投稿時間:2021-11-15 21:31:55 RSSフィード2021-11-15 21:00 分まとめ(40件)

カテゴリー等 サイト名等 記事タイトル・トレンドワード等 リンクURL 頻出ワード・要約等/検索ボリューム 登録日
TECH Engadget Japanese 新型Pixelbookは2023年以降におあずけ? Google担当者が発言 https://japanese.engadget.com/google-chromebook-2023-110052741.html google 2021-11-15 11:00:52
IT ITmedia 総合記事一覧 [ITmedia News] 「鬼滅の刃じぇっと」空へ ANA国内線で22年1月就航 キャラクターの機内アナウンスも https://www.itmedia.co.jp/news/articles/2111/15/news153.html itmedia 2021-11-15 20:30:00
IT ITmedia 総合記事一覧 [ITmedia News] IIJ、PPAP廃止へ 社外から届くパスワード付きZIPファイルは削除 https://www.itmedia.co.jp/news/articles/2111/15/news148.html itmedianewsiij 2021-11-15 20:24:00
python Pythonタグが付けられた新着投稿 - Qiita 植物健康診断システムを作ってみた https://qiita.com/mantohihihihi/items/1335451365c916c978ff その情報をAPI人工知能モデルに渡す。 2021-11-15 20:33:38
js JavaScriptタグが付けられた新着投稿 - Qiita 行動履歴を記録する手間を省きたい!! https://qiita.com/dsvvpxgcseldie/items/380a20fe59bb6ae30dd2 行動履歴を記録する手間を省きたいコロナ禍において、毎日行動履歴を残し、週回上司へ報告コロナ感染拡大防止の為、自社では、毎日行動履歴を残して、週回上司に報告しております。 2021-11-15 20:39:40
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) LNK2019の解決 https://teratail.com/questions/369448?rss=all LNKの解決エラーの消去現在任意波形発生器FGをcで外部操作するプログラムを開発しております発生している問題・エラーメッセージLNK未解決の外部シンボルviOpenが関数mainで参照されましたというエラーメッセージが生じましたincludeファイルにheaderファイルのaposvisahaposをlibraryファイルにaposvisalibaposaposvisalibaposを設定していますが上記のエラーが発生してしまいますエラーの対策方法をお教えいただければ幸いです。 2021-11-15 21:00:16
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) 特定の文字列の間にある文字列のみ抽出したいです。 https://teratail.com/questions/369447?rss=all 特定の文字列の間にある文字列のみ抽出したいです。 2021-11-15 20:55:44
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) ML-Agents 学習開始時、TypeError: entry_points() missing 1 required positional argument: 'name'が表示される https://teratail.com/questions/369446?rss=all MLAgents学習開始時、TypeErrorentrypointsmissingrequiredpositionalargumentxnamexが表示される前提・実現したいことUnityでMLagentsを使って強化学習をしようと思っています。 2021-11-15 20:37:23
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) 当たり判定がうまくいかない https://teratail.com/questions/369445?rss=all 当たり判定がうまくいかない前提・実現したいことprocessingで的あてゲームを作っています。 2021-11-15 20:34:33
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) makeを入力するとNo such file or directoryが出てしまいます。 https://teratail.com/questions/369444?rss=all makeを入力するとNosuchfileordirectoryが出てしまいます。 2021-11-15 20:31:12
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) [Nuxt.js]auth moduleで$auth.loggedInがtrueにならない https://teratail.com/questions/369443?rss=all NuxtjsauthmoduleでauthloggedInがtrueにならない前提・実現したいことサーバーサイドはRailsでdevisetokenauth、フロントはNuxtjsでauthnbspmoduleを使って開発しています。 2021-11-15 20:22:52
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) [DOM] [JavaScript ] クラスからDOM要素の取得ができず困っております。 https://teratail.com/questions/369442?rss=all DOMJavaScriptクラスからDOM要素の取得ができず困っております。 2021-11-15 20:16:48
Program [全てのタグ]の新着質問一覧|teratail(テラテイル) C# ASP.NET Core 緯度・経度を住所に変換したい https://teratail.com/questions/369441?rss=all CASPNETCore緯度・経度を住所に変換したい前提・実現したいことASPNETnbspCorenbspRazornbspPagesで個人的にアプリを開発しています。 2021-11-15 20:02:21
Linux Ubuntuタグが付けられた新着投稿 - Qiita Runtu(Openbox)における、リモートデスクトップサーバーの設定の方法 https://qiita.com/hoperstep/items/d234a40f163c4a941a4d ならば、ということで、cinnamonをopenboxに読み替えて行うだが、画面が真っ黒sudoaptinstallyxserverxorgcorexorgxrdpxrdpここで、他のサイトを見てみるととあるので、xrdp以外で実行※xserverxorgcoreは既にインストール済みだが、引き続き、画面が真っ黒sudoaptinstallyxinitここで、悶々として、本家ubuntuとaptlistでパッケージを比較して、気づいたことが。 2021-11-15 20:23:43
海外TECH MakeUseOf The 7 Best Robot Mops for Cleaning Floors https://www.makeuseof.com/best-robot-mops/ extra 2021-11-15 11:40:21
海外TECH MakeUseOf The Best Black Friday Deals 2021 https://www.makeuseof.com/tag/best-black-friday-deals/ deals 2021-11-15 11:19:21
海外TECH DEV Community AWS Key Management Service Best Practices | AWS White Paper Summary https://dev.to/awsmenacommunity/aws-key-management-service-best-practices-aws-white-paper-summary-3ci3 AWS Key Management Service Best Practices AWS White Paper SummaryAWS Key Management Service AWS KMS is a managed service that allows you to concentrate on the cryptographic needs of your applications while Amazon Web Services AWS manages availability physical security logical access control and maintenance of the underlying infrastructure Further AWS KMS allows you to audit usage of your keys by providing logs of all API calls made on them to help you meet compliance and regulatory requirements Customers want to know how to effectively implement AWS KMS in their environment This whitepaper discusses how to use AWS KMS for each capability described in the AWS Cloud Adoption Framework Security Perspective whitepaper including the differences between the different types of customer master keys using AWS KMS key policies to ensure least privilege auditing the use of the keys and listing some use cases that work to protect sensitive information within AWS Identity and Access ManagementThe Identity and Access Management capability provides guidance on determining the controls for access management within AWS KMS to secure your infrastructure according to established best practices and internal policies AWS KMS and IAM PoliciesYou can use AWS Identity and Access Management IAM policies in combination with key policies to control access to your customer master keys CMKs in AWS KMS This section discusses using IAM in the context of AWS KMS It doesn t provide detailed information about the IAM service Policies attached to IAM identities that is users groups and roles are called identity based policies or IAM policies Policies attached to resources outside of IAM are called resource based policies In AWS KMS you must attach resource based policies to your customer master keys CMKs These are called key policies All KMS CMKs have a key policy and you must use it to control access to a CMK IAM policies by themselves are not sufficient to allow access to a CMK although you can use them in combination with a CMK key policy To do so ensure that the CMK key policy includes the policy statement that enables IAM policies Key PoliciesKey policies are the primary way to control access to CMKs in AWS KMS Each CMK has a key policy attached to it that defines permissions on the use and management of the key The default policy enables any principals you define as well as enables the root user in the account to add IAM policies that reference the key We recommend that you edit the default CMK policy to align with your organization s best practices for least privilege To access an encrypted resource the principal needs to have permissions to use the resource as well as to use the encryption key that protects the resource If the principal does not have the necessary permissions for either of those actions the request to use the encrypted resource will be denied Least Privilege Separation of DutiesKey policies specify a resource action effect principal and conditions to grant access to CMKs Key policies allow you to push more granular permissions to CMKs to enforce least privilege For example an application might make a KMS API call to encrypt data but there is no use case for that same application to decrypt data In that use case a key policy could grant access to the kms Encrypt action but not kms Decrypt and reduce the possibility for exposure Additionally AWS allows you to separate the usage permissions from administration permissions associated with the key This means that an individual may have the ability to manipulate the key policy but might not have the necessary permissions to use the key for cryptographic functions Cross Account Sharing of KeysDelegation of permissions to a CMK within AWS KMS can occur when you include the root principal of a trusted account within the CMK key policy The trusted account then has the ability to further delegate these permissions to IAM users and roles within their own account using IAM policies While this approach may simplify the management of the key policy it also relies on the trusted accounts to ensure that the delegated permissions are managed The other approach would be to explicitly manage permissions to all authorized users using only the KMS key policy which could make the key policy complex and less manageable Regardless of the approach you take the specific trust should be broken out on a per key basis to ensure that you adhere to the least privilege model CMK GrantsKey policy changes follow the same permissions model used for policy editing elsewhere in AWS That is users either have permission to change the key policy or they do not Users with the PutKeyPolicy permission for a CMK can completely replace the key policy for a CMK with a different key policy of their choice You can use key policies to allow other principals to access a CMK but key policies work best for relatively static assignments of permissions To enable more granular permissions management you can use grants Grants are useful when you want to define scoped down temporary permissions to use your CMK on your behalf in the absence of a direct API call from you Encryption ContextIn addition to limiting permission to the AWS KMS APIs AWS KMS also gives you the ability to add an additional layer of authentication for your KMS API calls utilizing encryption context The encryption context is a key value pair of additional data that you want associated with AWS KMS protected information This is then incorporated into the additional authenticated data AAD of the authenticated encryption in AWS KMS encrypted ciphertexts If you submit the encryption context value in the encryption operation you are required to pass it in the corresponding decryption operation You can use the encryption context inside your policies to enforce tighter controls for your encrypted resources Because the encryption context is logged in CloudTrail you can get more insight into the usage of your keys from an audit perspective Be aware that the encryption context is not encrypted and will be visible within CloudTrail logs The encryption context should not be considered sensitive information and should not require secrecy Multi Factor AuthenticationTo provide an additional layer of security over specific actions you can implement an additional layer of protection using multi factor authentication MFA on critical KMS API calls Some of those calls are PutKeyPolicy ScheduleKeyDeletion DeleteAlias and DeleteImportedKeyMaterial This can be accomplished through a conditional statement within the key policy that checks for when or if an MFA device was used as part of authentication If someone attempts to perform one of the critical AWS KMS actions the following CMK policy will validate that their MFA was authenticated within the last seconds or minutes before performing the action Sid MFACriticalKMSEvents Effect Allow Principal AWS arn aws iam user ExampleUser Action kms DeleteAlias kms DeleteImportedKeyMaterial kms PutKeyPolicy kms ScheduleKeyDeletion Resource Condition NumericLessThan aws MultiFactorAuthAge Detective ControlsThe Detective Controls capability ensures that you properly configure AWS KMS to log the necessary information you need to gain greater visibility into your environment CMK AuditingAWS KMS is integrated with CloudTrail To audit the usage of your keys in AWS KMS you should enable CloudTrail logging in your AWS account This ensures that all KMS API calls made on keys in your AWS account are automatically logged in files that are then delivered to an Amazon Simple Storage Service S bucket that you specify Using the information collected by CloudTrail you can determine what request was made the source IP address from which the request was made who made the request when it was made and so on AWS KMS integrates natively with many other AWS services to make monitoring easy You can use these AWS services or your existing security tool suite to monitor your CloudTrail logs for specific actions such as ScheduleKeyDeletion PutKeyPolicy DeleteAlias DisableKey DeleteImportedKeyMaterial on your KMS key Furthermore AWS KMS emits Amazon CloudWatch Events when your CMK is rotated deleted and imported key material in your CMK expires CMK Use ValidationIn addition to capturing audit data associated with key management and use you should ensure that the data you are reviewing aligns with your established best practices and policies One method is to continuously monitor and verify the CloudTrail logs as they come in Another method is to use AWS Config rules By using AWS Config rules you can ensure that the configuration of many of the AWS services are set up appropriately For example with EBS volumes you can use the AWS Config rule ENCRYPTED VOLUMES to validate that attached EBS volumes are encrypted A CMK can have a tag applied to it for a variety of purposes The most common use is to correlate a specific CMK back to a business category such as a cost center application name or owner The tags can then be used to verify that the correct CMK is being used for a given action For example in CloudTrail logs for a given KMS action you can verify that the CMK being used belongs to the same business category as the resource that it s being used on Previously this might have required a look up within a resource catalog but now this external lookup is not required because of tagging within AWS KMS as well as many of the other AWS services Infrastructure SecurityThe Infrastructure Security capability provides you with best practices on how to configure AWS KMS to ensure that you have an agile implementation that can scale with your business while protecting your sensitive information Customer Master KeysWithin AWS KMS your key hierarchy starts with a CMK A CMK can be used to directly encrypt data blocks up to KB or it can be used to secure data keys which protect underlying data of any size CMKs can be broken down into two general types AWS managed and customer managed An AWSmanaged CMK is created when you choose to enable server side encryption of an AWS resource under the AWS managed CMK for that service for the first time e g SSE KMS The AWS managed CMK is unique to your AWS account and the Region in which it s used An AWS managed CMK can only be used to protect resources within the specific AWS service for which it s created It does not provide the level of granular control that a customer managed CMK provides For more control a best practice is to use a customer managed CMK in all supported AWS services and in your applications A customer managed CMK is created at your request and should be configured based upon your explicit use case Key Creation and ManagementSince AWS makes creating and managing keys easy through the use of AWS KMS we recommend that you have a plan for how to use the service to best control the blast radius around individual keys Previously you may have used the same key across different geographic regions environments or even applications With AWS KMS you should define data classification levels and have at least one CMK per level For example you could define a CMK for data classified as “Confidential and so on This ensures that authorized users only have permissions for the key material that they require to complete their job You should also decide how you want to manage usage of AWS KMS Creating KMS keys within each account that requires the ability to encrypt and decrypt sensitive data works best for most customers but another option is to share the CMKs from a few centralized accounts Maintaining the CMKs in the same account as the majority of the infrastructure using them helps users provision and run AWS services that use those keys AWS services don t allow for cross account searching unless the principal doing the searching has explicit List permissions on resources owned by the external account This can also only be accomplished via the CLI or SDK and not through service console based searches Additionally by storing the credentials in the local accounts it might be easier to delegate permissions to individuals who know the IAM principals that require access to the specific CMKs If you were sharing the keys via a centralized model the AWS KMS administrators would need to know the full Amazon Resource Name ARN for all users of the CMKs to ensure least privilege Otherwise the administrators might provide overly permissive permissions on the keys Key AliasesA key alias allows you to abstract key users away from the underlying Region specific key ID and key ARN Authorized individuals can create a key alias that allows their applications to use a specific CMK independent of the Region or rotation schedule Thus multi Region applications can use the same key alias to refer to KMS keys in multiple Regions without worrying about the key ID or the key ARN You can also trigger manual rotation of a CMK by pointing a given key alias to a different CMK Similar to how Domain Name Services DNS allows the abstraction of IP addresses a key alias does the same for the key ID When you are creating a key alias we recommend that you determine a naming scheme that can be applied across your accounts such as alias Environment Function Service Team It should be noted that CMK aliases can t be used within policies This is because the mapping of aliases to keys can be manipulated outside the policy which would allow for an escalation of privilege Therefore key IDs must be used in KMS key policies IAM policies and KMS grants Using AWS KMS at ScaleAWS recommends using envelope encryption to scale your KMS implementation Envelope encryption is the practice of encrypting plaintext data with a unique data key and then encrypting the data key with a key encryption key KEK Within AWS KMS the CMK is the KEK You can encrypt your message with the data key and then encrypt the data key with the CMK Then the encrypted data key can be stored along with the encrypted message You can cache the plaintext version of the data key for repeated use reducing the number of requests to AWS KMS Additionally envelope encryption can help to design your application for disaster recovery You can move your encrypted data as is between Regions and only have to re encrypt the data keys with the Region specific CMKs Data ProtectionThe Data Protection capability addresses some of the common AWS use cases for using AWS KMS within your organization to protect your sensitive information Common AWS KMS Use Cases Encrypting PCI Data Using AWS KMSSince security and quality controls in AWS KMS have been validated and certified to meet the requirements of PCI DSS Level certification you can directly encrypt Primary Account Number PAN data with an AWS KMS CMK The use of a CMK to directly encrypt data removes some of the burden of managing encryption libraries Additionally a CMK can t be exported from AWS KMS which alleviates the concern about the encryption key being stored in an insecure manner As all KMS requests are logged in CloudTrail use of the CMK can be audited by reviewing the CloudTrail logs It s important to be aware of the requests per second limit when designing applications that use the CMK directly to protect Payment Card Industry PCI data Secret Management Using AWS KMS and Amazon SAlthough AWS KMS primarily provides key management functions you can leverage AWS KMS and Amazon S to build your own secret management solution Create a new Amazon s bucket to hold your secrets Deploy a bucket policy onto the bucket to limit access to only authorized individuals and services The secrets stored in the bucket utilize a predefined prefix per file to allow for granular control of access to the secrets Each secret when placed in the S bucket is encrypted using a specific customer managed KMS key Furthermore due to the highly sensitive nature of the information being stored within this bucket S access logging or CloudTrail Data Events are enabled for audit purposes Then when a user or service requires access to the secret they assume an identity within AWS that has permissions to use both the object in the S bucket as well as the KMS key An application that runs in an EC instance uses an instance role that has the necessary permissions Encrypting Lambda Environment VariablesBy default when you create or update Lambda functions that use environment variables those variables are encrypted using AWS KMS When your Lambda function is invoked those values are decrypted and made available to the Lambda code You have the option to use the default KMS key for Lambda or specify a specific CMK of your choice To further protect your environment variables you should select the “Enable encryption helpers checkbox By selecting this option your environment variables will also be individually encrypted using a CMK of your choice and then your Lambda function will have to specifically decrypt each encrypted environment variable that is needed Encrypting Data within Systems Manager Parameter StoreAmazon EC Systems Manager is a collection of capabilities that can help you automate management tasks at scale To efficiently store and reference sensitive configuration data such as passwords license keys and certificates the Parameter Store lets you protect sensitive information within secure string parameters A secure string is any sensitive data that needs to be stored and referenced in a secure manner If you have data that you don t want users to alter or reference in clear text such as domain join passwords or license keys then specify those values using the Secure String data type You should use secure strings in the following circumstances You want to use data parameters across AWS services without exposing the values as clear text in commands functions agent logs or CloudTrail logs You want to control who has access to sensitive data You want to be able to audit when sensitive data is accessed using CloudTrail You want AWS level encryption for your sensitive data and you want to bring your own encryption keys to manage access By selecting this option when you create your parameter the Systems Manager encrypts that value when it s passed into a command and decrypts it when processing it on the managed instance The encryption is handled by AWS KMS and can be either a default KMS key for the Systems Manager or you can specify a specific CMK per parameter Enforcing Data at Rest Encryption within AWS ServicesYour organization might require the encryption of all data that meets a specific classification Depending on the specific service you can enforce data encryption policies through preventative or detective controls For some services like Amazon S a policy can prevent storing unencrypted data For other services the most efficient mechanism is to monitor the creation of storage resources and check whether encryption is enabled appropriately In the event that unencrypted storage is created you have a number of possible responses ranging from deleting the storage resource to notifying an administrator ConclusionAWS KMS provides your organization with a fully managed service to centrally control your encryption keys Its native integration with other AWS services makes it easier for AWS KMS to encrypt the data that you store and process By taking the time to properly architect and implement AWS KMS you can ensure that your encryption keys are secure and available for applications and their authorized users Additionally you can show your auditors detailed logs associated with your key usage Reference Original paper 2021-11-15 11:52:58
海外TECH DEV Community In-House vs Outsourced Software Development https://dev.to/metricoid_technology/in-house-vs-outsourced-software-development-90 In House vs Outsourced Software DevelopmentWhat is In House Software Development Insourcing is another term for in house development It involves the presence of critical software development talent within the firm No outside expertise is required because everyone working on the project is employed by that firm Advantages of In House software development It s a group of professionals from the same country city as you with similar cultural and linguistic backgrounds who work for the same company You may simply adapt the project to your business by making relevant adjustments during the development phase Internal experts improve their abilities in the construction of the project you started and they quickly become highly focused professionals Disadvantages of In House software development The cost of assembling and sustaining a development team must be taken into account Working with an In House software developer is more expensive than an external service provider A specialized project needs the participation of individuals who possess a certain skill set If the team lacks that skill set a new candidate must be found This can also happen if the project is modified or enlarged Developing software applications is frequently not the company s core business Such a project can be quite stressful on in house IT resources Employee dissatisfaction and poor project outcomes are the results of work overload Employee resignation is one of the most significant hazards in in house software development Companies can leave after investing considerable resources in their adaption and you ll need to reinvest in new team members What is Outsourced Software Development Software outsourcing is a business arrangement in which a corporation collaborates with a third party company to build software rather than relying on its own staff The conventional outsourcing approach was primarily used to reduce operating costs but software outsourcing is now seen as a growth strategy that may help firms drive digital transformation Advantages of Outsourcing Software Development The most apparent benefit of outsourcing sophisticated technical tasks is that you are no longer limited to applicants within driving distance or even inside the same nation Companies may save time and money by eliminating the requirement to recruit and verify skilled developers External development teams are generally well versed in the subject When new challenges occur as the project advances no additional members are required because the knowledge is already present Without a long hiring process or an unpleasant dismissal procedure the team may simply be grown or lowered as needed Payment dates can be arranged if required when engaging an external firm This will significantly improve the company s cash flow Disadvantages Of Outsourcing Software Development The majority of project contact takes place via written technological channels such as email rather than in person These sorts of impersonal communication don t have the same impact and might lead to misconceptions or misinterpretations Miscommunication might lead to a distrustful relationship An outsourced development project requires a high level of trust A vital step is to find the correct companion Both parties must agree to acknowledge each other meet on time and report in a way that meets everyone s requirements and goals Another downside of outsourcing software development is the possibility of lower quality code One of the most significant hazards of outsourcing is losing control over how work is performed managed or worse the data and insights associated with outsourced projects 2021-11-15 11:48:10
海外TECH DEV Community Day 38 of 100 Days of Code & Scrum: Styling Next.js <Image> With a Wrapper https://dev.to/rammina/day-38-of-100-days-of-code-scrum-styling-nextjs-with-a-wrapper-1fpc Day of Days of Code amp Scrum Styling Next js lt Image gt With a WrapperGreetings everyone Today I started to gain some momentum for working on my company website I finished setting up AWS SES Lambda and API Gateway for my email contact form Now all there is left to do is to actually code the frontend contact form with proper styling What really grinds my gears is Next js lt Image gt which has a really weird inline styling effect the workaround is really annoying which is to wrap a lt div className gt around it to add custom CSS styling I don t like this because it adds up an extra node element for every lt Image gt I need to style in my application Yikes Oh and I still don t have my Internet back However I will make do with whatever bandwidth I have Anyway let s move on to my daily report YesterdayI planned out what I will be doing for this week and I noticed that I am being overwhelmed by various interesting things that I want to learn and work on I decided to prioritize my main objective first which is the website MVP TodayHere are the things I learned and worked on today Next jscoded my services section for the homepage finished the mobile styling for the skeleton layout the desktop version is also okay but could use some size changes had to fix a lot of my lt Image gt and wrap them around with lt div gt so I could add styling AWSfinished setting up AWS SES Lambda and API Gateway for my email contact form ScrumI did some practice flashcards for Scrum reviewed some of the things I ve learned before Have a great start to your week everyone Resources Recommended ReadingsEnable styling of next image outer wrapper GitHub DiscussionsOfficial Next js tutorialThe Typescript HandbookThe Scrum GuideMikhail Lapshin s Scrum Quizzes Cover Imagelaura adai on Unsplash DISCLAIMERThis is not a guide it is just me sharing my experiences and learnings This post only expresses my thoughts and opinions based on my limited knowledge and is in no way a substitute for actual references If I ever make a mistake or if you disagree I would appreciate corrections in the comments Other MediaFeel free to reach out to me in other media 2021-11-15 11:29:49
海外TECH DEV Community MongoDB Atlas for a SaaS https://dev.to/adriantwarog/mongodb-atlas-for-a-saas-1971 MongoDB Atlas for a SaaSI decided to build a SaaS last month called Enhance AI using OpenAI with GPT to perform some interesting applications of AI to help programmers save time coding I needed to pick a good database for this SaaS As the title suggests I ended up picking MongoDB however how I came to this conclusion took some research Youtube Video Creating a SaaS DatabaseThe SaaS Enhance AIMongoDB Atlas IntroductionThis will cover what I learned by picking and implementing MongoDB Atlas for my project and my thoughts If you re expecting something technical this won t be for you Defining the scope and requirementsPicking databasesDeciding local vs cloud databaseSetting up the database schemaCreating the API routes Defining the Scope amp RequirementsThe first thing you want to consider is your goal for a project Mine was to build a startup in days or less This means I needed to build fast and have good documentation whenever I encountered problems There was lots of options like firestore or mysql however one of the most common startup stacks is called MERN which is Mongo Express React and Nodejs There are lots of youtube videos on how to set them up now one more and I was quite confident as I had worked with each one of those technologies in the past The other requirements was working with JSON objects which Mongo does quite well as because of the fact that it s a document collection based database And finally the fact that it s quite flexible in the fact that it s schema can easily be changed on the fly meant I believe it was a good choice for my startup Deciding local vs cloud databasesIt s and soon to be You are no longer limited to setup an entire production workstation with all items installed such as a web server database files and more Microservices and cloud services now allow you to distribute all your technologies So the question of hosting the database locally or online is an actual decision to make There are a few advantages and disadvantages to both approaches Yes you have more control if everything is locally on your machine but by comparison having a cloud version of a database means it s accessible anywhere As I often swap computers work remotely and want more flexibility I had a look at the cloud version of MongoDb It s called MongoDB Atlas I have the option to connect directly to it via my vscode with a plugin which is quite useful On top of that you can scale and grow it with your needs Other than that the setup is exactly the same for connecting it to your project minus the requirement to install and actually host the database on the machine This meant I got to save time and effort and simply copy paste the url of the database from Mongo and I was up and running in minutes Setting up the Database SchemaEvery website and application hopefully is unique However there are some items which remain the same such as the requirement for users authentication etc I took a few days to plan out how I wanted to structure my database before actually implementing it The main difference was the fact that I was using OpenAI and I wanted to make sure that could help improve my GPT outputs overtime so I made sure to also implement a history schema Using express I setup mongoose as it s one of the easier ways to define a schema which I could later use in my routes Creating the APIWith the database picked the cloud setup the schema defined I was able to implement the API with ease Most of the requests could be simple GET POST requests which are then using the findOne command using mongoose with mongo no different to if I was using it locally I originally thought I might get some significant delays by using the cloud version of MongoDB however the server was quite fast and I never had any such delays ConclusionWhile this was a brief overview of using MongoDB Atlas it s worthwhile that people try it over the alternative of running up a database locally and manually You will get the same results with less time and have more flexibility moving forward I ve done a while video which goes more into depth about this journey but hopefully this gives you a good idea of some of the items I learned during this time MongoDB Atlas Youtube Video Creating a SaaS Database Adrian Twarog adrian twarog Creating a SaaS Database in mins Picking a Database Using Local versus Cloud Backups amp Security Setting up schema Setting up the collations documents Connecting it to an API Plug in to VSCODE Accessing it remotelyAnd much more check out link below AM Nov Follow and support me Special thanks if you subscribe to my channel ️YoutubeTwitter 2021-11-15 11:01:35
海外TECH Engadget Samsung update brings some Galaxy Watch 4 features to older smartwatches https://www.engadget.com/samsung-galaxy-watch-update-latest-features-older-watches-115358932.html?src=rss Samsung update brings some Galaxy Watch features to older smartwatchesAlong with the release of its One UI update Samsung has revealed new Galaxy Watch software that brings features from its latest Watch model to four older smartwatches Sammobile has reported Owners of the Galaxy Watch Galaxy Watch Active Galaxy Watch Active and Galaxy Watch are set to benefit from the new release With the Galaxy Watch Samsung introduced Fall Detection with more levels of sensitivity and the ability to enable detection even if you re standing still It will also send an SOS alert to approved contacts That update is now available on the Galaxy Watch and Galaxy Watch Active though not the older Galaxy Watch Watch Active models However owners of all four watches will benefit from new watch faces first launched with the Galaxy Watch that offer extra customization options text colors backgrounds or even different animated creatures on one Other features include an updated group challenge in the Work Out with Friends feature and more accurate health monitoring The update is arriving today in the USA and Korea and will follow in other regions later nbsp nbsp 2021-11-15 11:53:58
海外TECH Engadget Samsung's Galaxy S21 series updated to One UI 4 with new Android 12 features https://www.engadget.com/samsung-galaxy-s21-phones-get-update-to-one-ui-4-110031121.html?src=rss Samsung x s Galaxy S series updated to One UI with new Android featuresFollowing a beta launch in September Samsung has released its One UI software with new features from Android like the Privacy Dashboard As usual owners of Samsung s flagship Galaxy S smartphone lineup including the Galaxy S S and S Ultra will be first in line to receive it nbsp The biggest change with the new skin is how it looks One UI now allows a more customized experience with new color palettes and widgets along with a wider range of emoji features GIFs and stickers That sounds very much like Android s Material You except it s not auto or AI generated nbsp EngadgetThe other difference from before is around security Following the lead of Android Samsung is introducing a Privacy Dashboard that brings all settings and controls into one place For example it will show when an app is attempting to access your camera microphone or other sensor and why it needed that data Other features include access to Samsung s extended ecosystem of devices and third party apps That will ensure a quot seamless experience quot when using non Samsung apps like Google Duo the company said It s also promising a uniform look across devices like the Galaxy Fold Galaxy Watch and Galaxy Tab Since the release of One UI Samsung has been trying to get the latest versions of Android onto its high end smartphones as quickly as possible It s fair to say it s done that here as Google released Android less than a month ago onto its Pixel devices One UI is available starting today for Galaxy S device quot and will soon arrive to previous Galaxy S and Note series as well as Galaxy A series foldables and tablets quot the company said nbsp 2021-11-15 11:00:31
海外TECH WIRED How a VR Company Became the Airbnb for NFTs https://www.wired.com/story/spatial-airbnb-for-nfts nftsyes 2021-11-15 12:00:00
海外TECH WIRED You Don’t Have to WFH at Home—Try These Places Instead https://www.wired.com/story/remote-working-alternatives-tips-productivity local 2021-11-15 12:00:00
海外TECH WIRED Finally, A Practical Use for Nuclear Fusion https://www.wired.com/story/nuclear-fusion-spacecraft-jupiter materials 2021-11-15 12:00:00
海外TECH WIRED Twitter Vigilantes Are Hunting Down Crypto Scammers https://www.wired.com/story/twitters-crypto-vigilantes-are-just-getting-started cryptocurrency 2021-11-15 12:00:00
海外TECH WIRED The 15 Best Personal Tech Gifts for Kids https://www.wired.com/gallery/tech-gifts-for-kids-2021 appropriate 2021-11-15 12:00:00
海外科学 BBC News - Science & Environment COP26: How might decisions at the climate summit change our lives? https://www.bbc.co.uk/news/science-environment-59263761?at_medium=RSS&at_campaign=KARANGA glasgow 2021-11-15 11:47:04
医療系 医療介護 CBnews HPVワクチン無料接種、「機会逃した全員に」大勢-厚科審・分科会 https://www.cbnews.jp/news/entry/20211115195656 子宮頸がん 2021-11-15 20:40:00
医療系 医療介護 CBnews 医療DX、日本の遅れに危機感-鉄祐会・武藤理事長「夢のまた夢」 https://www.cbnews.jp/news/entry/20211115195616 医療法人社団 2021-11-15 20:25:00
ニュース BBC News - Home Liverpool Women's Hospital explosion declared a terror incident https://www.bbc.co.uk/news/uk-england-merseyside-59291095?at_medium=RSS&at_campaign=KARANGA remembrance 2021-11-15 11:47:02
ニュース BBC News - Home Danny Fenster: US journalist freed from Myanmar jail https://www.bbc.co.uk/news/world-asia-59290412?at_medium=RSS&at_campaign=KARANGA sentence 2021-11-15 11:04:21
ニュース BBC News - Home Norwich City: Dean Smith named new Canaries head coach https://www.bbc.co.uk/sport/football/59274626?at_medium=RSS&at_campaign=KARANGA coach 2021-11-15 11:50:25
ニュース BBC News - Home COP26: How might decisions at the climate summit change our lives? https://www.bbc.co.uk/news/science-environment-59263761?at_medium=RSS&at_campaign=KARANGA glasgow 2021-11-15 11:47:04
ニュース BBC News - Home Covid: Are booster jabs available for my age group? https://www.bbc.co.uk/news/health-55045639?at_medium=RSS&at_campaign=KARANGA advisory 2021-11-15 11:39:23
ビジネス ダイヤモンド・オンライン - 新着記事 三菱UFJフィナンシャル・グループ、「増配」を発表 し、配当利回り4.3%に! 配当額は1年で12%増加、 2022年3月期は前期比3円増の「1株あたり28円」に! - 配当【増配・減配】最新ニュース! https://diamond.jp/articles/-/287769 2021-11-15 20:05:00
北海道 北海道新聞 政府、石炭火力削減で協議着手 COP26の合意受け https://www.hokkaido-np.co.jp/article/611896/ 国連気候変動枠組み条約 2021-11-15 20:08:00
IT 週刊アスキー アーティストの西川貴教さんが声を演じる新★5「荒瀧一斗」が登場!『原神』が11月24日にVer.2.3アップデートを実施予定 https://weekly.ascii.jp/elem/000/004/075/4075155/ mihoyo 2021-11-15 20:10:00
海外TECH reddit エッチを実技で教えてくれるエロい保険の先生がマジで東京に実在した! ソープランドで働き懲戒免職 https://www.reddit.com/r/newsokunomoral/comments/que6v6/エッチを実技で教えてくれるエロい保険の先生がマジで東京に実在した_ソープランドで働き懲戒免職/ ewsokunomorallinkcomments 2021-11-15 11:17:08
海外TECH reddit Would you date a woman who only masturbates to male gay porn? https://www.reddit.com/r/AskReddit/comments/que7zh/would_you_date_a_woman_who_only_masturbates_to/ Would you date a woman who only masturbates to male gay porn submitted by u bunbunzinlove to r AskReddit link comments 2021-11-15 11:19:13

コメント

このブログの人気の投稿

投稿時間:2021-06-17 05:05:34 RSSフィード2021-06-17 05:00 分まとめ(1274件)

投稿時間:2021-06-20 02:06:12 RSSフィード2021-06-20 02:00 分まとめ(3871件)

投稿時間:2020-12-01 09:41:49 RSSフィード2020-12-01 09:00 分まとめ(69件)