python |
Pythonタグが付けられた新着投稿 - Qiita |
ポケモンUNITEの流行ポケモンが知りたい! |
https://qiita.com/RyosK06/items/a66eb3d33e3650e5a8ba
|
|
2022-02-06 03:08:18 |
js |
JavaScriptタグが付けられた新着投稿 - Qiita |
【JavaScript】JavaScript基礎まとめ2 |
https://qiita.com/P-man_Brown/items/2b06e43c8ca55a5ea192
|
年齢はmyProfileです。 |
2022-02-06 03:37:37 |
海外TECH |
MakeUseOf |
How to Mute Text Messages Notifications From Someone on Your iPhone |
https://www.makeuseof.com/how-to-mute-text-message-notifications-person-iphone/
|
particular |
2022-02-05 18:30:12 |
海外TECH |
MakeUseOf |
4 Productive Tools to Improve Focus in Distracting Offices |
https://www.makeuseof.com/productive-tools-to-focus-in-offices/
|
digital |
2022-02-05 18:15:43 |
海外TECH |
DEV Community |
Prisma - Backup System |
https://dev.to/daxsoft/prisma-backup-system-n6f
|
Prisma Backup System startHi everyone GitHub of the ProjectUse this module to create a backup measure for your project that uses Prisma You can either backup the information or use them to migrate to another database or just to reset the database Example Let s say that you need to change a unique key email to another like code You can backup first then change the schema prisma and use this module to inject the old information How To UseBasic example using the Prisma let s imagine that we have two models User amp Post And the Post model is related to the User model import PrismaClient from prisma client import backup from vorlefan prisma backup const prisma new PrismaClient void async function const user post await prisma transaction prisma user findMany prisma post findMany w out encrypt await backup models user encrypting the models await backup models user encrypt true password pwd backupFolderName encrypted EndThere a lot of feature that I m planning for this module then if you want to please contribute or follow up the news xD |
2022-02-05 18:30:28 |
海外TECH |
DEV Community |
How the Internet work? (IP, TCP, LAN, FTP, ...) |
https://dev.to/fkkarakurt/how-the-internet-work-ip-tcp-lan-ftp--agg
|
How the Internet work IP TCP LAN FTP The single most important fact to understand about the Internet is that it can potentially link your computer to any other computer Anyone with access to the Internet can exchange text data files and programs with any other user For all practical purposes almost everything that happens on the Internet is a variation of one of these activities The Internet itself is the pipeline that carries the data between computers TCP IP the Universal Language of the InternetThe Internet works because every computer connected to it uses the same set of rules and procedures protocols to control timing and data format The protocols used by the internet are called Transmission Control Protocol Internet Protocol universally abbreviated as TCP IP These protocols include the specifications that identify individual computers and that exchange data between computers They also include rules for several categories of application programs so programs that run on different kinds of computers can talk to one another TCP IP software looks different on different types of computers but it always presents the same appearance to the network It does not matter if the system at the other end of a connection is a supercomputer pocket size PC or anything in between as long as it recognises TCP IP protocols it can send an receive data through the internet Routing Traffic Across the InternetMost computers are not connected directly to the Internet Rather they are connected to smaller networks that connect to the Internet backbone through gateways This is why the Internet is sometimes described as a network of networks The core of the Internet is the set of backbone connections that tie the local and regional networks together and the routing scheme that controls the way each piece of data finds its destination The Internet includes many thousands of servers each with its own unique address These servers in tandem with routers and bridges do the work of storing and transferring data across the network Because the Internet creates a potential connection between any computers the data may be forced to take a long circuitous route to reach its destination Suppose for example you request data from a server in another area Request must be broken into packetsPackets are routed through your local network and possibly though one or more subsequent networks to the Internet backbone After leaving the backbone the packets are routed through one or more networks until they reach the appropriate server and are reassembled into the complete request Once the destination server receives your request it begins sending you the requested data which winds its way back to you possibly over a different route Between the destination server and you PC the request and data may travel through several different servers each helping to forward the packets to their final destination Addressing Schemes IP and DNS AddressesInternet activity can be defined as computers communicating with each other using the common language of TCP IP Examples areClient system communicating with an Internet server Internet server computer communicating with a client computer server computers communicating with each other client computers communicating via one or more servers The computer that originates a transaction must identify its intended destination with a unique address Every computer on the Internet has a four part numeric address called the Internet protocol address IP address which contains routing information that identifies its location Each of the four parts is a number between and so and IP address looks like Computers have no problems working with long strings of numbers but we are not so skilled Most computers on the Internet also have an address called a domain name system DNS address an address that uses words rather than numbers Domains and SubdomainsDNS addresses have partsHost name name for a computer connected to the InternetDomain generally identifies the type of institution that uses the address This type of domain name is often called a top level domain Most common types of Internet domains DomainType of OrganisationExample comBusiness commercial ibm com eduEducationalmit edu govGovernmentwhitehouse gov milMilitaryarmy mil netGateway or hostbehance net orgOther organisation typically non profit isoc orgSome large institutions and corporations divide their domain addresses into smaller subdomains In the Internet Assigned Numbers Authority IANA and the Internet society began an organised movement to create an additional set of top level Internet domains The action was necessary because many companies and private groups were finding it difficult to devise suitable domain names for their Internet sites There was only so much room in the com domain and some companies found that their mane or product name was already in use The group s goal was to expand the list of top level domains to make it easier for organisations of all kinds to create an Internet domain for themselves The group developed the Generic Top Level Domain Memorandum of Understanding TLDMoU which spells out proposals for the future management of Internet domains andproposes new top level domains for future useDomainTypes of Organisation firmBusinesses or Firms equivalent to com shopBusinesses offering purchases over the Internet webOrganisations involved in web related activities artsOrganisations promoting artistic or entertainment activities over the internet recOrganisations promoting recreational activities over the Internet infoOrganisations providing information services over the Internet nomIndividual family or personal nomenclature Major Features of the InternetThe popularity of the Internet is due more to content than connectivity As a business tool it has many uses Email is an efficient and inexpensive way to send and receive massages and documents around the world The www is becoming an important advertising medium and channel for distribution Databases and online information archives are often more up to date than any library The Internet also has virtual communities made up of people who share interests Most individual users connect the computers modem to the phone line and set up an account with an Internet Service Provides ISP providing local and regional access to the Internet backbone Many others connect through a school or business LAN The World Wide WebThe web was created in at the European Particle Physics Lab in Geneva as a method for incorporating footnotes figures and cross references into online hypertext documents A hypertext document is a specially encoded file that uses the hypertext markup language HTML This language allows a documents author to embed hypertext links called hyperlinks or links into the document As you read a hypertext document web page on screen you can click on an encoded word or picture and immediately jump to another location A collection of web pages is called a web site and these are housed on a web server Copying a page to the server is called posting the page or publishing or uploading Popular web sites receive millions of hits or page views per day Many web masters measure their sites success by the number of hits in a given timeframe A Webmaster is the person or group responsible for designing and maintaining a website The terms www and internet are used interchangeably however the www is just one part of the Internet Web browsers and HTML tagsMosaic a point and click web browser was developed at the University of Illinois in A web browser is a software application designed to find hypertext documents on the web and open them on the users computer A web browser displays a web page as specified by the pages underlying HTML code The code provides the browser withFonts and font sizesWhere and how to display graphicsIf and how to display sound animation or other special content Location of links and where to go if they are clicked Whether special programming codes which the browser needs to interpret are used in the page HTML tags which are enclosed in angle bracket lt gt tell the browser how to display individual elements on the page They are placed around the portions of the document that they affect Most tags have a starting tag such as lt H gt and an ending tag such as lt H gt A slash indicates a finishing tag HTTP and URLsThe internal structure of the World Wide Web is built on a set of rules called hypertext transfer protocol HTTP HTTP uses Internet addresses in a special format called a uniform resource locator URL that look like type address path Type specifies type of server on which the URL is located Address is the address of the server Path location within the file structure of the server Home PagesPersonalised start pageOn your browser you can choose a web page that opens immediately when you launch the browser Web site home pageA web sites primary page is also called a home page This is the first page that you see when you type the sites basic URL Helper Applications and multimedia contentLarge files such as audio and video require special applications in order to be played in real time across the Web These applications are called helper applications or plugins Plugins are used to support several types of content including streaming audio and streaming video One of the most commonly used plugin applications is Macromedia Shockwave enabling web designers to create high quality animation or video with sound that plays directly within the browser window Finding content with a search engineSpecialised Web sites called search engines use powerful data searching techniques to discover the type of content available on the Web By using a search engine and specifying your topic of interest you can find the right site of information Popular Search EnginesWebcrawlerYahoo GoogleMetacrawlerBingBaiduYandexDuckDuckGo Electronic MailPopular Internet email programs includeGmailOutlookProtonMailAOLZoho MailiCloudYahoo MailGMX Listserv systemsOne type of mailing list that uses email is an automated list server or listserv Users on the list can post their own messages so the result is an ongoing discussion NewsThe Internet supports a form of public bulletin board called news Many of the most widely distributed newsgroups are part of a system called Usenet Users post articles about the groups topic and as others respond they create a thread of linked articles A newsreader program obtains articles from the news server using the network news transfer protocol NNTP To see articles posted on a specific topic you subscribe to the newsgroup addressing that topic Major Usenet domainsComp computer relatedSci science and technology not computers Soc social issues and politicsNews topics related to UsenetRec arts hobbies and recreational activitiesMisc all other topics Telnet Remote Access to distant computersThis is the Internet tool for using one computer to access a second computer You can send commands that run programs and open text or data files Connecting to a Telnet host is easy enter the address and the telnet program establishes a connection FTPFile Transfer Protocol is the Internet tool used to copy files from one computer to another When a user has accounts on more than one computer FTP can be used to transfer data or programs between them Internet Relay Chat IRC Internet Relay Chat or just chat is a popular way for Internet users to communicate in real time with other users Chat does not require a waiting period between the time you send a message and the time the other party receives it IRC is often referred to as the CB radio of the Internet because it enables few or many people to join a discussion Accessing the InternetDirect ConnectionPrograms run on the local computer which uses TCP IP protocols to exchange data with another computer through the Internet An isolated computer connects to the Internet through a serial data communications port using SLIP serial line interface protocol or PPP point to point protocol Remote Terminal ConnectionExchanges data and commands in ASCII format with a host computer that uses UNIX or similar OS TCP IP application programs and protocols all run on the host This is known as a shell account as the command set in UNIX is called a shell Gateway ConnectionEven if a LAN does not use TCP IP commands and protocols it may provide some Internet services Such networks use gateways that convert commands and data to TCP IP format Connecting Through a LANIf a LAN uses TCP IP protocols for communication within the network it is simple to connect to the Internet through a router another computer that stores and forwards data to other computers on the internet Connecting Through a ModemIf there is no LAN on site a stand alone computer can connect to the internet through a serial data communications port and a modem using either a shell account and a terminal emulation or a direct connection with a SLIP serial line interface protocol or PPP point to point protocol account High Speed Data LinksUsing fibre optics microwave and other technologies it is entirely practical to establish an internet connection that is at least times faster than a modem connection o ISDN service o xDSL services o Cable modem service Working on the Internet Businesses and FirewallsA firewall is set up to control access to a network by people using the Internet Firewalls act as barriers to unauthorised entry into a network that is connected to the Internet allowing outsiders access to public access areas but preventing them from exploring proprietary areas of the network A firewall system can be hardware software or both It works by inspecting requests and data that travel between the private network and the Internet If the request or data does not pass the firewalls security inspection it is stopped from travelling any further Intranets and ExtranetsAn intranet is a LAN or WAN that uses TCP IP protocols but belongs exclusively to a corporation school or organisation It is accessible only to the organisation s workers If it is connected to the Internet then it is secured by a firewall to prevent unauthorised access An extranet is an intranet that can be accessed by outside users over the Internet To gain entrance an external user typically must log on to the network by providing a valid user ID and password Intranets and Extranets are popular for several reasons includingUse standard TCP IP protocols ‡simpler and less expensive to install and configure Enable users to work in standard web browsers providing a consistent interface Function readily with firewalls and other standard security technologies Issues for Business Users and TelecommutersOwnershipAny piece of text or graphic retrieved from the Internet may be covered by trademark or copyright law making it illegal to use it without the owners consent Libel If email messages are sent through an employers network then the employer may become involved if the sender is accused of libel Appropriate useWhen using a business network to access the Internet users must be careful to use network resources appropriately Commerce on the wwwUsing an e commerce site is like browsing through an online catalogue When you are ready to make your purchases you can pay in several ways One time credit card purchasesProvide your personal and credit card information each time you make a purchase Set up an online accountIf you think you will make more purchases with the online vendor you can set up an account at the web site The vendor stores your personal and credit card information on a secure server and a cookie is placed on your computer disk Later when you access your account using a user ID and password the site uses the information in the cookie to access your account Use electronic CashAlso called digital cash Takes the form of a redeemable electronic certificate which can be purchased from a bank that provides electronic cash services Not all e commerce web sites accept digital cash yet Electronic walletProgram on your computer that store credit card information a digital certificate that verifies your identity and shipping details Not accepted by all e commerce sites SecurityReputable e commerce sites use sophisticated measures to ensure that customer information cannot fall into the wrong hands One way is to use secure web pages One way to provides secure websites is to encode pages using secure sockets layer SSL technology which encrypts the data Another way is to use secure HTTP SHTTP SSL can be used to encode any amount of data S HTTP is used to encode individual pieces of data ConclusionThe purpose of this article was simply to explain how the internet works You learned the meanings of some internet terms that we frequently use in daily life It doesn t matter if you are a Back End or Front End Developer You can also be a game developer or a Data Scientist But I think every developer should know how the internet works and some basic security measures Take care and don t forget to follow This is quite motivating |
2022-02-05 18:26:38 |
海外TECH |
DEV Community |
A CICD pipeline that pushes code to cpanel or any other server via FTP or SSH |
https://dev.to/leroykayanda/a-cicd-pipeline-that-pushes-code-to-cpanel-or-any-other-server-via-ftp-or-ssh-36l6
|
A CICD pipeline that pushes code to cpanel or any other server via FTP or SSHThe code is on github Set up codebuild to build your code once a commit is made to your repository You can also use codebuild to run your tests When building is complete the code is stored in sCreate a codepipeline that will trigger automatically when you push a commit to your repository bitbucket github codecommit etc The first stage will be your code source and the second stage will be codebuild When you push a commit the pipeline will run The code will be built and stored in S You can set up an S lifecyle rule to delete old code artifacts You can also set up a CloudWatch event rule that will inform you via SNS of the state of the pipeline execution successful or failed The code now needs to be pushed to cpanel Set up an S event that monitors for new object creation When code is pushed set the event should invoke a lambda function The Lambda will fetch the code from S and store it in its tmp directory which is limited to mb The lambda will unzip the code and push it to cpanel using FTP FTP credentials are fetched from the AWS Parameter Store Lambda can then inform you via SNS when the code has been successfully pushed Lambda has a maximum running time of minutes codepipeline cpanel push lambda pyIAM Permissions RequiredcloudwatchSSNSSSMLambda Environment Variablesbucket bucket name for bucket that stores codepipeline artifactsftp hostnamesns topic arn of sns topic to send you a notification when code has been pushed to cpanelregionftp directory where files will be pushed toftp hostname hostname of the cpanel serverThe function named codepipeline ssh push lambda py is for the case where code is pushed to a server via SSH which offers increased security as the data between the lambda function and the server will be encrypted Lambda environment variables in this case target host IP address of the server zipped src path in tmp directory of lamba temporary storage where the zipped code downloaded from S will be stored eg tmp zipped unzipped src path in tmp directory of lamba temporary storage where the unzipped code will be stored e g tmp unzipped |
2022-02-05 18:23:17 |
海外TECH |
DEV Community |
transform property in CSS: part 3 |
https://dev.to/therajatg/transform-property-in-css-part-3-1lfg
|
transform property in CSS part Note This is the third part of a part series dedicated to the transform property of CSS In this part we ll understand the translate function of the transform property but if you want to jump to any other function of the transform property be my guest and click on the links provided below part rotatepart scalepart translatepart skew yet to be published Now this is what I feel is by far the most useful function of the transform property It makes the moving of elements seamless It is used to move an element left and right along the x axis up and down along the y axis and back and forth along the z axis Since we are dealing with d objects we ll restrict ourselves along the x and y axis So let s get started To understand this we ll take boxes so that we can see the relative movement of one of the boxes CSS is sometimes hard to teach in an article In the below example we applied transform translate px to the red box and it moved px to its right along the x axis red background color red color white height px width px transform translate px Instead of px we can use any other unit However I like to use percentages here as we do not have to know the exact width of the box to move it see the below example in which we ll move the red box by of its width to the left red background color red color white height px width px transform translate Now let us move the box along y axis Remember that the positive y will move our box downwards and negative y will move it upwards let s see the below example red background color red color white height px width px transform translate Now let us move the red box across both the axis x and y red background color red color white height px width px transform translate If we want to move across only one direction we can also use either translateX or translateY depending on the direction we want to move instead of what we learned above red background color red color white height px width px transform translateY If you still have any doubt feel free to ask in the comments section and do not forget to check other functions of transform link at the top I write one article every day related to web development yes every single f cking day Follow me here if you are learning the same my Twitter handle therajatgIf you are the Linkedin type let s connect Have an awesome day ahead PS Whoa I am getting good at blogging I wrote this article in under hours |
2022-02-05 18:23:08 |
Apple |
AppleInsider - Frontpage News |
Fujifilm works on camera firmware to fix bug affecting macOS users |
https://appleinsider.com/articles/22/02/05/fujifilm-works-on-camera-firmware-to-fix-bug-affecting-macos-users?utm_medium=rss
|
Fujifilm works on camera firmware to fix bug affecting macOS usersFujifilm is working on an issue affecting some of its X and GFX series cameras one which prevents macOS users from being able to access some of the images stored on a memory card While photographers know of the potential for the loss of images from a memory card failing it s rare for the source of the problem to be the camera itself In a notice from Fujifilm it seems that for some of its Mac using customers the camera s software could be at fault Read more |
2022-02-05 18:42:13 |
ニュース |
BBC News - Home |
Boris Johnson names two new aides after No 10 party turmoil |
https://www.bbc.co.uk/news/uk-politics-60274440?at_medium=RSS&at_campaign=KARANGA
|
communications |
2022-02-05 18:53:43 |
ニュース |
BBC News - Home |
Prince Andrew to give evidence in deposition in March |
https://www.bbc.co.uk/news/uk-60274193?at_medium=RSS&at_campaign=KARANGA
|
assault |
2022-02-05 18:05:36 |
ニュース |
BBC News - Home |
Scotland retain Calcutta Cup with dramatic late win over England |
https://www.bbc.co.uk/sport/rugby-union/60274404?at_medium=RSS&at_campaign=KARANGA
|
Scotland retain Calcutta Cup with dramatic late win over EnglandScotland secure successive Calcutta Cup wins after a dramatic late penalty try helps them claim a nerve shredding Six Nations victory over England at Murrayfield |
2022-02-05 18:40:19 |
ニュース |
BBC News - Home |
Six Nations: Scotland awarded penalty try to level score |
https://www.bbc.co.uk/sport/av/rugby-union/60273114?at_medium=RSS&at_campaign=KARANGA
|
deliberate |
2022-02-05 18:39:18 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
「ぐっすり眠りたい」ときに「夜8時から30分だけ」やるべき簡単なこととは? - 孤独からはじめよう |
https://diamond.jp/articles/-/295155
|
自分 |
2022-02-06 03:50:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
中古マンションは争奪戦! 失敗しない賢い買い方・売り方とは - マイホームは価値ある中古マンションを買いなさい! |
https://diamond.jp/articles/-/293439
|
中古マンションは争奪戦失敗しない賢い買い方・売り方とはマイホームは価値ある中古マンションを買いなさい新築マンション市場が、投資・転売・節税目的の購入者層で沸いています。 |
2022-02-06 03:45:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
【1日1分強運貯金】 見るだけで、突然、人間関係が良くなる! 【観世音菩薩】のやすらぎ御利益パワーとは? - 1日1分見るだけで願いが叶う!ふくふく開運絵馬 |
https://diamond.jp/articles/-/293618
|
【日分強運貯金】見るだけで、突然、人間関係が良くなる【観世音菩薩】のやすらぎ御利益パワーとは日分見るだけで願いが叶うふくふく開運絵馬Amazonランキング第位祭祀・、楽天ブックスランキング第位民俗・、。 |
2022-02-06 03:40:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
精神科医が教える 他人の意見に振り回されない たった1つの考え方 - 精神科医Tomyが教える 心の荷物の手放し方 |
https://diamond.jp/articles/-/294008
|
voicy |
2022-02-06 03:35:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
【出口学長・哲学と宗教特別講義】 ソクラテスは、本当に ソフィストだったのか、否か? - 哲学と宗教全史 |
https://diamond.jp/articles/-/293485
|
|
2022-02-06 03:30:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
【「お金と時間の自由」を最速で獲得】 自由になるために必要なたった3つの行動 - 投資をしながら自由に生きる |
https://diamond.jp/articles/-/294180
|
|
2022-02-06 03:25:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
9割の人が知らない! 転職サイトと転職エージェントの違いとは? 絶対知っておくべき使い分け方 - 真の「安定」を手に入れるシン・サラリーマン |
https://diamond.jp/articles/-/293989
|
割の人が知らない転職サイトと転職エージェントの違いとは絶対知っておくべき使い分け方真の「安定」を手に入れるシン・サラリーマン異例の発売前重版刷仕事がデキない、忙しすぎる、上司のパワハラ、転職したい、夢がない、貯金がない、老後が不安…サラリーマンの悩み、この一冊ですべて解決これからのリーマンに必要なもの、結論、出世より「つの武器」リーマン力副業力マネー力。 |
2022-02-06 03:20:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
【9割の人が知らない売れるコピー技術100】 目が釘づけのセールスレターと ゴミ箱直行のセールスレター、 「構成」の微差が大差を生む瞬間 - コピーライティング技術大全 |
https://diamond.jp/articles/-/294217
|
【割の人が知らない売れるコピー技術】目が釘づけのセールスレターとゴミ箱直行のセールスレター、「構成」の微差が大差を生む瞬間コピーライティング技術大全発売たちまち大重版Amazonランキング第位広告・宣伝。 |
2022-02-06 03:15:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
「部下をほめる上司、叱る上司」どちらが良いリーダーか? - 武器としての組織心理学 |
https://diamond.jp/articles/-/294152
|
人間関係 |
2022-02-06 03:10:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
目標を決めずに ダイエットを 始めてはいけない - 3か月で自然に痩せていく仕組み |
https://diamond.jp/articles/-/294825
|
会食三昧なのに、このメソッドでキロも痩せた精神科医の樺沢紫苑先生が、「ストレスフリー我慢不要アウトプットレコーディングで痩せられる、脳科学的にも正しいメソッドです」と推薦する話題の書、「か月で自然に痩せていく仕組み意志力ゼロで体が変わる勤休ダイエットプログラム」野上浩一郎著から、そのコツや実践法を紹介していきます。 |
2022-02-06 03:05:00 |
北海道 |
北海道新聞 |
バレエ、田中月乃さんが2位入賞 50回目のローザンヌ国際 |
https://www.hokkaido-np.co.jp/article/642406/
|
若手 |
2022-02-06 03:18:00 |
コメント
コメントを投稿