Solved

Priority Algorithm for cache management in Java

Posted on 2006-07-14
9
337 Views
Last Modified: 2013-12-03
Hi,

Far faster respone to database queries, I need to have a Cache in Java that mirrors the database. Now, this cache should be intelligent enough to determine:

1. what kind of data is queries very often and keep that at the top far faster access.
2. Should synch with database automatically after certain interval so as to avoaid staleness of the data.
3. Other components should push certain data changes/updates  to this cache and the cache should in turn synchronise the database.

Appreciate any idea/code how to implement such a cach and the underlying smart algorithm??

Thanks,
Vinay AGgarwal.
0
Comment
Question by:Vinay_enjoy
9 Comments
 
LVL 86

Accepted Solution

by:
CEHJ earned 84 total points
ID: 17107014
Ofbiz?
0
 
LVL 24

Assisted Solution

by:sciuriware
sciuriware earned 83 total points
ID: 17107053
You might try EHCACHE but you're surely asking much.

;JOOP!
0
 
LVL 35

Assisted Solution

by:girionis
girionis earned 83 total points
ID: 17107359
Hi Vinay_enjoy

a few free caching solutions can be found here: http://www.manageability.org/blog/stuff/distributed-cache-java/view

Cheers
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 26

Expert Comment

by:ksivananth
ID: 17111082
what about hibernate solutins!
0
 

Author Comment

by:Vinay_enjoy
ID: 17119605
Hi ksivananth ,

Problem with Hibernate is:

1. May not be able to handle large volume of data as cache.

2. It anyway needs smart algorithm for :
  2.1 what kind of data is queries very often and keep that at the top far faster access.
  2.2 Should synch with database automatically after certain interval

Thanks,
Vinay.
0
 
LVL 24

Expert Comment

by:sciuriware
ID: 17362969
OK
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Java contains several comparison operators (e.g., <, <=, >, >=, ==, !=) that allow you to compare primitive values. However, these operators cannot be used to compare the contents of objects. Interface Comparable is used to allow objects of a cl…
Introduction This article is the second of three articles that explain why and how the Experts Exchange QA Team does test automation for our web site. This article covers the basic installation and configuration of the test automation tools used by…
Viewers will learn about the different types of variables in Java and how to declare them. Decide the type of variable desired: Put the keyword corresponding to the type of variable in front of the variable name: Use the equal sign to assign a v…
This theoretical tutorial explains exceptions, reasons for exceptions, different categories of exception and exception hierarchy.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now