AWS |
AWSタグが付けられた新着投稿 - Qiita |
CloudFront + S3 で「This XML file does not appear to have any style information associated with it.」エラー |
https://qiita.com/holdout0521/items/822621826d5cde49a493
|
他にもオリジンリクエストポリシーのAllViewerやヘッダーのAuthorizationが追加されると同様に上書きされてしまい、エラーになります。 |
2022-01-29 22:32:05 |
AWS |
AWSタグが付けられた新着投稿 - Qiita |
Golangはじめて物語(第10話: RDS Proxy+Aurora(PostgreSQL互換)とうまく付き合う方法) |
https://qiita.com/neruneruo/items/2313feed6d4ce28c2061
|
RDSProxyは特性上、PreparedStatementのように接続時に設定を行うようなことをするとピン留めが発生する参考公式ドキュメント、クラスメソッド先生の記事RDSProxyには初期化クエリという、ProxyがAuroraとセッションを張ったときに実行するクエリがあり、そこでPreparedStatementも実行できるが、プログラム言語側からそのクエリを指定して実行することができないGolangはプレースホルダを使ったSQLを発行すると、バックエンドのdatabasesqlライブラリが勝手にPreparedStatementを実行してしまう仕様があるもうかなり詰んだ状態である。 |
2022-01-29 22:16:50 |
golang |
Goタグが付けられた新着投稿 - Qiita |
Golangはじめて物語(第10話: RDS Proxy+Aurora(PostgreSQL互換)とうまく付き合う方法) |
https://qiita.com/neruneruo/items/2313feed6d4ce28c2061
|
RDSProxyは特性上、PreparedStatementのように接続時に設定を行うようなことをするとピン留めが発生する参考公式ドキュメント、クラスメソッド先生の記事RDSProxyには初期化クエリという、ProxyがAuroraとセッションを張ったときに実行するクエリがあり、そこでPreparedStatementも実行できるが、プログラム言語側からそのクエリを指定して実行することができないGolangはプレースホルダを使ったSQLを発行すると、バックエンドのdatabasesqlライブラリが勝手にPreparedStatementを実行してしまう仕様があるもうかなり詰んだ状態である。 |
2022-01-29 22:16:50 |
Linux |
CentOSタグが付けられた新着投稿 - Qiita |
CentOS8.3のインストール |
https://qiita.com/Higemal/items/21dc6b99e81c9d0eeb6f
|
isoの起動「InstallCentOSLinux」をカーソルで選択し、Enterを押下します。 |
2022-01-29 22:11:00 |
海外TECH |
Ars Technica |
Did eating meat really make us human? |
https://arstechnica.com/?p=1830242
|
evolution |
2022-01-29 13:00:45 |
海外TECH |
MakeUseOf |
These 4 Chrome Extensions Make Creating YouTube Content Easy |
https://www.makeuseof.com/chrome-extensions-making-youtube-content/
|
These Chrome Extensions Make Creating YouTube Content EasyIf you re looking to delve into the world of YouTube the platform may seem daunting Luckily these four Chrome extensions can make things easier |
2022-01-29 13:01:55 |
海外TECH |
DEV Community |
How Cryptocurrency Works Explained Visually |
https://dev.to/narottam04/how-cryptocurrency-works-explained-visually-2j32
|
How Cryptocurrency Works Explained VisuallyIn when Lehman Brothers Holdings Inc filed for bankruptcy it shook people s faith in banks so much that a new class of assets appeared without formal bank backing The first cryptocurrency named Bitcoin was invented in by an unknown person or group of people using the name Satoshi Nakamoto The idea was to make a decentralized open source digital currency without a central bank or single administrator Here is the link to the proposed whitepaper by Satoshi NakamotoIn this article we will explore how cryptocurrency actually works from transactions to data storage Since Bitcoin is the first and most well known cryptocurrency I will focus on it in this article Bitcoin ≠BlockchainIt is a common misconception that people use the word blockchain and Bitcoin interchangeably but that s not trueBitcoin is not just a coin but a protocol based on the technology of Blockchain Protocol is set of rules that guides the participants on the network how to communicate with one another An example of a protocol for bitcoins is how public and private keys for authentication should be managed how mining should be done for transactions to be confirmed etc Ethereum waves neo and ripple are a few other examples of similar protocols like bitcoin This protocol like Bitcoin and Ethereum has a coin that is typically named after the protocol name which enables human interaction This coin is used to reward people who mine to add blocks to the blockchain and most importantly to buy stuff from one another Tokens are layer and rely on smart contracts that are constructed on protocols from layer Ethereum is the most popular protocol for creating smart contracts and for creating token Bitcoin protocol does not have token because it does not support creating smart contract on their protocol A Secure Alternative to Traditional Banks To truly comprehend cryptocurrencies let us first examine how blockchain and traditional client server architecture function Client Server ArchitectureBasic concept of this architecture is client user will make a http request to the server and if everything is correct it will send back that webpage served from the centralized database as a response The fact that all data is stored on a centralized server controlled by the bank and companies is a huge issue Furthermore because the data is housed on a centralized server the likelihood of the server being hacked is very high implying that your data and privacy is at risk BlockchainBlockchain solves major two flaws that are present in traditional client server architecture i e data privacy and security of data Blockchain is a distributed immutable ledger which is completely transparent Let s break down the definition in simple terms Distributed means that the data is stored in a network of computers eliminating the need for centralized servers You can think of ledgers as an account book keeping track of all the transactions taking place on the blockchain and it is immutable meaning that once it is added to the blockchain it can never be changed Blockchain transactions are encrypted with cryptography so not everyone can see them Transactions are shown using secret code Bitcoin MiningNow that we ve covered the fundamentals of blockchain let s look at how transactions work in the bitcoin protocol As an example suppose Bob wishes to send BTC to Alice Bob conducts a transaction in order to send money to Alice The transaction initiated by Bob is initially saved in Mempool It is an area where all unconfirmed transactions are stored To add a transaction from mempool to the bitcoin blockchain miners must first solve a mathematical problem that takes an average of minutes to solve The miner who solves the mathematical problem first will tell all other miner in the network that it has successfully solved the problem Now other miners in the network will first check if the mined block is genuinely from Bob or a hacker attempting to penetrate the chain After double checking everything the transaction is successfully posted to the blockchain and Alice receives BTC from Bob It should be noted that the miner who solves the mathematical problem first will receive a reward or transaction fee in the form of bitocin Mathematical ProblemNow that we have a fundamental grasp of mining let us look at the mathematical problem that miners are solving in order to add it to the bitcoin network When Bob conducted a transaction with Alice the transaction looked like the one shown below Each transaction is identified by a Block number a nonce data a previous hash and a hash The block number as the name implies is the current block number that is to be added to the blockchain Data contains the transaction details of Bob wallet to Alice wallet In the blockchain hashes are like fingerprints and they are used to remember previous blocks The previous hash contains the hash value of the previous block that is already mined in the blockchain Nonce is a variable value or number that the miner can alter to get the proper hash all other data in the block such as the block number data and previous hash are immutable by nature and cannot be changed by anyone SHA AlgorithmWhen a file is processed by this algorithm SHA creates an encrypted data file with hexadecimal characters and bits per character Hash is generated when we pass block no data and prev hash amp nonce in SHA algorithm Miners are given a target value by the bitcoin protocol The hash generated by miners should be less than the bitcoin protocol s target value in order to be successfully added to the blockchain Miners change the nonce number to generate hash numbers and the miner who generates the hash that is less than the target value first receives a reward for successfully solving the mathematical problem To explore the demo yourself visit to this website Above is a demonstration of the transaction that we were attempting you can try it yourself on the website Be sure to observe how the hash changes when you change the block no nonce or data in the block A change like this prevents hackers from hacking blockchains which we will discuss in the following sections Chain Of BlocksNow that you have a basic understanding of how bitcoin is mined using the SHA algorithm let s look at how a successfully mined block is added in the blockchain The first block on the blockchain is also known as the Genesis block and it s Previous Hash value is Our Bob and Alice transaction is the third block that has been successfully added with the previous hash value equal to the value of the second block s hash Distributed PP NetworksLet s zoom out a bit to see how this blockchain is kept on decentralized distributed Peer to Peer networks or PP networks If one peer in a distributed PP network requires data it will contact the peer who has that data stored The benefit of this PP network is that it cannot be hacked by a hacker since the data is kept in many locations and if one data is tampered with the other data will stay safe We will look at the benefits of pp in the following section but first let s see how the successfully minned block of Bob and Alice is stored in pp networks Let the figure below serve as an example of a PP network with miners and users Consider A to be the miner who successfully solves the mathematical problem of the transaction between Bob and Alice and adds it to the local blockchain i e at block Once uploaded to the blockchain it will alert the other user on the network of the newly mined block and instruct them to include it in their own block Below is an animation that will help you visualize it The other user will first verify that the block mined by A is correct and then the block will be successfully added to the blockchain When the block is successfully added our peer to peer network will resemble the following image ResourcesYouTube Course In HindiSo that s all folks This was a quick introduction of how cryptocurrency works and I hope you learned something new from this blog today If you want to learn in more depth about blockchain and cryptocurrency in general I recommend you following sources mentioned below For more such insights checkout my blog website blog webdrip in |
2022-01-29 13:30:52 |
海外TECH |
DEV Community |
Frontend vs Backend vs Full-Stack |
https://dev.to/invalidlenni/frontend-vs-backend-vs-full-stack-1fip
|
Frontend vs Backend vs Full Stack Frontend vs Backend Full Stack developerYou don t know the differences between frontend and backend and full stack developer developer The post is perfect for you FrontendA frontend developer makes visual elements of a website client etc The frontend makes the web stuff that you can see on ex a website Frontend is client side BackendA backend developer focusing on the side for website users You can t see the backend Backend is server side Full Stack developerA full stack developer has many coding skills from frontend backend development to graphic design and UI UX management |
2022-01-29 13:02:41 |
海外TECH |
Engadget |
Twitter's misinformation policy doesn't cover the 2020 elections anymore |
https://www.engadget.com/twitter-misinformation-policy-2020-elections-132205770.html?src=rss
|
Twitter x s misinformation policy doesn x t cover the elections anymoreTwitter is no longer taking action on tweets spreading misinformation about the US elections the website has revealed to CNN Elizabeth Busby the company s spokesperson told the news organization that the social network hasn t been enforcing its quot civic integrity policy quot when it comes to content about the Presidential elections for almost a year now ーsince March Busby said that s because the policy was meant to be used within the duration of an event and that President Biden has already been in office for more than a year The website amended its civic integrity policy before the Presidential elections to add labels to tweets with quot false or misleading information intended to undermine public confidence in an election or other civic process quot In some cases Twitter could remove tweets under the policy The rules cover tweets quot inciting unlawful conduct to prevent a peaceful transfer of power or orderly succession quot If you ll recall former President Trump was banned on the social network following the Capitol attack after deciding that his tweets can be used to incite violence The rules also cover unverified information quot election rigging quot which the administration s opponents are echoing until this day In fact YouTube has just removed a copy of a TV ad by Missouri Rep Billy Long that claims quot the Democrats rigged the election quot in YouTube spokesperson Ivy Choi explained the Google owned website made it clear that quot false claims that widespread fraud errors or glitches changed the outcome of the US presidential election quot are prohibited on the platform Long said YouTube s action was quot un American and straight from the communist playbook quot though and that it just proves quot Big Tech certainly has and will continue to influence elections quot |
2022-01-29 13:22:05 |
ニュース |
BBC News - Home |
US East Coast hunkers down as 'bombogenesis' snowstorm hits |
https://www.bbc.co.uk/news/world-us-canada-60177979?at_medium=RSS&at_campaign=KARANGA
|
blizzard |
2022-01-29 13:51:26 |
ニュース |
BBC News - Home |
Doncaster: Boy, 17, and man die in double fatal town centre stabbing |
https://www.bbc.co.uk/news/uk-england-south-yorkshire-60182333?at_medium=RSS&at_campaign=KARANGA
|
centre |
2022-01-29 13:33:47 |
ニュース |
BBC News - Home |
Sri Lanka to Coalisland: 'We felt like only people of colour in our town' |
https://www.bbc.co.uk/news/uk-northern-ireland-60147850?at_medium=RSS&at_campaign=KARANGA
|
ireland |
2022-01-29 13:42:41 |
ニュース |
BBC News - Home |
Kyrgios & Kokkinakis clinch maiden men's doubles Grand Slam title |
https://www.bbc.co.uk/sport/tennis/60181930?at_medium=RSS&at_campaign=KARANGA
|
Kyrgios amp Kokkinakis clinch maiden men x s doubles Grand Slam titleNick Kyrgios and Thanasi Kokkinakis beat fellow Australians Matthew Ebden and Max Purcell in the Australian Open men s doubles final to secure a maiden Grand Slam title |
2022-01-29 13:37:42 |
LifeHuck |
ライフハッカー[日本版] |
価格と機能性がちょうどいい電動歯ブラシ『フィリップス ソニッケアー プロテクトクリーン』【今日のライフハックツール】 |
https://www.lifehacker.jp/article/lht_electric_tooth_brush/
|
電動歯ブラシ |
2022-01-29 13:05:00 |
北海道 |
北海道新聞 |
日ロ地域間の関係強化へ 札幌で交流年開会式 |
https://www.hokkaido-np.co.jp/article/639380/
|
関係強化 |
2022-01-29 22:18:00 |
北海道 |
北海道新聞 |
サンクトペテルブルクで北海道フェア 食や観光アピール |
https://www.hokkaido-np.co.jp/article/639379/
|
隆史 |
2022-01-29 22:15:00 |
北海道 |
北海道新聞 |
札幌冬季五輪 招致期成会がオンラインシンポジウム |
https://www.hokkaido-np.co.jp/article/639365/
|
五輪招致 |
2022-01-29 22:10:43 |
コメント
コメントを投稿