Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Agreed, and I'm over in the corner sharpening an axe, looking at Redis with highly malicious intent, too. I think many of the things people use Redis for could be accomplished with a small postgres server and a decent schema e.g. `create table redislike (id bigserial primary key, contents jsonb);`


You can stuff some pretty insane stuff in Redis keys beside ints, giant multi MB strings with globby query patterns. Your general point is dead on.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: