- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 622 Articles for Data Storage
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
206 Views
Introduction Navigating the complex world of distributed databases can feel like a daunting task, especially when it comes to managing transactions. Did you know that successful transaction management ensures data integrity and consistency across multiple nodes in a system? This article will provide an in-depth overview of transaction management in distributed databases, breaking down its core components and illustrating its importance. What is Transaction Management in Distributed Databases? Transaction Management in Distributed Databases is a pivotal process that ensures database operations are performed accurately and reliably. It essentially deals with the administration of transactions occurring in a distributed database environment, ... Read More
![sudhir sharma](https://www.tutorialspoint.com/assets/profiles/125719/profile/60_65058-1565947418.jpg)
95 Views
Introduction Whenever we deal with the data storage can often feel frustrating, especially as files grow in size and our need for required space expands. Did you happen to know that there is a simple storage solution called 'Just a Bunch Of Disks' or JBOD that might be what your system needs? This article will guide you through an overview of JBOD, helping to clarify its benefits and when it may be suggested to prefer over other configurations for example, RAID. What is JBOD? The option for data storage, JBOD, short for "Just a Bunch Of Disks, " refers like ... Read More
![Aarti Kaushik](https://www.tutorialspoint.com/assets/profiles/746298/profile/60_2685203-1697777482.jpeg)
297 Views
In this article, we are going to study Rename and Alias. Both these have their specific role when we talk in terms of DBMS. Renaming and aliases to the elements of the database provide a layer of abstraction and make the attributes of the relation presentable for the viewer. Mostly, Database store crucial information the concepts of renaming and aliasing plays an important role in representing data with efficiency. Let's gain an understanding of these concepts, their syntax, and the difference between them. What is Alias? Alias is an alternative name given to a column in the database Management System. This practice ... Read More
![Shirjeel Yunus](https://www.tutorialspoint.com/assets/profiles/612930/profile/60_285618-1678179898.jpg)
71 Views
What is Acronis Cyber Protect Home Office? Acronis Cyber Protect Home Office is a solution to protect all your data which may include documents, images videos, audio, and a lot more. You can also secure your entire disk which may include operating system, system files, applications and their settings, etc. Data protection and security are the main benefits of this platform. You can also take backups so that files and data can be restored in case of a disaster. You can also take online backups and the data will be stored on Acronis Cloud. Why Acronis Cyber Protect Home Office ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
457 Views
Introduction In context of distributed systems, exception handling refers to process of detecting, diagnosing, and recovering from errors that occur in a distributed system. In such systems, errors can occur at any point in communication and coordination process, including network failures, hardware malfunctions, and software bugs. Thus, effective exception handling is crucial to ensure reliability and availability of a distributed system. In this article, we will explore various techniques and best practices for exception handling in distributed systems. Importance of Exception Handling in Distributed Systems In a distributed system, multiple processes run on different machines and communicate with each other ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
2K+ Views
Introduction Distributed computing systems refer to a network of interconnected devices that share resources and work together to achieve a common goal. evolution of distributed computing systems has been rapid, and it has transformed way we use technology in our daily lives. From simple file sharing systems to advanced cloud computing, distributed computing systems have come a long way. In this article, we will discuss evolution of distributed computing systems and explore some of examples. Early Days of Distributed Computing The early days of distributed computing can be traced back to 1960s, where researchers began experimenting with idea of sharing ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
1K+ Views
Introduction Distributed systems have become an integral part of our modern-day technological infrastructure. They have made it possible to deliver services at scale, provide better resilience, and enable better fault tolerance. However, designing distributed systems is a challenging task, and one of most significant challenges is maintaining ordering of events in system. This article will discuss event ordering in distributed systems and provide examples of different techniques used to achieve it. Event Ordering Event ordering is essential in distributed systems because it determines order in which events occur. In a distributed system, events can happen concurrently on different nodes, and ... Read More
![Hardik Gupta](https://www.tutorialspoint.com/assets/profiles/603247/profile/60_3328109-1676611356.jpeg)
235 Views
Open Database Connectivity (ODBC) is a common API (Application Programming Interface) that enables programmes to connect to different database management systems (DBMS) using a standardised interface. Regardless of how a database's native interface is configured, the ODBC interface offers a consistent mechanism for programmes to communicate with it. The connectivity of ODBC, including its design, drivers, and connections, will be examined in more detail in this article. ODBC Architecture Flow Diagram of ODBC Architecture The three primary parts of the ODBC architecture are the application, the ODBC Driver Manager, and the ODBC driver. Each piece of software that needs ... Read More
![Hardik Gupta](https://www.tutorialspoint.com/assets/profiles/603247/profile/60_3328109-1676611356.jpeg)
58 Views
In conclusion, creating a Cassandra cluster entails selecting the seed nodes, setting the replication factor, configuring the IP addresses and ports for each cluster node, as well as additional configuration options like the cluster name. The main configuration file for Cassandra clusters is the cassandra.yaml file. Cassandra clusters may offer high availability and fault tolerance for massive volumes of data with the proper configuration. You may effectively configure a Cassandra cluster to suit your unique requirements by adhering to the syntax and examples shown in this article. Syntax UPDATE table_name SET column1 = value1, column2 = value2, ... WHERE condition; ... Read More
![Hardik Gupta](https://www.tutorialspoint.com/assets/profiles/603247/profile/60_3328109-1676611356.jpeg)
335 Views
View-equivalence is a term used in database management systems to describe the circumstance in which two schedules, when applied to the same database, yield the same result set. This requirement is necessary to guarantee data correctness and consistency in database applications. There are requirements that schedules must meet in order to achieve view equality. These circumstances are − Conflict Serializability − The conflicting operations in a schedule must be performed in the same sequence for it to be conflict serializable. Operations that access the same data item and at least one of which affects the data are said to ... Read More