SlideShare una empresa de Scribd logo
1 de 134
find, grep, sed, & awk Increasing productivity with command-line tools.
Unix philosophy ,[object Object],[object Object]
Why learn command-line utils? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Part 0 – pipes and  xargs
Some simple programs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Putting programs together ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Part 1:  find
Basic find examples ,[object Object]
Basic find examples ,[object Object],[object Object]
Basic find examples ,[object Object],[object Object],[object Object]
Basic find examples ,[object Object],[object Object],[object Object],[object Object]
Basic find examples ,[object Object],[object Object],[object Object],[object Object],[object Object]
Basic find examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Find and do stuff ,[object Object]
Find and do stuff ,[object Object],[object Object],[object Object],[object Object]
Find and do stuff ,[object Object],[object Object],[object Object],[object Object],[object Object]
-exec  or  | xargs ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Find by type ,[object Object],[object Object]
Find by type ,[object Object],[object Object],[object Object],[object Object]
Find by type ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
By modification time ,[object Object],[object Object]
By modification time ,[object Object],[object Object],[object Object],[object Object]
By modification time ,[object Object],[object Object],[object Object],[object Object],[object Object]
By modification time,  II ,[object Object],[object Object],[object Object]
By modification time,  III ,[object Object],[object Object]
By modification time,  III ,[object Object],[object Object],[object Object],[object Object],[object Object]
Find by permissions ,[object Object],[object Object],[object Object],[object Object]
Find by size ,[object Object],[object Object]
Find by size ,[object Object],[object Object],[object Object],[object Object]
find  summary: ,[object Object]
find  summary: ,[object Object],[object Object]
find  summary: ,[object Object],[object Object],[object Object]
Part 2:  grep ,[object Object],[object Object],[object Object]
Basic usage: ,[object Object]
Basic usage: ,[object Object],[object Object]
Basic usage: ,[object Object],[object Object],[object Object]
Basic usage: ,[object Object],[object Object],[object Object],[object Object]
Basic usage: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common  grep  options ,[object Object],[object Object]
Common  grep  options ,[object Object],[object Object],[object Object],[object Object]
Common  grep  options ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Filtering results ,[object Object],[object Object],[object Object]
Filtering results ,[object Object],[object Object],[object Object],[object Object],[object Object]
Filtering results ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More  grep  options ,[object Object],[object Object]
More  grep  options ,[object Object],[object Object],[object Object],[object Object]
More  grep  options ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example ,[object Object]
Example ,[object Object],[object Object],[object Object],[object Object]
grep  summary: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Part 3:  sed ,[object Object],[object Object]
sed  command #1:  s ,[object Object]
sed  command #1:  s ,[object Object],[object Object]
sed  command #1:  s ,[object Object],[object Object],[object Object]
sed  command #1:  s ,[object Object],[object Object],[object Object],[object Object]
sed  command #1:  s ,[object Object],[object Object],[object Object],[object Object],[object Object]
Typical uses ,[object Object],[object Object]
Typical uses ,[object Object],[object Object],[object Object]
Typical uses ,[object Object],[object Object],[object Object],[object Object]
Typical uses ,[object Object],[object Object],[object Object],[object Object],[object Object]
Real life example  I ,[object Object]
Real life example  I ,[object Object],[object Object],[object Object],[object Object]
Real life example  II ,[object Object],[object Object]
Real life example  II ,[object Object],[object Object],[object Object],[object Object]
Real life example  III ,[object Object]
Real life example  III ,[object Object],[object Object],[object Object]
Real life example  III ,[object Object],[object Object],[object Object],[object Object],[object Object]
Capturing groups ,[object Object]
Capturing groups ,[object Object],[object Object]
Capturing groups ,[object Object],[object Object],[object Object]
Capturing groups ,[object Object],[object Object],[object Object],[object Object]
Capturing groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Exercise: formatting phone #. ,[object Object]
Exercise: formatting phone #. ,[object Object],[object Object],[object Object]
Exercise: formatting phone #. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Exercise: trim whitespace ,[object Object]
Exercise: trim whitespace ,[object Object],[object Object]
Exercise: trim whitespace ,[object Object],[object Object],[object Object]
Exercise: trim whitespace ,[object Object],[object Object],[object Object],[object Object]
Exercise: trim whitespace ,[object Object],[object Object],[object Object],[object Object],[object Object]
Exercise: trim whitespace ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Add comment line to file with  s : ,[object Object]
Add comment line to file with  s : ,[object Object],[object Object],[object Object],[object Object],[object Object]
Shebang! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
sed  command #2:  d ,[object Object],[object Object]
sed  command #2:  d ,[object Object],[object Object],[object Object],[object Object]
sed  command #2:  d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More delete examples: ,[object Object]
More delete examples: ,[object Object],[object Object]
More delete examples: ,[object Object],[object Object],[object Object]
More delete examples: ,[object Object],[object Object],[object Object],[object Object]
More delete examples: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Real life example  II, ctd ,[object Object],[object Object]
Real life example  II, ctd ,[object Object],[object Object],[object Object],[object Object]
sed  summary ,[object Object]
sed  summary ,[object Object],[object Object]
sed  summary ,[object Object],[object Object],[object Object]
sed  summary ,[object Object],[object Object],[object Object],[object Object]
Part 4:  awk ,[object Object],[object Object],[object Object]
Simple  awk  programs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example  server.log  file: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Built-in variables:  NF ,  NR ,[object Object],[object Object],[object Object]
Built-in variables:  NF ,  NR ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Structure of an  awk  program ,[object Object]
Structure of an  awk  program ,[object Object],[object Object]
Structure of an  awk  program ,[object Object],[object Object],[object Object]
Structure of an  awk  program ,[object Object],[object Object],[object Object],[object Object],[object Object]
Structure of an  awk  program ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Changing delimiter ,[object Object]
Changing delimiter ,[object Object],[object Object],[object Object]
Changing delimiter ,[object Object],[object Object],[object Object],[object Object],[object Object]
Get date out of  server.log ,[object Object],[object Object]
Get date out of  server.log ,[object Object],[object Object],[object Object],[object Object]
Get date out of  server.log ,[object Object],[object Object],[object Object],[object Object],[object Object]
Get date out of  server.log ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Get date out of  server.log ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Maintaining state in  awk ,[object Object]
Maintaining state in  awk ,[object Object],[object Object],[object Object]
Maintaining state in  awk ,[object Object],[object Object],[object Object],[object Object]
Maintaining state in  awk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Maintaining state in  awk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
One more example ,[object Object],[object Object]
One more example ,[object Object],[object Object],[object Object]
One more example ,[object Object],[object Object],[object Object],[object Object]
Example, ctd. ,[object Object]
Example, ctd. ,[object Object],[object Object]
Example, ctd. ,[object Object],[object Object],[object Object]
awk  summary ,[object Object]
awk  summary ,[object Object],[object Object]
awk  summary ,[object Object],[object Object],[object Object]
awk  summary ,[object Object],[object Object],[object Object],[object Object]
awk  summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
awk  summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Using Unix
Using UnixUsing Unix
Using Unix
Dr.Ravi
 
Unix And C
Unix And CUnix And C
Unix And C
Dr.Ravi
 
Unix Basics
Unix BasicsUnix Basics
Unix Basics
Dr.Ravi
 
101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions
Acácio Oliveira
 
Unit 8 text processing tools
Unit 8 text processing toolsUnit 8 text processing tools
Unit 8 text processing tools
root_fibo
 
15 practical grep command examples in linux
15 practical grep command examples in linux15 practical grep command examples in linux
15 practical grep command examples in linux
Teja Bheemanapally
 
DevChatt 2010 - *nix Cmd Line Kung Foo
DevChatt 2010 - *nix Cmd Line Kung FooDevChatt 2010 - *nix Cmd Line Kung Foo
DevChatt 2010 - *nix Cmd Line Kung Foo
brian_dailey
 
Introducing Modern Perl
Introducing Modern PerlIntroducing Modern Perl
Introducing Modern Perl
Dave Cross
 

La actualidad más candente (19)

Using Unix
Using UnixUsing Unix
Using Unix
 
Unix And C
Unix And CUnix And C
Unix And C
 
Unix lab manual
Unix lab manualUnix lab manual
Unix lab manual
 
3.7 search text files using regular expressions
3.7 search text files using regular expressions3.7 search text files using regular expressions
3.7 search text files using regular expressions
 
Unix Basics
Unix BasicsUnix Basics
Unix Basics
 
Unix 1st sem lab programs a - VTU Karnataka
Unix 1st sem lab programs a - VTU KarnatakaUnix 1st sem lab programs a - VTU Karnataka
Unix 1st sem lab programs a - VTU Karnataka
 
101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions
 
101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions
 
Unix
UnixUnix
Unix
 
Unit 8 text processing tools
Unit 8 text processing toolsUnit 8 text processing tools
Unit 8 text processing tools
 
15 practical grep command examples in linux
15 practical grep command examples in linux15 practical grep command examples in linux
15 practical grep command examples in linux
 
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
 
DevChatt 2010 - *nix Cmd Line Kung Foo
DevChatt 2010 - *nix Cmd Line Kung FooDevChatt 2010 - *nix Cmd Line Kung Foo
DevChatt 2010 - *nix Cmd Line Kung Foo
 
Unix Tutorial
Unix TutorialUnix Tutorial
Unix Tutorial
 
Working with text, Regular expressions
Working with text, Regular expressionsWorking with text, Regular expressions
Working with text, Regular expressions
 
You Can Do It! Start Using Perl to Handle Your Voyager Needs
You Can Do It! Start Using Perl to Handle Your Voyager NeedsYou Can Do It! Start Using Perl to Handle Your Voyager Needs
You Can Do It! Start Using Perl to Handle Your Voyager Needs
 
Using Regular Expressions in Grep
Using Regular Expressions in GrepUsing Regular Expressions in Grep
Using Regular Expressions in Grep
 
Introducing Modern Perl
Introducing Modern PerlIntroducing Modern Perl
Introducing Modern Perl
 
Love Your Command Line
Love Your Command LineLove Your Command Line
Love Your Command Line
 

Destacado

Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014
iimjobs and hirist
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
Hemant Shah
 

Destacado (20)

Web Application Security with PHP
Web Application Security with PHPWeb Application Security with PHP
Web Application Security with PHP
 
Sed & awk the dynamic duo
Sed & awk   the dynamic duoSed & awk   the dynamic duo
Sed & awk the dynamic duo
 
Secure SHell
Secure SHellSecure SHell
Secure SHell
 
Secure shell protocol
Secure shell protocolSecure shell protocol
Secure shell protocol
 
PHP Secure Programming
PHP Secure ProgrammingPHP Secure Programming
PHP Secure Programming
 
Unix Command Line Productivity Tips
Unix Command Line Productivity TipsUnix Command Line Productivity Tips
Unix Command Line Productivity Tips
 
Practical Example of grep command in unix
Practical Example of grep command in unixPractical Example of grep command in unix
Practical Example of grep command in unix
 
Web Application Security: Introduction to common classes of security flaws an...
Web Application Security: Introduction to common classes of security flaws an...Web Application Security: Introduction to common classes of security flaws an...
Web Application Security: Introduction to common classes of security flaws an...
 
How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF
 
Defeating The Network Security Infrastructure V1.0
Defeating The Network Security Infrastructure  V1.0Defeating The Network Security Infrastructure  V1.0
Defeating The Network Security Infrastructure V1.0
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAPVirtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
 
Secure Shell(ssh)
Secure Shell(ssh)Secure Shell(ssh)
Secure Shell(ssh)
 
SSH
SSHSSH
SSH
 
Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014
 
RHCE FINAL Questions and Answers
RHCE FINAL Questions and AnswersRHCE FINAL Questions and Answers
RHCE FINAL Questions and Answers
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
 
Linux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old SecretsLinux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old Secrets
 
Linux Systems Performance 2016
Linux Systems Performance 2016Linux Systems Performance 2016
Linux Systems Performance 2016
 

Similar a Unix command-line tools

Perl.Hacks.On.Vim
Perl.Hacks.On.VimPerl.Hacks.On.Vim
Perl.Hacks.On.Vim
Lin Yo-An
 
Unix shell scripting basics
Unix shell scripting basicsUnix shell scripting basics
Unix shell scripting basics
Abhay Sapru
 
Unix Shell Scripting Basics
Unix Shell Scripting BasicsUnix Shell Scripting Basics
Unix Shell Scripting Basics
Dr.Ravi
 
Why Perl, when you can use bash+awk+sed? :P
Why Perl, when you can use bash+awk+sed? :PWhy Perl, when you can use bash+awk+sed? :P
Why Perl, when you can use bash+awk+sed? :P
Luciano Rocha
 
Perl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim PerlchinaPerl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim Perlchina
guestcf9240
 
Perl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim PerlchinaPerl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim Perlchina
Lin Yo-An
 
Writing Friendly libraries for CodeIgniter
Writing Friendly libraries for CodeIgniterWriting Friendly libraries for CodeIgniter
Writing Friendly libraries for CodeIgniter
CodeIgniter Conference
 
Unix Shell Scripting Basics
Unix Shell Scripting BasicsUnix Shell Scripting Basics
Unix Shell Scripting Basics
Sudharsan S
 
Your own (little) gem: building an online business with Ruby
Your own (little) gem: building an online business with RubyYour own (little) gem: building an online business with Ruby
Your own (little) gem: building an online business with Ruby
Lindsay Holmwood
 

Similar a Unix command-line tools (20)

Perl Presentation
Perl PresentationPerl Presentation
Perl Presentation
 
Perl.Hacks.On.Vim
Perl.Hacks.On.VimPerl.Hacks.On.Vim
Perl.Hacks.On.Vim
 
Advanced Perl Techniques
Advanced Perl TechniquesAdvanced Perl Techniques
Advanced Perl Techniques
 
Codementor Office Hours with Eric Chiang: Stdin, Stdout: pup, Go, and life at...
Codementor Office Hours with Eric Chiang: Stdin, Stdout: pup, Go, and life at...Codementor Office Hours with Eric Chiang: Stdin, Stdout: pup, Go, and life at...
Codementor Office Hours with Eric Chiang: Stdin, Stdout: pup, Go, and life at...
 
spug_2008-08
spug_2008-08spug_2008-08
spug_2008-08
 
Unix shell scripting basics
Unix shell scripting basicsUnix shell scripting basics
Unix shell scripting basics
 
Unix Shell Scripting Basics
Unix Shell Scripting BasicsUnix Shell Scripting Basics
Unix Shell Scripting Basics
 
Why Perl, when you can use bash+awk+sed? :P
Why Perl, when you can use bash+awk+sed? :PWhy Perl, when you can use bash+awk+sed? :P
Why Perl, when you can use bash+awk+sed? :P
 
Perl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim PerlchinaPerl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim Perlchina
 
Perl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim PerlchinaPerl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim Perlchina
 
Cleancode
CleancodeCleancode
Cleancode
 
Unix shell scripting basics
Unix shell scripting basicsUnix shell scripting basics
Unix shell scripting basics
 
BASH Variables Part 1: Basic Interpolation
BASH Variables Part 1: Basic InterpolationBASH Variables Part 1: Basic Interpolation
BASH Variables Part 1: Basic Interpolation
 
Writing Friendly libraries for CodeIgniter
Writing Friendly libraries for CodeIgniterWriting Friendly libraries for CodeIgniter
Writing Friendly libraries for CodeIgniter
 
Unix Shell Scripting Basics
Unix Shell Scripting BasicsUnix Shell Scripting Basics
Unix Shell Scripting Basics
 
Dealing with Legacy Perl Code - Peter Scott
Dealing with Legacy Perl Code - Peter ScottDealing with Legacy Perl Code - Peter Scott
Dealing with Legacy Perl Code - Peter Scott
 
Your own (little) gem: building an online business with Ruby
Your own (little) gem: building an online business with RubyYour own (little) gem: building an online business with Ruby
Your own (little) gem: building an online business with Ruby
 
Getting groovy (ODP)
Getting groovy (ODP)Getting groovy (ODP)
Getting groovy (ODP)
 
BSDM with BASH: Command Interpolation
BSDM with BASH: Command InterpolationBSDM with BASH: Command Interpolation
BSDM with BASH: Command Interpolation
 
Easy R
Easy REasy R
Easy R
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Unix command-line tools

  • 1. find, grep, sed, & awk Increasing productivity with command-line tools.
  • 2.
  • 3.
  • 4. Part 0 – pipes and xargs
  • 5.
  • 6.
  • 7. Part 1: find
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.