Skip to main content

HSQLDB

HSQLDB

It's been almost two years I've been using HSQLDB in one of my client-critical application.
When I was given the task of working on this application (which was already in production), main challenge was to reduce latency and also to make it flexible enough to accommodate any future use-cases.

Without going into to much details, here's my use-case:
  • Application receives data from multiple sources
  • Parse data from each source and extract required data
  • Aggregate this extracted data and find best candidate which satisfies certain rules

One simplest solution is to join data from all sources by having a (for-)loop, one each for a source and apply rules inside inner-most loop. As number of data sources increases, so does the latency.
HSQLDB came to my rescue. I used in-memory variant, as the data is non more required, once a candidate is found.

Data extracted from each source is stored into DB (from here on, DB => in-memory HSQLDB), wherein we have one table each for a data source.

Here come the best part.
Now all my rules for computation are mere SQL queries. Instead of going through the code, one can easily understand the rules by looking at this SQL queries.
By adding proper indices, which can be done by simple annotations, we can perform any complex query in almost no time (subject to the size of data).
It also comes with one more added benefit, flexibility. We can add/modify rules with almost no effort.

HSQLDB has a huge community and all your queries, if any, would have been already answered.

Please share your comments/queries below.
Will add samples and mocks, if required.

Comments

Popular posts from this blog

Reverse Engineering : Extract contents from .img file

Unyaffs is a program to extract files from a YAFFS2 file system image. Currently it can only extract images created by mkyaffs2image. Download the source from here . Compiling : Extract the contents into a suitable place and run the following command make Usage : unyaffs [options] <image_file_name> [<extract_directory>] Options: -d detection of flash layout, no extraction -b spare contains bad block information -c <chunk size> set chunk size in KByte (default: autodetect, max: 16) -s <spare size> set spare size in Byte (default: autodetect, max: 512) -t list image contents -v verbose output -V print version Source: Official github repository

Mac Yosemite : Ugly turned out to be Uglier and Ugliest

You might have read my review on Mac OSX Yosemite , The Good, bad and ugly. Now it turned out to be UGLIEST. No more words. Here's the image. If you are on Yosemite, you might be familiar with it. Most of the times, you get stuck on boot logo. I've seen complaints regarding it saying that fellow members are ignorant of it and they deny such possibility, even though many are still facing it. Workarounds suggested by our online friends: Just reboot your mac as many times it takes to your desktop. Boot into safe mode, by holding SHIFT and then reboot. Comment your workaround below, mine is the first one. If you are still on Mavericks, be there till Apple provides a fix for this.

Reverse Engineering : Android Dex files to Class files

In my previous post, we have seen how to extract the contents of img file . After extraction, you will find that most of the files have ".dex" extension. These are Compiled Android application code files. In order to convert them into executable format (.class or .jar), you can use dex2jar tool. Extract it to a proper location and open the terminal to this location. Now run the following command: ./d2j-dex2jar.sh <Path-to-dex_file> It will bundle the dex files into a jar file, and stores it in the current directory. dex2jar can also be used to convert dex files into variuos other formats. For detailed info, click here .