iChue

18K posts

iChue banner
iChue

iChue

@vavar

Solution Architect / Technical Project Manager / Developer / Casual Social Gamer / Noob :)

Nonthaburi, Thailand Katılım Mayıs 2008
522 Takip Edilen275 Takipçiler
iChue
iChue@vavar·
python ที่ one liner ได้ ก็เพราะ code ทั้งหมดอยู่ใน pip หมดแล้ว
ไทย
0
0
0
12
iChue retweetledi
SD Gundam G Generation ETERNAL【Official】
#GundamEternal Cherished Memories Campaign Post with the hashtag #GGenerationMemories Today's topic is... ・Tell us which Units you have SP converted Point Acquisition Deadline: Until 10/1 12:00 (JST) #GundamEternal #G世代 #G世代永恆 #SD건담지제네레이션이터널 Half Anniversary Unit Assembly (Up to 46 Free Pulls): Starts Sept. 30! ※The global version of the campaign is being conducted on a site with English notation. Also, some features require an X account. ⇩Click here to participate! gget-halfanniv-ww.rooot.fan
SD Gundam G Generation ETERNAL【Official】 tweet media
English
924
620
1.8K
59K
iChue retweetledi
Alex Xu
Alex Xu@alexxubyte·
The Generative AI Tech Stack
Alex Xu tweet media
English
47
354
2.3K
240.9K
iChue
iChue@vavar·
หรือว่าเราใช้ชีวิตยากไปนะ …
ไทย
0
0
0
56
iChue retweetledi
Vlad Mihalcea
Vlad Mihalcea@vlad_mihalcea·
Applying the high scalability tips from Google and Netflix software architectures to your trivial project.
Vlad Mihalcea tweet media
English
35
643
5.2K
321.9K
iChue retweetledi
Alex Xu
Alex Xu@alexxubyte·
Log Parsing Cheat Sheet. The method to download the high-resolution PDF is available at the end. The diagram below lists the top 6 log parsing commands. 1. GREP GREP searches any given input files, selecting lines that match one or more patterns. 2. CUT CUT cuts out selected portions of each line from each file and writes them to the standard output. 3. SED SED reads the specified files, modifying the input as specified by a list of commands. 4. AWK AWK scans each input file for lines that match any of a set of patterns. 5. SORT SORT sorts text and binary files by lines. 6. UNIQ UNIQ reads the specified input file comparing adjacent lines and writes a copy of each unique input line to the output file. These commands are often used in combination to quickly find useful information from the log files. For example, the below commands list the timestamps (column 2) when there is an exception happening for xxService. grep “xxService” service.log | grep “Exception” | cut -d” “ -f 2 Over to you: What other commands do you use when you parse logs? – Subscribe to our newsletter to download the 𝐡𝐢𝐠𝐡-𝐫𝐞𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧 𝐏𝐃𝐅. After signing up, find the download link on the success page: bit.ly/ByteByteGoLogp…
English
9
202
806
103.6K
iChue
iChue@vavar·
ผ่าพิภพ Tablet จีน ... ข้อเตือนใจก่อนซื้อ/ดูแลรักษา dlvr.it/SvxNgQ
ไทย
0
0
0
50
iChue
iChue@vavar·
❌เก็บข้อมูลบน db เพื่อออก report ✅ เก็บข้อมูลบน db สำหรับ 24-hrs temporary data
0
0
0
45
iChue
iChue@vavar·
หรือ design เรามันเก่าไปแล้วนะ เค้า handle soft delete user กันแบบไหนเหรอ
0
0
0
43
iChue
iChue@vavar·
ทำงานไม่ตรง role มาจะ 5 เดือน .... จะเอาไปเขียน cv ยังไงนะ ...
ไทย
0
0
0
84
iChue
iChue@vavar·
8.8 รอบนี้ laz อย่างโหด ... สั่งเที่ยงคืน ... เที่ยงวันมาส่งแล้ว
ไทย
0
0
0
50
iChue retweetledi
Alex Xu
Alex Xu@alexxubyte·
OAuth 2.0 Explained With Simple Terms. OAuth 2.0 is a powerful and secure framework that allows different applications to securely interact with each other on behalf of users without sharing sensitive credentials. The entities involved in OAuth are the User, the Server, and the Identity Provider (IDP). What Can an OAuth Token Do? When you use OAuth, you get an OAuth token that represents your identity and permissions. This token can do a few important things: Single Sign-On (SSO): With an OAuth token, you can log into multiple services or apps using just one login, making life easier and safer. Authorization Across Systems: The OAuth token allows you to share your authorization or access rights across various systems, so you don't have to log in separately everywhere. Accessing User Profile: Apps with an OAuth token can access certain parts of your user profile that you allow, but they won't see everything. Remember, OAuth 2.0 is all about keeping you and your data safe while making your online experiences seamless and hassle-free across different applications and services. Over to you: Imagine you have a magical power to grant one wish to OAuth 2.0. What would that be? Maybe your suggestions actually lead to OAuth 3. – Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): bit.ly/42Ex9oZ
Alex Xu tweet media
English
38
1.3K
4.9K
459K
iChue
iChue@vavar·
IT Sec ก็ไม่ใช่ , CTO ก็ไม่ใช่ เป็นแค่ TL แต่ไปขอ policy / standard / procedure เป็นเราเวลาโดนขอจะรู้สึกยังไงนะ
ไทย
0
0
0
43
iChue
iChue@vavar·
ไม่เกี่ยงงานนะ ถ้าจะให้ทำ IT Governance แต่ปัญหาคือ role มันไม่ใช่ไง ขอความช่วยเหลือใคร เค้าก็ต้องดู role ก่อนไหมนะ ใครเค้าจะให้นะ
ไทย
1
0
0
65
iChue retweetledi
Ilya · イリア
Ilya · イリア@ilyamiskov·
This video by Apple is literally motion design porn.
English
195
2.8K
20.5K
2.3M
iChue
iChue@vavar·
ทำเอกสารมาจะ 4 เดือน ... ยังหาความสนุกกับการทำ word / excel / PowerPoint ไม่ได้เลย
ไทย
0
0
0
63
iChue retweetledi
Massimo
Massimo@Rainmaker1973·
Keikyu Aburatsubo Marine Park near Tokyo and the Dubai Aquarium offer unique encounters where the otters can place their little paws through holes in the glass [read more: buff.ly/448ZGDX] twitter.com/SjamaanN/statu…
English
201
1.7K
18.1K
5M