投稿時間:2021-08-09 19:33:21 RSSフィード2021-08-09 19:00 分まとめ(38件)

カテゴリー等 サイト名等 記事タイトル・トレンドワード等 リンクURL 頻出ワード・要約等/検索ボリューム 登録日
TECH Engadget Japanese ASUSのゲーミングノートPCやデスクトップがお買い得。Amazonでセール開催中 https://japanese.engadget.com/sale-asus-gaming-091010102.html amazon 2021-08-09 09:10:10
IT ITmedia 総合記事一覧 [ITmedia ビジネスオンライン] 1964年東京五輪 「選手村の味」 帝国ホテルで再び https://www.itmedia.co.jp/business/articles/2108/09/news033.html itmedia 2021-08-09 18:51:00
Google カグア!Google Analytics 活用塾:事例や使い方 TikTokから爆売れのコレは一体なに?コンビニでも売り切れ続出のあのおかし他 https://www.kagua.biz/social/tiktok/20210809a2.html tiktok 2021-08-09 09:00:56
python Pythonタグが付けられた新着投稿 - Qiita *執筆途中【Python】アルゴリズム実装で多用する記法 https://qiita.com/OhDyla/items/133185f105cb9e3ad237 注開始位置と終了位置が通常と異なることに注意。 2021-08-09 18:32:49
python Pythonタグが付けられた新着投稿 - Qiita vscを使って,anacondaで作った環境でデバッグする https://qiita.com/yoshida_fumiaki/items/4fe357f85252e667108b anacondaの環境変数はフォルダ変えてるだけだからpythonを呼び出すpathを適切なやつにすればいい。 2021-08-09 18:19:40
python Pythonタグが付けられた新着投稿 - Qiita EC2にPython/Flask2を構築 https://qiita.com/miyakiyo/items/cbaf0d1e1e4769073098 更新内容は後で確認しますかflask用のファイルを作成して起動・今回はopt配下にecuserで作成していくcdoptsudomkdirflasksudochownRecuserecuserflaskcdflaskmkdirhogecdhoge・hogeディレクトリの配下にapppyを作成verになってるので本家のサイトFlaskサイトを参考に進めてみるとapppyfromflaskimportFlaskappFlasknameapproutedefindexreturn世界のみなさん、こんにちは・ファイルを作成したの、適当に動かしてみるflaskrunEnvironmentproductionWARNINGThisisadevelopmentserverDonotuseitinaproductiondeploymentUseaproductionWSGIserverinsteadDebugmodeoffRunningonPressCTRLCtoquit・あれ動いたwcurlを投げてみますかcurliHTTPOKContentTypetexthtmlcharsetutfContentLengthServerWerkzeugPythonDateMonAugGMT世界のみなさん、こんにちは・確かに動いてるぞどこでapppyを判断したんだよ。 2021-08-09 18:09:40
js JavaScriptタグが付けられた新着投稿 - Qiita 文字コードを指定してURLエンコードを行う(Node.js) https://qiita.com/fukuchi0527/items/5d4a86f168ea298b696b そのAPIはクエリストリングをAPIの名前keyvalueampkeyvalueampsignature認証用の値にしてリクエスト送信してくださいね、ということで下記のようなソースでクエリストリングを作成。 2021-08-09 18:12:23
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) iframe内におけるJavaScriptによるイベントトラッキング (Google Tag Managerを使えないAmebaOwnd上でイベントトラッキングを実現するために) https://teratail.com/questions/353478?rss=all iframe内におけるJavaScriptによるイベントトラッキングGoogleTagManagerを使えないAmebaOwnd上でイベントトラッキングを実現するために前提・実現したいことAmebaOwndというWEBサイト作成サービスで作ったページ上でイベントトラッキングをし、GooglenbspAnalyticsGAにデータを送信したいです。 2021-08-09 18:42:01
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) AWSのセキュリティグループのどれが実行されるか知りたいです。 https://teratail.com/questions/353477?rss=all 認識 2021-08-09 18:11:51
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) オンプレミスのファイルサーバー上にIISサーバーを立てることは可能ですか? https://teratail.com/questions/353476?rss=all aspnetc 2021-08-09 18:05:27
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) AmazonAppstoreへのアプリ申請でコンテンツポリシー違反している部分が分からない https://teratail.com/questions/353475?rss=all AmazonAppstoreへのアプリ申請でコンテンツポリシー違反している部分が分からない前提・実現したいこと作成したアプリをAmazonnbspAppstoreで申請したところ、以下の通りAmazonコンテンツポリシーに違反しているとのことで、修正して再申請しようとしているのですが、コンテンツぽしりーを見ても、具体的にどこで使用者に誤解させてしまっているのかが分かりませんでした。 2021-08-09 18:04:33
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) Unityでビルド作成したXcodeプロジェクトを、XcodeでiOS Simulatorをターゲットにビルドするとエラーが出る https://teratail.com/questions/353474?rss=all Unityでビルド作成したXcodeプロジェクトを、XcodeでiOSSimulatorをターゲットにビルドするとエラーが出るUnityでXcodeプロジェクトをビルドし、当該プロジェクトをXcodeで開きビルドしようとしました。 2021-08-09 18:04:09
AWS AWSタグが付けられた新着投稿 - Qiita AWS Client VPN with TrustLogin https://qiita.com/kudarisenmon/items/c595351c15c9360fe911 設定項目設定内容アクセスを有効にするサブネット任意のサブネットアクセス権を付与する対象特定のアクセスグループのユーザーへのアクセスを許可するアクセスグループIDTrustLoginで作成したグループ名VPNUser説明任意の説明ルートテーブルVPC外のネットワークにアクセスする場合はルートの作成でルーティングを追加します。 2021-08-09 18:34:30
AWS AWSタグが付けられた新着投稿 - Qiita 何となくわかった気になる週刊AWS – 2021/7/26週 https://qiita.com/NaGym_t/items/d81e2d5637ef02cbacb2 実際の環境を構築していないので字面でしか理解していないのですが、AmazonRouteアプリケーション復旧コントローラーの紹介に詳細な解説と紙芝居形式のデモがありましたので、是非ご覧ください。 2021-08-09 18:13:12
Ruby Railsタグが付けられた新着投稿 - Qiita スケーラブルなフロントエンド開発 on Rails https://qiita.com/punkshiraishi/items/1cf9633944b124ce1f23 もう一度結論CSSを可能な限り書かない→TailwindonRailsどうしてもCSSを使いたいときはScopedに書くviewscomponentsFormHelperのレイヤーで考えるグローバルなCSSは基本的なHTML要素に限り使用可とするViewComponentを使用するRailsでも、CSSを使わず、コンポーネント分割を意識することで、スケールするフロントエンド開発ができそうです。 2021-08-09 18:13:32
技術ブログ Developers.IO クロスプラットフォームなAzure Data StudioでグラフビューアとSandDanceを使う https://dev.classmethod.jp/articles/azure-data-studio-graph-viewer-sanddance/ sqlserver 2021-08-09 09:20:39
海外TECH DEV Community Get a Flux grant for deploying your app on the Flux network https://dev.to/cryptovium/get-a-flux-grant-for-deploying-your-app-on-the-flux-network-2nbh Get a Flux grant for deploying your app on the Flux networkFlux has opened up applications for developers to get a Flux at time of writing grant for creating and deploying something awesome on the Flux network If you ve got the ideas skills and motivation to build something truly unique then Flux s decentrealized cloud network is the place to build it What is Flux Flux is a powerful global decentralized computing network currently made up of over community run decentralized nodes powered by the revolutionary second layer operating system FluxOS Each node is capable of hosting dockerized applications with FluxOS ensuring that a set number of containers are run across the network This ensures true decentralization and that your app is always available The Flux Network currently has close to vCores TB RAM and TB of SSD storage available for apps to consume Powering the ecosystem is the Flux blockchain a Proof of Work chain that is used for rewarding miners and node operators payment for compute resources and much more Apps already on the Flux NetworkThe Flux network already hosts dozens of apps and aspects of blockchain infrastructure for other projects Flux can run any hardened dockerized image so the possibilities of what you can build are endless They recently completed a dapps in days challenge which new apps added to the network including numerous games In fact Flux is perfect for hosting online games and even has some Minecraft servers currently running on the network As mentioned above Flux also hosts aspects of other Crypto projects infrastructure the best example of which is Kadena There are hundreds of Kadena nodes currently being run on the Flux Network To see a complete list of apps running on Flux check out dapps section k Flux grantsTo keep the ball rolling after the dapps in days challenge Flux is looking for the next killer decentralized application and is inviting developers to submit their ideas to be in with a chance of getting one of those k FLUX grants It can be a single app a platform system consisting of a combination of apps or something else entirely as long as it harnesses the strengths of a decentralized cloud and helps to grow the network Grants are give for the development proposals that are greenlighted by the community DAO and are paid in phases at key project milestones with the final amount paid on the final production deployment How to applyFor more details on how to apply and what winning the grant will mean please check out the following post from the Flux team Further readingIf you d like to learn more about the Flux project as a whole then checkout the Flux website drop by the Flux discord or give them a follow on Twitter I also cover Flux and other projects extensively on my own Twitter account including weekly updates on the earning potential of running a Flux node Cryptovium cryptovium I m a month into running my stratus FluxNode so time for a monthly update Even with the suppressed FLUX and KDA prices we re experiencing at the moment these things are PassiveIncome powerhouses As the Crypto market conditions improve Monthly profit PM Jul Give me a follow 2021-08-09 09:54:04
海外TECH DEV Community strip.pysondb a new JSON DB for python https://dev.to/adwaithrajesh/strip-pysondb-a-new-json-db-for-python-2c75 strip pysondb a new JSON DB for pythonToday we will be talking about strip pysondb as the name suggest it s stripped down version of an existing JSON DB called pysondb We will discuss some issues with pysondb and how the strip pysondb fixes those issues But first some of the core features of strip pysondb are No third party packages neededNo CLINo ImageUtilsUse of python naming conventions in functions and classes Just the code required to perform CRUD operation on JSON DB Users can generate custom id s for theirEven though its called a stripped down version of the original There are some huge differences in the strip pysondb works The data is not saved to file instantly instead a methods needs to be called in order to do that The user is supposed to pass the keys column name for the DB during initialization of the DB class Some of the new methods that are not derived from PysonDB are popcommitloadvaluesset id generatorid exists Let s talk about speedHere is a sample code that continuously add values to the DB and calculates the time it takes to add all the valuespysonDB pip install pysondb test py from time import time from pysondb import db a db getDb test json t time for i in range a add name f name i age i t time print t t Output py test py Yep it takes seconds to add values If the DB already has a values then it takes seconds strip pysondb pip install strip pysondb test py from time import time from pysondb import DB db DB keys name age t time for i in range db add name f name i age i db commit test json t time print t t Output py test py As you can see it only takes seconds to add values It only takes seconds to values to the DB Click here to see the GItHub Repo and for more info on the usage of strip pysondb Star it if you like it So next time you want to use a DB in your projects choose wisely and research all the available options Thank you for reading 2021-08-09 09:33:51
海外TECH DEV Community Considerations in Building Enclaves for Multiparty Computation (Part 2) https://dev.to/oblivious/considerations-in-building-enclaves-for-multiparty-computation-part-2-2pcn Considerations in Building Enclaves for Multiparty Computation Part Getting Your Code OnNow that you ve pinned down the ideal functionality of the enclave and assuming you are comfortable coding up a server to handle requests from each party we can talk about some of the aspects you probably want to keep in mind In AWS you can treat Nitro Enclaves as a self contained VM with an Enclave Image File build from a Docker image running inside The communication in and out of the enclave is via virtual sockets vsock only to the parent instance that is the instance that created the enclave The parent instance acts as an intermediary between the enclave and the outside world with the sole exception of the KMS Proxy which speaks directly with AWS Key Management Service To start the purpose of using a trusted execution environment is because the parties don t trust each other So we have to assume the users of the enclave are adversarial by nature This means there is an onus on you the developer to develop a secure application which is often easier said than done A good starting point is to create strict input and output validators If the IO is forced to conform to a predefined JSON schema or OpenAPI definition at least you should be able to validate that while checking for any malicious characters and so on You should endeavor to be particularly careful when handling bytes as an input especially in Python The YouTuber PwnFunction has a nice introductory tutorial on a known exploit in Python s Pickle library which you can find here There is an ever persisting battle of course between usability and security Some would strongly argue that enclave source code should be in either C or Rust while others feel comfortable using languages such as Python in order to take advantage of a particular tool or framework within the enclave itself Irrespective of your decision the code can be made more secure by performing rigorous testing performing static analysis such as SonarCloud and using internal firewalls to lock down any unexpected communication channels ‌Once you ve hardened the IO of the enclave you may also want to consider your authentication model for within the enclave This can be as simple as inputting the key management services the enclave can speak to as a build argument discusses in the next section or using pre shared keys with TLS PSK for example OAuth based approaches may cause some additional considerations if the enclave can not directly communicate with a trusted key authority for public key cryptographic approaches That s not to say it s impossible but one should certainly think through the challenges and potential risks which may be involved if there is a parent server acting as a man in the middle Encoding Guarantees Build Arguments and Environment VariablesPreviously we established that the enclave image converted from the Docker image running inside the Nitro Enclave is what is attested when requesting key access from one or more of the parties Well we can use this fact to develop reusable enclave images For example assume that we have two parties Alice and Bob They would like to be authorised based on some hash of their respective KMS ARNs and would also like to limit the number of function calls made by Alice to and Bob to Now imagine another scenario where Alice and Charlie would like to run the same interaction but this time Alice can only make function calls and Charlie In such a scenario you do not want to be hard coding this information each time Instead you can leverage Docker build arguments and set them as environment variables within the enclave This changes the Docker image and as such the attestation hashes that are used to verify the container to the key management services It also can be highly efficient too depending on how you create your Docker image as it can take advantage of build caching such that building the image with new arguments can be a painless process Persistent Storage PCI Devices amp Resource RequirementsNitro Enclaves endeavor to ensure security by locking down a virtual machine to a very limited set of functionalities It operates purely in RAM with dedicated CPUs As such many functionalities you may expect may not be available For example one would typically expect to have persistent storage on a Volume on an EC instance However this of course is outside of the enclave so you have to encrypt data using a KMS before releasing it to the parent instance In the context of multiparty computation this poses an interesting question whose keys to use To answer this you may wish to consider who manages the parent instance and how many of the parties would need to collaborate together to decrypt the data if the encrypted payload was to ever be leaked One approach would be to encrypt the packet with each party s KMS in turn and reverse the process when decrypting the payload if returned to the enclave at a later point There is nothing obviously wrong with this approach but as we no every encryption and decryption will add to the latency of the enclave overall When it comes to data we ve found it s best to assume the enclave is transactional and to save and reload persistent data for better confidence That is not to say you shouldn t save anything locally but best to consider it as a cache That way if the enclave were to halt and be restored you have the safety net of being able to reload the state of the enclave A second challenge is that no PCI devices are available to the enclave so if you are hoping to crunch some data on a GPA or equivalent you may want to think again Your only obvious solution in such a scenario is to pay for an instance with more powerful CPUs and or to allocate more of them to the enclave to facilitate threading and multiprocessing Finally one must remember that the entire enclave lives within the permitted resources at launch time This means the enclave must have enough ram for the enclave image all RAM required internally and all RAM which will store the file system and so forth This is worth keeping in mind as you develop your enclave and taking a resource efficient design can save you significantly on your monthly AWS bills Timing AttacksImportantly enclaves give you a guarantee that what code you agree gets run not that it is safe to run This is a big difference and the onus is on the developer to make sure that side channels such as execution time do not leak sensitive information that was unforeseen when signing off on the ideal functionality Let s have a look at how the timing of execution may inadvertently change the guessing probability of a party s secret input Suppose Alice inputs a decision tree that Bob wishes to use to classify some data If the decision tree is not balanced ie if there is a different number of comparisons required depending on the path taken through the branches of the decision tree then simple timing of the execution time may reveal what the output of the classification was While not always trivial to achieve you should endeavor to create fixed time programs for enclaves if the timing is likely to reveal superfluous information to one or more parties involved SummaryWhile not delving into actual code we ve tried to outline some pointers towards building your first few enclaves Even the pros can make a mistake with a poorly defined ideal functionality or an insecure implementation Take your time give it a shot and be comfortable to make some mistakes initially Enclave technology is still very new and there is great reward in being an early pioneer in developing and leveraging enclave applications Why Oblivious ‌At Oblivious we ve built the first full service enclave management system for multiparty applications It s called Ignite and it allows data scientists and machine learning practitioners to take advantage of prebuilt enclaves for data exploration analysis training and inference If you are interested in the technology reach out to us to get started today 2021-08-09 09:21:31
Apple AppleInsider - Frontpage News Apple publishes response to criticism of child safety initiatives https://appleinsider.com/articles/21/08/09/apple-publishes-response-to-criticism-of-child-safety-initiatives?utm_medium=rss Apple publishes response to criticism of child safety initiativesApple has published an FAQ document detailing its response to privacy criticisms of its new iCloud Photos feature of scanning for child abuse images Credit AppleApple s suite of tools meant to protect children has caused mixed reactions from security and privacy experts with some erroneously choosing to claim that Apple is abandoning its privacy stance Now Apple has published a rebuttal in the form of a Frequently Asked Questions document Read more 2021-08-09 09:29:04
海外科学 NYT > Science Where the Lab Rats Are Tickled: It’s More Science Than Art https://www.nytimes.com/2021/08/09/world/australia/lab-rats-tickle.html australia 2021-08-09 09:35:19
海外ニュース Japan Times latest articles With Olympics over, Suga faces uncertain future over COVID-19 response https://www.japantimes.co.jp/news/2021/08/09/national/politics-diplomacy/suga-post-olympics/ With Olympics over Suga faces uncertain future over COVID responseExperts say the prime minister must now cling to hope that the country s vaccine drive will pay off in time to prevent a medical system 2021-08-09 18:48:29
海外ニュース Japan Times latest articles Japan’s push to phase out faxes faces resistance from bureaucrats https://www.japantimes.co.jp/news/2021/08/09/national/fax-machine-phaseout-pushback/ Japan s push to phase out faxes faces resistance from bureaucratsAfter a government task force issued a notice telling ministries to abandon their fax machines it was inundated with about responses from officials 2021-08-09 18:43:14
海外ニュース Japan Times latest articles How we saw it: The Athletes’ Olympics https://www.japantimes.co.jp/sports/2021/08/09/olympics/summer-olympics/athletes-olympics-support/ fellow 2021-08-09 18:41:20
海外ニュース Japan Times latest articles A first time for everything: The many ways history was made at Tokyo 2020 https://www.japantimes.co.jp/sports/2021/08/09/olympics/summer-olympics/tokyo-olympic-firsts/ A first time for everything The many ways history was made at Tokyo Plenty of records were broken and a number of new sports were introduced But beyond the more obvious first there was a dizzying array of 2021-08-09 18:37:43
海外ニュース Japan Times latest articles How we saw it: The Mental Health Olympics https://www.japantimes.co.jp/sports/2021/08/09/olympics/summer-olympics/mental-health-olympics/ consciousness 2021-08-09 18:21:56
ニュース BBC News - Home Peter Kay: Cancer patient 'honoured' to inspire comic's comeback gig https://www.bbc.co.uk/news/uk-england-lancashire-58143012 treatment 2021-08-09 09:23:13
ニュース BBC News - Home Porth Ysgo rescue: Two people rescued from disused mine shaft https://www.bbc.co.uk/news/uk-wales-58143594 shaft 2021-08-09 09:00:59
ニュース BBC News - Home Ocado to allow staff to work remotely from abroad https://www.bbc.co.uk/news/business-58143560 firms 2021-08-09 09:49:21
ニュース BBC News - Home Harry Dunn: Lawyers claim phone may have distracted suspect https://www.bbc.co.uk/news/uk-england-northamptonshire-58144499 crash 2021-08-09 09:37:38
ニュース BBC News - Home George Burgess returns to Australia's NRL https://www.bbc.co.uk/sport/rugby-league/58144519 dragons 2021-08-09 09:18:33
ニュース BBC News - Home Covid rules: What's changing in Wales, Scotland, England and Northern Ireland https://www.bbc.co.uk/news/explainers-52530518 wales 2021-08-09 09:33:50
ビジネス ダイヤモンド・オンライン - 新着記事 【米国株】「クルーズ船」関連銘柄を解説! 新型コロナ の影響で旅行関連株の株価が低迷中の今、運行が再開 した「クルーズ船」関連株は“押し目買い”のチャンス! - 世界投資へのパスポート https://diamond.jp/articles/-/279083 2021-08-09 18:30:00
北海道 北海道新聞 美浜蒸気噴出事故17年で追悼式 「反省と教訓風化させぬ」 https://www.hokkaido-np.co.jp/article/576631/ 福井県美浜町 2021-08-09 18:19:00
北海道 北海道新聞 核の先制不使用、受け入れを 元米高官らが日本側に書簡 https://www.hokkaido-np.co.jp/article/576616/ 受け入れ 2021-08-09 18:14:03
北海道 北海道新聞 首相に被爆体験者の救済要望 厚労相「科学的知見ない」 https://www.hokkaido-np.co.jp/article/576629/ 被爆体験者 2021-08-09 18:10:00
北海道 北海道新聞 「せたな潮トマト」海水で育ち甘み増す 出荷が本格化 https://www.hokkaido-np.co.jp/article/576628/ 海洋深層水 2021-08-09 18:09:14
ビジネス 東洋経済オンライン 万全な体の為の脱プラスチックのすすめ【動画】 「身の回りの化学物質」が私たちに与える危険性 | 健康 | 東洋経済オンライン https://toyokeizai.net/articles/-/446928?utm_source=rss&utm_medium=http&utm_campaign=link_back 化学物質 2021-08-09 18:05:00

コメント

このブログの人気の投稿

投稿時間:2021-06-17 05:05:34 RSSフィード2021-06-17 05:00 分まとめ(1274件)

投稿時間:2021-06-20 02:06:12 RSSフィード2021-06-20 02:00 分まとめ(3871件)

投稿時間:2020-12-01 09:41:49 RSSフィード2020-12-01 09:00 分まとめ(69件)