Solved

Priority Algorithm for cache management in Java

Posted on 2006-07-14
9
338 Views
Last Modified: 2013-12-03
Hi,

Far faster respone to database queries, I need to have a Cache in Java that mirrors the database. Now, this cache should be intelligent enough to determine:

1. what kind of data is queries very often and keep that at the top far faster access.
2. Should synch with database automatically after certain interval so as to avoaid staleness of the data.
3. Other components should push certain data changes/updates  to this cache and the cache should in turn synchronise the database.

Appreciate any idea/code how to implement such a cach and the underlying smart algorithm??

Thanks,
Vinay AGgarwal.
0
Comment
Question by:Vinay_enjoy
9 Comments
 
LVL 86

Accepted Solution

by:
CEHJ earned 84 total points
ID: 17107014
Ofbiz?
0
 
LVL 24

Assisted Solution

by:sciuriware
sciuriware earned 83 total points
ID: 17107053
You might try EHCACHE but you're surely asking much.

;JOOP!
0
 
LVL 35

Assisted Solution

by:girionis
girionis earned 83 total points
ID: 17107359
Hi Vinay_enjoy

a few free caching solutions can be found here: http://www.manageability.org/blog/stuff/distributed-cache-java/view

Cheers
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 26

Expert Comment

by:ksivananth
ID: 17111082
what about hibernate solutins!
0
 

Author Comment

by:Vinay_enjoy
ID: 17119605
Hi ksivananth ,

Problem with Hibernate is:

1. May not be able to handle large volume of data as cache.

2. It anyway needs smart algorithm for :
  2.1 what kind of data is queries very often and keep that at the top far faster access.
  2.2 Should synch with database automatically after certain interval

Thanks,
Vinay.
0
 
LVL 24

Expert Comment

by:sciuriware
ID: 17362969
OK
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction Java can be integrated with native programs using an interface called JNI(Java Native Interface). Native programs are programs which can directly run on the processor. JNI is simply a naming and calling convention so that the JVM (Java…
Introduction This article is the first of three articles that explain why and how the Experts Exchange QA Team does test automation for our web site. This article explains our test automation goals. Then rationale is given for the tools we use to a…
This theoretical tutorial explains exceptions, reasons for exceptions, different categories of exception and exception hierarchy.
This tutorial will introduce the viewer to VisualVM for the Java platform application. This video explains an example program and covers the Overview, Monitor, and Heap Dump tabs.

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now