- 285
- 244 968
Lazy Programmer
India
เข้าร่วมเมื่อ 29 ก.ย. 2011
Technical Tutorials for Programmers (Java, Python, Linux)
Facebook: er.amanmalhi
Instagram: iamanmalhi
#coding #java #python #installation #programming
Facebook: er.amanmalhi
Instagram: iamanmalhi
#coding #java #python #installation #programming
High-Level vs Low-Level Design with URL Shortener Explained | System Design
Are you struggling to understand High-Level Design (HLD) and Low-Level Design (LLD) in system design? 😟 Don’t worry! In this video, we break it down step by step using the popular example of a URL Shortener.
🔥 What You’ll Learn:
✔️ The difference between High-Level Design (HLD) and Low-Level Design (LLD).
✔️ Key elements to focus on during system design interviews.
✔️ Practical High-Level Design with components like databases, load balancers, and more.
✔️ Detailed Low-Level Design including schema, caching with Redis, and handling security.
We’ve also shared tips to ace system design interviews and build scalable systems. Whether you’re preparing for interviews or building real-world applications, this video is your ultimate guide!
🎯 Chapters:
00:00 Introduction to HLD vs LLD
00:22 High-Level Design: Overview
01:13 High-Level Design: Key Focus Areas
02:07 High-Level Design: Online Shopping App Example
02:47 High-Level Design: Tech Stack Selection
03:20 High-Level Design: When it is created?
04:03 Low-Level Design: Overview and Key Focus Areas
05:33 Practical Example: URL Shortener
👉 Don’t forget to like, share, and subscribe for more amazing system design content! Let’s make system design simple and exciting.
#SystemDesign #HighLevelDesign #LowLevelDesign #URLShortener #SoftwareEngineering #ScalableSystems #RedisCaching #TechInterviews #CodingInterview #ProgrammingTips #TechEducation #SystemDesignSimplified #LearnSystemDesign #SoftwareArchitecture #EngineeringExcellence #interviewpreparation
#SystemDesign #TechInterviews #SoftwareArchitecture #Netflix #Scalability
🔔 Don't forget to like, comment, and subscribe for more tutorials!
To check out more on the tutorials Topic wise you can follow below links
Links:
Please do checkout other tutorial videos also if required:
Spring Framework: th-cam.com/play/PLOktGWstEbloSPMJ1unePUM6RBRq5PITf.html
DevOps: th-cam.com/play/PLOktGWstEbloOXfYeErrQzmEMev9kMiTR.html
Java Design Patterns: th-cam.com/play/PLOktGWstEblrsAq3NBW-3IvKXUG12g4YI.html
Java 8 Features: th-cam.com/play/PLOktGWstEblq7U723DhM22BWPTe7Juy3v.html
Core Java Complete Tutorial: th-cam.com/play/PLOktGWstEblosEXd96yj4pdN8OCX7cDOu.html
Interview Preparation for Java: th-cam.com/play/PLOktGWstEblqGRuD7oUb6mJWQRs5MCZ_a.html
Python: th-cam.com/play/PLOktGWstEblpsjnKH7qAnCgPa6k224zDw.html
Linux: th-cam.com/play/PLOktGWstEblqOSZ9ikDYHunYfb7D8beHq.html
Please do LIKE, Share and SUBSCRIBE
Thank You
Keywords
OAuth
OAuth 2.0
Authorization Code Flow
Implicit Code Flow
Authentication and Authorization
OAuth Roles
Client, Resource Owner, Authorization Server
Web Security
API Security
Access Tokens
Third-party Authentication
Secure Web Apps
#OAuth #OAuth2 #AuthorizationCodeFlow #ImplicitCodeFlow #API #WebSecurity #MobileSecurity #TokenBasedAuth #Authorization #Authentication #SecureApps #SpringSecurity #Java #WebDevelopment #APISecurity #cloudsecurity
#SpringSecurity #GDPR #HIPAA #PCI-DSS #java #spring #springframework #springmvc
🔥 What You’ll Learn:
✔️ The difference between High-Level Design (HLD) and Low-Level Design (LLD).
✔️ Key elements to focus on during system design interviews.
✔️ Practical High-Level Design with components like databases, load balancers, and more.
✔️ Detailed Low-Level Design including schema, caching with Redis, and handling security.
We’ve also shared tips to ace system design interviews and build scalable systems. Whether you’re preparing for interviews or building real-world applications, this video is your ultimate guide!
🎯 Chapters:
00:00 Introduction to HLD vs LLD
00:22 High-Level Design: Overview
01:13 High-Level Design: Key Focus Areas
02:07 High-Level Design: Online Shopping App Example
02:47 High-Level Design: Tech Stack Selection
03:20 High-Level Design: When it is created?
04:03 Low-Level Design: Overview and Key Focus Areas
05:33 Practical Example: URL Shortener
👉 Don’t forget to like, share, and subscribe for more amazing system design content! Let’s make system design simple and exciting.
#SystemDesign #HighLevelDesign #LowLevelDesign #URLShortener #SoftwareEngineering #ScalableSystems #RedisCaching #TechInterviews #CodingInterview #ProgrammingTips #TechEducation #SystemDesignSimplified #LearnSystemDesign #SoftwareArchitecture #EngineeringExcellence #interviewpreparation
#SystemDesign #TechInterviews #SoftwareArchitecture #Netflix #Scalability
🔔 Don't forget to like, comment, and subscribe for more tutorials!
To check out more on the tutorials Topic wise you can follow below links
Links:
Please do checkout other tutorial videos also if required:
Spring Framework: th-cam.com/play/PLOktGWstEbloSPMJ1unePUM6RBRq5PITf.html
DevOps: th-cam.com/play/PLOktGWstEbloOXfYeErrQzmEMev9kMiTR.html
Java Design Patterns: th-cam.com/play/PLOktGWstEblrsAq3NBW-3IvKXUG12g4YI.html
Java 8 Features: th-cam.com/play/PLOktGWstEblq7U723DhM22BWPTe7Juy3v.html
Core Java Complete Tutorial: th-cam.com/play/PLOktGWstEblosEXd96yj4pdN8OCX7cDOu.html
Interview Preparation for Java: th-cam.com/play/PLOktGWstEblqGRuD7oUb6mJWQRs5MCZ_a.html
Python: th-cam.com/play/PLOktGWstEblpsjnKH7qAnCgPa6k224zDw.html
Linux: th-cam.com/play/PLOktGWstEblqOSZ9ikDYHunYfb7D8beHq.html
Please do LIKE, Share and SUBSCRIBE
Thank You
Keywords
OAuth
OAuth 2.0
Authorization Code Flow
Implicit Code Flow
Authentication and Authorization
OAuth Roles
Client, Resource Owner, Authorization Server
Web Security
API Security
Access Tokens
Third-party Authentication
Secure Web Apps
#OAuth #OAuth2 #AuthorizationCodeFlow #ImplicitCodeFlow #API #WebSecurity #MobileSecurity #TokenBasedAuth #Authorization #Authentication #SecureApps #SpringSecurity #Java #WebDevelopment #APISecurity #cloudsecurity
#SpringSecurity #GDPR #HIPAA #PCI-DSS #java #spring #springframework #springmvc
มุมมอง: 25
วีดีโอ
System Design Explained | Why It’s Crucial for Tech Interviews & Real-World Success
มุมมอง 157วันที่ผ่านมา
Welcome to the Ultimate System Design Series! Are you ready to unlock the secrets of building scalable, reliable, and efficient applications? In this video, we’re kicking off our brand-new System Design series with a deep dive into: ✅ What is System Design? ✅ Why it’s a game-changer for tech interviews and real-world applications. ✅ How companies like Netflix, Uber, and Instagram scale to serve...
Learn OAuth2 in Just 30 Minutes: GitHub App Setup & Spring Boot Integration
มุมมอง 32814 วันที่ผ่านมา
Learn OAuth2 in Just 30 Minutes! In this video, we’ll demystify OAuth2 and take you step-by-step through: ✅ Understanding OAuth2 and its Flows ✅ Creating a GitHub OAuth App ✅ Implementing OAuth2 in a Spring Boot Application We’ll start from scratch, explaining every concept in simple terms, and then dive into a hands-on implementation using GitHub as an OAuth provider. By the end of this video,...
OAuth2 Implementation + SpringBoot 3 + GitHub as Authentication Provider
มุมมอง 18321 วันที่ผ่านมา
In this video, I walk you through building an OAuth2 login system in Spring Boot, step-by-step, using GitHub as the authentication provider. Here’s how it was developed: Setting Up OAuth2 Client Configurations: - Created an OAuth app on GitHub, securing Client ID and Client Secret, which powers the app’s secure login flow. For this please check the previous video. Defining Security and Endpoint...
How to Create a GitHub OAuth App | Step-by-Step Guide
มุมมอง 419หลายเดือนก่อน
In today’s video, we’re diving into how to create an OAuth app using GitHub as our authentication provider. Whether you're new to OAuth or just looking for a clear, detailed tutorial, we’ve got you covered! I’ll guide you through the entire process of setting up your GitHub OAuth app, explaining every step along the way from registering your application to configuring essential details like the...
OAuth 2.0 Simplified | Authorization Code & Implicit Flow Explained
มุมมอง 620หลายเดือนก่อน
Welcome to this in-depth video on OAuth and OAuth 2.0 flows! In this video, we will dive deep into how authentication and authorization worked before OAuth, highlighting the security risks involved in older methods, and how OAuth revolutionized secure access for modern web and mobile applications. We’ll break down the key roles in OAuth 2.0, such as the Client, Resource Owner, Authorization Ser...
Another Tech Disaster Windows 11 Update: KB5043145 Brings Chaos and Crashes!
มุมมอง 753หลายเดือนก่อน
Microsoft strikes again with the latest Windows 11 update, KB5043145, bringing more than just new features! From the infamous Blue Screen of Death to the Green Screen of Death for Insiders, this update has it all-boot loops, BitLocker issues, and even broken peripherals. In this video, we’ll dive into the chaos caused by this optional September update, how Microsoft’s timing of pulling it down ...
Generate JWT Token Without REST Endpoint + JWT + Spring Boot 3 + Spring Security 6 | Lazy Programmer
มุมมอง 4122 หลายเดือนก่อน
We have already Implemented JWT Authentication and Authorization in a Spring Boot application from scratch in our previous video. Unlock Seamless Authentication with JWT Tokens in Spring Boot 3 Spring Security 6 | No REST Endpoint Needed! In this video, I’ll walk you through generating JWT tokens without a REST endpoint using an Authentication Filter. We’re diving into Spring Boot 3 and Spring ...
RBAC JWT + SpringBoot 3 + Upgrade JWT + Fix Deprecated Method Usage | Lazy Programmer
มุมมอง 4242 หลายเดือนก่อน
We have already Implemented JWT Authentication and Authorization in a Spring Boot application from scratch in our previous video. In this video, we take your Spring Boot application security to the next level by implementing Role-Based Access Control (RBAC). You’ll learn how to create two secure endpoints - one for admin and one for user roles - demonstrating how role-based access works in real...
Spring Boot 3 + Spring Security 6 + JWT From Scratch | Lazy Programmer
มุมมอง 1.3K2 หลายเดือนก่อน
In this video, we implement JWT Authentication and Authorization in a Spring Boot application from scratch. We’ll cover all the necessary steps, including setting up POM dependencies (Spring Data JPA, Spring Security, Spring Web, H2 database, Lombok, JWT), configuring application.properties, creating User entities and DTOs, and building a JwtUtil*class for JWT token generation and validation. W...
What is JWT and How it works | JWT vs Session Based Authentication | Security | Lazy Programmer
มุมมอง 3313 หลายเดือนก่อน
In this video, we dive deep into the world of JWT (JSON Web Token) and uncover how it solves the challenges of traditional session-based authentication. From understanding the issues with sessions like scalability, security risks, and token management, to seeing how JWT steps in as the modern solution, I’ve got you covered! We'll walk through the structure of JWT, breaking down the Header, Payl...
Secure Password using BCrypt Spring Security | Spring Boot | Java
มุมมอง 4783 หลายเดือนก่อน
In this tutorial, I dive deep into the essentials of securing passwords in your Spring Boot applications. You'll learn: 🔒 Why you should avoid using the DefaultPasswordEncoder 🔐 How to replace the DefaultPasswordEncoder with BCrypt 💡 Understanding critical BCrypt concepts like Salting, Adaptive Hashing, and Cost Factor 🔍 Breaking down an encoded BCrypt hashed password: $2a, cost factor, salt, a...
Role Based Access Control Spring Security | Spring Boot | Java
มุมมอง 1.4K3 หลายเดือนก่อน
In this video, I walk you through the process of implementing Role-Based Access in a Spring Boot application using Spring Security. Whether you're new to Spring Security or looking to enhance your application's security, this tutorial covers all the essential steps: - Spring Security Configuration: Learn how to set up and configure Spring Security in your project. - SecurityChainFilters: Unders...
Basic Authentication Spring Security | Spring Boot | Java
มุมมอง 1.8K3 หลายเดือนก่อน
In this video, we dive into the essentials of implementing Basic Authentication with Spring Boot. From setting up non-secure REST endpoints to enhancing security with custom credentials, we've got you covered. Learn how Spring Security can protect your endpoints and see step-by-step instructions on how to test everything using Postman. What You'll Learn: Development of Basic Non-Secure REST End...
Cyberattack on 300 Indian Banks | RansomEXX | SBI TCS C-Edge
มุมมอง 8193 หลายเดือนก่อน
CYBER-ATTACK on Indian Banks In this video we have discussed what happened on 31st July 2024. And a detailed Root Cause Analysis which you will not find anywhere else.
Beyond Firewalls: The Importance of Application-Level Security | Spring Security | GDPR HIPAA PCIDSS
มุมมอง 1564 หลายเดือนก่อน
Beyond Firewalls: The Importance of Application-Level Security | Spring Security | GDPR HIPAA PCIDSS
Crack Spring Interview | Questions for Freshers and 1-3 Years of Experience Part-2
มุมมอง 3414 หลายเดือนก่อน
Crack Spring Interview | Questions for Freshers and 1-3 Years of Experience Part-2
Biggest IT Outage: Root Cause Analysis-How a Simple Error Crippled Microsoft Windows Users Worldwide
มุมมอง 6554 หลายเดือนก่อน
Biggest IT Outage: Root Cause Analysis-How a Simple Error Crippled Microsoft Windows Users Worldwide
Resolve Dependency Injection Conflicts in Production | Spring | Spring boot | Java
มุมมอง 3164 หลายเดือนก่อน
Resolve Dependency Injection Conflicts in Production | Spring | Spring boot | Java
Crack Spring Interview | Questions for Freshers and 1-3 Years of Experience Part-1
มุมมอง 4044 หลายเดือนก่อน
Crack Spring Interview | Questions for Freshers and 1-3 Years of Experience Part-1
Develop Production Like REST API using Spring Boot | A Complete Development Tutorial
มุมมอง 1K4 หลายเดือนก่อน
Develop Production Like REST API using Spring Boot | A Complete Development Tutorial
API Fundamentals | Restful APIs | REST Principles | Easiest Way to Understand
มุมมอง 2045 หลายเดือนก่อน
API Fundamentals | Restful APIs | REST Principles | Easiest Way to Understand
Simplify Configuration using @EnableWebMvc in MVC Application #springmvc
มุมมอง 2366 หลายเดือนก่อน
Simplify Configuration using @EnableWebMvc in MVC Application #springmvc
Spring Boot MVC Tutorial: Implementing User Registration and Login with JPA and Thymeleaf
มุมมอง 9586 หลายเดือนก่อน
Spring Boot MVC Tutorial: Implementing User Registration and Login with JPA and Thymeleaf
Spring MVC with Zero Configuration using #SpringBoot and #Thymeleaf #java #springmvc
มุมมอง 2666 หลายเดือนก่อน
Spring MVC with Zero Configuration using #SpringBoot and #Thymeleaf #java #springmvc
How Spring MVC Work? Complete Workflow of Spring MVC Request
มุมมอง 3897 หลายเดือนก่อน
How Spring MVC Work? Complete Workflow of Spring MVC Request
#4 - Java Multithreading Interview Questions [MOST ASKED] 5-8 Years Experienced
มุมมอง 1.8K7 หลายเดือนก่อน
#4 - Java Multithreading Interview Questions [MOST ASKED] 5-8 Years Experienced
Nicely presented for each of the methods. Thanks!
Thank you so much for this amazing video! I have a quick question: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?
Is the Java code for url shortner available so that practical implementation would be better
Hi Deepak, This video was targeted to explain How to go for high level design and low level design and how they are connected with each other. As mentioned in the video we have not explained the complete design of URL Shortener and it will be covered in the future videos.
👍
Short and sweet! Keep going!
Thank you 😊
i wanted explaination on the topic, instead of quickly reading from slides you could slow down and explain the topics in more understandable way (ex. giving analogies and examples)
Thank you for your feedback Vivek, I will keep in mind for the future seaaions.
Hi thanks for sharing this knowledge. Could you explain if we got static methods not variables. Will it still keep the objects we create inside or passed as org for ever?
I believe objects passed as arguments or created inside static method will get out of scope and ready to be garbage collected as soon as the static method execution is complete.
superb presentation. keep up your excellent work
Thank you 😊
Thanks for the great video!
Thank you for your feedback Keep Learning 🙂
Was waiting for this video. Thank you 💙
Great video with simple explanation💯👍.
Thank you for the feedback, I am glad that it was helpful, Keep Learning 🙂
thanks for a beauifull lesson, but the lesson sequence is not correct, it should be at the beginning.
I am glad that it was helpful, as far as sequence is concerned, I first try to cover the concept theoretically and then move to implementation hence the sequence. Thank you for your feedback 🙂
Great lesson, easy explain for biginners and advanced,the best thing I like it the descreption that you have added it below the video coz many people are not good enough in Engliish! thanks a lot bro
I am happy that it was helpful, thanks for supporting and Keep Learning 🙂
Great explanation ❤
Glad it was helpful! Keep Learning :)
Great. Thanks brother
Welcome :)
Great video brother
Thank you 🙏😊
Quite engaging!
Thank you @SPS_Tech 🙏
broo when i try to debug, the debug perspective opens and shows variables breakpoints and expressions but the console is not showing . what to do?
You may need to show it in eclipse. Please try the steps below: Go to the menu bar and click on Window. Then, navigate to Show View and click on Console.
Yes. Microsoft decided that Western Digitals Black SN770 Nvme2 shouldn't be used and will crash your PC repeatedly.
They want to restrict you from all aspects.
Your presentation is awesome 🎉❤
Thank you 😊
1st comment, 1st like... And your anchoring and script is far better than many professional comedians.... System breaking updates.
@@DurgaShiva7574 thank you so much 🙏
Is it the latest quality or function update when you are removing it in windows recovery?
Easy to understand I get all things in single video Greate👍🏻
Thank you for your feedback. Keep Learning :)
Thank you :)
helpful video! thanks
Thank you for your feedback. Keep Learning :)
Your content was absolutely on point! You explained everything in such an easy-to-understand way.
Thank you, I am glad it was helpful!
Still I am not able to understand what we have achieved here? still there is an end-point to generate the token.
Nikhil, did you see us creating any endpoint here? Where is the rest controller and endpoint defined?
I understood your doubt which is in this code he has not removed the Auth controller code from the project. Even though its still there just think like it is removed and the class itself is deleted. Now the login authentication is handled by the Filter named 'JwtAuthenticationFilter'. This is preffered since the request is authenticated even before it reaches the controller. In real world applications authentication would be handled by the filter usually in a layer like the Api gateway.
Hello LazyProgrammer thanks for you video, 1 question what is the function of the JwtAuthenticationFilter?? in your implementation, because you added/instantiate the class in the securityFilterChain method as a filter .addFilter(new JwtAuthenticationFilter(authenticationManager(httpSecurity.getSharedObject(AuthenticationConfiguration.class)), jwtUtil)) however there is no use case (at least that i was able to find) that actually makes use of the implementation 1 for login you created a controller and service that gets the userdetails using userdetailservice bean and then creates a jwt using jwtutil class 2 for secure routes the generated token is used in the JwtAuthorizationFilter class to validate the user 3 for register no authentication is applied
AuthenticationFilter will be used in the scenario for our next video where we'll get rid of AuthController itself.
To generate JWT tokens without a REST endpoint? th-cam.com/video/Q96jo3UVLoU/w-d-xo.html You can checkout the usage of JwtAuthenticationFilter in this.
What's the difference between hasRole and hasAuthority
That's a really good point which you have highlighted Hridesh. For using hasRole we have to follow a naming convention like start the role name as "ROLE_". Because spring security expects this naming format. If you don't provide it then Spring will add it explicitly and then check it But this is not mandatory if you use hasAuthority. So, you can use the role names as per your choice and spring will not add prefixes.
Why using deprecated methods instead of latest 0.12.6v of jjwt ... If possible can you help me to get the latest Jwt Authorization token... I tried but can't access preAuthorize API has Role ADMIN....
Sure Chetan, I am already planning to upgrade it and get rid of deprecated JWT methods in next video where I will implement RBAC
@@LazzyProgrammer Thanks a lot for ur response....I tried it on all aspects of accessing RBAC, In DB role name is saved as ROLE_ADMIN ROLE_USER Also at SecurityConfig Giving @EnableMethodSecurity(prePostEnabled = true) For @preAuthorize("hasRole('ADMIN')") @DeleteMapping Admin role Jwt Authorization token can't access the above API... help me...
Hi Chetan, You can check the video below as I have covered the same problem in my recent video. RBAC JWT + SpringBoot 3 + Upgrade JWT + Fix Deprecated Method Usage: th-cam.com/video/gfHsKST8hXs/w-d-xo.html
C
Correct
loved your video. Please start a series for improving performance of java applications like identifying memory leaks, profiling etc.
Thank you for your feedback, Sure I can take a look into such series after completing Spring Security. In the mean time if you want you can check out few videos where such issues are discussed. Links are give below: Memory Leaks: th-cam.com/video/1ksJpgk1HIc/w-d-xo.html Working of Heap Memory: th-cam.com/video/HItOMv92MFA/w-d-xo.html and few Garbage Collection related videos also.
Brother Your Scratch level Explanation on Core and Advance Java is NextLevel 🔥🔥🔥🔥Whatever you explain in between ~15 Minuit video is More than 3 day's classroom tutor .Thank's Brother for your Work God Bless You.
Thank you so much :). I am glad that these things are helping. Let us keep learning together :)
Please start a series for improving performance of java applications like identifying memory leaks, profiling etc.
Sure, Will do that. Thank you so much for your feedback
Thanks 😊
I am glad that it was helpful 🙂
Please Make Interview Question video on SpringBoot,SpringData,RESTfulWebServices,SpringSecurity,kafka,Microservices
Sure, will soon cover these topics from Interview prospective.
excellent series on multithreading. Great work!!
@@kaushlendramishra5588 Thank you 🙂
Thanks for your crystal clear explanation about JWT.. It's time to implement JWT in our application . Do you have any reference video , If yes , Please send me link . I will look into it ..
Thank You Praveen for your valuable feedback. Implementation of JWT is going to be our next video in this series. There we'll create an application from scratch and implement JWT End-to-End. Hopefully that will help you to understand in detail about the Implementation part as well. Once again Thank you so much and Keep Supporting
Really great video in terms of the information provided and the way you explained everything. It would be even better if you could work a bit on thumbnails for more reach. Looking forward to more of these videos-you're doing a fantastic job! Kudos!
Thank you so much for your feedback. I'll definitely work on the thumbnail part.
Great video
Thank you 🙂
Clear explanation 💙
Thank you, I am glad it was helpful. Let's keep learning 📖
Thanks! Learned it!
Great! Let's keep learning 📖
@@LazzyProgrammer thanks!
music is loud
I apologise Karthik, and will make sure to fix the issue in all upcoming videos
👍💯
Audio is low
Thanks for the feedback, I'll take care in the future.
Why did you use two locks ? Printer class should not create a lock inside the constructor , instead lock should be passed to the constructor right ?
Yes, it is better to pass the lock object to the constructor if you want to ensure that all instances share the same lock object. There is only one lock which is static thus shared across all the objects of the class.
00:02 A simple logical error caused the biggest IT outage in history. 00:50 CrowdStrike update caused system crash on Windows devices 01:37 Blue screen of death indicated system crash affecting Windows users worldwide 02:26 Global IT outage impacted various services and companies 03:09 Addressing the Windows outage through safe mode and deployment of fix. 03:53 Channel files were updated, impacting Windows users worldwide. 04:40 A configuration update led to a logical error causing operating system crashes. 05:25 Endpoint security tools help detect and respond to cyber threats.
Thank you Bhanu
Great coverage
Thank you :)
Great video on the issue and fix👍
Thanks Mukul :)
Got to learn new thing todays ... Thanks buddy
I am glad 😊 Let's keep learning
Good Job OSM
Thank you Rajeev 🙂