投稿時間:2022-01-27 12:36:09 RSSフィード2022-01-27 12:00 分まとめ(40件)

カテゴリー等 サイト名等 記事タイトル・トレンドワード等 リンクURL 頻出ワード・要約等/検索ボリューム 登録日
IT 気になる、記になる… 「Surface Laptop Studio」の国内発売は3月1日に − 本日より予約受付開始 https://taisy0.com/2022/01/27/151280.html surfacebook 2022-01-27 02:36:32
IT 気になる、記になる… 世界の企業ブランドベスト500の2022年版を発表 − Appleが2年連続で1位に https://taisy0.com/2022/01/27/151276.html apple 2022-01-27 02:25:18
IT 気になる、記になる… Anker、ペットカメラ「Eufy Dog Camera D605」を発売 − 初回100台限定で10%ポイント還元も実施中 https://taisy0.com/2022/01/27/151238.html anker 2022-01-27 02:15:39
TECH Engadget Japanese メンズビジネスバッグのAmazon売れ筋ランキング。ノートPCやタブレット、紙書類を収納する必須ギア! https://japanese.engadget.com/ranking-business-bags-025036848.html メンズビジネスバッグのAmazon売れ筋ランキング。 2022-01-27 02:50:36
TECH Engadget Japanese iOS/iPadOS 15.3とmacOS 12.2配信開始。SafariからGoogleアカウント情報が漏れるバグを修正 https://japanese.engadget.com/ios-ipados-macos-security-update-safari-exploit-023523050.html google 2022-01-27 02:35:23
TECH Engadget Japanese 速報:Surface Laptop Studio日本版発表。3月1日発売で20万9880円から https://japanese.engadget.com/surface-laptop-studio-japan-021846942.html surfacelaptopstudio 2022-01-27 02:18:46
IT ITmedia 総合記事一覧 [ITmedia Mobile] 日本通信が7年ぶり黒字へ、好調の要因は“音声通話”の強化 福田社長に聞く https://www.itmedia.co.jp/mobile/articles/2201/27/news119.html itmediamobile 2022-01-27 11:37:00
IT ITmedia 総合記事一覧 [ITmedia News] 北朝鮮にDDoS攻撃か メディア、外務省などのWebサイトが一時ダウン https://www.itmedia.co.jp/news/articles/2201/27/news118.html itmedia 2022-01-27 11:30:00
IT ITmedia 総合記事一覧 [ITmedia ビジネスオンライン] UB Ventures、SaaS企業分析年次レポート「SaaS Annual Report 2021」を無償公開 https://www.itmedia.co.jp/business/articles/2201/27/news114.html itmedia 2022-01-27 11:27:00
IT ITmedia 総合記事一覧 [ITmedia News] 米Meta、Oculusブランドから卒業 今後は「Meta Quest」に https://www.itmedia.co.jp/news/articles/2201/27/news115.html itmedia 2022-01-27 11:27:00
TECH Techable(テッカブル) USENらが“音の力”を共同研究。BGMがコールセンターのオペレーターに与える効果とは? https://techable.jp/archives/172069 sounddesignforo 2022-01-27 02:00:46
IT 情報システムリーダーのためのIT情報専門サイト IT Leaders サイバートラスト、脆弱性管理「MIRACLE Vul Hammer」新版、システム設定の脆弱性を検査 | IT Leaders https://it.impress.co.jp/articles/-/22634 サイバートラスト、脆弱性管理「MIRACLEVulHammer」新版、システム設定の脆弱性を検査ITLeadersサイバートラストは年月日、脆弱性管理ソフトウェア「MIRACLEVulHammer」をバージョンアップした。 2022-01-27 11:36:00
AWS lambdaタグが付けられた新着投稿 - Qiita lambda 関数作るとき【完全自分用メモ】 https://qiita.com/smoto-shei/items/aafc5e77b73e231cc4cb 2022-01-27 11:16:19
python Pythonタグが付けられた新着投稿 - Qiita lambda 関数作るとき【完全自分用メモ】 https://qiita.com/smoto-shei/items/aafc5e77b73e231cc4cb 2022-01-27 11:16:19
js JavaScriptタグが付けられた新着投稿 - Qiita Electron Tips ~便利なモジュールや小技~ https://qiita.com/shiro1212/items/1d30b583770fc16c22df フォーカスはずれたときに閉じたいランチャーアプリのようなアプリを作る際は、アプリからフォーカスが外れるとアプリを閉じたり隠したりしたいという場面が発生すると思います。 2022-01-27 11:40:46
js JavaScriptタグが付けられた新着投稿 - Qiita JavascriptでlocalStorageを使う【メモ】 https://qiita.com/kazufoot21/items/d9105205fa79aa9e0d50 JavascriptでlocalStorageを使う【メモ】localStorageとはlocalStorageとは簡単に言うとWebブラウザにデータを保存できる場所のこと。 2022-01-27 11:16:08
golang Goタグが付けられた新着投稿 - Qiita SQLBoilerでエラー:Error: unable to initialize tables: unable to fetch table data https://qiita.com/_akira19/items/4aa414482d36eb272eb0 SQLBoilerでエラーErrorunabletoinitializetablesunabletofetchtabledataはじめにSQLBoilerでsqlboilermysqlコマンドをうったときにエラーが出ました。 2022-01-27 11:24:17
Git Gitタグが付けられた新着投稿 - Qiita 【git】upstream を Current Branch にmerge する https://qiita.com/kotaaaa/items/141ce9980d2cdf0c1000 gitmergeupstreammaster 2022-01-27 11:06:38
Git Gitタグが付けられた新着投稿 - Qiita git rebase方法メモ https://qiita.com/kotaaaa/items/ad3b5c2f2b8205a5609e commit 2022-01-27 11:03:25
技術ブログ Developers.IO [新インスタンス] 高クロックのメモリ最適化 EC2 インスタンス X2iezn が利用可能になりました! https://dev.classmethod.jp/articles/high-clock-cpu-memory-optimization-ec2-instance-x2iezn-available/ reinvent 2022-01-27 02:46:27
技術ブログ Developers.IO sql-metadataを試してみる https://dev.classmethod.jp/articles/sql-metadata/ kobayashi 2022-01-27 02:45:07
海外TECH DEV Community Security and Correctness: two different concepts. https://dev.to/marcoservetto/security-and-correctness-two-different-concepts-3g04 Security and Correctness two different concepts A few years ago I started researching on Software correctness I was actually interested in software security but I was unaware of the difference at the time Now after researching in both areas I can finally discuss the difference between those two concepts What does it take to mathematically define if a specific program is correct and or secure Fist I will talk about correctness then security We say that a program is correct if it respects its specification Thus it does not even make sense to talk about the correctness of a program on its own Correctness is actually a consistency property of a pair program specification Let s consider a very simple program with a simple specification Post the result is a positive number int foo return Is this code correct That is is it true that the result of calling that method will always respect the specified post condition Well NO For no real architecture that method will always return a positive number In some situations calling that method will simply raise a StackOverflow error and sometime the physical hardware will crash and burn before being able to compute the result However most developers would agree that the code above is correct or at least as correct as it can possibly be That is we are not considering correctness in an absolute sense we are considering a simplified execution model with certain simplifications with respect to the hash reality where anything can fail at any point anyway Many researchers in the area of software verification seams to simply accepting that there is going to be this set of simplifications that hopefully will be irrelevant in most real life situations an focus on mathematically modelling code execution in order to prove correctness that is consistency between code and specification on such a simplified execution model Instead I decided to study and categorize those simplifications If we can not make proofs on the actual execution model what execution model should we use I say that an execution model more close to reality has a bigger scope that an execution model that excludes more difficulties Most of the verification for correctness research area works under the following simplifications No StackOverflow we assume we have an infinite stack No MemoryOverflow we assume we have an infinite heap I O control we assume no other process is editing our files Uncorrupted Root we assume other processes can not randomly edit our memory bits Correctness of the OS OS functionalities behave as expected Good Hardware we assume no HW bugs Small Physics no cosmic ray bit flips or funky quantum events Large Physics no power cuts no explosions or kicks to the HD Deployment the code we checked is the one that will actually run DefinitionsThus under those simplifications we can define Correctness as follows A program is correct if it always does the right thingWhere the specification identifies what is the acceptable range of right things Now we can contrast the definition of correctness with the one of Security A program is secure if it never does the wrong thing Warning the scope is implicit At a first glance it may look like security is simply a subset of correctness However the SCOPE is often different When discussing about security we do not accept simplifications and that is even if there is a StackOverflow we still can not accept to perform an invalid action In response to a StackOverflow it is ok to crash but it is not ok to send our private information to another country Thus usually we attempt to verify correctness under simplifications and security without simplifications but still with simplifications In particular without near every program is simply incorrect While the right thing is often defining defined using pre post conditions in some logical framework the wrong thing is often defined using actions we abstract over the internal state of the program and we just observe the interaction the program has with the rest of the world Usually we can represent those interactions as forms of I O or calls to low level OS functionalities Under this lens terminating the program with an error message is often not considered an action Going in loop is also often not considered an action Thus those model of security often does not model Denial Of Service vulnerabilities In my research I have never seen a formal mathematical model able to model them to distinguish them from simply a slow algorithm To further clarify the difference of security and correctness consider the two examples below An universally secure but not correct solution to any problem throw new Error NOPE That is we can simply refuse to act No action means no security violation An universally correct but not secure solution to any problemAssuming to have a function correctlyDoStuff that is both correct and secure we can forge a correct but not secure version of it int doStuff int x try rec aNumber catch StackOverflowError o badAction return correctlyDoStuff x void rec int i if i return rec i where badAction does a security violation like formatting the hard drive For any real execution environment of our code for our doStuff function there exists a number aNumber that will trigger the StackOverflow but in the verification for correctness model the catch is recognized as dead code Indeed some code verification tools will accept such a solution as correct ConclusionsThere is a lot of confusion between correctness and security I hope I clarified the terms a little bit here Ultimately there can not be full agreement on any terminology but if we want something that can be mathematically modeled and checked verified the introduced terminology is a very good starting point Also terminology in this area is so challenging that I do not think it is fair to require developers and companies to have a good grasp on those terms In particular if you your company want security and someones tries to sell you correctness without making sure that you understand the difference between the terms they may be scamming you Overall in my opinion we should start by writing SECURE software and only after we are certain that we are well rooted in a secure environment we should start working toward CORRECTNESS 2022-01-27 02:50:20
海外TECH DEV Community WebRTC For Beginners - Part 4: Screen Share https://dev.to/ethand91/webrtc-for-beginners-part-4-screen-share-42p6 WebRTC For Beginners Part Screen ShareContents Part Introduction to WebRTC and creating the signaling serverPart Understanding the MediaDevices API and getting access to the user s media devicesPart Creating the peers and sending receiving mediaPart Sharing and sending the user s display and changing tracksPart Data Channels basicsPart Android native peerPart iOS native peerPart Where to go from hereWelcome back Here in part we will be learning how to get the user s screen and how to switch media tracks so that instead of the camera the screen will be sent instead This part technically doesn t need the previous parts if you already have a signaling server feel free to use that instead Keep in mind that the variety of screens tabs windows that can be shared depends on the browser being used First we will need to edit the public index html file open it and add the following one line lt button id screenShareButton onclick shareScreen disabled gt Share Screen lt button gt Screen sharing will be started when the user clicks this button Next we need to modify public main js open it up and add the following First we need to get a reference to the screen share button const screenShareButton document getElementById screenShareButton We will enable the button once the RTCPeerConnection is initialized same as the call button at the end of the “initializePeerConnection function add the following screenShareButton disabled false Next we need to disable the button again when the session has finished so in the “stop function add the following screenShareButton disabled true Now we can create the new functions that will allow the user to share their screen const shareScreen async gt const mediaStream await getLocalScreenCaptureStream const screenTrack mediaStream getVideoTracks if screenTrack console log replace camera track with screen track replaceTrack screenTrack This function calls a helper function which will be implemented shortly but basically what it does is get the screen track and replaces the track being sent to the remote peer Next we will define the two helper functions the first being “getLocalScreenCaptureStream const getLocalScreenCaptureStream async gt try const constraints video cursor always audio false const screenCaptureStream await navigator mediaDevices getDisplayMedia constraints return screenCaptureStream catch error console error failed to get local screen error Here we get the user s screen by calling “getDisplayMedia this API uses slightly different constraints than the “getUserMedia API Here I ve told it to also show the cursor when screen sharing Also we already have the user s microphone so we don t need any audio Next we define the function that replaces the camera track with the screen track const replaceTrack newTrack gt const sender peerConnection getSenders find sender gt sender track kind newTrack kind if sender console warn failed to find sender return sender replaceTrack newTrack This function takes a newTrack parameter this is the track that is to replace the old track First we need to get the relevant RTCRtpSender so we call RTCPeerConnection getSenders this returns an array of RTCRtpSender objects next we filter the senders based on the kind of the newTrack which is audio or video Since we are replacing the camera track with the screen track we should get the video RTCRtpSender object Finally we replace the sender s track with the screen track Next we need to stop the track when the session ends so add the following to the “stop function for const sender of peerConnection getSenders sender track stop This loops through all the RtcRtpSender s of the RTCPeerConnection and stops their track Done if done correctly the remote peer should now be getting the shared screen Now let s see it in action First start the server npm startNext open tabs browsers to “https localhost Follow the steps from the previous part to initialize the call and click on the “Share Screen button You should see the following prompt I m using Chrome but if you are using a different browser the prompt will be different Also the language may vary Feel free to pick whatever you wanna share and click OK Once done look at the remote peer and you should see the shared screen in the remote video like so The track should also be released when the session ends Phew That s this part done next we will be looking into Data Channels Hope to see you there Github Repo Bonus Things to consider What are the other constraints that could be passed to the getDisplay API Mobile devices cannot share the screen can you detect if the user is using a mobile device In newer MacOS s the user needs to enable the browser to use the screen via the privacy settings can that be handled Bonus Materials RTCRtpSender Web APIs MDNMediaDevices getDisplayMedia Web APIs MDNLike me work Any support is appreciated 2022-01-27 02:14:41
Apple AppleInsider - Frontpage News Apple working on tech to allow iPhones to directly process credit cards https://appleinsider.com/articles/22/01/27/apple-working-on-tech-to-allow-iphones-to-directly-process-credit-cards?utm_medium=rss Apple working on tech to allow iPhones to directly process credit cardsSmall businesses may soon be able to accept credit and debit card payments directly through the iPhone s onboard NFC chip without the need for external hardware In August it was reported that Apple purchased Mobeewave a payments technology startup that developed a method allowing smartphones to be used as mobile payments terminals Now it appears that the Cupertino based tech giant has plans for the technology ーallowing small businesses to accept payments directly on their iPhones without any extra hardware according to Bloomberg Read more 2022-01-27 02:45:47
海外科学 NYT > Science An Extraordinary Iceberg Is Gone, but Not Forgotten https://www.nytimes.com/2022/01/26/climate/iceberg-a68a-antarctica.html An Extraordinary Iceberg Is Gone but Not ForgottenA chunk of Antarctic ice that was one of the biggest icebergs ever seen has met its end near South Georgia Scientists will be studying its effects on the ecosystem around the island for some time 2022-01-27 02:54:16
金融 ニュース - 保険市場TIMES MyVoiceの【医療保険の加入に関する調査】 医療保険の加入者は7割強 https://www.hokende.com/news/blog/entry/2022/01/27/120000 MyVoiceの【医療保険の加入に関する調査】医療保険の加入者は割強単独加入は割弱マイボイスコムのネットリサーチMyVoiceは月日、【医療保険の加入に関する調査】の結果を発表した。 2022-01-27 12:00:00
海外ニュース Japan Times latest articles How the computer chip shortage could incite a U.S. conflict with China https://www.japantimes.co.jp/news/2022/01/27/world/chip-shortage-conflict/ How the computer chip shortage could incite a U S conflict with ChinaThe war game and study by the Center for a New American Security illustrate how dependent the world is on Taiwanese computer chips 2022-01-27 11:25:43
海外ニュース Japan Times latest articles IOC plans to meet with Peng Shuai during Beijing Olympics https://www.japantimes.co.jp/sports/2022/01/27/tennis/ioc-meet-peng/ safety 2022-01-27 11:14:26
ニュース BBC News - Home Covid: Face mask rules and Covid passes end in England https://www.bbc.co.uk/news/uk-60147766?at_medium=RSS&at_campaign=KARANGA legal 2022-01-27 02:25:35
ビジネス ダイヤモンド・オンライン - 新着記事 WTO、中国による対米報復関税を認める - WSJ発 https://diamond.jp/articles/-/294621 関税 2022-01-27 11:20:00
サブカルネタ ラーブロ 船堀「やまだ」麻婆ラーメン(辛め)とモツ煮込定食 http://ra-blog.net/modules/rssc/single_feed.php?fid=195953 久しぶり 2022-01-27 02:30:39
GCP Google Cloud Platform Japan 公式ブログ 顧客管理の暗号鍵(CMEK)を使用して Data Fusion データとメタデータの暗号化が可能 https://cloud.google.com/blog/ja/products/data-analytics/general-availability-for-cmek-in-data-fusion/ CMEKにより、CloudKeyManagementServiceKMSで制御できる鍵を使用して、保存時にユーザーデータもメタデータも暗号化できるようになります。 2022-01-27 04:00:00
GCP Google Cloud Platform Japan 公式ブログ Wayfair がデータベースを一度に 1 つモダナイズしている方法 https://cloud.google.com/blog/ja/products/databases/wayfair-migrates-to-cloud-sql-and-cloud-spanner/ 数千ものデータベースがある場合、個々のチームレベルで自己解決するのではなく、抽象化されたものと対話することができるため、開発時間の短縮や市場投入までの時間短縮につながります。 2022-01-27 03:00:00
北海道 北海道新聞 道内コロナ2800人超 最多更新 札幌1590人台に急増 https://www.hokkaido-np.co.jp/article/638314/ 新型コロナウイルス 2022-01-27 11:13:50
北海道 北海道新聞 モデルナもオミクロン株対応へ ワクチンの臨床試験実施 https://www.hokkaido-np.co.jp/article/638347/ 臨床試験 2022-01-27 11:09:00
ビジネス 東洋経済オンライン 14歳少女も住み込みで「家事手伝う」時代の生き様 漫画「うちのちいさな女中さん」(第1話) | うちのちいさな女中さん | 東洋経済オンライン https://toyokeizai.net/articles/-/506204?utm_source=rss&utm_medium=http&utm_campaign=link_back 住み込み 2022-01-27 11:30:00
マーケティング AdverTimes テルモ100周年 グローバルでの一体感を醸成 https://www.advertimes.com/20220127/article374931/ tsunagu 2022-01-27 02:41:20
マーケティング AdverTimes DX推進PJを新設 ルネサンス、リーダーに平野CD部長 https://www.advertimes.com/20220127/article375245/ 部門 2022-01-27 02:38:28
GCP Cloud Blog JA 顧客管理の暗号鍵(CMEK)を使用して Data Fusion データとメタデータの暗号化が可能 https://cloud.google.com/blog/ja/products/data-analytics/general-availability-for-cmek-in-data-fusion/ CMEKにより、CloudKeyManagementServiceKMSで制御できる鍵を使用して、保存時にユーザーデータもメタデータも暗号化できるようになります。 2022-01-27 04:00:00
GCP Cloud Blog JA Wayfair がデータベースを一度に 1 つモダナイズしている方法 https://cloud.google.com/blog/ja/products/databases/wayfair-migrates-to-cloud-sql-and-cloud-spanner/ 数千ものデータベースがある場合、個々のチームレベルで自己解決するのではなく、抽象化されたものと対話することができるため、開発時間の短縮や市場投入までの時間短縮につながります。 2022-01-27 03:00:00

コメント

このブログの人気の投稿

投稿時間:2021-06-17 22:08:45 RSSフィード2021-06-17 22:00 分まとめ(2089件)

投稿時間:2021-06-20 02:06:12 RSSフィード2021-06-20 02:00 分まとめ(3871件)

投稿時間:2021-06-17 05:05:34 RSSフィード2021-06-17 05:00 分まとめ(1274件)