Open in app

Sign in

Write

Sign in

Toxix
Toxix

2 Followers

Home

About

Jul 5, 2021

How to hot-plug a wireless network card in Ubuntu

On my Lenovo x220 laptop, that I am still using as private laptop, because of it’s amazing keyboard and durability. Didn’t find anything similar yet. The Laptop has survived even an ‘attack‘ with melted butter, going through the laptop a couple of years ago. Happened on a hot summer day…

Linux

3 min read

Linux

3 min read


Nov 4, 2020

Violated Key Constraints in Magento Database

Discovery In Y1 we are using a program that is called db-archiver. This tool is taking a dump of the production database and cleaning out a lot of sensitive data from it (like for example access logs, customer address data, credentials). The cleaned db dumps then are used for setting up…

Mangento 2

3 min read

Violated Key Constraints in Magento Database
Violated Key Constraints in Magento Database
Mangento 2

3 min read


Published in

Y1 Digital

·Feb 7, 2019

Why Logging to the MySQL Database is an Antipattern

At work, we have been alerted by our monitoring system that a server is running out of disk space at night for a period of around two hours. Investigating disk usage peaks On the next day, I was asked to investigate the alert. I first had a lookat the detailed disk usage graph over…

MySQL

3 min read

Why Logging to the MySQL Database is an Antipattern
Why Logging to the MySQL Database is an Antipattern
MySQL

3 min read

Toxix

Toxix

2 Followers
Following
  • Andrew Howden

    Andrew Howden

  • Y1

    Y1

  • Valentin Sauer

    Valentin Sauer

  • Behrouz Abbasi

    Behrouz Abbasi

See all (5)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams