1. Home
  2. /
  3. Technology

Technology

What is happening across technology? Check out these carefully chosen highlights from PANDARON.COM

Editor's picks

Linux Prompt Cheatsheet: 45 Commands that Every Technologist Should Know

The Linux command line (often referred to as shell, terminal, console, prompt) is a text interface to your computer running one of the Linux operating systems. In here, we are trying to compile a fairly comprehensive list that covers various categories, including file management, system monitoring, network commands, and others, to serve as a foundational reference for you. This cheat sheet aims to provide a balanced mixture of commands - from the most commonly used to those that are crucial for specific troubleshooting and system management tasks.

How Your Database Stands Up to the Ultimate Reliability Check: ACID rules

For IT professionals in database management, grasping the core principles that protect our digital transactions is essential. Today, we're exploring the ACID model, a pivotal framework for ensuring transaction reliability and security. This goes beyond mere theoretical knowledge; it's vital for the smooth operation of diverse systems, from financial processes to social media platforms. We'll delve into the ACID principles and their critical role in real-world applications.

The CAP Theorem after two decades: where are we in 2024?

Databases are critical in managing information for applications, ensuring data is correctly stored, updated, and retrieved. In a single-node database, network partitions are not major concern. However, as systems grow in complexity and scale, while having data replicated across multiple nodes for redundancy and performance, challenges in maintaining data consistency, availability, and partition tolerance arise. This is where the CAP theorem becomes relevant, a fundamental principle that guides the design and operation of distributed systems. In this article, we are going to look closer at the CAP theorem as of 2024.

No More Memory Leaks: The Pro Strategies

Memory leaks are well-known challenges in the software engineering industry, affecting both seasoned professionals and leading-edge enterprise solutions. If you ask some industry veterans, they probably have some war stories to share about battling memory leaks. In this article, we'll break down the common ways memory leaks sneak into Java applications and provide you with the strategies to prevent them, safeguarding your application's performance.

Convert String to Date: The Java Ways

Converting strings to dates in programming is a common task that's more complex than it seems. This challenge is rooted in the wide range of date formats and the specifics of time zones. Converting a String to a Date in Java can be done in several ways, depending on the Java version you're using and whether you are incorporating external libraries. Below are the primary methods used in different versions of Java and through some commonly used external libraries.

Z Garbage Collector: What you should know

The Z Garbage Collector (ZGC) is a scalable low latency garbage collector. It designed to handle large heaps with minimal pause times. According to the official documentation, ZGC performs all expensive work concurrently, without stopping the execution of application threads for more than 10ms, which makes is suitable for applications which require low latency and/or use a very large heap up to terabytes.
1-2-1 ... 4