
Coding matters: What the real hacker looks like
Jacqui shares some recent revelations about what real hackers look like. It’s not what you expect.
Jacqui shares some recent revelations about what real hackers look like. It’s not what you expect.
Lewis looks at how to walk a file tree in Java with the walkFileTree() method and the FileVIsitor interface.
Here’s a quick recap on those abbreviations: POPIA: Protection of Personal Information Act. That’s the law that protects your right to privacy – like GDPR in Europe. PAIA: Public Access to Information Act. This law aims to create transparency and accountability in public and private bodies. Yet another data breach
Project managers in the software industry should be familiar with the concept of the “mythical man-month”. Or what we should now call the person-month. Jacqui looks at an even more mythical version of it, courtesy of ChatGPT.
In the final part of this series on memory leaks in Java, Lewis takes a look at the JDK Flight Recorder and JDK Mission Control tools. Together these create a complete tool chain to continuously collect detailed runtime information.
The frenzy about AI and ChatGPT makes me wonder how long until more fiction becomes reality. Androids and cyborgs have been part of stories and movies for decades. The traditional definition is that androids are robots that look and act like humans. Cyborgs are humans augmented with machine or computer
Now that you know about some of the causes of memory leaks in your Java program, Lewis takes a quick look at profilers and other tools that can help you, in particular VisualVM and JConsole.
The fashion industry isn’t the only industry where it is hard to keep up with trends. Sometimes technology leaves us confused: stuck somewhere between outdated and bleeding edge. Is this new tech just another bright shiny object? Or are we already late to the party? The bleeding edge The Miriam-Webster
Lewis looks at how you can use the verbose output from the garbage collector to find memory leaks in your Java program.
In part 4 of this series on memory leaks in Java, Lewis looks at how incorrect or missing equals() and hashCode() methods can cause memory leaks.
Stay home. Stay safe. Stay informed. Find information at www.sacoronavirus.co.za
Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)
Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.
If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com