brief introduction to java generation memory
Java VM uses a generational garbage collector, which relies on the below two observations: Most allocated objects will become unreachable quickly There are few references […]
Read More →Java VM uses a generational garbage collector, which relies on the below two observations: Most allocated objects will become unreachable quickly There are few references […]
Read More →In Oracle, the ‘select’ statement must have a ‘from’ clause. However, some queries don’t require any table. They just perform some operation or calculation based […]
Read More →maven supports parent-child relationship, where the configuration of the parent project is inherited by the child project. This relationship is specified using the <parent> element […]
Read More →Symmetric Key Cryptography is used to transfer a message securely between two endpoints using a shared secret key. The message is encrypted using a shared […]
Read More →In an interview, one may be asked how an security connection is established between two endpoints using TLS protocol. He may answer the below steps: […]
Read More →These days I read a few articles about Transport Layer Security (TLS) protocol. I found two articles that are good enough to dive into the […]
Read More →Today I tried to run foxit reader installer in my Ubuntu Linux as root account. I got the below error message: QXcbConnection: Could not connect […]
Read More →