TECH |
Engadget Japanese |
面倒な収納もボタンを押せば自動で完了。愛車を汚れや紫外線から守る車体カバー「Auto Car Coat」 |
https://japanese.engadget.com/auto-car-coat-225017582.html
|
面倒な収納もボタンを押せば自動で完了。 |
2021-08-12 22:50:17 |
TECH |
Engadget Japanese |
iPhoneやiPadなどApple製品専用にゲームコントローラー「Nimbus+」を買ってみた|買い物レビュー日記 |
https://japanese.engadget.com/mini-review-steelseries-222516928.html
|
nimbus |
2021-08-12 22:25:16 |
TECH |
Engadget Japanese |
シン・エヴァ劇場版、プライムビデオで独占配信スタート |
https://japanese.engadget.com/primevideo-221501363.html
|
amazonprimevideo |
2021-08-12 22:15:01 |
IT |
ITmedia 総合記事一覧 |
[ITmedia エンタープライズ] 企業体質に合う「日本型テレワーク」とは 総務省が提言書を公開 |
https://www.itmedia.co.jp/enterprise/articles/2108/13/news047.html
|
itmedia |
2021-08-13 07:15:00 |
TECH |
Techable(テッカブル) |
自律走行型配送ロボット「YUNJI DELI」、国内ホテルで初めて鶴雅リゾートに導入 |
https://techable.jp/archives/159628
|
yunjideli |
2021-08-12 22:00:11 |
AWS |
AWS |
Formula 1 Redesigns Cars for Closer Racing with AWS HPC Solutions | Amazon Web Services |
https://www.youtube.com/watch?v=GO7foPZSokg
|
Formula Redesigns Cars for Closer Racing with AWS HPC Solutions Amazon Web ServicesFormula F which has the world s fastest regulated racing cars needed to redesign its cars to enable closer racing action To solve the problem F moved its on premises computational fluid dynamics CFD technology platform to AWS using Amazon EC Cn instances and AWS Graviton based Cg instances to run simulations that visualize wake turbulence F has cut CFD simulation time by percent and reduced downforce loss in wheel to wheel racing from percent to percent Now cars can drive closer to each other and overtake more easily making races more exciting Find out how running computational fluid dynamics workloads on AWS can reduce simulation times accelerate product design and enable faster innovation Learn more at Subscribe More AWS videos More AWS events videos ABOUT AWSAmazon Web Services AWS is the world s most comprehensive and broadly adopted cloud platform offering over fully featured services from data centers globally Millions of customers ーincluding the fastest growing startups largest enterprises and leading government agencies ーare using AWS to lower costs become more agile and innovate faster AWS AmazonWebServices CloudComputing |
2021-08-12 22:32:34 |
python |
Pythonタグが付けられた新着投稿 - Qiita |
【Python演算処理】環論(Ring Theory)に立脚した全体像再構築②同値関係(Equivalence Relation)の再習 |
https://qiita.com/ochimusha01/items/0374f5579545f4981ec5
|
「二項関係」と「順列」および「組み合わせ」うさぎでもわかる離散数学第羽二項関係編とある集合Sから、集合Sの要素をつ並べたものを何個か集めた集合集合論的表現では「Sの部分集合」を二項関係と言います。 |
2021-08-13 07:26:06 |
python |
Pythonタグが付けられた新着投稿 - Qiita |
StreamlitとTensorFlowで犬猫判定アプリを作りました |
https://qiita.com/oddgai/items/2a1074cbd127c1a62709
|
アップロードした画像がたまに度回転して表示されてしまうスマホで撮影した画像でよく起こっていたもので、それによって判定にも良くない影響が出ていました実家の猫の画像が確実に猫gtほぼ猫にランクダウンするなど。 |
2021-08-13 07:17:15 |
Program |
[全てのタグ]の新着質問一覧|teratail(テラテイル) |
React CSS ページ全体の背景色を揃えたい |
https://teratail.com/questions/354052?rss=all
|
ReactCSSページ全体の背景色を揃えたいbootstrapを初めて利用してWebページを作成しています。 |
2021-08-13 07:11:50 |
golang |
Goタグが付けられた新着投稿 - Qiita |
Go言語:foo(s []int)とfoo(s *[]int)本質的な違い |
https://qiita.com/xu1718191411/items/4b6850bb7819dacd1d66
|
funcfooarrintltスライスのポインタを使う場合funcbararrintltスライスのポインタを使わない場合結論結論関数内からスライスが参照するArrayの要素だけ変更したい場合は、スライスのポインタを使う必要がありません結論関数内から外側のスライスの変更startlencapスライスのポインタを使うべきです結論関数内の変更がスライスが参照するArrayを作り直された場合、スライスポインタを使うべきです説明結論関数内からスライスの要素だけを変更したい場合は、ポインタを使う必要がありません。 |
2021-08-13 07:57:19 |
海外TECH |
Ars Technica |
School mask battles rage on as more children fall ill, fill hospitals |
https://arstechnica.com/?p=1786940
|
adult |
2021-08-12 22:26:15 |
海外TECH |
DEV Community |
Build End-to-End Encryption in 51 lines of Rust |
https://dev.to/mrinal/build-end-to-end-encryption-in-51-lines-of-rust-340p
|
Build End to End Encryption in lines of Rust ockam network ockam End to end encryption and mutual authentication for distributed applications Ockam is a rust library that makes it simple for distributed applications to guarantee end to end integrity authenticity and confidentiality of data In this post we ll create two small Rust programs called Alice and Bob Alice and Bob will send each other messages over the network via a cloud service They will mutually authenticate each other and will have a cryptographic guarantee that en route messages were not tampered or forged The intermediary cloud service and attackers on the network will not be able to see or change the contents of en route messages In later examples we ll also see how we can have this end to end protection even when the communication path between Alice and Bob is more complex with multiple transport connections a variety of transport protocols and many intermediaries Show me the code Remove implicit trust in porous network boundariesModern distributed applications operate in highly dynamic environments Infrastructure automation microservices in multiple clouds or data centers a mobile workforce the Internet of Things and Edge computing mean that machines and applications are continuously leaving and entering network boundaries Application architects have learnt that they must lower the amount of trust they place in network boundaries and infrastructure The vulnerability surface of our application cannot include all code that may be running within the same porous network boundary That surface is too big too dynamic and usually outside the control of an application developer Applications must instead take control of the security and reliability of their own data To do this all messages that are received over the network must prove who sent them and show that they weren t tampered with or forged Lower trust in intermediariesAnother aspect of modern applications that can take away Alice s and Bob s ability to rely on the integrity and authenticity of incoming messages are intermediary services such as the cloud service in our example below Data within distributed applications are rarely exchanged over a single point to point transport connection Application messages routinely flow over complex multi hop multi protocol routes ーacross data centers through queues and caches via gateways and brokers ーbefore reaching their end destination Typically when information or commands are exchanged through an intermediary service the intermediary is able to READ the messages that are being exchanged UPDATE en route messages CREATE messages that were never sent and DELETE never deliver messages that were actually sent Alice and Bob are entirely dependent on the security of such intermediaries If the defenses of an intermediary are compromised our application is also compromised Transport layer security protocols are unable to protect application messages because their protection is constrained by the length and duration of the underlying transport connection If there is an intermediary between Alice and Bob the transport connection between Alice and the intermediary is completely different from the transport connection between Bob and the intermediary This is why the intermediary has full CRUD permissions on the messages in motion In environments like Microservices Internet of Things and Edge Computing there are usually many such intermediaries Our application s vulnerability surface quickly grows and becomes unmanageable Mutually Authenticated End to End Encrypted Secure Channels with OckamOckam crate makes it simple for applications to create any number of lightweight mutually authenticated end to end encrypted secure channels These channels use cryptography to guarantee end to end integrity authenticity and confidentiality of messages An application can use Ockam Secure Channels to enforce least privileged access to commands data configuration machine learning models and software updates that are flowing as messages between its distributed parts Intermediary services and compromised software that may be running within the same network boundary no longer have implicit CRUD permissions on our application s messages Instead we have granular control over access permissions tampering or forgery of data in motion is immediately detected With end to end secure channels we can make the vulnerability surface of our application strikingly small Rust ExampleLet s build end to end protected communication between Alice and Bob through a cloud service We ll create two small Rust programs called Alice and Bob We want Bob to create a secure channel listener and ask Alice to initiate a secure handshake authenticated key exchange with this listener We ll imagine that Bob and Alice are running on two separate computers and this handshake must happen over the Internet We ll also imagine that Bob is running within a private network and cannot open a public port exposed to the Internet Instead Bob registers a forwarding address on an Ockam Node running as a cloud service in Ockam Hub This node is at TCP address node ockam network and offers two general purpose Ockam services routing and forwarding SetupIf you don t have it please install the latest version of Rust curl proto https tlsv sSf shNext create a new cargo project to get started cargo new lib hello ockam amp amp cd hello ockam amp amp mkdir examples amp amp echo ockam gt gt Cargo toml amp amp cargo buildIf the above instructions don t work on your machine please post a question we would love to help BobCreate a file at examples bob rs and copy the below code snippet to it examples bob rsuse ockam Context Entity Result SecureChannels TrustEveryonePolicy Vault use ockam RemoteForwarder Routed TcpTransport Worker TCP struct Echoer Define an Echoer worker that prints any message it receives and echoes it back on its return route ockam worker impl Worker for Echoer type Context Context type Message String async fn handle message amp mut self ctx amp mut Context msg Routed lt String gt gt Result lt gt println n ✓ Address Received ctx address msg Echo the message body back on its return route ctx send msg return route msg body await ockam node async fn main ctx Context gt Result lt gt Initialize the TCP Transport TcpTransport create amp ctx await Create a Vault to safely store secret keys for Bob let vault Vault create amp ctx Create an Entity to represent Bob let mut bob Entity create amp ctx amp vault Create a secure channel listener for Bob that will wait for requests to initiate an Authenticated Key Exchange bob create secure channel listener listener TrustEveryonePolicy The computer that is running this program is likely within a private network and not accessible over the internet To allow Alice and others to initiate an end to end secure channel with this program we connect with node ockam network as a TCP client and ask the forwarding service on that node to create a forwarder for us All messages that arrive at that forwarding address will be sent to this program using the TCP connection we created as a client let node in hub TCP node ockam network let forwarder RemoteForwarder create amp ctx node in hub listener await println n ✓ RemoteForwarder was created on the node at node ockam network println Forwarding address for Bob is println forwarder remote address Start a worker of type Echoer at address echoer This worker will echo back every message it receives along its return route ctx start worker echoer Echoer await We won t call ctx stop here this program will run until you stop it with Ctrl C Ok AliceCreate a file at examples alice rs and copy the below code snippet to it examples alice rsuse ockam route Context Entity Result SecureChannels TrustEveryonePolicy Vault use ockam TcpTransport TCP use std io ockam node async fn main mut ctx Context gt Result lt gt Initialize the TCP Transport TcpTransport create amp ctx await Create a Vault to safely store secret keys for Alice let vault Vault create amp ctx Create an Entity to represent Alice let mut alice Entity create amp ctx amp vault This program expects that Bob has setup a forwarding address for his secure channel listener on the Ockam node at node ockam network From standard input read this forwarding address for Bob s secure channel listener println nEnter the forwarding address for Bob let mut address String new io stdin read line amp mut address expect Error reading from stdin let forwarding address address trim Combine the tcp address of the node and the forwarding address to get a route to Bob s secure channel listener let route to bob listener route TCP node ockam network forwarding address As Alice connect to Bob s secure channel listener and perform an Authenticated Key Exchange to establish an encrypted secure channel with Bob let channel alice create secure channel route to bob listener TrustEveryonePolicy println n ✓ End to end encrypted secure channel was established n loop Read a message from standard input println Type a message for Bob s echoer let mut message String new io stdin read line amp mut message expect Error reading from stdin let message message trim Send the provided message through the channel to Bob s echoer ctx send route channel clone echoer message to string await Wait to receive an echo and print it let reply ctx receive lt String gt await println Alice received an echo n reply should print Hello Ockam This program will keep running until you stop it with Ctrl C Run the exampleRun Bob s program cargo run example bobThe Bob program creates a Secure Channel Listener to accept requests to begin an Authenticated Key Exchange It also connects over TCP to the cloud node at node ockam network and creates a Forwarder on that cloud node All messages that arrive at that forwarding address will be forwarded to Bob using the TCP connection that Bob created as a client Bob also starts an Echoer worker that prints any message it receives and echoes it back on its return route The Bob program will print a hex value which is the forwarding address for Bob on the cloud node copy it In a separate terminal window in the same directory path run the Alice program cargo run example aliceIt will stop to ask for Bob s forwarding address that was printed in step Give it that address This will tell Alice that the route to reach Bob is TCP node ockam network forwarding address When Alice sends a message along this route the Ockam routing layer will look at the first address in the route and hand the message to the TCP transport The TCP transport will connect with the cloud node over TCP and hand the message to it The routing layer on the cloud node will then take the message to the forwarding address for Bob The forwarder at that address will send the message to Bob over the TCP connection Bob had earlier created with the cloud node Replies from Bob take the same path back and the entire secure channel handshake is completed is this way End to end Secure Channel is established Send messages to Bob and get their echoes back Once the secure channel is established the Alice program will stop and ask you to enter a message for Bob Any message that you enter is delivered to Bob using the secure channel via the cloud node The echoer on Bob will echo the messages back on the same path and Alice will print it ConclusionCongratulations on creating your first end to end encrypted application We discussed that in order to have a small and manageable vulnerability surface distributed applications must use mutually authenticated end to end encrypted channels Implementing an end to end secure channel protocol from scratch is complex error prone and will take more time than application teams can typically dedicate to this problem In the above example we created a mutually authenticated end to end encrypted channel in lines of code excluding comments Ockam combines proven cryptographic building blocks into a set of reusable protocols for distributed applications to communicate security and privately The above example only scratched the surface of what is possible with the tools that our included in the ockam Rust crate To learn more please see our use case guide on End to End Encryption through Kafka and our Step by Step Deep Dive into the various building blocks that makeup Ockam ockam network ockam End to end encryption and mutual authentication for distributed applications |
2021-08-12 22:19:41 |
Apple |
AppleInsider - Frontpage News |
Apple employees express concern over new child safety tools |
https://appleinsider.com/articles/21/08/12/apple-employees-express-concern-over-new-child-safety-tools?utm_medium=rss
|
Apple employees express concern over new child safety toolsApple employees are voicing concern over the company s new child safety features set to debut with iOS this fall with some saying the decision to roll out such tools could tarnish Apple s reputation as a bastion of user privacy Pushback against Apple s newly announced child safety measures now includes critics from its own ranks who are speaking out on the subject in internal Slack channels reports Reuters Announced last week Apple s suite of child protection tools includes on device processes designed to detect and report child sexual abuse material uploaded to iCloud Photos Another tool protects children from sensitive images sent through Messages while Siri and Search will be updated with resources to deal with potentially unsafe situations Read more |
2021-08-12 22:45:06 |
Apple |
AppleInsider - Frontpage News |
Disney+ reaches 116M subscribers in less than two years |
https://appleinsider.com/articles/21/08/12/disney-reaches-116m-subscribers-in-less-than-two-years?utm_medium=rss
|
Disney reaches M subscribers in less than two yearsDisney continues to rake in new users with the streaming service doubling figures from to hit million subscribers in Disney s third fiscal quarter of Disney announced the subscriber growth numbers PDF link alongside a Wall Street beat on Thursday reporting billion in revenue compared to an expected billion reports CNBC Disney s premiere streaming service Disney hit million subscribers to beat analyst estimates by nearly million That s a more than bump from the same time last year when the product boasted million subscribers Read more |
2021-08-12 22:54:48 |
海外TECH |
Engadget |
Wendy's plans 700 kitchens expressly for food delivery apps |
https://www.engadget.com/wendys-ghost-kitchen-food-delivery-uber-eats-doordash-grubhub-220215092.html?src=rss
|
Wendy x s plans kitchens expressly for food delivery appsGiven how convenient it is to tap a few buttons and have someone bring dinner to your door food delivery isn t likely to drop in popularity anytime soon Wendy s is looking to meet surging demand by opening hundreds of delivery only kitchens in the next few years The likes of Uber Eats DoorDash and Grubhub will handle orders Wendy s is planning to open such kitchens in the US UK and Canada by as the Associated Press reports The locations will primarily be in major cities and the first should be up and running this year Reef Technology which already manages around so called quot ghost kitchens quot will open the Wendy s locations and hire workers Wendy s will take around a six percent cut of sales which are expected to hit at least annually at each kitchen The concept of ghost kitchens has been around for several years They re kitchens without storefronts that make food orders only for delivery or pickup ーsome are run out of existing brick and mortar restaurants Other fast food chains have experimented with the idea including Chick fil A and Chipotle Meanwhile YouTuber MrBeast uses ghost kitchens for his burger chain which has more than locations nbsp |
2021-08-12 22:02:15 |
海外科学 |
NYT > Science |
F.D.A. Approves GHB, a ‘Date Rape’ Drug, for Rare Sleeping Disorder |
https://www.nytimes.com/2021/08/12/health/GHB-hypersomnia-sleep-FDA.html
|
F D A Approves GHB a Date Rape Drug for Rare Sleeping DisorderJazz Pharmaceuticals brought in more than billion last year selling GHB to narcolepsy patients With the new approval sales could soar |
2021-08-12 22:22:50 |
海外科学 |
NYT > Science |
For Many, Hydrogen Is the Fuel of the Future. New Research Raises Doubts. |
https://www.nytimes.com/2021/08/12/climate/hydrogen-fuel-natural-gas-pollution.html
|
For Many Hydrogen Is the Fuel of the Future New Research Raises Doubts Industry has been promoting hydrogen as a reliable next generation fuel to power cars heat homes and generate electricity It may in fact be worse for the climate than previously thought |
2021-08-12 22:30:01 |
金融 |
金融総合:経済レポート一覧 |
FX Daily(8月11日)~ドル円、米CPI公表後、110円台前半まで急落 |
http://www3.keizaireport.com/report.php/RID/465023/?rss
|
fxdaily |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
J-REIT市場における敵対的TOBを考える~TOBリスクが市場拡大を阻害する要因に:基礎研レポート |
http://www3.keizaireport.com/report.php/RID/465030/?rss
|
jreit |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
取締役会の多様性向上を図るナスダックの上場規則改正:大崎貞和のPoint of グローバル金融市場 |
http://www3.keizaireport.com/report.php/RID/465035/?rss
|
pointof |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
米消費者物価は高水準も前月比では伸び鈍化~NYダウ、S&P500指数は過去最高値を更新:マーケットレポート |
http://www3.keizaireport.com/report.php/RID/465053/?rss
|
三井住友トラスト |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
【ACI】ヘルスケア・マンスリー・レポート(2021年7月) |
http://www3.keizaireport.com/report.php/RID/465054/?rss
|
野村アセットマネジメント |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
米国リート市場動向と見通し(2021年8月号):REITレポート |
http://www3.keizaireport.com/report.php/RID/465055/?rss
|
見通し |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
インド準備銀行7会合連続政策金利据え置き~RBIは2021年度の消費者物価上昇率見通しを上方修正:新興国レポート |
http://www3.keizaireport.com/report.php/RID/465056/?rss
|
上方修正 |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
KAMIYAMA Seconds!:アメリカの雇用増と金融政策 |
http://www3.keizaireport.com/report.php/RID/465057/?rss
|
kamiyamaseconds |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
楽読 Vol.1730~長期・積立・分散投資の力を活用する |
http://www3.keizaireport.com/report.php/RID/465058/?rss
|
分散投資 |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
中国の各種規制強化の全体像および今後の見通し~規制強化は一段落しつつあり、年後半の政策の軸は景気下支えへ:マーケットレター |
http://www3.keizaireport.com/report.php/RID/465059/?rss
|
投資信託 |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
主要な資産の利回り比較(2021年7月)景気回復の遅れへの懸念等から国債利回りが大幅低下 |
http://www3.keizaireport.com/report.php/RID/465061/?rss
|
三井住友 |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
取引参加者の内部管理態勢に係るチェックポイント<2021年8月 改訂版> |
http://www3.keizaireport.com/report.php/RID/465066/?rss
|
取引参加者 |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
IPO Monthly Report (2021年7月)~2021年7月の月間新規上場会社数は、前年比2社増の9社。年始からの新規上場社数は62社(前年比21社増) |
http://www3.keizaireport.com/report.php/RID/465067/?rss
|
ipomonthlyreport |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
Q&A: 「自然資本」とは何か? また、投資家が関心を示すべき理由とは?:フォーカス |
http://www3.keizaireport.com/report.php/RID/465093/?rss
|
自然資本 |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
トヨタとテスラの時価総額に環境ブームの影:金融経済ニュースの着眼点 |
http://www3.keizaireport.com/report.php/RID/465097/?rss
|
大和総研 |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
【円債投資ガイド】日銀“民間丸投げ”気候変動オペが助長する事 |
http://www3.keizaireport.com/report.php/RID/465098/?rss
|
日本総合研究所 |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
インタビュー:UAEドバイ首長国の廃棄物処理・発電事業に初のプロジェクトファイナンス~インフラ・環境ファイナンス部門 社会インフラ部 第4ユニット 武内 香奈枝 調査役に聞く |
http://www3.keizaireport.com/report.php/RID/465101/?rss
|
国際協力銀行 |
2021-08-13 00:00:00 |
金融 |
金融総合:経済レポート一覧 |
地方銀行の紹介パンフレット 和文版(A4判・8ページ:2021年8月掲載) |
http://www3.keizaireport.com/report.php/RID/465113/?rss
|
全国地方銀行協会 |
2021-08-13 00:00:00 |
ニュース |
BBC News - Home |
Plymouth shooting: Multiple fatalities in Keyham |
https://www.bbc.co.uk/news/uk-england-devon-58195419
|
keyhama |
2021-08-12 22:44:04 |
ニュース |
BBC News - Home |
Man City prepared to pay £127m for Kane - Friday's gossip |
https://www.bbc.co.uk/sport/58190754
|
cristiano |
2021-08-12 22:01:22 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
ディズニー、4-6月は大幅増収 動画配信の契約数上振れ - WSJ発 |
https://diamond.jp/articles/-/279428
|
動画配信 |
2021-08-13 07:22:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
米の白人人口、史上初の減少 2020年国勢調査 - WSJ発 |
https://diamond.jp/articles/-/279429
|
国勢調査 |
2021-08-13 07:14:00 |
コメント
コメントを投稿