iChue
18K posts

iChue
@vavar
Solution Architect / Technical Project Manager / Developer / Casual Social Gamer / Noob :)
Nonthaburi, Thailand Katılım Mayıs 2008
522 Takip Edilen275 Takipçiler

#GundamEternal Cherished Memories Campaign
Post with the hashtag !!#GGenerationMemories
English
iChue retweetledi

#GundamEternal Cherished Memories Campaign
Post with the hashtag #GGenerationMemories
Today's topic is...
・Tell us which Units you have SP converted
Point Acquisition Deadline: Until 10/1 12:00 (JST)
#GundamEternal #G世代 #G世代永恆 #SD건담지제네레이션이터널
Half Anniversary Unit Assembly (Up to 46 Free Pulls): Starts Sept. 30!
※The global version of the campaign is being conducted on a site with English notation. Also, some features require an X account.
⇩Click here to participate!
gget-halfanniv-ww.rooot.fan

English
iChue retweetledi
iChue retweetledi
iChue retweetledi

Log Parsing Cheat Sheet. The method to download the high-resolution PDF is available at the end.
The diagram below lists the top 6 log parsing commands.
1. GREP
GREP searches any given input files, selecting lines that match one or more patterns.
2. CUT
CUT cuts out selected portions of each line from each file and writes them to the standard output.
3. SED
SED reads the specified files, modifying the input as specified by a list of commands.
4. AWK
AWK scans each input file for lines that match any of a set of patterns.
5. SORT
SORT sorts text and binary files by lines.
6. UNIQ
UNIQ reads the specified input file comparing adjacent lines and writes a copy of each unique input line to the output file.
These commands are often used in combination to quickly find useful information from the log files. For example, the below commands list the timestamps (column 2) when there is an exception happening for xxService.
grep “xxService” service.log | grep “Exception” | cut -d” “ -f 2
Over to you: What other commands do you use when you parse logs?
–
Subscribe to our newsletter to download the 𝐡𝐢𝐠𝐡-𝐫𝐞𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧 𝐏𝐃𝐅. After signing up, find the download link on the success page: bit.ly/ByteByteGoLogp…
English
iChue retweetledi

OAuth 2.0 Explained With Simple Terms.
OAuth 2.0 is a powerful and secure framework that allows different applications to securely interact with each other on behalf of users without sharing sensitive credentials.
The entities involved in OAuth are the User, the Server, and the Identity Provider (IDP).
What Can an OAuth Token Do?
When you use OAuth, you get an OAuth token that represents your identity and permissions. This token can do a few important things:
Single Sign-On (SSO): With an OAuth token, you can log into multiple services or apps using just one login, making life easier and safer.
Authorization Across Systems: The OAuth token allows you to share your authorization or access rights across various systems, so you don't have to log in separately everywhere.
Accessing User Profile: Apps with an OAuth token can access certain parts of your user profile that you allow, but they won't see everything.
Remember, OAuth 2.0 is all about keeping you and your data safe while making your online experiences seamless and hassle-free across different applications and services.
Over to you: Imagine you have a magical power to grant one wish to OAuth 2.0. What would that be? Maybe your suggestions actually lead to OAuth 3.
–
Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): bit.ly/42Ex9oZ

English
iChue retweetledi
iChue retweetledi
iChue retweetledi

Keikyu Aburatsubo Marine Park near Tokyo and the Dubai Aquarium offer unique encounters where the otters can place their little paws through holes in the glass
[read more: buff.ly/448ZGDX]
twitter.com/SjamaanN/statu…
English





