The document contains log data from user activities on a platform. There are three columns - user_id, event, and event_date. It logs the activities of 5 users over several days, including events like logins, posts, comments, views. It also includes some aggregated data on unique events and totals by user.
This document discusses hot and cold observables in RxSwift. It explains that subjects produce hot observables while operators produce cold observables. It provides examples of how cold observables resubscribe to source sequences while hot observables multicast their values to multiple observers. The document answers questions about the differences between hot and cold observable behavior.
This document discusses Yarn and its advantages over npm. It notes that Yarn uses yarn.lock files instead of npm-shrinkwrap.json files to lock down dependency versions. Yarn is also described as being faster, able to work offline by caching dependencies, and potentially more secure than npm with features like flat mode and module folders. The document suggests Yarn may handle dependencies and devDependencies differently than npm, and questions whether the yarn.lock file should be committed to source control.
This document discusses hot and cold observables in RxSwift. It explains that subjects produce hot observables while operators produce cold observables. It provides examples of how cold observables resubscribe to source sequences while hot observables multicast their values to multiple observers. The document answers questions about the differences between hot and cold observable behavior.
This document discusses Yarn and its advantages over npm. It notes that Yarn uses yarn.lock files instead of npm-shrinkwrap.json files to lock down dependency versions. Yarn is also described as being faster, able to work offline by caching dependencies, and potentially more secure than npm with features like flat mode and module folders. The document suggests Yarn may handle dependencies and devDependencies differently than npm, and questions whether the yarn.lock file should be committed to source control.
How to bake delicious cookie (RESTful Meetup #03)Toru Yamaguchi
?
Toru Yamaguchi gave a presentation on advanced cookie usage. He explained the differences between host cookies and domain cookies, and how the path attribute can be used to control where cookies are sent. He discussed how JSON web tokens (JWT) can be used for login sessions by embedding user agent information. Finally, he mentioned how transparent session state cookies allow for single logout between authorization servers and client applications.
1. The document discusses various issues that can cause failures when building APIs to access database systems, such as deadlocks from concurrent updates and purging data inconsistencies between master and slave databases.
2. It proposes solutions to these issues like using queues to defer updates, disabling binary logging to bypass replication, and partitioning or sharding data.
3. When building a friend timeline API, challenges include efficiently querying the necessary data across multiple database tables to return a paginated result with the total count. Solutions presented include using temporary tables and iteration in batches to query the data.
Inside mbga Open Platform API architectureToru Yamaguchi
?
The document describes a load balancer distributing requests across multiple lighttpd web servers running fastcgi applications. It also shows databases for user profiles and messages with memcached caching. Messages are enqueued into a message queue processed by worker processes and inserted into a replicated message database with a slave for high availability. Cached messages from previous lookups are stored in memcached for improved performance.
The document discusses OpenID authentication and describes the flow between an Identity Provider and OpenID Provider. It includes code snippets for retrieving an XRDS document from an OpenID and generating an HMAC signature. The overall document provides information about OpenID authentication standards and protocols.
El documento describe una reunión tecnológica sobre OpenID. La reunión incluirá presentaciones sobre temas relacionados con OpenID como autenticación y autorización. También habrá tiempo para preguntas y discusión.
30. #!/usr/bin/perl
use strict;
use warnings;
use Digest::SHA qw(hmac_sha256_hex);
use Perl6::Say;
our $hmac_key = "common_secret";
sub format_keyval {
my %pairs = @_;
join "n" => map { $_ . ':' . $pairs{$_} }
keys %pairs;
}
sub sig {
my %pairs = @_;
my $keyval = format_keyval(%pairs);
hmac_sha256_hex($keyval,
$hmac_key);
}
say sig( foo => "abc", bar => "xyz" );
89b7f51ec9b76e97d5a179f313af38e6cc8b5cb086
0e266caf6847ded05428ce