VM Instance

Redis Server on Oracle 8.4

Redis is used by the most highly trafficked websites in the world for mission critical database management and caching, especially when low latency is required. Redis uses hashtable data structures for data storage in RAM (Random Access Memory). It allows sub-millisecond retrieval by bypassing reads from a Hard Disk Drive (HDD) or Solid State Drive (SSD). It offers extensibility through modules and high availability with automatic failover. Highly scalable with partition and sharding capabilities for clusters. The large repository of clients and libraries support Python, Java, PHP, Perl, Go, Ruby, C/C#/C++, JavaScript, Node.js, and many more. 

Get it on Azure

Redis is short for Remote Dictionary Server because it uses dictionary key-value data model as its relational database structure. Redis values can be a string, array, set, hash, bitmap, Hyperloglog, or other complex data type. Strings in Redis store any object, including images, because they are binary safe. 

Redis has multiple module, Command Line Interface (CLI), and Graphical User Interface (GUI) tools to augment the user experience. CLI commands in the Read Evaluate Print Loop (REPL) mode enable basic line editing functions for simplicity. It supports Publish/Subscribe (PubSub) functions and continuous execution of commands for monitoring. The CLI can export data to CSV files, manipulate data types, and execute scripts on the server from file. 

Redis scales to any size dataset without performance loss using a tiered combination of flash memory, SSD, and Dynamic random-access memory (DRAM) based on data size, usage frequency, and throughput speed. Data persists by writing to disk (HDD/SSD) as snapshots or append only files (AOF) to provide atomicity in operations. 

A fully managed Redis service can be deployed on premise, cloud, or hybrid. Operating systems compatible with Redis include most POSIX systems, Linux Berkely Software Distribution (BSD), Mac OS X, and Windows. 

Ntegral certified images are always up-to-date, secure, and built to work right out of the box. 

Ntegral packages applications following industry standards, and continuously monitors all components and libraries for vulnerabilities and application updates. When any security threat or update is identified, Ntegral automatically repackages the applications and pushes the latest versions to the cloud marketplaces.