life of web developers easier by giving them a structure for app development. They provide common patterns in a web application that are fast, reliable and easily maintainable.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Pyscript: A Browser-Based Python Framework for the 99%", + "title": "Pyscript: A Browser-Based Python Framework", "url": "https://thenewstack.io/pyscript-a-browser-based-python-framework/", "type": "article" }, @@ -858,7 +874,7 @@ "description": "Pyramid is a general, open source, web application development framework built in python. It allows python developer to create web applications with ease. Pyramid is backed by the enterprise knowledge Management System KARL (a George Soros project).\n\nVisit the following resources to learn more:", "links": [ { - "title": "Pyramid - Official Website", + "title": "Pyramid Website", "url": "https://trypyramid.com/", "type": "article" }, @@ -876,20 +892,31 @@ }, "7zcpXN3krnS3tMRWVNIVe": { "title": "Plotly Dash", - "description": "", - "links": [] + "description": "Plotly Dash is a Python framework that allows you to build analytical web applications. It's a high-level library that enables you to create interactive, web-based data visualization dashboards without requiring extensive knowledge of web development.\n\nVisit the following resources to learn more:", + "links": [ + { + "title": "Plotly Dash Documentation", + "url": "https://dash.plotly.com/", + "type": "article" + }, + { + "title": "20 Minutes Tutorial", + "url": "http://dash.plotly.com/tutorial", + "type": "article" + } + ] }, "InUJIGmTnf0X4cSoLuCEQ": { "title": "gevent", "description": "gevent is a Python library that provides a high-level interface to the event loop. It is based on non-blocking IO (libevent/libev) and lightweight greenlets. Non-blocking IO means requests waiting for network IO won't block other requests; greenlets mean we can continue to write code in synchronous style.\n\nVisit the following resources to learn more:", "links": [ { - "title": "GitHub Repository", + "title": "gevent/gevent", "url": "https://github.com/gevent/gevent", "type": "opensource" }, { - "title": "gevent — Official Website", + "title": "gevent Website", "url": "http://www.gevent.org/", "type": "article" }, @@ -905,7 +932,7 @@ "description": "aiohttp is a Python 3.5+ library that provides a simple and powerful asynchronous HTTP client and server implementation.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Official Docs", + "title": "aiohttp docs", "url": "https://docs.aiohttp.org/en/stable/", "type": "article" }, @@ -926,7 +953,7 @@ "description": "Tornado is a scalable, non-blocking web server and web application framework written in Python. It was developed for use by FriendFeed; the company was acquired by Facebook in 2009 and Tornado was open-sourced soon after.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Tornado — Official Website", + "title": "Tornado Website", "url": "https://www.tornadoweb.org/", "type": "article" }, @@ -947,7 +974,7 @@ "description": "Sanic is a Python 3.7+ web server and web framework that's written to go fast. It allows the usage of the async/await syntax added in Python 3.5, which makes your code non-blocking and speedy.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Sanic Official Website", + "title": "Sanic Website", "url": "https://sanic.dev/en/", "type": "article" } @@ -958,7 +985,7 @@ "description": "FastAPI is a Web framework for developing RESTful APIs in Python. FastAPI is based on Pydantic and type hints to validate, serialize, and deserialize data and automatically auto-generate OpenAPI documents.", "links": [ { - "title": "Official Documentation", + "title": "FastAPI Documentation", "url": "https://fastapi.tiangolo.com/", "type": "article" }, @@ -979,17 +1006,17 @@ "description": "Django is a free and open-source, Python-based web framework that follows the model–template–views architectural pattern. It is maintained by the Django Software Foundation, an independent organization established in the US as a 501 non-profit\n\nVisit the following resources to learn more:", "links": [ { - "title": "Django Official Website", + "title": "Django Website", "url": "https://www.djangoproject.com/", "type": "article" }, { - "title": "Official Getting Started Guide", + "title": "Getting Started", "url": "https://www.djangoproject.com/start/", "type": "article" }, { - "title": "Is Django synchronous or asynchronous?", + "title": "Is Django Synchronous or Asynchronous?", "url": "https://stackoverflow.com/questions/58548089/django-is-synchronous-or-asynchronous", "type": "article" }, @@ -1010,12 +1037,12 @@ "description": "Flask is a micro web framework written in Python. It is classified as a microframework because it does not require particular tools or libraries. It has no database abstraction layer, form validation, or any other components where pre-existing third-party libraries provide common functions. Instead, it provides flexibility by requiring you to choose and integrate the best libraries for your project's needs.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Flask - Official Website", + "title": "Flask Website", "url": "https://flask.palletsprojects.com/", "type": "article" }, { - "title": "Flask - Official Tutorial", + "title": "Flask Tutorial", "url": "https://flask.palletsprojects.com/en/3.0.x/tutorial/", "type": "article" }, @@ -1030,6 +1057,11 @@ "title": "Concurrency", "description": "Concurrency in Python allows multiple tasks to be executed simultaneously using different approaches. GIL (Global Interpreter Lock) limits thread execution, making multithreading less efficient for computational tasks, but suitable for I/O. Multiprocessing, using the multiprocessing module, allows multiple cores to be utilized, providing true parallelism. Asynchrony via asyncio is optimal for I/O operations, allowing thousands of connections to be processed simultaneously without blocking. The choice of approach depends on the nature of the task.\n\nLearn more about concurrency using the following resources:", "links": [ + { + "title": "Concurrent Execution", + "url": "https://docs.python.org/3/library/concurrency.html", + "type": "article" + }, { "title": "Python Concurrency", "url": "https://realpython.com/python-concurrency/", @@ -1050,7 +1082,7 @@ }, "UIx0XYaOgXXlYbbQtjiPq": { "title": "Threading", - "description": "Multithreading allows multiple threads within a single process. However, because of GIL, threads cannot run in parallel on different cores, which makes multithreading suitable for I/O tasks (e.g., network requests) but not for computational tasks.\n\nLearn more about it from the following resources:", + "description": "Multithreading allows multiple threads within a single process. However, because of GIL, threads cannot run in parallel on different cores, which makes multithreading suitable for I/O tasks (e.g., network requests) but not for computational tasks.\n\nLearn more from the following resources:", "links": [ { "title": "Python Threading Library", @@ -1069,7 +1101,7 @@ "description": "Multiprocessing utilizes multiple processes, each with its own GIL. This allows full utilization of multiple processor cores, which is effective for computationally intensive tasks. Python's multiprocessing module supports creating processes and exchanging data between them.\n\nLearn more about multiprocessing with the following resources:", "links": [ { - "title": "Official Documentation", + "title": "Python Documentation", "url": "https://docs.python.org/3/library/multiprocessing.html", "type": "article" }, @@ -1087,7 +1119,7 @@ }, "Mow7RvropbC4ZGDpcGZmw": { "title": "Asynchrony", - "description": "Asynchronous programming, supported by asyncio, allows code to be executed without blocking, using async and await. This is especially useful for I/O tasks such as networking or file manipulation, allowing thousands of connections to be handled without blocking the main thread.\n\nLearn more about asynchronous programming in Python with the following resources:", + "description": "Asynchronous programming, supported by asyncio, allows code to be executed without blocking, using async and await. This is especially useful for I/O tasks such as networking or file manipulation, allowing thousands of connections to be handled without blocking the main thread.\n\nLearn more from the following resources:", "links": [ { "title": "Python AsyncIO library", @@ -1103,18 +1135,18 @@ }, "p3Frfs6oxpuciUzeCEsvb": { "title": "uv", - "description": "uv is an \"extremely fast\" python package installer and resolver.\n\nLearn more about it using the following resources:", + "description": "uv is an \"extremely fast\" python package installer and resolver.\n\nLearn more from the following resources:", "links": [ { - "title": "uv GitHub Repository", + "title": "astral-sh/uv", "url": "https://github.com/astral-sh/uv", - "type": "article" + "type": "opensource" } ] }, "GHKAY9gOykEbxkEeR30wL": { "title": "pyproject.toml", - "description": "This file is used to define the project configuration and dependencies. It is a configuration file that contains metadata about the project, such as its name, version, dependencies, and build settings. The `pyproject.toml` file is used by tools like `poetry` and `flit` to manage Python projects and their dependencies.\n\nLearn more about `pyproject.toml` by visiting the following resources:", + "description": "This file is used to define the project configuration and dependencies. It is a configuration file that contains metadata about the project, such as its name, version, dependencies, and build settings. The `pyproject.toml` file is used by tools like `poetry` and `flit` to manage Python projects and their dependencies.\n\nLearn more from the following resources:", "links": [ { "title": "Writing pyproject.toml files", @@ -1125,7 +1157,7 @@ }, "IWq-tfkz-pSC1ztZl60vM": { "title": "Pipenv", - "description": "Pipeline Environment (pipenv) is a tool that aims to bring the best of all packaging worlds (bundled, requirements.txt, [setup.py](http://setup.py), setup.cfg, etc.) to the Python world. It automatically creates and manages a virtualenv for your projects, as well as adds/removes packages from your Pipfile as you install/uninstall packages. It also generates the ever-important Pipfile.lock, which is used to produce deterministic builds.\n\nLearn more about Pipenv by visiting the following resources:", + "description": "Pipeline Environment (pipenv) is a tool that aims to bring the best of all packaging worlds (bundled, requirements.txt, [setup.py](http://setup.py), setup.cfg, etc.) to the Python world. It automatically creates and manages a virtualenv for your projects, as well as adds/removes packages from your Pipfile as you install/uninstall packages. It also generates the ever-important Pipfile.lock, which is used to produce deterministic builds.\n\nLearn more from the following resources:", "links": [ { "title": "Pipenv Documentation", @@ -1141,21 +1173,21 @@ }, "N5VaKMbgQ0V_BC5tadV65": { "title": "pyenv", - "description": "pyenv is a tool for managing multiple versions of the Python programming language on Unix-like systems. It works by setting environment variables to point to the directory where the desired version of Python is installed. This allows you to switch between different versions of Python without having to modify your system's default Python installation.\n\nLearn more about pyenv by exploring the following resources:", + "description": "pyenv is a tool for managing multiple versions of the Python programming language on Unix-like systems. It works by setting environment variables to point to the directory where the desired version of Python is installed. This allows you to switch between different versions of Python without having to modify your system's default Python installation.\n\nLearn more from the following resources:", "links": [ { - "title": "@Official@pyenv GitHub Repository", + "title": "pyenv/pyenv", "url": "https://github.com/pyenv/pyenv", - "type": "article" + "type": "opensource" } ] }, "1PXApuUpPmJjgi12cmWo4": { "title": "Static Typing", - "description": "Static typing can be a powerful tool to help you catch bugs before they happen. It can also help you understand the code you're working with, and make it easier to maintain and refactor.\n\nLearn more about static typing with the following resources:", + "description": "Static typing can be a powerful tool to help you catch bugs before they happen. It can also help you understand the code you're working with, and make it easier to maintain and refactor.\n\nLearn more from the following resources:", "links": [ { - "title": "Static typing in Python", + "title": "Static Typing in Python", "url": "https://typing.readthedocs.io/en/latest/index.html", "type": "article" } @@ -1166,7 +1198,7 @@ "description": "Pydantic is a python library for data validation and settings management using python type annotations.\n\nLearn more from the following resources:", "links": [ { - "title": "Pydantic documentation", + "title": "Pydantic Documentation", "url": "https://docs.pydantic.dev/latest/", "type": "article" } @@ -1174,8 +1206,13 @@ }, "gIcJ3bUVQXqO1Wx4gUKd5": { "title": "mypy", - "description": "mypy is an optional static type checker for Python that aims to combine the benefits of dynamic (or \"duck\") typing and static typing. Mypy combines the expressive power and convenience of Python with a powerful type system and compile-time type checking. Mypy type checks standard Python programs; run them using any Python VM with basically no runtime overhead.", + "description": "mypy is an optional static type checker for Python that aims to combine the benefits of dynamic (or \"duck\") typing and static typing. Mypy combines the expressive power and convenience of Python with a powerful type system and compile-time type checking. Mypy type checks standard Python programs; run them using any Python VM with basically no runtime overhead.\n\nVisit the following resources to learn more:", "links": [ + { + "title": "python/mypy", + "url": "https://github.com/python/mypy", + "type": "opensource" + }, { "title": "mypy documentation", "url": "https://mypy-lang.org/", @@ -1185,7 +1222,7 @@ }, "1q9HWgu9jDTK757hTNOmE": { "title": "pyright", - "description": "pyright is a static type checker for Python. It is a Microsoft product and is written in TypeScript. It is a language server that uses the Language Server Protocol (LSP) to communicate with the editor. It is a good alternative to mypy and pytype.\n\nLearn more about pyright from the following resources:", + "description": "pyright is a static type checker for Python. It is a Microsoft product and is written in TypeScript. It is a language server that uses the Language Server Protocol (LSP) to communicate with the editor. It is a good alternative to mypy and pytype.\n\nLearn more from the following resources:", "links": [ { "title": "Pyright Documentation", @@ -1196,10 +1233,10 @@ }, "9mFR_ueXbIB2IrkqU2s85": { "title": "pyre", - "description": "pyre is a static type checker for Python. It is a tool that helps you find type errors in your Python code. Pyre is designed to be fast, scalable, and easy to use. It is used at Facebook to help developers catch type errors before they make it to production.\n\nLearn more about pyre from the following resources:", + "description": "pyre is a static type checker for Python. It is a tool that helps you find type errors in your Python code. Pyre is designed to be fast, scalable, and easy to use. It is used at Facebook to help developers catch type errors before they make it to production.\n\nLearn more from the following resources:", "links": [ { - "title": "pyre documentation", + "title": "pyre Documentation", "url": "https://pyre-check.org/", "type": "article" } @@ -1207,8 +1244,19 @@ }, "0F0ppU_ClIUKZ23Q6BVZp": { "title": "Code Formatting", - "description": "", - "links": [] + "description": "Python code formatting is crucial for maintaining readability, consistency, and reducing errors. Black is a code formatter for Python. It is a tool that automatically formats Python code to adhere to the PEP 8 style guide. It is a great tool to use in your Python projects to ensure that your code is formatted consistently and correctly.\n\nVisit the following resources to learn more:", + "links": [ + { + "title": "Pylint for Python", + "url": "https://www.pylint.org/", + "type": "article" + }, + { + "title": "Black Documentation", + "url": "https://black.readthedocs.io/en/stable/", + "type": "article" + } + ] }, "6cB0pvUO1-gvCtgqozP-Q": { "title": "ruff", @@ -1226,7 +1274,12 @@ "description": "black is a code formatter for Python. It is a tool that automatically formats Python code to adhere to the PEP 8 style guide. It is a great tool to use in your Python projects to ensure that your code is formatted consistently and correctly.", "links": [ { - "title": "black documentation", + "title": "Getting Started with Black", + "url": "https://black.readthedocs.io/en/stable/getting_started.html", + "type": "article" + }, + { + "title": "Black Documentation", "url": "https://black.readthedocs.io/en/stable/", "type": "article" } @@ -1234,23 +1287,29 @@ }, "tsh_vbhzKz1-H9Vh69tsK": { "title": "yapf", - "description": "yapf is a formatter for Python files. It is a tool that automatically formats Python code to conform to the PEP 8 style guide. It is similar to black but has more configuration options.\n\nLearn more about yapf and how to use it effectively in your Python projects.", + "description": "yapf is a formatter for Python files. It is a tool that automatically formats Python code to conform to the PEP 8 style guide. It is similar to black but has more configuration options.\n\nLearn more from the following resources:", "links": [ { - "title": "yapf Documentation", + "title": "google/yapf", "url": "https://github.com/google/yapf", - "type": "article" + "type": "opensource" } ] }, "maYNuTKYyZndxk1z29-UY": { "title": "Sphinx", - "description": "Sphinx is a tool that makes it easy to create intelligent and beautiful documentation, written by Georg Brandl and licensed under the BSD license.\n\nLearn more about Sphinx by visiting the [official website](https://www.sphinx-doc.org/en/master/).", - "links": [] + "description": "Sphinx is a tool that makes it easy to create intelligent and beautiful documentation, written by Georg Brandl and licensed under the BSD license.\n\nVisit the following resources to learn more:", + "links": [ + { + "title": "Shpinx Website", + "url": "https://www.sphinx-doc.org/en/master/", + "type": "article" + } + ] }, "_94NrQ3quc4t_PPOsFSN0": { "title": "Common Packages", - "description": "Python has a rich ecosystem of packages and modules that can be used to get the most out of the language.\n\nHere are some common Python packages that are widely used in various domains:", + "description": "Python has a rich ecosystem of packages and modules that can be used to get the most out of the language. A package is essentially a directory that contains multiple modules and subpackages. A module is a single file that contains a collection of related functions, classes, and variables. Modules are the basic building blocks of Python code organization. A module can be thought of as a container that holds a set of related code.\n\nVisit the following resources to learn more:", "links": [ { "title": "requests", @@ -1286,25 +1345,31 @@ "title": "pandas", "url": "https://pandas.pydata.org/docs/", "type": "article" - }, - { - "title": "polars", - "url": "https://github.com/pola-rs/polars", - "type": "article" } ] }, "WQOYjuwKIWB2meea4JnsV": { "title": "Testing", - "description": "", - "links": [] + "description": "Testing in programming means checking if your code works as expected. It's a systematic way to find and fix errors (bugs) before your code goes live. Imagine building a beautiful house without checking if the walls are straight or the roof doesn't leak—that's what coding without testing can feel like!\n\nVisit the following resources to learn more:", + "links": [ + { + "title": "Unit Testing in Python", + "url": "https://docs.python.org/3/library/unittest.html", + "type": "article" + }, + { + "title": "Python Testing Tutorial", + "url": "https://realpython.com/python-testing/", + "type": "article" + } + ] }, "aVclygxoA9ePU5IxaORSH": { "title": "doctest", "description": "Python’s standard library comes equipped with a test framework module called doctest. The doctest module programmatically searches Python code for pieces of text within comments that look like interactive Python sessions. Then, the module executes those sessions to confirm that the code referenced by a doctest runs as expected.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Doctest module reference", + "title": "Doctest Module", "url": "https://docs.python.org/3/library/doctest.html", "type": "article" }, @@ -1336,7 +1401,7 @@ "description": "pytest is a mature full-featured Python testing tool that helps you write better programs.\n\nVisit the following resources to learn more:", "links": [ { - "title": "Official Docs", + "title": "Pytest Docs", "url": "https://docs.pytest.org/", "type": "article" }, @@ -1362,13 +1427,13 @@ "description": "PyUnit is an easy way to create unit testing programs and UnitTests with Python. (Note that [docs.python.org](http://docs.python.org) uses the name \"unittest\", which is also the module name.)\n\nVisit the following resources to learn more:", "links": [ { - "title": "How To Use unittest to Write a Test Case for a Function in Python", - "url": "https://www.digitalocean.com/community/tutorials/how-to-use-unittest-to-write-a-test-case-for-a-function-in-python", + "title": "PyUnit Docs", + "url": "https://wiki.python.org/moin/PyUnit%C2%A0", "type": "article" }, { - "title": "PyUnit Docs", - "url": "https://wiki.python.org/moin/PyUnit%C2%A0", + "title": "How To Use unittest to Write a Test Case for a Function in Python", + "url": "https://www.digitalocean.com/community/tutorials/how-to-use-unittest-to-write-a-test-case-for-a-function-in-python", "type": "article" }, { @@ -1380,10 +1445,10 @@ }, "o1wi39VnjnFfWIC8XcuAK": { "title": "typing", - "description": "typing is a module in Python that provides runtime support for type hints. The typing module defines a standard set of names that can be used to describe types in the Python language. The typing module was added to the standard library in Python 3.5.", + "description": "Typing is a module in Python that provides runtime support for type hints. The typing module defines a standard set of names that can be used to describe types in the Python language. The typing module was added to the standard library in Python 3.5.", "links": [ { - "title": "typing python", + "title": "Typing Module", "url": "https://docs.python.org/3/library/typing.html", "type": "article" } @@ -1391,10 +1456,10 @@ }, "jPFOiwbqfaGshaGDBWb5x": { "title": "tox", - "description": "tox is a tool for automating test environment management and testing against multiple interpreter configurations. It is particularly useful for Python codebases that need to support multiple versions of Python.\n\nLearn more about tox from the following resources:", + "description": "Tox is a tool for automating test environment management and testing against multiple interpreter configurations. It is particularly useful for Python codebase that need to support multiple versions of Python.\n\nLearn more about tox from the following resources:", "links": [ { - "title": "tox documentation", + "title": "Tox Documentation", "url": "https://tox.wiki/en/", "type": "article" } diff --git a/public/roadmap-content/react.json b/public/roadmap-content/react.json index 581c38379..693d449c2 100644 --- a/public/roadmap-content/react.json +++ b/public/roadmap-content/react.json @@ -240,16 +240,36 @@ }, "8OBlgDRUg-CTgDXY-QHyO": { "title": "Component Lifecycle", - "description": "React components have a lifecycle consisting of three phases: Mounting, Updating, and Unmounting along with several “lifecycle methods” that you can override to run code at particular times in the process. You can use this [lifecycle diagram](https://projects.wojtekmaj.pl/react-lifecycle-methods-diagram/) as a cheat sheet.\n\nIt is not recommended to use lifecycle methods manually. Instead, use the useEffect hook with functional components.\n\nVisit the following resources to learn more:", + "description": "React components have a lifecycle consisting of three phases: Mounting, Updating, and Unmounting along with several “lifecycle methods” that you can override to run code at particular times in the process.\n\nIt is not recommended to use lifecycle methods manually. Instead, use the useEffect hook with functional components.\n\nVisit the following resources to learn more:", "links": [ + { + "title": "Lifecycle of Reactive Effects", + "url": "https://react.dev/learn/lifecycle-of-reactive-effectsv", + "type": "article" + }, { "title": "Class Component", "url": "https://react.dev/reference/react/Component", "type": "article" }, { - "title": "Lifecycle of Reactive Effects", - "url": "https://react.dev/learn/lifecycle-of-reactive-effects", + "title": "React component lifecycle: React lifecycle methods & hooks", + "url": "https://tsh.io/blog/react-component-lifecycle-methods-vs-hooks/", + "type": "article" + }, + { + "title": "The React lifecycle: methods and hooks explained", + "url": "https://retool.com/blog/the-react-lifecycle-methods-and-hooks-explained#react-hooks-and-the-component-lifecycle", + "type": "article" + }, + { + "title": "React Lifecycle: Methods & Hooks In Detail", + "url": "https://www.bairesdev.com/blog/react-lifecycle-methods-hooks/", + "type": "article" + }, + { + "title": "lifecycle diagram", + "url": "https://projects.wojtekmaj.pl/react-lifecycle-methods-diagram/", "type": "article" } ] diff --git a/public/roadmap-content/redis.json b/public/roadmap-content/redis.json index 9834106c9..7dd7387b6 100644 --- a/public/roadmap-content/redis.json +++ b/public/roadmap-content/redis.json @@ -39,88 +39,279 @@ }, "eHuBz_zSZK3rubn7nkd7g": { "title": "Cache", - "description": "", - "links": [] + "description": "Redis cache is an in-memory key-value store used to cache frequently accessed data to improve application performance. By storing data in memory rather than on disk, Redis significantly reduces data access latency, making it ideal for use cases such as session management, caching database query results, and storing temporary data. Its ability to handle high throughput and support data persistence options allows it to be used as both a short-term cache and a durable data store.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Caching", + "url": "https://redis.io/solutions/caching/", + "type": "article" + }, + { + "title": "How to use Redis Caching for incredible performance", + "url": "https://www.youtube.com/watch?v=-5RTyEim384", + "type": "video" + } + ] }, "mgGJTBU8ofvOzl9gYWhnG": { "title": "Message Broker", - "description": "", - "links": [] + "description": "A message broker is a middleware system that enables communication between different services or applications by routing, storing, and delivering messages. Redis can serve as a lightweight message broker using its `PUBLISH` and `SUBSCRIBE` commands for a pub/sub messaging pattern, or through lists and sorted sets for more advanced messaging scenarios like task queues. Redis Streams provide additional features like message persistence, acknowledgment, and consumer groups, making it suitable for both real-time communication and more complex message processing pipelines. Its high throughput and low latency make Redis an efficient solution for building scalable messaging systems.\n\nLearn more from the following resources:", + "links": [ + { + "title": "PUBLISH Command", + "url": "https://redis.io/docs/latest/commands/publish/", + "type": "article" + }, + { + "title": "SUBSCRIBE Command", + "url": "https://redis.io/docs/latest/commands/subscribe/", + "type": "article" + }, + { + "title": "Redis As a Message Broker", + "url": "https://medium.com/shoutloudz/redis-as-a-message-broker-d1a1aeac23c3", + "type": "article" + } + ] }, "-TjnSOY8txYrhhxRV1OIl": { "title": "Caching", - "description": "", - "links": [] + "description": "Redis cache is an in-memory key-value store used to cache frequently accessed data to improve application performance. By storing data in memory rather than on disk, Redis significantly reduces data access latency, making it ideal for use cases such as session management, caching database query results, and storing temporary data. Its ability to handle high throughput and support data persistence options allows it to be used as both a short-term cache and a durable data store.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Caching", + "url": "https://redis.io/solutions/caching/", + "type": "article" + }, + { + "title": "How to use Redis Caching for incredible performance", + "url": "https://www.youtube.com/watch?v=-5RTyEim384", + "type": "video" + } + ] }, "bVJASI7bfSYqYnNhX83ng": { "title": "Real-time Analytics", - "description": "", - "links": [] + "description": "Real-time analytics in Redis involves the immediate processing and analysis of data as it is generated or received, enabling businesses and applications to gain insights and make decisions on-the-fly. Redis's in-memory data storage architecture allows for extremely low-latency access to data, making it ideal for scenarios such as monitoring user behavior, tracking metrics, and processing events in real-time. With support for various data structures like sorted sets for leaderboards, streams for event logging, and pub/sub for live notifications, Redis facilitates efficient aggregation, querying, and visualization of data.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Real-time Analytics with Redis", + "url": "https://redis.io/resources/real-time-analytics-redis/", + "type": "article" + } + ] }, "URxGmhZHr0Y8nyrYj0gJl": { "title": "Session Management", - "description": "", - "links": [] + "description": "Redis session management leverages the database's speed and versatility for efficient web application user session handling by using key-value storage with session IDs as keys, allowing quick access and updates.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Distributed Session Management", + "url": "https://redis.io/solutions/session-management/", + "type": "article" + }, + { + "title": "Session Management Basics with Redis", + "url": "https://dev.to/koshirok096/session-management-basics-with-redis-2o2e", + "type": "article" + } + ] }, "ZCyId3aIoLv3duxoJdk2P": { "title": "Pub/Sub Messaging", - "description": "", - "links": [] + "description": "Pub/Sub messaging in Redis is a messaging pattern that allows clients to communicate with each other through channels without needing direct connections. In this model, clients can subscribe to one or more channels to receive messages and can publish messages to these channels. When a message is published, all subscribed clients receive it in real-time, making it ideal for applications requiring instant notifications, such as chat systems, live updates, or event broadcasting. Redis's implementation of Pub/Sub is simple and efficient, supporting commands like `PUBLISH`, `SUBSCRIBE`, and `UNSUBSCRIBE`, although it does not provide message persistence or acknowledgment, which means that messages are not stored for clients that are not actively subscribed at the time of publishing.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Pub/Sub", + "url": "https://redis.io/docs/latest/develop/interact/pubsub/", + "type": "article" + }, + { + "title": "PUBLISH Documentation", + "url": "https://redis.io/docs/latest/commands/publish/", + "type": "article" + }, + { + "title": "SUBSCRIBE Documentation", + "url": "https://redis.io/docs/latest/commands/subscribe/", + "type": "article" + }, + { + "title": "UNSUBSCRIBE Documentation", + "url": "https://redis.io/docs/latest/commands/unsubscribe/", + "type": "article" + } + ] }, "Fv1iGX22sApIEifM2IpJz": { "title": "Leaderboards and Counters", - "description": "", - "links": [] + "description": "Leaderboards and counters are common use cases for Redis, leveraging its sorted sets and atomic increment operations. For leaderboards, the `ZADD` command is used to add members with their scores to a sorted set, and `ZRANGE` or `ZREVRANGE` retrieves the top (or bottom) ranked members efficiently. This makes Redis ideal for ranking systems in gaming or tracking top-performing entities. Counters are managed using commands like `INCR` and `DECR`, which atomically increase or decrease integer values. These operations are lightweight and performant, making Redis a go-to solution for tracking metrics, analytics, or rate limiting.\n\nLearn more from the following resources:", + "links": [ + { + "title": "ZADD Documentation", + "url": "https://redis.io/docs/latest/commands/zadd/", + "type": "article" + }, + { + "title": "ZRANGE Documentation", + "url": "https://redis.io/docs/latest/commands/zrange/", + "type": "article" + } + ] }, "8uRpPJ0iD4XnQPKruQc8P": { "title": "Data Persistence Options", - "description": "", + "description": "Redis offers two main data persistence options: **RDB (Redis Database)** snapshots and **AOF (Append-Only File)**. RDB creates point-in-time snapshots of the dataset at specified intervals, making it suitable for infrequent backups but with potential data loss between snapshots. AOF logs every write operation and replays them on restart, providing more durable persistence with finer control over data recovery. You can also configure Redis to use both methods for a balance between fast recovery and minimal data loss. Additionally, Redis supports running in memory-only mode without persistence.", "links": [] }, "uVewcyaFi1Pt2Gs0KrkfA": { "title": "Rich Data Structures", - "description": "", - "links": [] + "description": "Redis provides data structures such as strings, hashes, lists, sets, sorted sets with range queries, bitmaps, hyperloglogs, geospatial indexes, and streams.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Data Structures", + "url": "https://redis.io/redis-enterprise/data-structures/", + "type": "article" + }, + { + "title": "Understand Redis Data Types", + "url": "https://redis.io/docs/latest/develop/data-types/", + "type": "article" + } + ] }, "5-3pd4rLDqRzMzSRVLdXh": { "title": "High Performance and Scalability", - "description": "", - "links": [] + "description": "High performance and scalability in Redis are achieved through its in-memory data storage model, which allows for extremely fast read and write operations with minimal latency. Redis supports data partitioning, replication, and clustering, enabling it to scale horizontally across multiple nodes and handle large volumes of requests simultaneously. With asynchronous replication and automatic failover, Redis ensures high availability, making it well-suited for real-time applications that require low latency and high throughput, such as caching, messaging, and session management.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Optimizing Redis for High Performance", + "url": "https://loadforge.com/guides/optimizing-redis-for-high-performance-essential-configuration-tweaks", + "type": "article" + } + ] }, "EvWiEx_AoxAht6sKxzW2l": { "title": "Redis vs SQL/NoSQL DBs", - "description": "", - "links": [] + "description": "Redis differs significantly from traditional SQL and NoSQL databases in terms of data model, performance, and use cases. Redis is an in-memory key-value store that supports various data structures like strings, hashes, lists, and sets, allowing for flexible data handling and low-latency access. This makes it ideal for high-speed operations such as caching, real-time analytics, and session management. In contrast, SQL databases use a structured schema with tables and relationships, excelling in complex queries and transactions, while other NoSQL databases may utilize document, graph, or wide-column models to accommodate unstructured or semi-structured data.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis vs MongoDB", + "url": "https://aws.amazon.com/compare/the-difference-between-redis-and-mongodb/", + "type": "article" + }, + { + "title": "Understanding NoSQL vs SQL", + "url": "https://www.youtube.com/watch?v=9JHrL0UWrWs", + "type": "video" + } + ] }, "1Af5H0BgdAsRdBCNdHz5v": { "title": "When to choose Redis?", - "description": "", - "links": [] + "description": "Redis is ideal when you need a fast, in-memory data store with low latency and high throughput. It's particularly well-suited for caching, session management, real-time analytics, leaderboards, and message queues.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Introduction to Redis", + "url": "https://redis.io/about/", + "type": "article" + }, + { + "title": "Why Use Redis For All Your Applications", + "url": "https://www.youtube.com/watch?v=ZL4cHe3oL84", + "type": "video" + } + ] }, "Bf_kLfmy7_uflqC9N0-jt": { "title": "Using Package Managers", - "description": "", - "links": [] + "description": "Redis can be installed on Linux, MacOS and WSL2 via the platform specific package managers such as yum, apt and brew.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Install via apt", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/install/install-stack/linux/", + "type": "article" + }, + { + "title": "Install via brew", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/install/install-redis/install-redis-on-mac-os/", + "type": "article" + }, + { + "title": "Install on WSL2", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/install/install-redis/install-redis-on-windows/", + "type": "article" + } + ] }, "yBZ79s6mzGdj5AnX2H_Hy": { "title": "Pre-compiled Binaries", - "description": "", - "links": [] + "description": "Redis can be compiled and installed on a variety of platofrm and operating systems including Linux and macOS, the Redis binaries have no dependencies other than a C compiler and libc\n\nLearn more from the following resources:", + "links": [ + { + "title": "Installing Redis from Source", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/install/install-redis/install-redis-from-source/", + "type": "article" + }, + { + "title": "How to install Redis from source on Ubuntu and CentOS", + "url": "https://docs.vultr.com/how-to-install-redis-from-source-on-ubuntu-and-centos", + "type": "article" + } + ] }, "TDxv0q7jlZ26uZYYlneem": { "title": "Using Docker", - "description": "", - "links": [] + "description": "Redis Community Edition can be installed on Docker but it is recommended to complete the installation of Redis Stack in order to gain access to the modeling capabilities, be able to seach and query data, as well as using Redis as a vector database.\n\nLearn more from the following resources:", + "links": [ + { + "title": "How can I install Redis on Docker?", + "url": "https://redis.io/kb/doc/1hcec8xg9w/how-can-i-install-redis-on-docker", + "type": "article" + }, + { + "title": "redis/redis-stack-server", + "url": "https://hub.docker.com/r/redis/redis-stack-server", + "type": "article" + } + ] }, "43LvShQhmoWQ8Nye7fLkz": { "title": "Starting the Server", - "description": "", - "links": [] + "description": "Starting a Redis server is platform dependant and is usually done via `systemctl` on Linux or `brew services` on MacOS.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Start and stop Redis on MacOS", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/install/install-redis/install-redis-on-mac-os/#starting-and-stopping-redis-in-the-foreground", + "type": "article" + }, + { + "title": "Start and stop Redis on Ubuntu/Debian", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/install/install-redis/install-redis-on-linux/#starting-and-stopping-redis-in-the-background", + "type": "article" + }, + { + "title": "Install and start Redis on WSL2", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/install/install-redis/install-redis-on-windows/#install-redis", + "type": "article" + } + ] }, "BOGXTjmCLo6WI6mYDsqRu": { "title": "Connecting using Redis CLI", - "description": "", - "links": [] + "description": "The Redis CLI (`redis-cli`) is a command-line interface used to interact with a Redis server. It allows users to run Redis commands, monitor the server, manage data, and perform administrative tasks. Common operations include setting and getting keys, managing key expiration, and checking server status. The CLI supports running commands in both interactive mode and non-interactive mode for scripting and automation. It’s a powerful tool for developers and administrators to troubleshoot and manage Redis instances directly.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis CLI Documentation", + "url": "https://redis.io/docs/latest/develop/connect/cli/", + "type": "article" + }, + { + "title": "The Command Line Tool: redis-cli", + "url": "https://www.youtube.com/watch?v=VenGyryG4OE", + "type": "video" + } + ] }, "NhcZM4nUQoSBBf_1qXi6l": { "title": "Basic Commands / SET, GET", @@ -143,40 +334,96 @@ } ] }, - "DOdNkTY1yIMipWA2CD9xH": { - "title": "Settings and Getting Keys", + "and-getting-keys@DOdNkTY1yIMipWA2CD9xH.md": { + "title": " and Getting Keys", "description": "", "links": [] }, "lV_MnUNTB2h925idX0YWk": { "title": "DEL", - "description": "", - "links": [] + "description": "The `DEL` command in Redis is used to delete one or more keys from the database. If the specified key(s) exist, they are removed, and the command returns the number of keys that were deleted. If a key does not exist, it is simply ignored, and no error is returned. This command is useful for managing memory by removing unnecessary or obsolete data and is an atomic operation, ensuring that keys are deleted without interference from other operations.\n\nLearn more from the following resources:", + "links": [ + { + "title": "DEL Documentation", + "url": "https://redis.io/docs/latest/commands/del/", + "type": "article" + }, + { + "title": "Redis DEL Command", + "url": "https://www.tutorialspoint.com/redis/keys_del.htm", + "type": "article" + } + ] }, "U84XgBFPyIbY0W5afH4cx": { "title": "Overview of Data Types", - "description": "", - "links": [] + "description": "Redis is a data structure server and at its core, REdis provides a collection of native data types that allow you to solve a wide variety of problems, from caching to event processing.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Understand Redis Data Types", + "url": "https://redis.io/docs/latest/develop/data-types/", + "type": "article" + }, + { + "title": "Redis Data Types", + "url": "https://www.tutorialspoint.com/redis/redis_data_types.htm", + "type": "article" + } + ] }, "ltF4vCT9ZA2XuUuHnuGnN": { "title": "SET", - "description": "", - "links": [] + "description": "The SET command sets the defined key to hold a value, if the key already holds a value then it will be overwritten regardless of its type.\n\nLearn more from the following resources:", + "links": [ + { + "title": "SET Command", + "url": "https://redis.io/docs/latest/commands/set/", + "type": "article" + } + ] }, "mQc4H2ZMMSVjh33LJY8mK": { "title": "GET", - "description": "", - "links": [] + "description": "The `GET` command in Redis is used to retrieve the value associated with a specified key. If the key exists, it returns the value as a string; if the key does not exist, it returns a nil response. This command is fundamental for accessing stored data in Redis and is often used in conjunction with other commands to manipulate and manage data within the database. The `GET` command is atomic, meaning it provides a consistent view of the data at the time the command is executed.\n\nLearn more from the following resources:", + "links": [ + { + "title": "GET Documentation", + "url": "https://redis.io/docs/latest/commands/get/", + "type": "article" + }, + { + "title": "How to get all keys in Redis", + "url": "https://www.atlassian.com/data/admin/how-to-get-all-keys-in-redis", + "type": "article" + } + ] }, "5K9qyC4mrhXYWOC8WSq8C": { "title": "INCR", - "description": "", - "links": [] + "description": "`INCR` is a Redis command used to increment the value of a string key by 1. If the key does not exist, it initializes the key with a value of 0 before performing the increment operation, resulting in a value of 1. If the key contains a non-integer value, the command will return an error. `INCR` is atomic, meaning it is safe to use in concurrent environments without race conditions, making it ideal for use cases like counters or tracking metrics.\n\nLearn more from the following resources:", + "links": [ + { + "title": "INCR Documentation", + "url": "https://redis.io/docs/latest/commands/incr/", + "type": "article" + } + ] }, "t4BXPofF8OCqH5KHwdYVh": { "title": "DECR", - "description": "", - "links": [] + "description": "The `DECR` command in Redis decreases the integer value of a key by 1. If the key does not exist, it is initialized to 0 before performing the decrement. If the key contains a value that is not an integer, Redis returns an error. This command is useful in counters and for tracking state changes in a simple, atomic way.\n\nLearn more from the following resources:", + "links": [ + { + "title": "DECR Documentation", + "url": "https://redis.io/docs/latest/commands/decr/", + "type": "article" + }, + { + "title": "Redis String DECR", + "url": "https://www.w3resource.com/redis/redis-decr-key.php", + "type": "article" + } + ] }, "cPWd53BO6tm-uy4gqLdtZ": { "title": "APPEND", @@ -196,13 +443,25 @@ }, "eJQW986HM4Wf1o1i2FnXs": { "title": "STRLEN", - "description": "", - "links": [] + "description": "The STRLEN command returns the length of a string value that is stored at the defined key, if no string value is help at the key then an error will be returned.\n\nLearn more from the following resources:", + "links": [ + { + "title": "STRLEN Documentation", + "url": "https://redis.io/docs/latest/commands/strlen/", + "type": "article" + } + ] }, "0v8uLWRCbAqEmKKdYaRQW": { "title": "More Commands", - "description": "", - "links": [] + "description": "Redis strings include a variety of operations that go beyond basic SET and GET functionality. Examples include MSET and MGET for setting and getting multiple keys at once, GETSET to set a new value while returning the old one, and SETEX or PSETEX for setting a value with an expiration time. Other commands like INCRBY and DECRBY allow incrementing or decrementing by a specified amount, while BITCOUNT and BITOP provide bit-level manipulations.\n\nLearn more from the following resources:", + "links": [ + { + "title": "All Redis String Commands", + "url": "https://redis.io/docs/latest/commands/?group=string", + "type": "article" + } + ] }, "2_E2VwbjTgk4xxTFWfHuV": { "title": "Usecases", @@ -210,59 +469,130 @@ "links": [] }, "nS0DHhfy4wxHItgOFhulA": { - "title": "EXPR", - "description": "", - "links": [] + "title": "expire", + "description": "The EXPIRE command is used to set a time-to-live (TTL) for a key in seconds, after which the key will be automatically deleted. If you need to specify the expiration time in milliseconds, you can use the PEXPIRE command. Both commands help manage memory by allowing you to automatically remove keys that are no longer needed, which is especially useful in caching and session management scenarios.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Expiring Keys", + "url": "https://redis.io/ebook/part-2-core-concepts/chapter-3-commands-in-redis/3-7-other-commands/3-7-3-expiring-keys/", + "type": "article" + }, + { + "title": "EXPIRE Documentation", + "url": "https://redis.io/docs/latest/commands/expire/", + "type": "article" + } + ] }, "Vll7VMmGWSI5XGZ9JpHyl": { "title": "TTL", - "description": "", - "links": [] + "description": "The TTL command returns the remaining time left to live of a key that is specified, this capability allows a Redis client to check how many seconds a given key will continue to be a part of a dataset.\n\nLearn more from the following resources:", + "links": [ + { + "title": "TTL Documentation", + "url": "https://redis.io/docs/latest/commands/ttl/", + "type": "article" + } + ] }, "Kq7G89KaZZMFkrH-9WZoS": { "title": "LPUSH", - "description": "", - "links": [] + "description": "`LPUSH` is a Redis command that inserts one or more elements at the beginning (left side) of a list. If the list does not exist, it creates a new list before performing the insertion. This command returns the length of the list after the operation. `LPUSH` is useful for building stacks or adding items to queues where new elements need to be prioritized, enabling efficient manipulation of ordered data structures in Redis.\n\nLearn more from the following resources:", + "links": [ + { + "title": "LPUSH Documentation", + "url": "https://redis.io/docs/latest/commands/lpush/", + "type": "article" + } + ] }, "jC8G1o7yFj7D_PGmOIgcD": { "title": "RPUSH", - "description": "", - "links": [] + "description": "The RPUSH command will insert all the specified values at the tail end o the list that is stored at the defined key, if the key does not exist then it will be created as an empty list before performing the push.\n\nLearn more from the following resources:", + "links": [ + { + "title": "RPUSH Documentation", + "url": "https://redis.io/docs/latest/commands/rpush/", + "type": "article" + } + ] }, "voa61RTWMJD3Sk8DNJoVQ": { "title": "LPOP", - "description": "", - "links": [] + "description": "`LPOP` is a Redis command that removes and returns the first element from the left side of a list. If the list is empty or does not exist, it returns `nil`. This command is commonly used in scenarios like implementing queues or consuming elements in FIFO (First-In-First-Out) order, making it ideal for task processing, message handling, and managing ordered data flows in real-time applications.\n\nLearn more from the following resources:", + "links": [ + { + "title": "LPOP Documentation", + "url": "https://redis.io/docs/latest/commands/lpop/", + "type": "article" + } + ] }, "brUGqWZ287EWtvl9uUbNt": { "title": "RPOP", - "description": "", - "links": [] + "description": "The RPOP command removes and then returns the last elements of the list stored and the specified key, by default it will pop only a single element from the list.\n\nLearn more from the following resources:", + "links": [ + { + "title": "RPOP Documentation", + "url": "https://redis.io/docs/latest/commands/rpush/", + "type": "article" + } + ] }, "8JTtBy6oD2wFYDizVkcVa": { "title": "LRANGE", - "description": "", - "links": [] + "description": "`LRANGE` is a Redis command that retrieves a specified range of elements from a list, defined by a start and stop index. The indices can be positive (starting from 0) or negative (e.g., -1 for the last element). This command is commonly used to fetch subsets of a list without loading the entire list into memory, making it useful for paginating data, viewing portions of a queue, or analyzing a segment of ordered data in an efficient manner.\n\nLearn more from the following resources:", + "links": [ + { + "title": "LRANGE Documentation", + "url": "https://redis.io/docs/latest/commands/lrange/", + "type": "article" + } + ] }, "hBFEUXtuzUTzWZKp2qWaZ": { "title": "LINDEX", - "description": "", - "links": [] + "description": "`LINDEX` is a Redis command used to retrieve an element from a list by its index. The index can be positive (starting from 0 for the first element) or negative (e.g., -1 for the last element). If the index is out of range, the command returns `nil`. This command is useful for accessing specific elements in a list without needing to fetch the entire list, making it efficient for operations where only certain elements are needed.\n\nLearn more from the following resources:", + "links": [ + { + "title": "LINDEX Documentation", + "url": "https://redis.io/docs/latest/commands/lindex/", + "type": "article" + } + ] }, "4oCcP9FxDJSDMHCEVBCNa": { "title": "LLEN", - "description": "", - "links": [] + "description": "`LLEN` is a Redis command used to return the length of a list stored at a specified key. If the list does not exist, it returns `0`. This command is efficient for quickly checking the number of elements in a list without retrieving its contents, making it useful for monitoring queue sizes, tracking list growth, or validating data presence in real-time applications.\n\nLearn more from the following resources:", + "links": [ + { + "title": "LLEN Documentation", + "url": "https://redis.io/docs/latest/commands/llen/", + "type": "article" + } + ] }, "9KvHcS5F4Jj5ZXgIAdOQY": { "title": "LMOVE", - "description": "", - "links": [] + "description": "`LMOVE` is a Redis command used to atomically move an element from one list to another. It pops an element from the source list (either from the left or right end) and pushes it to the destination list (either to the left or right end), based on the specified parameters (`LEFT` or `RIGHT`). This command is useful for implementing queue-like patterns or managing work distribution between different lists without race conditions, as it ensures that the element is safely transferred in a single atomic operation.\n\nLearn more from the following resources:", + "links": [ + { + "title": "LMOVE Documentation", + "url": "https://redis.io/docs/latest/commands/lmove/", + "type": "article" + } + ] }, "eBeEUYY-IL_CMkcm31lUL": { "title": "More Commands", - "description": "", - "links": [] + "description": "Redis Lists include operations like LTRIM to trim the list to a specified range, RPOPLPUSH to remove an element from one list and append it to another, and BLPOP or BRPOP for blocking pop operations that wait until an element is available. Commands like LPOS allow finding the position of elements, and LSET is used to update a list element at a specified index. These additional commands provide robust functionality for manipulating lists, implementing queue-based patterns, and ensuring efficient handling of ordered data, making lists highly suitable for real-time data pipelines and task queues.\n\nLearn more from the following resources:", + "links": [ + { + "title": "All Redis List Commands", + "url": "https://redis.io/docs/latest/commands/?group=list", + "type": "article" + } + ] }, "XTwNCCtzXvZMdaex4gZEh": { "title": "Usecases", @@ -271,48 +601,102 @@ }, "Qgkpr9vf9d6-vUg1o8XFj": { "title": "Sets", - "description": "", - "links": [] + "description": "A Redis set is an unordered collection of members which can be used to track unique items, represent relations and preform set operations.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Sets", + "url": "https://redis.io/docs/latest/develop/data-types/sets/", + "type": "article" + } + ] }, "xUKoQps69FFQrJeuhD1pz": { "title": "SADD", - "description": "", - "links": [] + "description": "The SADD command will add the specified members to the set which is stored and the defined key, any specified members that are already a member of the set will simply be ignored.\n\nLearn more from the following resources:", + "links": [ + { + "title": "SADD Documentation", + "url": "https://redis.io/docs/latest/commands/sadd/", + "type": "article" + } + ] }, "mQ0ILns53n1By0Tq6xSZI": { "title": "SMEMBERS", - "description": "", - "links": [] + "description": "The SMEMBERS command returns all the members of the set that is defined at key.\n\nLearn more from the following resources:", + "links": [ + { + "title": "SMEMBERS Documentation", + "url": "https://redis.io/docs/latest/commands/smembers/", + "type": "article" + } + ] }, "WQWVL5GT_scHdgfCtI7WT": { "title": "SREM", - "description": "", - "links": [] + "description": "The SREM command will remove the specified members from the set stored at the defined key, specified members that are not a member of the set will be ignored.\n\nLearn more from the following resources:", + "links": [ + { + "title": "SREM Documentation", + "url": "https://redis.io/docs/latest/commands/srem/", + "type": "article" + } + ] }, "Ji5ghlcGJtlmErHFqVf3d": { "title": "SISMEMBER", - "description": "", - "links": [] + "description": "The SISMEMBER command will simply return a boolean value is the members is a part of the set stored at key.\n\nLearn more from the following resources:", + "links": [ + { + "title": "SISMEMBER", + "url": "https://redis.io/docs/latest/commands/sismember/", + "type": "article" + } + ] }, "5aLfNBewK4Dx017qVNO3T": { "title": "SINTER", - "description": "", - "links": [] + "description": "The SINTER command will return members of the set which will result in the intersection of all the given sets, keys that do not exist are considered to be empty sets.\n\nLearn more from the following resources:", + "links": [ + { + "title": "SINTER Documentation", + "url": "https://redis.io/docs/latest/commands/sinter/", + "type": "article" + } + ] }, "2gZL4a9aWGKWLa89iyHTc": { "title": "SCARD", - "description": "", - "links": [] + "description": "`SCARD` is a Redis command used to get the number of members in a set, it returns the cardinality of the specified set, which is the total count of unique elements it contains. If the set does not exist, `SCARD` returns `0`. This command is useful for quickly determining the size of a set, allowing applications to make decisions based on the number of unique items, such as checking user participation in a campaign or the count of unique tags in a system.\n\nLearn more from the following resources:", + "links": [ + { + "title": "", + "url": "https://redis.io/docs/latest/commands/scard/", + "type": "article" + } + ] }, "6QoYa-N2BKNBaRtvNeVNm": { "title": "SUNION", - "description": "", - "links": [] + "description": "The SUNION command returns the members of a set resulting in a union of all the given sets.\n\nLearn more from the following resources:", + "links": [ + { + "title": "SUNION Documentation", + "url": "https://redis.io/docs/latest/commands/sunion/", + "type": "article" + } + ] }, "JX5ajmcUmkshTO-mLF8lH": { "title": "SDIFF", - "description": "", - "links": [] + "description": "The SDIFF coimmand returns the members of a set resulting from the difference between the first set and all the following sets.\n\nLearn more from the following resources:", + "links": [ + { + "title": "SDIFF Documentation", + "url": "https://redis.io/docs/latest/commands/sdiff/", + "type": "article" + } + ] }, "2SG4Hr9Tuv6cxmGkrKjYZ": { "title": "More Commands", @@ -326,48 +710,101 @@ }, "b48EUyFGUeSjtT5fOa_m6": { "title": "More Commands", - "description": "", - "links": [] + "description": "Redis Sets include advanced operations like SRANDMEMBER to retrieve random members from a set, SPOP to remove and return random elements, and SMOVE to atomically move elements between sets. Commands like SSCAN allow for incremental iteration over large sets, avoiding performance issues with massive data structures. For complex set operations, SINTERSTORE, SUNIONSTORE, and SDIFFSTORE enable storing the results of set intersections, unions, or differences into new sets. These commands extend the functionality of basic set operations, enabling efficient membership tests, set manipulations, and mathematical set calculations, making Redis Sets highly versatile for diverse data management needs.\n\nLearn more from the following resources:", + "links": [ + { + "title": "All Redis Set Commands", + "url": "https://redis.io/docs/latest/commands/?group=set", + "type": "article" + } + ] }, "Wl23Jh-ASJOQ850yjaTIU": { "title": "Strings", - "description": "", + "description": "Strings in Redis are binary-safe, meaning they can contain any kind of data, including text, integers, floats, or even binary data like images and they can hold up to 512 MB of data per key. Redis strings support a wide range of operations, from basic CRUD (Create, Read, Update, Delete) to more complex manipulations like incrementing/decrementing numeric values, appending data, or extracting substrings.", "links": [] }, "4-C4XqACUp4nvcMIj6djF": { "title": "Lists", - "description": "", - "links": [] + "description": "Lists in Redis are ordered collections of string elements, allowing operations such as pushing, popping, and accessing elements by index. Lists support various commands, like `LPUSH` and `RPUSH` to add elements to the beginning or end, `LPOP` and `RPOP` to remove elements, and `LRANGE` to retrieve a range of elements. They are ideal for use cases like message queues, task management, or implementing stacks and queues, where maintaining order is crucial. Lists can grow dynamically and provide high performance for operations at the ends, making them highly flexible for managing ordered data sequences.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Lists", + "url": "https://redis.io/docs/latest/develop/data-types/lists/", + "type": "article" + }, + { + "title": "Complete Guide to Redis Lists", + "url": "https://www.geeksforgeeks.org/complete-guide-to-redis-lists/", + "type": "article" + } + ] }, "wY46Qj5Inw_ClBNI9PB_2": { "title": "Hashes", - "description": "", - "links": [] + "description": "Hashes in Redis are a data type that allows you to store a collection of key-value pairs under a single key, similar to a dictionary or a map. Each hash can hold multiple fields, and each field has its own value, making hashes ideal for representing objects or entities with various attributes. You can perform operations like adding fields (`HSET`), retrieving field values (`HGET`), deleting fields (`HDEL`), and iterating over fields (`HSCAN`). Hashes are memory-efficient and provide a way to group related data together, making them suitable for use cases like user profiles, configuration settings, or any structured data storage.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Hashes", + "url": "https://redis.io/docs/latest/develop/data-types/hashes/", + "type": "article" + } + ] }, "BOJzn9SWad9oRRdY_ub01": { "title": "HSET", - "description": "", - "links": [] + "description": "`HSET` is a Redis command used to set the value of a specified field within a hash. If the field already exists, it updates the value; if not, it adds the field to the hash. This command is useful for creating and managing key-value pairs within a hash structure without modifying other fields. It returns `1` if a new field is created and `0` if an existing field is updated, making it efficient for atomic updates in a Redis hash.\n\nLearn more from the following resources:", + "links": [ + { + "title": "HSET Documentation", + "url": "https://redis.io/docs/latest/commands/hset/", + "type": "article" + } + ] }, "MsKg9m5jFwHM2Bzjf-vdu": { "title": "HGET", - "description": "", - "links": [] + "description": "`HGET` is a Redis command used to retrieve the value of a specified field within a hash. If the field exists, it returns the value; if not, it returns `nil`. This command is efficient for accessing specific fields within a hash without retrieving the entire hash structure, making it ideal for scenarios where only selective data needs to be read from a Redis hash.\n\nLearn more from the following resources:", + "links": [ + { + "title": "HGET Documentation", + "url": "https://redis.io/docs/latest/commands/hget/", + "type": "article" + } + ] }, "TpR33sJ-tAjeG3jpGTvYR": { "title": "HGETALL", - "description": "", - "links": [] + "description": "`HGETALL` is a Redis command that retrieves all the fields and their values from a specified hash. It returns the data as an array of field-value pairs, making it useful for obtaining a complete view of the hash's contents. However, it can be memory-intensive for large hashes, so it’s recommended to use it cautiously when dealing with high data volumes.\n\nLearn more from the following resources:", + "links": [ + { + "title": "HGETALL Documentation", + "url": "https://redis.io/docs/latest/commands/hgetall/", + "type": "article" + } + ] }, "E7xFZkqqbzokD5KGTn9zJ": { "title": "HDEL", - "description": "", - "links": [] + "description": "`HDEL` is a Redis command used to delete one or more specified fields from a hash. If the fields exist in the hash, they are removed, and the command returns the number of fields that were deleted. If a specified field does not exist, it is ignored. `HDEL` is useful for efficiently managing memory and cleaning up data within a Redis hash without removing the entire hash structure.\n\nLearn more from the following resources:", + "links": [ + { + "title": "HDEL Documentation", + "url": "https://redis.io/docs/latest/commands/hdel/", + "type": "article" + } + ] }, "adhLMuSmfYMRyWTwIgnyE": { "title": "HEXISTS", - "description": "", - "links": [] + "description": "`HEXISTS` is a Redis command used to check if a specified field exists within a hash. It returns `1` if the field is present and `0` if it is not. This command is useful for verifying the presence of specific fields in a hash before performing operations like updates or deletions. It helps ensure data consistency and avoid unnecessary operations in Redis.\n\nLearn more from the following resources:", + "links": [ + { + "title": "HEXISTS Documentation", + "url": "https://redis.io/docs/latest/commands/hexists/", + "type": "article" + } + ] }, "jtVnUD-na-WffMaS8qYfu": { "title": "Usecases", @@ -376,48 +813,96 @@ }, "QTbkWZ7BpqYmBhUivccPu": { "title": "Sorted Sets", - "description": "", + "description": "A sorted set in Redis is a collection of unique strings, or members, that are ordered by an associated score. When more than one string has the same score, the strings are ordered lexicographically.", "links": [] }, "0swsBD0sOY-o5lzibT999": { "title": "ZADD", - "description": "", - "links": [] + "description": "The ZADD command adds all of the specified members with the specified scores to the sorted set defined at `key`.\n\nLearn more from the following resources:", + "links": [ + { + "title": "ZADD Documentation", + "url": "https://redis.io/docs/latest/commands/zadd/", + "type": "article" + } + ] }, "3pFChX6YIItrBz9lxu4XM": { "title": "ZRANGE", - "description": "", - "links": [] + "description": "The ZRANGE command can perform multiple range queries including by rank, by score or by lexiographical order. The order of elements returned are always from lowest to highest and any score ties are resolved using reverse lexiographical ordering.\n\nLearn more from the following resourceS:", + "links": [ + { + "title": "ZRANGE Documentation", + "url": "https://redis.io/docs/latest/commands/zrange/", + "type": "article" + } + ] }, "OlbixGa5RmdqEt7snY04j": { "title": "ZRANGEBYSCORE", - "description": "", - "links": [] + "description": "This command retrieves elements from a sorted set stored at the specified key. It returns all elements with scores falling within the given min and max range, inclusive of both boundaries. Elements are ordered from lowest to highest score. For elements sharing the same score, the command returns them in lexicographical order. This ordering is an inherent property of Redis sorted sets and requires no additional computation.\n\nLearn more from the following resources:", + "links": [ + { + "title": "ZRANGEBYSCORE Documentation", + "url": "https://redis.io/docs/latest/commands/zrangebyscore/", + "type": "article" + } + ] }, "m0FZDPwNE71zcwM_gUwz0": { "title": "ZREM", - "description": "", - "links": [] + "description": "Removes the specified members from the sorted set stored at key. Non existing members are ignored. An error is returned when key exists and does not hold a sorted set.\n\nLearn more from the following resources:", + "links": [ + { + "title": "ZREM Documentation", + "url": "https://redis.io/docs/latest/commands/zrem/", + "type": "article" + } + ] }, "W4v7FIQr2k-Vbm-HdfKog": { "title": "ZINCRBY", - "description": "", - "links": [] + "description": "ZINCRBY increments the score of a member in a sorted set by the defined increment. If the member targeted does not exists in the sorted set then it will be added and will be assigned the value of the increment. If the key does not exists that ZINCRBY will created the set with the targeted member as it's only member.\n\nLearn more from the following resources:", + "links": [ + { + "title": "ZINCRBY Documentation", + "url": "https://redis.io/docs/latest/commands/zincrby/", + "type": "article" + } + ] }, "AF_kWM4V8n5Ux06IgEVTl": { "title": "ZRANK", - "description": "", - "links": [] + "description": "ZRANK returns the rank of member in the sorted set stored at key, with the scores ordered from low to high. The rank is 0-based, which means that the member with the lowest score has rank 0. The optional WITHSCORE argument supplements the command's reply with the score of the element returned.\n\nLearn more from the following resources:", + "links": [ + { + "title": "ZRANK Documentation", + "url": "https://redis.io/docs/latest/commands/zrank/", + "type": "article" + } + ] }, "O-fZM_U-tW0pYtNzN_8Ax": { "title": "ZCOUNT", - "description": "", - "links": [] + "description": "ZCOUNT returns the number of elements in the sorted set at the targetted `key`, with a score between `min` and `max`.\n\nLearn more from the following resources:", + "links": [ + { + "title": "ZCOUNT Documentation", + "url": "https://redis.io/docs/latest/commands/zcount/", + "type": "article" + } + ] }, "P6TDUCroLlEI7qePBFHIH": { "title": "More Commands", - "description": "", - "links": [] + "description": "Redis Hashes include operations like HMSET and HMGET to set or retrieve multiple fields and values at once, HINCRBY and HINCRBYFLOAT to increment the value of a field by a given integer or float, and HLEN to get the number of fields in a hash. Commands like HKEYS and HVALS are used to retrieve all field names or values, respectively, while HSCAN enables incremental iteration over large hashes. These commands extend the functionality of basic hash operations, making Redis Hashes ideal for storing and manipulating structured data, such as user profiles or configuration settings, with efficient access and updates.\n\nLearn more from the following resources:", + "links": [ + { + "title": "All Redis Hash Commands", + "url": "https://redis.io/docs/latest/commands/?group=hash", + "type": "article" + } + ] }, "lxevY15ZyP43s_JrEqMX7": { "title": "Usecases", @@ -426,23 +911,46 @@ }, "o6e_CwxfPoU6qkfWkwKwj": { "title": "More Commands", - "description": "", - "links": [] + "description": "Redis Sorted Sets include operations like ZREVRANGE to get elements in reverse order, ZRANGEBYLEX to retrieve elements within a specific lexicographical range, and ZINTERSTORE or ZUNIONSTORE to perform intersection and union operations on multiple sorted sets and store the results. Commands like ZREMrangeBYRANK and ZREMRANGEBYSCORE allow for removing elements based on their rank or score ranges.\n\nLearn more from the following resources:", + "links": [ + { + "title": "All Redis Sorted Set Commands", + "url": "https://redis.io/docs/latest/commands/?group=sorted-set", + "type": "article" + } + ] }, "jCaVx5wvsvuyqtwh6m8si": { "title": "Naming Conventions", - "description": "", + "description": "Naming conventions in Redis are crucial for maintaining organized and understandable data structures, especially in large applications. Common practices include using colons (`:`) as separators for hierarchical keys (e.g., `user:1001:settings`), employing prefixes to group related keys (e.g., `session:`, `cache:`), and using concise, descriptive names to indicate the purpose and type of the key.", "links": [] }, "UlQHqw1dbxZnAKbsWsOgU": { "title": "Retrieval by Pattern", - "description": "", - "links": [] + "description": "Redis offers powerful pattern-based key retrieval, allowing users to query multiple keys using wildcard patterns. This functionality primarily relies on the KEYS command, which supports glob-style patterns such as \\*, ?, and \\[\\] for flexible matching.\n\nLearn more from the following resources:", + "links": [ + { + "title": "SCAN Command", + "url": "https://redis.io/docs/latest/commands/scan/", + "type": "article" + } + ] }, "OSIYDYPGz8Vgo9SU9GGH9": { "title": "Expiration", - "description": "", - "links": [] + "description": "Redis key expiration allows you to set a time-to-live (TTL) for keys, automatically deleting them after a specified duration. This can be achieved using commands like `EXPIRE`, which sets the expiration time in seconds, or `PEXPIRE`, which uses milliseconds for finer granularity. You can also use `SET` with the EX argument to set a key with a value and expiration in a single command. Expired keys are removed during normal operations, such as when accessed or during periodic cleanup. This feature is useful for managing memory efficiently and for scenarios like session management or caching where temporary data storage is needed.\n\nLearn more from the following resources:", + "links": [ + { + "title": "PEXPIRE Documentation", + "url": "https://redis.io/docs/latest/commands/pexpire/", + "type": "article" + }, + { + "title": "EXPIRE Documentation", + "url": "https://redis.io/docs/latest/commands/expire/", + "type": "article" + } + ] }, "jrgaoDnt_RxTu79hk4hCD": { "title": "Atomicity in Redis", @@ -451,8 +959,19 @@ }, "LHlwjN3WHYUBUafzzwsWQ": { "title": "Pipelining", - "description": "", - "links": [] + "description": "Pipelining in Redis is a technique that allows clients to send multiple commands to the server without waiting for individual responses after each command. Instead, the commands are sent in a batch, and responses are read together at the end. This reduces the network overhead and latency associated with multiple round trips, significantly improving throughput, especially in high-volume operations.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Pipelining", + "url": "https://redis.io/docs/latest/develop/use/pipelining/", + "type": "article" + }, + { + "title": "Complete Guide to Redis Pipelining", + "url": "https://www.geeksforgeeks.org/complete-guide-to-redis-pipelining/", + "type": "article" + } + ] }, "7JzeyTrkZ_1_yxMVrqvZU": { "title": "Batch Operations", @@ -483,13 +1002,25 @@ }, "B-YUFhPQNdr1KZNupmR5N": { "title": "SETBIT", - "description": "", - "links": [] + "description": "The SETBIT command sets or clearts the bit at the specified offset in the string value that is stored at the specified key. When the key does not exist, a new string value will be created and the string is grown to make sure it can hold a bit to the same value as the earlier defined offset.\n\nLearn more from the following resources:", + "links": [ + { + "title": "SETBIT command", + "url": "https://redis.io/docs/latest/commands/setbit/", + "type": "article" + } + ] }, "0HFLJfcrcSnAVTecG3P8W": { "title": "GETBIT", - "description": "", - "links": [] + "description": "The `GETBIT` command in Redis retrieves the value of a specific bit at a given offset in a string key. It returns either 0 or 1, depending on the state of the bit at that position. If the key does not exist, the command returns 0, as it treats non-existing keys as empty strings. This command is particularly useful for working with bitmap data structures, allowing you to check the status of individual bits in a more efficient manner compared to retrieving the entire string.\n\nLearn more from the following resources:", + "links": [ + { + "title": "GETBIT Documentation", + "url": "https://redis.io/docs/latest/commands/getbit/", + "type": "article" + } + ] }, "jpcyXSSib7q4WBPmpgnXA": { "title": "BITCOUNT", @@ -509,13 +1040,35 @@ }, "tkrxArg_oYH0aQfM8NkD2": { "title": "BITOP", - "description": "", - "links": [] + "description": "The `BITOP` command in Redis performs bitwise operations (AND, OR, XOR, and NOT) across one or more string keys, treating the strings as binary data. The result is stored in a destination key. This command is useful for manipulating and analyzing binary data directly in Redis, such as when aggregating flags or working with bitmap data structures.\n\nLearn more from the following resources:", + "links": [ + { + "title": "BITOP Documentation", + "url": "https://redis.io/docs/latest/commands/bitop/", + "type": "article" + }, + { + "title": "BITOP Explained", + "url": "https://www.dragonflydb.io/docs/command-reference/strings/bitop", + "type": "article" + } + ] }, "Df1Eu7CuA-ARYii9JVvnm": { "title": "BITPOS", - "description": "", - "links": [] + "description": "The `BITPOS` command in Redis is used to find the position of the first bit set to 1 or 0 in a string key. You can specify a starting and ending byte range for the search. It’s commonly used in scenarios where you need to quickly locate specific bits within a bitmap, such as finding the first occurrence of a flag or status in large datasets.\n\nLearn more from the following resources:", + "links": [ + { + "title": "BITPOS Documentation", + "url": "https://redis.io/docs/latest/commands/bitpos/", + "type": "article" + }, + { + "title": "BITPOS", + "url": "https://upstash.com/docs/redis/sdks/py/commands/bitmap/bitpos", + "type": "article" + } + ] }, "s7PEr-5TAm5EGJm0RSjPJ": { "title": "Usecases", @@ -524,23 +1077,52 @@ }, "cszjT3YK8oyhGpqLTQzwX": { "title": "HyperLogLog", - "description": "", - "links": [] + "description": "HyperLogLog is a probabilistic data structure in Redis used for efficiently estimating the cardinality (i.e., the number of unique elements) of large datasets with minimal memory usage. Instead of storing the actual elements, it maintains a compressed representation, allowing it to estimate cardinality with a typical error rate of only 0.81%. Commands like `PFADD`, `PFCOUNT`, and `PFMERGE` are used to add elements, get the count, and merge HyperLogLogs, respectively. This structure is ideal for applications like unique visitor tracking or counting events where exact counts are not required but low memory consumption is critical.\n\nLearn more from the following resouces:", + "links": [ + { + "title": "HyperLogLog Documentation", + "url": "https://redis.io/docs/latest/develop/data-types/probabilistic/hyperloglogs/", + "type": "article" + }, + { + "title": "Redis HyperLogLog Explained", + "url": "https://www.youtube.com/watch?v=MunL8nnwscQ", + "type": "video" + } + ] }, "8a4DmPZrX2xGZ7zdWxS63": { "title": "PFADD", - "description": "", - "links": [] + "description": "`PFADD` is a Redis command used to add elements to a HyperLogLog data structure, which is designed for estimating the cardinality (number of unique elements) of a dataset. When elements are added using `PFADD`, Redis updates the internal structure without storing the actual elements, ensuring low memory consumption. This command returns `1` if the HyperLogLog was modified (i.e., a new unique element was added) and `0` otherwise. `PFADD` is ideal for use cases like counting unique visits or tracking unique events in a highly memory-efficient manner.\n\nLearn more from the following resources:", + "links": [ + { + "title": "PFADD Documentation", + "url": "https://redis.io/docs/latest/commands/pfadd/", + "type": "article" + } + ] }, "JWT30KIJQHVw0MXI5sGR6": { "title": "PFCOUNT", - "description": "", - "links": [] + "description": "`PFCOUNT` is a Redis command used to retrieve the estimated number of unique elements in one or more HyperLogLog structures. It provides an approximate cardinality count with a typical error rate of 0.81%, making it highly efficient for large datasets while using minimal memory. When called with multiple HyperLogLog keys, `PFCOUNT` merges the data and returns the approximate count of the union, allowing for quick aggregation of unique elements across multiple sets.\n\nLearn more from the following resources:", + "links": [ + { + "title": "PFCOUNT Documentation", + "url": "https://redis.io/docs/latest/commands/pfcount/", + "type": "article" + } + ] }, "s50jr_XOUcxh65-tGCKf5": { "title": "PFMERGE", - "description": "", - "links": [] + "description": "`PFMERGE` is a Redis command used to combine multiple HyperLogLog data structures into a single HyperLogLog key, creating a new structure that represents the union of all unique elements. This command is useful when you want to aggregate and estimate the cardinality of distinct elements across multiple datasets. The resulting HyperLogLog can then be queried using `PFCOUNT` to get the approximate count of the merged unique elements.\n\nLearn more from the following resources:", + "links": [ + { + "title": "PFMERGE Documentation", + "url": "https://redis.io/docs/latest/commands/pfmerge/", + "type": "article" + } + ] }, "XPeCvikPuu6EJ8UcOLGPh": { "title": "Usecases", @@ -549,28 +1131,52 @@ }, "zXs_9n2yEb_eVi0WuOQKH": { "title": "Streams", - "description": "", + "description": "A Redis stream is a data structure that acts like an append-only log but can also implement multiple operations to overcome limits seen in typical append-only logs. These include random access in O(1) time and complex consumption strategies, such as consumer groups.", "links": [] }, "7isWhgrUA6M5IGM2U2tm4": { "title": "XADD", - "description": "", - "links": [] + "description": "The XADD command used to append new entries to a stream data structure. It allows you to add one or more field-value pairs as a single entry, automatically assigning a unique ID to each new entry.\n\nLearn more from the following resources:", + "links": [ + { + "title": "XADD Documentation", + "url": "https://redis.io/docs/latest/commands/xadd/", + "type": "article" + } + ] }, "4sKiAtX5aIL4NDsQkilNC": { "title": "XREAD", - "description": "", - "links": [] + "description": "The XREAD command reads data from one or more streams, only returning entired with an ID greater than the last recieved ID.\n\nLearn more from the following resources:", + "links": [ + { + "title": "XREAD Documentation", + "url": "https://redis.io/docs/latest/commands/xread/", + "type": "article" + } + ] }, "CiYFuYE8XudZkR6AW2NQ7": { "title": "XRANGE", - "description": "", - "links": [] + "description": "The XRANGE command used for retrieving messages from a stream. It allows you to query a range of messages based on their IDs, returning them in chronological order. This command is particularly useful for reading a portion of a stream's history, enabling efficient data retrieval and processing.\n\nLearn more from the following resources:", + "links": [ + { + "title": "XRANGE Documentation", + "url": "https://redis.io/docs/latest/commands/xrange/", + "type": "article" + } + ] }, "DQJCMEw13lELcw_AwLfrT": { "title": "XLEN", - "description": "", - "links": [] + "description": "The XLEN command used to get the length of a stream, returning the number of entries it contains. This simple yet powerful command provides a quick way to assess the size of a stream without retrieving its contents. Unlike other Redis types, zero-length streams are possible so XLEN should be used in tandem with TYPE or EXISTS.\n\nLearn more from the following resources:", + "links": [ + { + "title": "XLEN Documentation", + "url": "https://redis.io/docs/latest/commands/xlen/", + "type": "article" + } + ] }, "zXlSBfa-Gi9_GhSYEzre3": { "title": "Usecases", @@ -579,23 +1185,46 @@ }, "4-z4hDKm86qQatYnmE21R": { "title": "More Commands", - "description": "", - "links": [] + "description": "Streams include a variety of operations that enhance the core functionality provided by basic commands like XADD and XREAD. Examples include XDEL to remove specific entries from a stream, XTRIM to control the size of a stream by trimming old entries, and XGROUP for managing consumer groups, allowing multiple clients to read from the same stream in a coordinated manner. Commands like XPENDING and XCLAIM are useful for monitoring and handling pending messages, ensuring that no data is lost or left unprocessed.\n\nLearn more from the following resources:", + "links": [ + { + "title": "All Redis Stream Commands", + "url": "https://redis.io/docs/latest/commands/?group=stream", + "type": "article" + } + ] }, "_NiUdVQ85qnvryI38k_vQ": { "title": "Geospatial Indexes", - "description": "", + "description": "Geospatial indexes in Redis are used to efficiently store and query location-based data, enabling fast geospatial operations. Redis uses a sorted set data structure to maintain these indexes, where each member represents a geographic location identified by longitude and latitude coordinates. The coordinates are encoded into a single value, allowing Redis to perform operations like adding locations (`GEOADD`), searching for nearby locations (`GEOSEARCH`), and calculating distances (`GEODIST`). This indexing mechanism allows for rapid retrieval of geospatial data, making it suitable for applications such as mapping services, location tracking, and proximity-based searches.", "links": [] }, "U3N1EgHFs1-YUaB_VrJfw": { "title": "GEOADD", - "description": "", - "links": [] + "description": "The `GEOADD` command in Redis is used to add geospatial data to a sorted set, where each entry consists of a member (a unique identifier) and its corresponding longitude and latitude coordinates. This command allows you to store location-based data efficiently, enabling geospatial queries such as finding members within a specified radius or calculating distances between points. The coordinates are stored in a format that allows for quick retrieval and analysis, making `GEOADD` a powerful tool for applications involving mapping, location tracking, and proximity searches.\n\nLearn more from the following resources:", + "links": [ + { + "title": "GEOADD Documentation", + "url": "https://redis.io/docs/latest/commands/geoadd/", + "type": "article" + } + ] }, "OWWDLuGTbdNwME7v2jxVP": { "title": "GEOSEARCH", - "description": "", - "links": [] + "description": "The `GEOSEARCH` command in Redis is used to query geospatial data by finding members within a specified geographic area. It allows you to search for entries based on a central point (latitude and longitude) and a defined radius, or by bounding box coordinates. The command returns a sorted set of members that fall within the specified geographical range, making it ideal for applications that require proximity searches, such as locating nearby businesses or services. `GEOSEARCH` can also be combined with various options, such as sorting results by distance or limiting the number of results returned.\n\nLearn more from the following resources:", + "links": [ + { + "title": "GEOADD Documentation", + "url": "https://redis.io/docs/latest/commands/geoadd/", + "type": "article" + }, + { + "title": "Getting Started with Geospatial Search in Redis", + "url": "https://redis.io/learn/howtos/solutions/geo/getting-started", + "type": "article" + } + ] }, "GNMjrLPkpTphneoQ0GoZF": { "title": "Usecases", @@ -604,33 +1233,69 @@ }, "FCbdKnkI1ZHGekT6yiGua": { "title": "More Commands", - "description": "", - "links": [] + "description": "Redis Geospatial indexes include operations like GEODIST to calculate the distance between two members of a geospatial set, GEOHASH to retrieve the Geohash representation of locations, and GEOPOS to get the longitude and latitude of specified members. Additionally, GEORADIUS and GEORADIUSBYMEMBER allow searching for members within a given radius based on coordinates or a reference member.\n\nLearn more from the following resources:", + "links": [ + { + "title": "All Redis Geospatial Commands", + "url": "https://redis.io/docs/latest/commands/?group=geo", + "type": "article" + } + ] }, "9W_jaK1DSEZHRKdPcUM7h": { "title": "Pub/Sub", - "description": "", - "links": [] + "description": "Pub/Sub in Redis is a powerful messaging paradigm that allows for real-time communication between clients through a publish/subscribe model. In this system, publishers send messages to specific channels without knowing who, if anyone, will receive them. Subscribers, on the other hand, express interest in particular channels and receive messages published to those channels instantly. This decouples the message producers from the consumers, facilitating flexible and scalable communication. Key commands in this model include `PUBLISH` for sending messages, `SUBSCRIBE` for listening to channels, and `UNSUBSCRIBE` for stopping the reception of messages.\n\nVisit the following resources to learn more:", + "links": [ + { + "title": "Pub/Sub in Redis", + "url": "https://redis.io/docs/latest/develop/interact/pubsub/", + "type": "article" + } + ] }, "55BCntuWlaQiLPqNtb-2i": { "title": "SUBSCRIBE", - "description": "", - "links": [] + "description": "The SUBSCRIBE command subscribes the client to the channels specified, once subscribed the client enters a state where it is not supposed to issue any other commands, except from those in the SUBSCRIBE subset i.e. SSUBSCRIBE, PSUBSCRIBE etc.\n\nLearn more from the following resources:", + "links": [ + { + "title": "SUBSCRIBE Documentation", + "url": "https://redis.io/docs/latest/commands/subscribe/", + "type": "article" + } + ] }, "5gkZzm2F4vu6IxUoJLYbK": { "title": "UNSUBSCRIBE", - "description": "", - "links": [] + "description": "The UNSUBSCRIBE command unsubscribes the client for the given channels, or all channels if none are specifically stated.\n\nLearn more from the following resources:", + "links": [ + { + "title": "UNSUBSCRIBE Documentation", + "url": "https://redis.io/docs/latest/commands/unsubscribe/", + "type": "article" + } + ] }, "gIPo-2CNqE1BsOaDzmkCU": { "title": "PUBLISH", - "description": "", - "links": [] + "description": "`PUBLISH` is a Redis command used to send messages to a specified channel in the pub/sub messaging system. When a message is published, all clients that are subscribed to that channel receive the message immediately. This command is useful for implementing real-time communication features, such as chat applications, notifications, or event broadcasting. The `PUBLISH` command does not return any acknowledgment to the sender, as it operates on a fire-and-forget basis, allowing for efficient message distribution without requiring the sender to wait for subscribers to process the message.\n\nLearn more from the following resources:", + "links": [ + { + "title": "PUBLISH Documentation", + "url": "https://redis.io/docs/latest/commands/publish/", + "type": "article" + } + ] }, "V-d6q-3Sf0dl5v8xiCQwl": { "title": "More Commands", - "description": "", - "links": [] + "description": "Redis Pub/Sub include operations like PSUBSCRIBE and PUNSUBSCRIBE for subscribing and unsubscribing to channels using pattern matching, allowing for flexible topic-based subscriptions. Additionally, PUBSUB CHANNELS lists active channels, PUBSUB NUMSUB shows the number of subscribers per channel, and PUBSUB NUMPAT returns the count of active pattern subscriptions. These commands extend the basic publish and subscribe functionality, providing better insights and control over the messaging patterns, making Pub/Sub ideal for real-time event broadcasting, chat applications, and inter-service communication in distributed systems.\n\nLearn more from the following resources:", + "links": [ + { + "title": "All Redis Pub/Sub Commands", + "url": "https://redis.io/docs/latest/commands/?group=pubsub", + "type": "article" + } + ] }, "MvyE_JUJej0UB9xe8Anfj": { "title": "Usecases", @@ -639,43 +1304,146 @@ }, "YHbWlKrQqptUDbaQVy0_A": { "title": "Transactions", - "description": "", - "links": [] + "description": "Redis Transactions allow the execution of a group of commands in a single step, they are centered around the commands MULTI, EXEC, DISCARD and WATCH.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Transactions", + "url": "https://redis.io/docs/latest/develop/interact/transactions/", + "type": "article" + }, + { + "title": "MULTI", + "url": "https://redis.io/docs/latest/commands/multi/", + "type": "article" + }, + { + "title": "EXEC", + "url": "https://redis.io/docs/latest/commands/exec/", + "type": "article" + }, + { + "title": "DISCARD", + "url": "https://redis.io/docs/latest/commands/discard/", + "type": "article" + }, + { + "title": "WATCH", + "url": "https://redis.io/docs/latest/commands/watch/", + "type": "article" + } + ] }, "c-y5Eck8VtSyIf8RAW9p7": { "title": "WATCH", - "description": "", - "links": [] + "description": "The WATCH command marks the given keys to be watched for conditional execution of a transaction. It's a critical component of Redis's approach to handling race conditions in multi-key transactions.\n\nLearn more from the following resources:", + "links": [ + { + "title": "WATCH Documentation", + "url": "https://redis.io/docs/latest/commands/watch/", + "type": "article" + } + ] }, "Ljy-Mc0EBBX4_vXfYZ5-4": { "title": "EXEC", - "description": "", - "links": [] + "description": "The `EXEC` command in Redis is used to execute a transaction that has been initiated with the `MULTI` command. When a transaction is started with `MULTI`, subsequent commands are queued but not executed immediately. Calling `EXEC` will execute all the commands in the transaction atomically, ensuring that either all commands succeed or none are applied. If any command in the transaction fails, the entire transaction is aborted. This command is essential for maintaining data integrity when performing a series of operations that should be treated as a single unit of work.\n\nLearn more from the following resources:", + "links": [ + { + "title": "", + "url": "https://redis.io/docs/latest/commands/eval/", + "type": "article" + }, + { + "title": "Redis Transactions: EXEC", + "url": "https://www.w3resource.com/redis/redis-exec.php", + "type": "article" + } + ] }, "U6hST1MkS16T2CHV3-Ise": { "title": "MULTI", - "description": "", - "links": [] + "description": "`MULTI` is a Redis command used to start a transaction, allowing a group of commands to be executed sequentially and atomically. After initiating a `MULTI` block, commands are queued instead of being executed immediately. Once all desired commands are added, the `EXEC` command is called to run them as a single atomic operation. If an error occurs in any command during queuing, it can be discarded using `DISCARD`. `MULTI` ensures that no other clients can interfere with the transaction, making it ideal for complex operations that require consistent state updates.\n\nLearn more from the following resources:", + "links": [ + { + "title": "MULTI Command", + "url": "https://redis.io/docs/latest/commands/multi/", + "type": "article" + } + ] }, "msW0Wd2H-6FFNDnjC64t-": { "title": "Optimistic Locking", - "description": "", - "links": [] + "description": "Optimistic locking in Redis is implemented using the `WATCH` command in combination with transactions (`MULTI` and `EXEC`). `WATCH` monitors specified keys for changes before starting a transaction. If any of the watched keys are modified by another client before `EXEC` is called, the transaction is aborted, and `EXEC` returns `nil` instead of executing the queued commands. This allows Redis to handle concurrent updates without requiring traditional locks, making it ideal for scenarios where multiple clients might modify the same keys. Optimistic locking helps maintain data integrity while minimizing the performance overhead typically associated with locking mechanisms.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Optimistic Locking using CHECK & SET", + "url": "https://redis.io/docs/latest/develop/interact/transactions/#optimistic-locking-using-check-and-set", + "type": "article" + }, + { + "title": "WATCH Command", + "url": "https://redis.io/docs/latest/commands/watch/", + "type": "article" + }, + { + "title": "MULTI Command", + "url": "https://redis.io/docs/latest/commands/multi/", + "type": "article" + } + ] }, "Veb30QrPYNjUn13dtGbUr": { "title": "Lua Scripting", - "description": "", - "links": [] + "description": "Lua scripting in Redis allows users to execute custom scripts atomically on the server side, enabling complex operations to be performed in a single step. Lua scripts are run using the `EVAL` or `EVALSHA` commands, and can manipulate multiple keys and values in a single execution. This reduces network overhead and ensures data consistency, as the script executes as a single transaction. Lua is commonly used for tasks like conditional updates, batch processing, and combining multiple commands into a single operation, enhancing Redis's flexibility and power for advanced use cases.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Lua Programming Language", + "url": "https://www.lua.org/", + "type": "article" + }, + { + "title": "Lua in 100 Seconds", + "url": "https://www.youtube.com/watch?v=jUuqBZwwkQw", + "type": "video" + }, + { + "title": "Full Lua Programming Crash Course", + "url": "https://www.youtube.com/watch?v=1srFmjt1Ib0", + "type": "video" + } + ] }, "rjeq3i9oX8IGyQzo--L3c": { "title": "EVAL", - "description": "", - "links": [] + "description": "The `EVAL` command in Redis allows the execution of Lua scripts directly on the server, enabling complex operations that can be atomically executed. This command takes a Lua script as an argument, along with a list of keys and arguments for the script. By executing scripts server-side, `EVAL` reduces the number of round trips between the client and server, enhances performance, and allows for operations that require multiple commands to be executed in a single atomic operation. It is particularly useful for implementing advanced data manipulations, custom logic, or conditional operations within Redis.\n\nLearn more from the following resources:", + "links": [ + { + "title": "EVAL Documentation", + "url": "https://redis.io/docs/latest/commands/eval/", + "type": "article" + }, + { + "title": "Redis EVAL Command", + "url": "https://www.tutorialspoint.com/redis/scripting_eval.htm", + "type": "article" + } + ] }, "3X0x_PcJGWBVPL-LSVAln": { "title": "EVALSHA", - "description": "", - "links": [] + "description": "The `EVALSHA` command in Redis is used to execute a Lua script that has already been loaded into the server with the `SCRIPT LOAD` command. Instead of sending the entire script each time, you provide the SHA1 hash of the script, which allows for more efficient execution and reduced network overhead. Like `EVAL`, `EVALSHA` can accept keys and arguments, enabling complex, atomic operations to be performed directly on the server. This approach is particularly beneficial in scenarios where the same script is executed multiple times, as it avoids the need to re-transmit the script’s source code.\n\nLearn more from the following resources:", + "links": [ + { + "title": "EVALSHA Documentation", + "url": "https://redis.io/docs/latest/commands/evalsha/", + "type": "article" + }, + { + "title": "Redis EVALSHA Command", + "url": "https://www.tutorialspoint.com/redis/scripting_evalsha.htm", + "type": "article" + } + ] }, "kF_nGo845XDwLkwcQt008": { "title": "Usecases", @@ -684,18 +1452,46 @@ }, "bQaek7f3dAaZfSUhwovm1": { "title": "Persistence Options", - "description": "", - "links": [] + "description": "Redis provides two main persistence options: **RDB (Redis Database Backup)** and **AOF (Append-Only File)**. RDB creates point-in-time snapshots of the dataset at specified intervals, offering efficient storage with minimal performance impact, making it suitable for periodic backups but with potential data loss between snapshots. AOF logs every write operation to disk, providing higher data durability by allowing finer-grained recovery, though it can be more resource-intensive. Redis also supports a **hybrid persistence** mode that combines both RDB and AOF for faster restarts and stronger durability. Additionally, a **No Persistence** option is available for scenarios where data retention is unnecessary, prioritizing speed and memory efficiency.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Data Persistence", + "url": "https://redis.io/docs/latest/operate/rc/databases/configuration/data-persistence/", + "type": "article" + }, + { + "title": "Redis Persistence", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/persistence/", + "type": "article" + } + ] }, "D3pZdAjwPFMRxX1-iyu5-": { "title": "How RDB Works?", - "description": "", - "links": [] + "description": "The RDB (Redis Database Backup) mechanism in Redis creates snapshots of the dataset at specified intervals and saves them to disk as a compact binary file. This process is triggered manually, via the `SAVE` or `BGSAVE` commands, or automatically based on predefined conditions. During a snapshot, Redis forks a child process to write the in-memory data to the RDB file, ensuring that the main process is not blocked. While RDB offers a lightweight and fast backup option, it may lead to potential data loss if Redis crashes between snapshots, making it ideal for periodic backups rather than real-time persistence.\n\nLearn more from the following resources:", + "links": [ + { + "title": "About RDB Snapshots", + "url": "https://cloud.google.com/memorystore/docs/redis/about-rdb-snapshots", + "type": "article" + } + ] }, "_pb2DPrFUUZabKxWsuFUo": { "title": "Configuring Save Interval", - "description": "", - "links": [] + "description": "Configuring the save interval in Redis controls how often data is saved from memory to disk (RDB snapshots). This is done using the `save` directive in the `redis.conf` file. You can specify multiple save intervals with different thresholds, for example: `save 900 1` saves the dataset if at least one key is changed within 900 seconds. Redis allows configuring multiple save intervals, offering flexibility between performance and data durability based on your use case.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Persistence", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/persistence/", + "type": "article" + }, + { + "title": "Understanding Redis Persistence", + "url": "https://www.youtube.com/watch?v=1pfvz24BAUs", + "type": "video" + } + ] }, "Z6yJwUkcDX08HoMyf1LwX": { "title": "Usecases / Best Practices", @@ -704,8 +1500,14 @@ }, "PTj6oxvpw8vP295WvAI80": { "title": "How AOF Works?", - "description": "", - "links": [] + "description": "The Append-Only File (AOF) in Redis is a persistence mechanism that logs every write operation to a file in sequential order, ensuring data durability. Each command is appended to the end of the AOF file, which Redis can replay to rebuild the dataset in case of a restart. The AOF file can grow over time, so Redis provides an automatic background process called _AOF rewrite_ to create a compact version by eliminating redundant commands. AOF is generally safer than the default RDB snapshotting, as it provides finer granularity for data recovery and minimizes the potential for data loss.\n\nLearn more from the following resources:", + "links": [ + { + "title": "About AOF Persistence - Google", + "url": "https://cloud.google.com/memorystore/docs/cluster/about-aof-persistence", + "type": "article" + } + ] }, "ibaZ34-laQtUyxAsERi7o": { "title": "AOF rewrite & compaction", @@ -725,8 +1527,24 @@ }, "9ToKTUqbi-NV5Wcwb21PT": { "title": "Truncation / Corruption", - "description": "", - "links": [] + "description": "Truncation and corruption typically refer to scenarios where data is unexpectedly cut off or altered, compromising its integrity. This can occur due to various reasons, such as sudden power failures, system crashes, or disk errors. Redis mitigates these risks through its persistence mechanisms like RDB snapshots and AOF (Append-Only File) logs.\n\nLearn more from the following resources:", + "links": [ + { + "title": "AOF Advantages", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/persistence/#aof-advantages", + "type": "article" + }, + { + "title": "What should I do if my AOF gets truncated?", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/persistence/#what-should-i-do-if-my-aof-gets-truncated", + "type": "article" + }, + { + "title": "What should I do if my AOF gets corrupted?", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/persistence/#what-should-i-do-if-my-aof-gets-corrupted", + "type": "article" + } + ] }, "VvOQUO22ZF8VvDSqHENNU": { "title": "Usecases", @@ -740,33 +1558,84 @@ }, "80035BzcB-fKCvD_3N8zE": { "title": "No Persistence Option", - "description": "", - "links": [] + "description": "The **No Persistence** option in Redis disables all data persistence mechanisms, meaning that no data will be saved to disk. This can be configured by turning off both RDB snapshots and AOF (Append-Only File) logging. Running Redis without persistence is ideal for use cases where high-speed caching is prioritized over data durability, such as storing ephemeral data or managing sessions that don’t need to survive a server restart. While this option reduces disk I/O and maximizes performance, it also means that all data will be lost if the server is shut down or crashes, making it suitable only for scenarios where data loss is acceptable.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Persistence Documentation", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/persistence/", + "type": "article" + } + ] }, "3S-qqOlfr60HR4VvDr4He": { "title": "RDB vs AOF Tradeoffs", - "description": "", - "links": [] + "description": "When comparing RDB (Redis Database Backup) and AOF (Append-Only File) for data persistence in Redis, several trade-offs must be considered.\n\n**RDB** is optimized for performance and efficient storage, creating point-in-time snapshots of the dataset at specified intervals. It is faster for startup since it loads a single file and consumes less disk I/O during normal operations. However, it may lead to data loss between snapshots if the server crashes, as changes made during that interval are not saved.\n\n**AOF**, on the other hand, logs every write operation in real-time, allowing for more granular recovery with minimal data loss, as you can replay commands to reconstruct the dataset. This comes at the cost of increased disk I/O and potential performance overhead, especially with frequent write operations. The AOF file can also grow significantly, requiring periodic rewriting to optimize size.\n\nLearn more from the following resources:", + "links": [ + { + "title": "RDB Advantages", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/persistence/#rdb-advantages", + "type": "article" + }, + { + "title": "AOF Advantages", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/persistence/#aof-advantages", + "type": "article" + }, + { + "title": "AOF vs RDB, Which One to Choose?", + "url": "https://codedamn.com/news/backend/redis-data-persistence-aof-vs-rdb", + "type": "article" + } + ] }, "S5Y26m1oHCQpB-oLCdtac": { "title": "Hybrid Persistence", - "description": "", - "links": [] + "description": "Hybrid persistence in Redis combines both RDB (Redis Database Backup) and AOF (Append-Only File) mechanisms to leverage the benefits of each. RDB provides efficient snapshot-based backups at defined intervals, while AOF logs every write operation to ensure minimal data loss. Using both, Redis achieves a balance between fast recovery times (thanks to compact RDB snapshots) and high durability (from the detailed logging of AOF). This approach minimizes the drawbacks of using either persistence type alone and offers a robust solution for scenarios requiring both performance and data safety.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Persistence", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/persistence/", + "type": "article" + } + ] }, "rSD8nJ-uNpHJVe5Hn66h7": { "title": "Replication Basics", - "description": "", - "links": [] + "description": "Replication in Redis is a process that allows data from one Redis instance (the master) to be copied to one or more Redis instances (the replicas). This mechanism enhances data availability, reliability, and scalability. When a master instance receives write operations, it propagates these changes to its replicas, ensuring they maintain an up-to-date copy of the data. Replication in Redis is asynchronous, meaning that replicas may lag behind the master, but this design improves performance by allowing the master to handle write operations without waiting for replicas to confirm the receipt of data. In addition to providing redundancy, Redis replication supports read scaling, as read operations can be distributed across replicas, reducing the load on the master. Configuring replication is straightforward, requiring minimal setup in the `redis.conf` file to designate a master and its replicas. Overall, replication is a fundamental feature in Redis that plays a crucial role in building resilient and scalable applications.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Replication", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/replication/", + "type": "article" + } + ] }, "nci3OB1NE1zJHUPfZCOpT": { "title": "Redis Sentinel", - "description": "", - "links": [] + "description": "Redis Sentinel serves as a robust high-availability solution for Redis deployments, offering a comprehensive suite of monitoring, notification, and automatic failover capabilities. By continuously overseeing master and replica Redis servers, Sentinel ensures system integrity and swift response to failures. In the event of a master instance failure, it seamlessly promotes a replica to master status, reconfiguring the system to maintain service continuity with minimal downtime.\n\nLearn more from the following resources:", + "links": [ + { + "title": "High Availability with Redis Sentinal", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/sentinel/", + "type": "article" + } + ] }, "AQiCcHS6dBAAAPloxiXub": { "title": "Clustering", - "description": "", - "links": [] + "description": "Redis Cluster is a distributed implementation of Redis that provides automatic data partitioning across multiple nodes and ensures high availability through data replication. It uses a sharding mechanism to split data across nodes using a hash slot system, where each key is mapped to one of 16,384 slots distributed among the cluster's nodes. Redis Cluster offers fault tolerance by replicating data across master and replica nodes, enabling the cluster to continue operating even if some nodes fail. This setup is ideal for large-scale applications requiring scalability and resilience.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Scale with Redis Cluster", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/scaling/", + "type": "article" + }, + { + "title": "How to Create a Cluster in Redis", + "url": "https://www.youtube.com/watch?v=N8BkmdZzxDg", + "type": "video" + } + ] }, "Qy42paiTUsO8HIwbWTMui": { "title": "Authentication", @@ -781,88 +1650,248 @@ }, "wsuKH7YwGDV6GYQbdhA4o": { "title": "Network Security", - "description": "", - "links": [] + "description": "Network security in Redis involves implementing measures to protect the server from unauthorized access and data breaches. Best practices include binding Redis to trusted interfaces, using firewalls to restrict access, and configuring `requirepass` for password protection. Redis should run in a secure network environment, ideally with TLS/SSL enabled for encrypted communication. Additionally, the use of `ACL` (Access Control Lists) provides granular permissions for different users. By disabling dangerous commands and using proper authentication and authorization mechanisms, Redis instances can be secured against common threats such as unauthorized data access and denial-of-service attacks.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Authentication Documentation", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/security/#authentication", + "type": "article" + }, + { + "title": "Redis Network Security Documentation", + "url": "https://redis.io/docs/latest/operate/rc/security/database-security/network-security/", + "type": "article" + } + ] }, "gdiWwTQg6A-BFHdQBmgmH": { "title": "SSL/TLS Encryption", - "description": "", - "links": [] + "description": "SSL/TLS is supported by Redis starting with version 6 as an optional feature that needs to be enabled at compile time. TLS will add a layer to the communication stack with overheads due to the read and writes from an SSL connection and integrity checks, this will lead to a decrease of achieveable throughput.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis TLS Support", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/security/encryption/#getting-started", + "type": "article" + }, + { + "title": "Transport Layer Security Documentation", + "url": "https://redis.io/docs/latest/operate/rc/security/database-security/tls-ssl/", + "type": "article" + } + ] }, "q2Jw49QUWCUGIfcEC1bZI": { "title": "INFO", - "description": "", - "links": [] + "description": "`INFO` is a Redis command that provides detailed information and statistics about the server, including memory usage, CPU load, connected clients, replication status, and more. It can be called without arguments to get a full overview or with specific sections (e.g., `INFO memory`) to retrieve targeted data. This command is useful for monitoring and debugging Redis instances, helping administrators understand the server's current state and performance metrics.\n\nLearn more from the following resources:", + "links": [ + { + "title": "INFO Documentation", + "url": "https://redis.io/docs/latest/commands/info/", + "type": "article" + } + ] }, "jBtEiylcedtaE6E20Uk4V": { "title": "MONITOR", - "description": "", - "links": [] + "description": "`MONITOR` is a Redis command that provides a real-time feed of all commands executed on the server, displaying each command along with its arguments as they are processed. It is primarily used for debugging, monitoring, or analyzing the behavior of a Redis instance. Since `MONITOR` can impact performance by streaming every command in real-time, it should be used cautiously in production environments. It is a useful tool for understanding command patterns, tracking down issues, and gaining insights into how clients interact with the Redis server.\n\nLearn more from the following resources:", + "links": [ + { + "title": "MONITOR Documentation", + "url": "https://redis.io/docs/latest/commands/monitor/", + "type": "article" + }, + { + "title": "SLOWLOG Documentation", + "url": "https://redis.io/docs/latest/commands/slowlog/", + "type": "article" + } + ] }, "XBPwHgIsXupMsyoOFkJZ0": { "title": "RedisInsight", - "description": "", - "links": [] + "description": "RedisInsight is an advanced graphical user interface (GUI) tool developed by Redis Labs that provides comprehensive management and monitoring capabilities for Redis databases. It offers users an intuitive interface to visualize and interact with their Redis data, making it easier to manage data structures such as strings, hashes, lists, sets, and sorted sets. With RedisInsight, users can perform tasks like querying and modifying data, running commands, and analyzing performance metrics in real-time. It includes features such as a query builder, visual data exploration, and memory analysis tools to help identify key usage patterns and potential optimization opportunities. Additionally, RedisInsight supports monitoring of multiple Redis instances, allowing administrators to keep track of performance and health across their deployments. Overall, RedisInsight enhances the user experience by simplifying complex Redis operations and providing valuable insights into database performance and data management.\n\nLearn more from the following resources:", + "links": [ + { + "title": "RedisInsight/RedisInsight - RedisInsight Module on GitHub", + "url": "https://github.com/RedisInsight/RedisInsight", + "type": "opensource" + }, + { + "title": "RedisInsight", + "url": "https://redis.io/insight/", + "type": "article" + } + ] }, "y5FPSAi6T-5X9SUfR58_-": { "title": "RedisCommander", - "description": "", - "links": [] + "description": "RedisCommander is a web-based GUI management tool for Redis that simplifies the interaction with Redis databases through a user-friendly interface. It allows users to browse, edit, and manage Redis keys and data structures easily, providing visual representations of data types such as strings, hashes, lists, sets, and sorted sets. With RedisCommander, users can perform common operations like adding, modifying, and deleting keys, as well as executing commands directly from the interface. The tool also supports features like searching for keys, viewing key details, and monitoring server performance metrics. RedisCommander is particularly useful for developers and administrators who prefer a graphical interface over command-line interaction, making it easier to manage Redis instances, troubleshoot issues, and explore data in real-time. Overall, it enhances productivity and streamlines Redis database management tasks.\n\nLearn more from the following resources:", + "links": [ + { + "title": "joeferner/redis-commander - RedisCommander Module on GitHub", + "url": "https://github.com/joeferner/redis-commander", + "type": "opensource" + } + ] }, "xF0wQYmtwXYkrzvWg5gOO": { "title": "Memory Management", - "description": "", - "links": [] + "description": "Memory management in Redis involves efficiently handling data storage within its in-memory structure to maximize performance and prevent memory overflows. Redis uses various techniques such as memory-efficient data encoding (e.g., `ziplist` or `intset`), active and passive eviction strategies based on the configured max memory policy, and expiration of keys to automatically free up space. To persist data, Redis offers snapshotting (RDB) and logging (AOF) mechanisms. Additionally, commands like `MEMORY USAGE` and `MEMORY STATS` help monitor memory consumption, making it easier to tune and optimize the instance for specific use cases. Effective memory management ensures high availability, low latency, and predictable performance.\n\nLearn more from the following resources:", + "links": [ + { + "title": "MEMORY USAGE Command", + "url": "https://redis.io/docs/latest/commands/memory-usage/", + "type": "article" + }, + { + "title": "MEMORY STATS Command", + "url": "https://redis.io/docs/latest/commands/memory-stats/", + "type": "article" + }, + { + "title": "Memory Management best practices", + "url": "https://cloud.google.com/memorystore/docs/redis/memory-management-best-practices", + "type": "article" + } + ] }, "Sd1ENOXSFCz1YqccXjr2A": { "title": "Max Memory Policy", - "description": "", + "description": "The Max Memory Policy in Redis determines how the server handles data when it reaches the configured maximum memory limit. Redis offers several eviction policies, such as `noeviction` (return an error on writes), `allkeys-lru` (evict the least recently used keys), `volatile-lru` (evict the least recently used keys with an expiration set), `allkeys-random` (evict random keys), and others. These policies allow Redis to optimize memory usage based on the use case, balancing between maintaining data availability and minimizing the risk of data loss when memory constraints are reached.\n\nLearn more from the following resources:", "links": [] }, "yaCWw2KjX58SaPajUAb0d": { "title": "Slow Log Analysis", - "description": "", - "links": [] + "description": "The Redis Slow Log in a system to log any queries that take longer than a specified time. The execution time does not include any I/O operations such as talking with the client, just the time need to execute the specified command.\n\nLearn more from the following resources:", + "links": [ + { + "title": "SLOWLOG", + "url": "https://redis.io/docs/latest/commands/slowlog/", + "type": "article" + }, + { + "title": "View Redis Slow Log", + "url": "https://redis.io/docs/latest/operate/rs/clusters/logging/redis-slow-log/", + "type": "article" + } + ] }, "kgHwK4N-sfh6dHjd_D_me": { "title": "redis-benchmark", - "description": "", - "links": [] + "description": "`redis-benchmark` is a utility provided with Redis that measures the performance of the Redis server by simulating various types of workloads. It allows users to test the speed and responsiveness of Redis commands under different conditions, providing metrics such as requests per second and latency. The tool can simulate multiple clients and different command types, such as `GET`, `SET`, and `INCR`, enabling users to evaluate the performance of their Redis configuration and hardware. By adjusting parameters like the number of parallel connections and the number of requests to be sent, `redis-benchmark` helps identify performance bottlenecks, optimize configurations, and assess the impact of changes to the Redis environment, making it a valuable tool for capacity planning and performance tuning.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Benchmark Documentation", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/optimization/benchmarks/", + "type": "article" + }, + { + "title": "How to benchmark the performance of a Redis server", + "url": "https://www.digitalocean.com/community/tutorials/how-to-perform-redis-benchmark-tests", + "type": "article" + } + ] }, "2p5RF4lVYfRvYTo1Ofm-a": { "title": "Monitoring", - "description": "", - "links": [] + "description": "Monitoring in Redis involves tracking the health, performance, and resource usage of the server to ensure optimal operation and early detection of issues. Tools and commands like `INFO` (providing statistics on memory, CPU, and clients), `MONITOR` (real-time command tracking), and `SLOWLOG` (logging slow queries) offer insights into server activity. Additionally, external tools like Redis Sentinel, Prometheus, and Grafana are often integrated for more comprehensive monitoring, alerting, and visualization. Effective monitoring helps maintain stability, optimize performance, and troubleshoot potential bottlenecks, making it crucial for managing Redis deployments at scale.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Monitoring with metrics and alerts", + "url": "https://redis.io/docs/latest/operate/rs/clusters/monitoring/", + "type": "article" + }, + { + "title": "MONITOR Documentation", + "url": "https://redis.io/docs/latest/commands/monitor/", + "type": "article" + } + ] }, "hLIT00Iz7rV56ZBIUhWYn": { "title": "Redis Modules", - "description": "", + "description": "Redis Modules are extensions that enhance the core functionality of Redis by adding new data types, commands, and capabilities. These modules allow developers to customize and extend Redis to better fit specific application needs without modifying the core Redis source code. Examples of popular Redis Modules include:\n\n1. **RediSearch**: Provides full-text search capabilities, allowing for indexing and querying data with complex search queries.\n2. **RedisGraph**: Adds graph database capabilities, enabling the storage and querying of graph data using the Cypher query language.\n3. **RedisJSON**: Facilitates the handling of JSON data structures, allowing for storage, retrieval, and manipulation of JSON documents within Redis.\n4. **RedisTimeSeries**: Optimized for time-series data, offering features for storing, querying, and aggregating time-stamped data efficiently.\n5. **RedisAI**: Integrates artificial intelligence capabilities, allowing for the execution of machine learning models directly within Redis.\n\nThese modules enable users to leverage Redis for a wide variety of use cases, from real-time analytics and search functionalities to complex data relationships and machine learning, while maintaining the performance and simplicity of Redis as an in-memory database.", "links": [] }, "jicsfYw56VrbRUt7M8c85": { "title": "RedisJSON", - "description": "", - "links": [] + "description": "RedisJSON is a Redis module that enables the storage, retrieval, and manipulation of JSON documents directly within Redis. It provides a rich set of commands for working with JSON data structures, allowing users to perform operations such as adding, updating, and querying JSON documents efficiently. With RedisJSON, users can store complex nested data and perform queries on specific fields, making it ideal for applications that require handling structured data without the need for additional data transformation or processing layers. Key features include support for JSONPath querying, atomic updates, and the ability to index JSON fields for faster retrieval. This module enhances Redis's capabilities, making it a suitable choice for use cases like real-time analytics, configuration management, and any application that benefits from the flexibility and performance of JSON data structures. Overall, RedisJSON allows developers to leverage the speed of Redis while working with JSON natively, streamlining data management in modern applications.\n\nLearn more from the following resources:", + "links": [ + { + "title": "RedisJSON/RedisJSON - RedisJSON Module on GitHub", + "url": "https://github.com/RedisJSON/RedisJSON", + "type": "opensource" + }, + { + "title": "RedisJSON", + "url": "https://redis.io/json/", + "type": "article" + } + ] }, "_GdTXcJO8uJlhPdfrmeXG": { "title": "Search", - "description": "", - "links": [] + "description": "Redis Search enhances the Redis experience by offering a robust set of search and query features, including a rich query language, incremental indexing for JSON and hash documents, vector search, full-text search, geospatial queries, and aggregations. These capabilities allow Redis to function as a document database, vector database, secondary index, and search engine, making it suitable for a variety of applications.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Search and Query", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/stack-with-enterprise/search/", + "type": "article" + }, + { + "title": "Querying, Indexing and Full-text Search in Redis", + "url": "https://www.youtube.com/watch?v=infTV4ifNZY", + "type": "video" + } + ] }, "RBr8opWSh2TKXC8Fmdg0j": { "title": "RedisTimeSeries", - "description": "", - "links": [] + "description": "RedisTimeSeries is a Redis module specifically designed for efficiently storing, querying, and managing time-series data, making it ideal for applications such as IoT monitoring, financial data analysis, and real-time analytics. It allows users to easily ingest time-stamped data, perform aggregations, and retrieve data across specified time intervals with minimal latency. The module supports features like automatic downsampling, retention policies, and powerful querying capabilities, enabling users to analyze trends and patterns over time while efficiently storing metadata alongside the time-series data.\n\nLearn more from the following resources:", + "links": [ + { + "title": "RedisTimeSeries", + "url": "https://redis.io/timeseries/", + "type": "article" + }, + { + "title": "Time Series Documentation", + "url": "https://redis.io/docs/latest/develop/data-types/timeseries/", + "type": "article" + } + ] }, "GwVL5CvbnHsiWb1hVh7lK": { "title": "RedisBloom", - "description": "", - "links": [] + "description": "RedisBloom is a Redis module that extends the capabilities of Redis by introducing probabilistic data structures, allowing for efficient membership testing and counting while minimizing memory usage. It provides tools such as Bloom Filters, Cuckoo Filters, Count-Min Sketches, and HyperLogLogs, enabling developers to manage large datasets with high performance and low memory overhead. With Bloom Filters, for instance, users can quickly determine if an element is possibly in a set or definitely not, making it useful for applications like web caching, spam filtering, and network security. Cuckoo Filters offer similar functionality but allow for the deletion of items. Count-Min Sketches enable approximate counting of elements in a dataset, while HyperLogLogs provide efficient cardinality estimation. RedisBloom is particularly beneficial for use cases involving big data analytics, real-time monitoring, and applications requiring high throughput with limited memory resources.\n\nLearn more from the following resources:", + "links": [ + { + "title": "RedisBloom/RedisBloom - RedisBloom on GitHub", + "url": "https://github.com/RedisBloom/RedisBloom", + "type": "opensource" + }, + { + "title": "RedisBloom", + "url": "https://redis.io/probabilistic/", + "type": "article" + } + ] }, "giyKPtQ-pziA064P8OQD-": { "title": "redis.conf", - "description": "", - "links": [] + "description": "`redis.conf` is the configuration file used by Redis to set up server parameters and customize its behavior. This file allows administrators to specify various settings, including memory limits, persistence options (like RDB and AOF), network configurations (such as port and binding addresses), and security features (like password protection and access control). Key parameters within `redis.conf` include `maxmemory`, which sets the maximum amount of memory Redis can use, `save`, which defines RDB snapshot intervals, and `requirepass`, which enables password authentication for client connections.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Configuration Documentation", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/config/", + "type": "article" + }, + { + "title": "Redis Configuration File Example", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/config-file/", + "type": "article" + } + ] }, "wXRDsNGFckXV_CSiit5sN": { "title": "Backup and Recovery", @@ -882,17 +1911,39 @@ }, "Cb-KazR4PuR86VX5oT0zi": { "title": "Upgrading Redis", - "description": "", - "links": [] + "description": "Upgrading Redis typically involves careful planning and execution to ensure minimal downtime and data integrity. The process generally includes backing up your data, installing the new Redis version, updating configuration files to accommodate any new settings or deprecated options, and restarting the Redis server.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Administration", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/admin/", + "type": "article" + }, + { + "title": "Upgrading or Restarting a Redis instance without downtime", + "url": "https://redis.io/docs/latest/operate/oss_and_stack/management/admin/#upgrading-or-restarting-a-redis-instance-without-downtime", + "type": "article" + } + ] }, "nUIfTkgm3PlSiqgun1BS7": { "title": "Disaster Recovery", - "description": "", - "links": [] + "description": "Disaster recovery in Redis involves strategies and practices to ensure data availability and integrity in the event of failures, such as server crashes, data corruption, or network issues. Key approaches include leveraging Redis's built-in replication, where data is copied from master to replica nodes for redundancy. Snapshots (RDB) and append-only file (AOF) persistence methods can be configured for data recovery, allowing the restoration of data to a recent state. Additionally, implementing a Redis Cluster can provide automated failover capabilities, distributing data across multiple nodes to minimize downtime and ensure business continuity. Regular backups and monitoring are also essential components of a robust disaster recovery plan.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Backup Disaster Recovery", + "url": "https://redis.io/redis-enterprise/technology/backup-disaster-recovery/", + "type": "article" + }, + { + "title": "Disaster Recovery for Redis in the Cloud", + "url": "https://www.alibabacloud.com/tech-news/a/redis/gtu8u2afbc-disaster-recovery-for-redis-in-the-cloud-strategies-and-best-practices", + "type": "article" + } + ] }, "8lyXDuZJ-KHl4v2_8Ew1h": { "title": "Redis Enterprise", - "description": "", + "description": "Redis Enterprise is a commercial offering that extends the capabilities of open-source Redis with advanced features designed for high availability, scalability, and performance in enterprise environments. It provides automatic sharding and replication, allowing for seamless horizontal scaling across multiple nodes and data centers. Redis Enterprise supports various deployment options, including on-premises, cloud, and hybrid environments, and offers enhanced data persistence options like active-active geo-distribution for global applications. Additionally, it includes advanced security features, such as role-based access control (RBAC), encryption, and audit logging, along with built-in monitoring and management tools. Redis Enterprise is particularly suited for mission-critical applications that require low-latency access to data and robust data management capabilities, making it ideal for use cases like real-time analytics, session management, and caching.", "links": [] }, "cybF72wlJyJbHLUjitLvn": { @@ -913,17 +1964,55 @@ }, "sWOFnbh2EyaHRzquz1UeF": { "title": "Redis on Flash", - "description": "", - "links": [] + "description": "Redis on Flash is a feature of Redis Enterprise that allows users to extend the memory capacity of their Redis instances by utilizing SSDs (Solid State Drives) alongside traditional RAM. This enables organizations to store larger datasets at a lower cost while maintaining the high performance that Redis is known for. In this configuration, frequently accessed data remains in RAM for fast access, while less frequently used data can be stored on Flash storage. Redis on Flash intelligently manages the data placement between memory and Flash, ensuring that performance is optimized by leveraging the speed of in-memory operations while still allowing for the efficient storage of larger datasets. This capability is particularly beneficial for use cases involving large-scale applications, such as caching, real-time analytics, and high-throughput data processing, as it allows organizations to handle big data workloads without the need for extensive investments in additional RAM.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis on Flash", + "url": "https://redis.io/blog/redis-on-flash-now-3-7x-faster/", + "type": "article" + }, + { + "title": "Redis on Flash Data Sheet", + "url": "https://media.trustradius.com/product-downloadables/1V/DT/TCXS6PSOA64L.pdf", + "type": "article" + } + ] }, "ujs77bV8g8-FOm5hBtZFd": { "title": "Security and Compliance", - "description": "", - "links": [] + "description": "Security and compliance in Redis involve implementing various measures to protect data, ensure secure access, and adhere to relevant regulatory standards. Redis provides several built-in security features, such as password authentication using the `requirepass` directive, which restricts access to authorized users only. Additionally, Redis supports TLS/SSL encryption, allowing for secure communication between clients and the server, protecting data in transit from eavesdropping and tampering. Access control can be further enhanced through Redis's Access Control Lists (ACLs), which allow administrators to define user roles and permissions, controlling which commands users can execute and which keys they can access. It’s also important to configure Redis to bind to trusted network interfaces, limiting exposure to potential threats.\n\nLearn more from the following resources:", + "links": [ + { + "title": "Redis Security Documentation", + "url": "https://redis.io/docs/latest/operate/rs/security/", + "type": "article" + }, + { + "title": "How to Secure Redis", + "url": "https://goteleport.com/blog/secure-redis/", + "type": "article" + }, + { + "title": "Rediscover Redis Security", + "url": "https://www.youtube.com/watch?v=oD8k3ymbfkY", + "type": "video" + } + ] }, "JlLwy69eQ1bPHAOOJNqjo": { "title": "When to consider enterprise?", - "description": "", - "links": [] + "description": "Redis Enterprise is typically considered when an organization requires enhanced scalability, high availability, and advanced features beyond what open-source Redis provides. It's particularly valuable for large-scale applications with demanding performance requirements, complex architectures, or mission-critical deployments.\n\nLearn more from the following resources:", + "links": [ + { + "title": "About Redis Enterprise", + "url": "https://redis.io/about/redis-enterprise/", + "type": "article" + }, + { + "title": "Redis Enterprise Website", + "url": "https://redis.io/enterprise/", + "type": "article" + } + ] } } \ No newline at end of file diff --git a/public/roadmap-content/software-architect.json b/public/roadmap-content/software-architect.json index fe0fa2675..3173fc73e 100644 --- a/public/roadmap-content/software-architect.json +++ b/public/roadmap-content/software-architect.json @@ -1392,8 +1392,14 @@ }, "hRug9yJKYacB9X_2cUalR": { "title": "PMI", - "description": "", - "links": [] + "description": "The PMI certification (Project Management Institute) is an internationally recognized credential in project management. The most well-known is the PMP® (Project Management Professional), which validates the skills and knowledge of professionals to manage projects effectively by applying best practices and standards defined in the PMBOK® (Project Management Body of Knowledge) guide.\n\nVisit the following resources to learn more:", + "links": [ + { + "title": "Project Managment Institute", + "url": "https://www.pmi.org/", + "type": "article" + } + ] }, "Rq1Wi-cHjS54SYo-Btp-e": { "title": "ITIL", @@ -1418,8 +1424,14 @@ }, "7rudOREGG-TTkCosU0hNw": { "title": "RUP", - "description": "", - "links": [] + "description": "The RUP (**Rational Unified Process**) is not a widely recognized certification like PMP or Scrum, but rather a software development framework created by Rational Software (now IBM). It follows an iterative and incremental approach to project development, based on best practices for delivering high-quality software on time and within budget.\n\nVisit the following resources to learn more:", + "links": [ + { + "title": "IBM certified solution designer RUP", + "url": "https://www.ibm.com/training/certification/ibm-certified-solution-designer-ibm-rational-unified-process-v70-38008003", + "type": "article" + } + ] }, "qwpsGRFgzAYstM7bJA2ZJ": { "title": "LeSS",