IT |
気になる、記になる… |
「Surface Laptop Studio」の国内発売は3月1日に − 本日より予約受付開始 |
https://taisy0.com/2022/01/27/151280.html
|
surfacebook |
2022-01-27 02:36:32 |
IT |
気になる、記になる… |
世界の企業ブランドベスト500の2022年版を発表 − Appleが2年連続で1位に |
https://taisy0.com/2022/01/27/151276.html
|
apple |
2022-01-27 02:25:18 |
IT |
気になる、記になる… |
Anker、ペットカメラ「Eufy Dog Camera D605」を発売 − 初回100台限定で10%ポイント還元も実施中 |
https://taisy0.com/2022/01/27/151238.html
|
anker |
2022-01-27 02:15:39 |
TECH |
Engadget Japanese |
メンズビジネスバッグのAmazon売れ筋ランキング。ノートPCやタブレット、紙書類を収納する必須ギア! |
https://japanese.engadget.com/ranking-business-bags-025036848.html
|
メンズビジネスバッグのAmazon売れ筋ランキング。 |
2022-01-27 02:50:36 |
TECH |
Engadget Japanese |
iOS/iPadOS 15.3とmacOS 12.2配信開始。SafariからGoogleアカウント情報が漏れるバグを修正 |
https://japanese.engadget.com/ios-ipados-macos-security-update-safari-exploit-023523050.html
|
google |
2022-01-27 02:35:23 |
TECH |
Engadget Japanese |
速報:Surface Laptop Studio日本版発表。3月1日発売で20万9880円から |
https://japanese.engadget.com/surface-laptop-studio-japan-021846942.html
|
surfacelaptopstudio |
2022-01-27 02:18:46 |
IT |
ITmedia 総合記事一覧 |
[ITmedia Mobile] 日本通信が7年ぶり黒字へ、好調の要因は“音声通話”の強化 福田社長に聞く |
https://www.itmedia.co.jp/mobile/articles/2201/27/news119.html
|
itmediamobile |
2022-01-27 11:37:00 |
IT |
ITmedia 総合記事一覧 |
[ITmedia News] 北朝鮮にDDoS攻撃か メディア、外務省などのWebサイトが一時ダウン |
https://www.itmedia.co.jp/news/articles/2201/27/news118.html
|
itmedia |
2022-01-27 11:30:00 |
IT |
ITmedia 総合記事一覧 |
[ITmedia ビジネスオンライン] UB Ventures、SaaS企業分析年次レポート「SaaS Annual Report 2021」を無償公開 |
https://www.itmedia.co.jp/business/articles/2201/27/news114.html
|
itmedia |
2022-01-27 11:27:00 |
IT |
ITmedia 総合記事一覧 |
[ITmedia News] 米Meta、Oculusブランドから卒業 今後は「Meta Quest」に |
https://www.itmedia.co.jp/news/articles/2201/27/news115.html
|
itmedia |
2022-01-27 11:27:00 |
TECH |
Techable(テッカブル) |
USENらが“音の力”を共同研究。BGMがコールセンターのオペレーターに与える効果とは? |
https://techable.jp/archives/172069
|
sounddesignforo |
2022-01-27 02:00:46 |
IT |
情報システムリーダーのためのIT情報専門サイト IT Leaders |
サイバートラスト、脆弱性管理「MIRACLE Vul Hammer」新版、システム設定の脆弱性を検査 | IT Leaders |
https://it.impress.co.jp/articles/-/22634
|
サイバートラスト、脆弱性管理「MIRACLEVulHammer」新版、システム設定の脆弱性を検査ITLeadersサイバートラストは年月日、脆弱性管理ソフトウェア「MIRACLEVulHammer」をバージョンアップした。 |
2022-01-27 11:36:00 |
AWS |
lambdaタグが付けられた新着投稿 - Qiita |
lambda 関数作るとき【完全自分用メモ】 |
https://qiita.com/smoto-shei/items/aafc5e77b73e231cc4cb
|
|
2022-01-27 11:16:19 |
python |
Pythonタグが付けられた新着投稿 - Qiita |
lambda 関数作るとき【完全自分用メモ】 |
https://qiita.com/smoto-shei/items/aafc5e77b73e231cc4cb
|
|
2022-01-27 11:16:19 |
js |
JavaScriptタグが付けられた新着投稿 - Qiita |
Electron Tips ~便利なモジュールや小技~ |
https://qiita.com/shiro1212/items/1d30b583770fc16c22df
|
フォーカスはずれたときに閉じたいランチャーアプリのようなアプリを作る際は、アプリからフォーカスが外れるとアプリを閉じたり隠したりしたいという場面が発生すると思います。 |
2022-01-27 11:40:46 |
js |
JavaScriptタグが付けられた新着投稿 - Qiita |
JavascriptでlocalStorageを使う【メモ】 |
https://qiita.com/kazufoot21/items/d9105205fa79aa9e0d50
|
JavascriptでlocalStorageを使う【メモ】localStorageとはlocalStorageとは簡単に言うとWebブラウザにデータを保存できる場所のこと。 |
2022-01-27 11:16:08 |
golang |
Goタグが付けられた新着投稿 - Qiita |
SQLBoilerでエラー:Error: unable to initialize tables: unable to fetch table data |
https://qiita.com/_akira19/items/4aa414482d36eb272eb0
|
SQLBoilerでエラーErrorunabletoinitializetablesunabletofetchtabledataはじめにSQLBoilerでsqlboilermysqlコマンドをうったときにエラーが出ました。 |
2022-01-27 11:24:17 |
Git |
Gitタグが付けられた新着投稿 - Qiita |
【git】upstream を Current Branch にmerge する |
https://qiita.com/kotaaaa/items/141ce9980d2cdf0c1000
|
gitmergeupstreammaster |
2022-01-27 11:06:38 |
Git |
Gitタグが付けられた新着投稿 - Qiita |
git rebase方法メモ |
https://qiita.com/kotaaaa/items/ad3b5c2f2b8205a5609e
|
commit |
2022-01-27 11:03:25 |
技術ブログ |
Developers.IO |
[新インスタンス] 高クロックのメモリ最適化 EC2 インスタンス X2iezn が利用可能になりました! |
https://dev.classmethod.jp/articles/high-clock-cpu-memory-optimization-ec2-instance-x2iezn-available/
|
reinvent |
2022-01-27 02:46:27 |
技術ブログ |
Developers.IO |
sql-metadataを試してみる |
https://dev.classmethod.jp/articles/sql-metadata/
|
kobayashi |
2022-01-27 02:45:07 |
海外TECH |
DEV Community |
Security and Correctness: two different concepts. |
https://dev.to/marcoservetto/security-and-correctness-two-different-concepts-3g04
|
Security and Correctness two different concepts A few years ago I started researching on Software correctness I was actually interested in software security but I was unaware of the difference at the time Now after researching in both areas I can finally discuss the difference between those two concepts What does it take to mathematically define if a specific program is correct and or secure Fist I will talk about correctness then security We say that a program is correct if it respects its specification Thus it does not even make sense to talk about the correctness of a program on its own Correctness is actually a consistency property of a pair program specification Let s consider a very simple program with a simple specification Post the result is a positive number int foo return Is this code correct That is is it true that the result of calling that method will always respect the specified post condition Well NO For no real architecture that method will always return a positive number In some situations calling that method will simply raise a StackOverflow error and sometime the physical hardware will crash and burn before being able to compute the result However most developers would agree that the code above is correct or at least as correct as it can possibly be That is we are not considering correctness in an absolute sense we are considering a simplified execution model with certain simplifications with respect to the hash reality where anything can fail at any point anyway Many researchers in the area of software verification seams to simply accepting that there is going to be this set of simplifications that hopefully will be irrelevant in most real life situations an focus on mathematically modelling code execution in order to prove correctness that is consistency between code and specification on such a simplified execution model Instead I decided to study and categorize those simplifications If we can not make proofs on the actual execution model what execution model should we use I say that an execution model more close to reality has a bigger scope that an execution model that excludes more difficulties Most of the verification for correctness research area works under the following simplifications No StackOverflow we assume we have an infinite stack No MemoryOverflow we assume we have an infinite heap I O control we assume no other process is editing our files Uncorrupted Root we assume other processes can not randomly edit our memory bits Correctness of the OS OS functionalities behave as expected Good Hardware we assume no HW bugs Small Physics no cosmic ray bit flips or funky quantum events Large Physics no power cuts no explosions or kicks to the HD Deployment the code we checked is the one that will actually run DefinitionsThus under those simplifications we can define Correctness as follows A program is correct if it always does the right thingWhere the specification identifies what is the acceptable range of right things Now we can contrast the definition of correctness with the one of Security A program is secure if it never does the wrong thing Warning the scope is implicit At a first glance it may look like security is simply a subset of correctness However the SCOPE is often different When discussing about security we do not accept simplifications and that is even if there is a StackOverflow we still can not accept to perform an invalid action In response to a StackOverflow it is ok to crash but it is not ok to send our private information to another country Thus usually we attempt to verify correctness under simplifications and security without simplifications but still with simplifications In particular without near every program is simply incorrect While the right thing is often defining defined using pre post conditions in some logical framework the wrong thing is often defined using actions we abstract over the internal state of the program and we just observe the interaction the program has with the rest of the world Usually we can represent those interactions as forms of I O or calls to low level OS functionalities Under this lens terminating the program with an error message is often not considered an action Going in loop is also often not considered an action Thus those model of security often does not model Denial Of Service vulnerabilities In my research I have never seen a formal mathematical model able to model them to distinguish them from simply a slow algorithm To further clarify the difference of security and correctness consider the two examples below An universally secure but not correct solution to any problem throw new Error NOPE That is we can simply refuse to act No action means no security violation An universally correct but not secure solution to any problemAssuming to have a function correctlyDoStuff that is both correct and secure we can forge a correct but not secure version of it int doStuff int x try rec aNumber catch StackOverflowError o badAction return correctlyDoStuff x void rec int i if i return rec i where badAction does a security violation like formatting the hard drive For any real execution environment of our code for our doStuff function there exists a number aNumber that will trigger the StackOverflow but in the verification for correctness model the catch is recognized as dead code Indeed some code verification tools will accept such a solution as correct ConclusionsThere is a lot of confusion between correctness and security I hope I clarified the terms a little bit here Ultimately there can not be full agreement on any terminology but if we want something that can be mathematically modeled and checked verified the introduced terminology is a very good starting point Also terminology in this area is so challenging that I do not think it is fair to require developers and companies to have a good grasp on those terms In particular if you your company want security and someones tries to sell you correctness without making sure that you understand the difference between the terms they may be scamming you Overall in my opinion we should start by writing SECURE software and only after we are certain that we are well rooted in a secure environment we should start working toward CORRECTNESS |
2022-01-27 02:50:20 |
海外TECH |
DEV Community |
WebRTC For Beginners - Part 4: Screen Share |
https://dev.to/ethand91/webrtc-for-beginners-part-4-screen-share-42p6
|
WebRTC For Beginners Part Screen ShareContents Part Introduction to WebRTC and creating the signaling serverPart Understanding the MediaDevices API and getting access to the user s media devicesPart Creating the peers and sending receiving mediaPart Sharing and sending the user s display and changing tracksPart Data Channels basicsPart Android native peerPart iOS native peerPart Where to go from hereWelcome back Here in part we will be learning how to get the user s screen and how to switch media tracks so that instead of the camera the screen will be sent instead This part technically doesn t need the previous parts if you already have a signaling server feel free to use that instead Keep in mind that the variety of screens tabs windows that can be shared depends on the browser being used First we will need to edit the public index html file open it and add the following one line lt button id screenShareButton onclick shareScreen disabled gt Share Screen lt button gt Screen sharing will be started when the user clicks this button Next we need to modify public main js open it up and add the following First we need to get a reference to the screen share button const screenShareButton document getElementById screenShareButton We will enable the button once the RTCPeerConnection is initialized same as the call button at the end of the “initializePeerConnection function add the following screenShareButton disabled false Next we need to disable the button again when the session has finished so in the “stop function add the following screenShareButton disabled true Now we can create the new functions that will allow the user to share their screen const shareScreen async gt const mediaStream await getLocalScreenCaptureStream const screenTrack mediaStream getVideoTracks if screenTrack console log replace camera track with screen track replaceTrack screenTrack This function calls a helper function which will be implemented shortly but basically what it does is get the screen track and replaces the track being sent to the remote peer Next we will define the two helper functions the first being “getLocalScreenCaptureStream const getLocalScreenCaptureStream async gt try const constraints video cursor always audio false const screenCaptureStream await navigator mediaDevices getDisplayMedia constraints return screenCaptureStream catch error console error failed to get local screen error Here we get the user s screen by calling “getDisplayMedia this API uses slightly different constraints than the “getUserMedia API Here I ve told it to also show the cursor when screen sharing Also we already have the user s microphone so we don t need any audio Next we define the function that replaces the camera track with the screen track const replaceTrack newTrack gt const sender peerConnection getSenders find sender gt sender track kind newTrack kind if sender console warn failed to find sender return sender replaceTrack newTrack This function takes a newTrack parameter this is the track that is to replace the old track First we need to get the relevant RTCRtpSender so we call RTCPeerConnection getSenders this returns an array of RTCRtpSender objects next we filter the senders based on the kind of the newTrack which is audio or video Since we are replacing the camera track with the screen track we should get the video RTCRtpSender object Finally we replace the sender s track with the screen track Next we need to stop the track when the session ends so add the following to the “stop function for const sender of peerConnection getSenders sender track stop This loops through all the RtcRtpSender s of the RTCPeerConnection and stops their track Done if done correctly the remote peer should now be getting the shared screen Now let s see it in action First start the server npm startNext open tabs browsers to “https localhost Follow the steps from the previous part to initialize the call and click on the “Share Screen button You should see the following prompt I m using Chrome but if you are using a different browser the prompt will be different Also the language may vary Feel free to pick whatever you wanna share and click OK Once done look at the remote peer and you should see the shared screen in the remote video like so The track should also be released when the session ends Phew That s this part done next we will be looking into Data Channels Hope to see you there Github Repo Bonus Things to consider What are the other constraints that could be passed to the getDisplay API Mobile devices cannot share the screen can you detect if the user is using a mobile device In newer MacOS s the user needs to enable the browser to use the screen via the privacy settings can that be handled Bonus Materials RTCRtpSender Web APIs MDNMediaDevices getDisplayMedia Web APIs MDNLike me work Any support is appreciated |
2022-01-27 02:14:41 |
Apple |
AppleInsider - Frontpage News |
Apple working on tech to allow iPhones to directly process credit cards |
https://appleinsider.com/articles/22/01/27/apple-working-on-tech-to-allow-iphones-to-directly-process-credit-cards?utm_medium=rss
|
Apple working on tech to allow iPhones to directly process credit cardsSmall businesses may soon be able to accept credit and debit card payments directly through the iPhone s onboard NFC chip without the need for external hardware In August it was reported that Apple purchased Mobeewave a payments technology startup that developed a method allowing smartphones to be used as mobile payments terminals Now it appears that the Cupertino based tech giant has plans for the technology ーallowing small businesses to accept payments directly on their iPhones without any extra hardware according to Bloomberg Read more |
2022-01-27 02:45:47 |
海外科学 |
NYT > Science |
An Extraordinary Iceberg Is Gone, but Not Forgotten |
https://www.nytimes.com/2022/01/26/climate/iceberg-a68a-antarctica.html
|
An Extraordinary Iceberg Is Gone but Not ForgottenA chunk of Antarctic ice that was one of the biggest icebergs ever seen has met its end near South Georgia Scientists will be studying its effects on the ecosystem around the island for some time |
2022-01-27 02:54:16 |
金融 |
ニュース - 保険市場TIMES |
MyVoiceの【医療保険の加入に関する調査】 医療保険の加入者は7割強 |
https://www.hokende.com/news/blog/entry/2022/01/27/120000
|
MyVoiceの【医療保険の加入に関する調査】医療保険の加入者は割強単独加入は割弱マイボイスコムのネットリサーチMyVoiceは月日、【医療保険の加入に関する調査】の結果を発表した。 |
2022-01-27 12:00:00 |
海外ニュース |
Japan Times latest articles |
How the computer chip shortage could incite a U.S. conflict with China |
https://www.japantimes.co.jp/news/2022/01/27/world/chip-shortage-conflict/
|
How the computer chip shortage could incite a U S conflict with ChinaThe war game and study by the Center for a New American Security illustrate how dependent the world is on Taiwanese computer chips |
2022-01-27 11:25:43 |
海外ニュース |
Japan Times latest articles |
IOC plans to meet with Peng Shuai during Beijing Olympics |
https://www.japantimes.co.jp/sports/2022/01/27/tennis/ioc-meet-peng/
|
safety |
2022-01-27 11:14:26 |
ニュース |
BBC News - Home |
Covid: Face mask rules and Covid passes end in England |
https://www.bbc.co.uk/news/uk-60147766?at_medium=RSS&at_campaign=KARANGA
|
legal |
2022-01-27 02:25:35 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
WTO、中国による対米報復関税を認める - WSJ発 |
https://diamond.jp/articles/-/294621
|
関税 |
2022-01-27 11:20:00 |
サブカルネタ |
ラーブロ |
船堀「やまだ」麻婆ラーメン(辛め)とモツ煮込定食 |
http://ra-blog.net/modules/rssc/single_feed.php?fid=195953
|
久しぶり |
2022-01-27 02:30:39 |
GCP |
Google Cloud Platform Japan 公式ブログ |
顧客管理の暗号鍵(CMEK)を使用して Data Fusion データとメタデータの暗号化が可能 |
https://cloud.google.com/blog/ja/products/data-analytics/general-availability-for-cmek-in-data-fusion/
|
CMEKにより、CloudKeyManagementServiceKMSで制御できる鍵を使用して、保存時にユーザーデータもメタデータも暗号化できるようになります。 |
2022-01-27 04:00:00 |
GCP |
Google Cloud Platform Japan 公式ブログ |
Wayfair がデータベースを一度に 1 つモダナイズしている方法 |
https://cloud.google.com/blog/ja/products/databases/wayfair-migrates-to-cloud-sql-and-cloud-spanner/
|
数千ものデータベースがある場合、個々のチームレベルで自己解決するのではなく、抽象化されたものと対話することができるため、開発時間の短縮や市場投入までの時間短縮につながります。 |
2022-01-27 03:00:00 |
北海道 |
北海道新聞 |
道内コロナ2800人超 最多更新 札幌1590人台に急増 |
https://www.hokkaido-np.co.jp/article/638314/
|
新型コロナウイルス |
2022-01-27 11:13:50 |
北海道 |
北海道新聞 |
モデルナもオミクロン株対応へ ワクチンの臨床試験実施 |
https://www.hokkaido-np.co.jp/article/638347/
|
臨床試験 |
2022-01-27 11:09:00 |
ビジネス |
東洋経済オンライン |
14歳少女も住み込みで「家事手伝う」時代の生き様 漫画「うちのちいさな女中さん」(第1話) | うちのちいさな女中さん | 東洋経済オンライン |
https://toyokeizai.net/articles/-/506204?utm_source=rss&utm_medium=http&utm_campaign=link_back
|
住み込み |
2022-01-27 11:30:00 |
マーケティング |
AdverTimes |
テルモ100周年 グローバルでの一体感を醸成 |
https://www.advertimes.com/20220127/article374931/
|
tsunagu |
2022-01-27 02:41:20 |
マーケティング |
AdverTimes |
DX推進PJを新設 ルネサンス、リーダーに平野CD部長 |
https://www.advertimes.com/20220127/article375245/
|
部門 |
2022-01-27 02:38:28 |
GCP |
Cloud Blog JA |
顧客管理の暗号鍵(CMEK)を使用して Data Fusion データとメタデータの暗号化が可能 |
https://cloud.google.com/blog/ja/products/data-analytics/general-availability-for-cmek-in-data-fusion/
|
CMEKにより、CloudKeyManagementServiceKMSで制御できる鍵を使用して、保存時にユーザーデータもメタデータも暗号化できるようになります。 |
2022-01-27 04:00:00 |
GCP |
Cloud Blog JA |
Wayfair がデータベースを一度に 1 つモダナイズしている方法 |
https://cloud.google.com/blog/ja/products/databases/wayfair-migrates-to-cloud-sql-and-cloud-spanner/
|
数千ものデータベースがある場合、個々のチームレベルで自己解決するのではなく、抽象化されたものと対話することができるため、開発時間の短縮や市場投入までの時間短縮につながります。 |
2022-01-27 03:00:00 |
コメント
コメントを投稿