投稿時間:2022-03-30 10:35:52 RSSフィード2022-03-30 10:00 分まとめ(42件)

カテゴリー等 サイト名等 記事タイトル・トレンドワード等 リンクURL 頻出ワード・要約等/検索ボリューム 登録日
IT 気になる、記になる… 「不思議のダンジョン 風来のシレン5plus」のスマホ版が登場 https://taisy0.com/2022/03/30/155251.html 不思議のダンジョン 2022-03-30 00:21:31
ROBOT ロボスタ 大阪・関西万博で「空飛ぶクルマ」のエアタクシーが現実的に!2025年運航開始の「大阪版ロードマップ」具体的な実装手順を公開 https://robotstart.info/2022/03/30/osaka-skydrive-roadmap.html 2022-03-30 00:00:39
IT ITmedia 総合記事一覧 [ITmedia エンタープライズ] KyndrylとLenovoが提携拡大を発表、ハイブリッドクラウドやエッジで存在感示す https://www.itmedia.co.jp/enterprise/articles/2203/30/news060.html itmedia 2022-03-30 09:55:00
IT ITmedia 総合記事一覧 [ITmedia News] NFTゲーム「Axie Infinity」のサイドチェーン「Ronin」から6億ドル相当のイーサリアム盗難 https://www.itmedia.co.jp/news/articles/2203/30/news083.html axieinfinity 2022-03-30 09:21:00
IT ITmedia 総合記事一覧 [ITmedia ビジネスオンライン] 月額3500円で1日3杯までコーヒーを! サブスク「JRE パスポート」が本格スタート https://www.itmedia.co.jp/business/articles/2203/30/news080.html itmedia 2022-03-30 09:14:00
IT ITmedia 総合記事一覧 [ITmedia ビジネスオンライン] 小田急、踏切に“ネーミングライツ”の実証実験 イメージアップと利用価値を創出へ https://www.itmedia.co.jp/business/articles/2203/30/news073.html itmedia 2022-03-30 09:10:00
TECH Techable(テッカブル) マイクメーカーRØDEが同社初のヘッドフォン発売、正確な周波数特性と低歪みを実現 https://techable.jp/archives/176158 周波数特性 2022-03-30 00:00:30
デザイン コリス 無料で使える! Notion用のおしゃれでシンプルなアイコン素材サイトをまとめました https://coliss.com/articles/freebies/icons-for-notion.html 続きを読む 2022-03-30 00:36:54
python Pythonタグが付けられた新着投稿 - Qiita DatabricksにおけるPythonユーザー定義関数(UDF) https://qiita.com/taka_yayoi/items/af1153c383ed841cfdf5 特にUDFがnullチェックで短絡セマンティクスに依存している場合、以下のようにUDFを呼び出す前にnullチェックが行われることは保証されません。 2022-03-30 09:25:03
python Pythonタグが付けられた新着投稿 - Qiita picoCTF2022 Sum-O-Primes 日本語Writeup https://qiita.com/O-Jun/items/7958c0eae5ae8c4d7682 あとはRSA暗号を解けばよい。 2022-03-30 09:04:41
js JavaScriptタグが付けられた新着投稿 - Qiita Agora.ioからWeb用のバーチャル背景機能(β)がリリースされました https://qiita.com/v-cube/items/2faf9b350a0bd0303059 概要このagoraextensionvirtualbackground拡張機能は、バーチャル背景機能を実装するためにAgoraWebSDKv以降と一緒に使用されます。 2022-03-30 09:51:51
Ruby Rubyタグが付けられた新着投稿 - Qiita クラス https://qiita.com/KazukiOhta/items/16c35c6e6885c49fe4b9 2022-03-30 09:22:56
Git Gitタグが付けられた新着投稿 - Qiita たまに使うGitコマンド集 https://qiita.com/goamix/items/d910871db4b53d77bffe たまに使うGitコマンド集はじめに便利だが、たまにしか使わないコマンドをメモとして残します。 2022-03-30 09:36:16
海外TECH DEV Community Simulating a Phishing Attack Against Your Company https://dev.to/theaccordance/simulating-a-phishing-attack-against-your-company-5b3g Simulating a Phishing Attack Against Your CompanySpoiler This is a post about defending against phishing attacks not a guide for engaging as an actor in a phishing campaign When it comes to playing defense in InfoSec engaging in Phishing campaigns is a well accepted method to test your company s readiness for possible intrusion It s becoming common for third parties auditors insurers to require these types of tests be carried out to maintain compliance Recently I had a discussion with our CISO around organizing simulations to test our company and wanted to share some insights on how we approached the problem RulesBefore we talk about specific campaigns it s important to first discuss some ground rules when engaging in Phishing simulations The purpose of the simulation is to measure the readiness of different groups of your work force for a phishing attack Employees need to be informed that the company periodically conducts phishing campaigns to test our readiness This disclosure generally happens at onboarding or when the employee has to agree to updated policies in an employee handbook Employees should not receive forewarning when a campaign is being conducted Doing so would taint the results as people will be prepared for the attempt whereas Phishing attacks in the wild happen at random Employees who fall for a phishing simulation shouldn t be shamed Rather they should be educated about policies and best practices and that education should be documented as an addendum to a simulation report Auditors will often ask for this as additional evidence when certifying compliance Keep it simple stupid The vast majority of reported phishing attacks have been simple requests Test your audience against what you re actively seeing Try not to overly engage employees with simulations If you run all your simulations simultaneously and an employee gets requests for credentials all at once they ll see through the ruse Avoid coercion where the phishing attempt is so enticing that it overly influences engagement As the Tribune Publishing Co learned creating a fictional reward to drive engagement created a negative reaction to the simulation angering employees who thought they were receiving a bonus Simulated Campaigns Whole CompanyIt s good to have a company wide metric when measuring how ready your whole team is for a Phishing attack A good test case for your whole company would be to ask for credentials for a common system like SSO Slack Zoom or even your own company s product FinanceFinance is often a target for phishing because they control the coin purse To measure Finance s readiness a good phishing test will try to obtain credentials for a banking system or submit a fraudulent invoice purchase agreement Resource OwnersGiven the proliferation of SaaS products in the workforce a company might have a large number of users with administrative rights A bad actor could target this group seeking access to specific systems either to obtain proprietary data or to allocate resources for their own purposes For a phishing campaign against resource owners it s best not to campaign against all resources at once Instead pick a sample of services and target those admins only ContractorsAs Okta s most recent security disclosure highlighted contractors are also vulnerable to intrusion Being able to report on this particular population within a company will likely be crucial going forward with certain certifications as most companies have controls around what contractors have access to 2022-03-30 00:35:29
海外TECH DEV Community Understanding Metamask: the basics. https://dev.to/adeleke5140/understanding-metamask-the-basics-2bg0 Understanding Metamask the basics The browser based wallet Metamask is a gateway to exploring Dapps and the world of Crypto You need a wallet to explore innovation which includes DeFiNFTsDAOsYet the web interface can be daunting to wrap one s head around In addition it can be confusing if you haven t used an extension before especially for carrying out financial transactions In this article I aim to simplify the Metamask web interface so that you can understand what is going on This tutorial is not an in depth tutorial It will only break down the main features of the Metamask Interface Let s get started Click the extension in the top bar of your browser It reveals a mini window similar to the image below Let s take a look at the key features Connected networkBy default the network Metamask shows is Ethereum Mainnet The Ethereum network is the leading network for smart contracts Defi NFTS and DAOs Therefore if you plan on transacting on the Ethereum network you do not need to change this A developer working on a project on a different network like Polygon will need to change this A regular user might or might not need to change it For the scope of this tutorial we will leave it as is Account InformationBeneath the network section lies another section The highlighted circle is the account Info Accounts can have custom names that you set during the initial setup For example I have it set as Account Look a bit closer You can see a set of random characters For example it is xAB b in the image above The set of characters is your wallet address The wallet address is helpful for several tasks The tasks include the following Receiving EthMinting NFTsUsing Defi Protocols etc Hover and Click the account info box to copy your address to the clipboard The account info helps receive funds from others Connection StatusThe connection status sits to the left of the Account Info section It verifies your connection to a Decentralized application Decentralized applications have a Connect wallet feature Once connected the icon changes from Not connected to Connected In the image below the user is unconnected The icon is grey with the text Not connected next Once connected to a Dapp the icon and text change It changes to a green icon with the text Connected next Account BalanceIt s a wallet and a wallet should show much funds is present The account balance section gives the amount of Eth and the equivalent value in USD In the settings you can modify the type of currency it shows By default it shows the ETH balance as the principal balance Beneath that is the equivalent value in USD Financial servicesMetamask is a wallet that provides three essential services The services include Buying Crypto Sending Crypto Swapping CryptoThe image below shows these services and the icons Let s explore what these features are Click on the Buy icon to buy some Eth Clicking the icon shows services that offer you ETH for fiat currency Get some Eth with Wyre You can get Eth directly into your account with your debit card Transat is an alternative method It comes with the added benefit of using a bank transfer if you do not have a card The last option is a direct deposit If you ve both some Eth on an exchange like Binance Kucoin FTX Buy coins e t c you can copy your address from the account info and send the ETH to it The methods above for funding your wallet all have their pros and cons However it is not within the scope of this article to discuss that Use whatever means is convenient and intuitive to you Available AssetsMetamask provides the feature of interaction with other Crypto apart from the native Eth token The Process of adding this to display can be daunting Yet it is helpful to know that you can In the image below I have added the Bzz token I can give out my address and receive BZZ through it Receiving BZZ works because the BZZ token utilizes the Ethereum blockchain There are cases where you need to switch to a different network for specific Dapps One example of that is the Polygon network to use the MATIC token This section includes the added benefit of showing the amount of tokens present ActivityThe last feature is the activity tab The activity tab shows all transactions you have carried out through your wallet Let s explore the two transactions in the image below The first is an NFT mint It has the title Mint On the th of March it occurred on a website titled www so There I minted an NFT free of charge I can recognize that it is free because it cost me ETH The second is a transfer In this transfer of tokens I am the recipient The title Receive indicates that On the th of March it occurred from an address with the characters x c The section adjacent to that shows the amount of Eth I received The activity tab fills up as you engage with more apps built on the Ethereum network However it is not limited to apps Any outflow or inflow of funds is also registered and documented It helps provide an accessible overview of what happens and where ConclusionThe following features explored above are all you need to start with Metamask There are more in depth features of using the wallet We will explore this in a different article Thanks for reading 2022-03-30 00:33:01
海外TECH DEV Community JavaScript Challenge #1 : Splitting an Army https://dev.to/zaky_abdur/javascript-challenge-1-splitting-an-army-3fe7 JavaScript Challenge Splitting an ArmyIn this first series of articles I m writing I will take any fun challenge that I find anywhere such as websites daily life or even video games and try solving them using JavaScript You can totally try solving them yourself as I will provide boilerplates for each challenge and your solution could actually be better than mine All you need is a basic knowledge in JavaScript and VueSo in this first challenge as the title suggests is splitting an army evenly into two lesser armies What do you mean by army It s pretty simpleI was playing a grand strategy game called Victoria II where you are in charge of the government of a nation during the Victorian era of course However one thing is bothering me The feature to split the army doesn t work properly This single army has infantry regiments hussar regiments engineer regiments and artillery regimentsAfter I split it they became thisone army has two engineer regiments one less infantry regiments The other one will be in for a hard time because they cannot make any defenses if the enemy launch an assault against them The ChallengeLet s fix this problem ourselves We want to make a JavaScript code that will take an object with properties defining the numbers of each regiment and split it evenly here is the specifics take and army object return an array of two objects that resulted from the splittingall regiments should number in integer we don t want a half strength regiment do we Starter CodeFeel free to copy this code and start solving the problem first This codes contain barebone UI for inputting and outputting data HTML 2022-03-30 00:26:59
海外TECH DEV Community CSS - Efeito de Rotação e Zoom com mouse hover https://dev.to/leonardohipolito/css-efeito-de-rotacao-e-zoom-com-mouse-hover-13ko hover 2022-03-30 00:19:17
海外TECH DEV Community Essential Cryptography for JavaScript Developers https://dev.to/italypaleale/essential-cryptography-for-javascript-developers-4h2m Essential Cryptography for JavaScript DevelopersIn the fall of my first book came out Svelte Up and Running published by Packt When one of their acquisition editors contacted me some months prior I was not new to writing having blogged for many years but the idea of writing an entire technical book was fascinating to meーand working with a reputable publisher like Packt seemed like a fantastic opportunity to try something new While writing about Svelte was fun shortly after the first book hit the virtual shelves I had already an idea for a second one that I pitched to Packt I wanted to write about cryptography creating a handbook that was specifically meant for software developers I m proud to share with you that this second book is now complete Essential Cryptography for JavaScript Developers You can find it on Amazon What the book is aboutObviously my second book is about cryptography However it takes the somewhat unique approach of being written for an audience of software developers who may not have any background in cryptography and yet they are interested in learning how to adopt common cryptographic operations in their applications safely Throughout the book we focus on learning about four common cryptographic operations Hashing A set of functions that allows generating a unique hash also called digest or checksum that is always of a fixed length Unlike encryption hashing is one way that is it s an operation that cannot be reversed Its uses include verifying the integrity of messages and files generating unique identifiers protecting passwords stored in databases and deriving encryption keys from passwords In the book we cover algorithms such as SHA scrypt and Argon…and we look at why outdated algorithms like MD and SHA are not to be used anymore Symmetric encryption This is about encrypting and decrypting data using a symmetric key i e using the same key for both encryption and decryption Most people are familiar with this concept for example when they protect a ZIP file with a passphrase In the book we cover how to encrypt and decrypt messages and entire files using two symmetric ciphers AES and ChaCha Poly Asymmetric encryption This is another class of encryption algorithms in which users have a pair of keys consisting of a private key and a public one and those are used to encrypt and decrypt messages when they re shared with other people While asymmetric ciphers are much lesser known and understood they are used by virtually every human being daily given that they underpin protocols like HTTPS that is used to serve web pages securely Within the book we learn about asymmetric ciphers and hybrid ones that combine an asymmetric cipher with a symmetric one when they should be used and how We re focusing on RSA and algorithms based on Elliptic Curve Cryptography ECDH and ECIES Digital signatures With digital signature schemes developers can build solutions that leverage public key cryptography to authenticate messages and certify their integrity For example those QR codes that many people are familiar with these days to prove COVID test results or vaccination status embed a message that is digitally signed allowing everyone to verify the integrity of the certification and who issued it Although they often operate behind the scenes and are not immediately visible to users digital signatures have a multitude of uses in software development including securing software distribution preventing tampering with messages etc In my book you ll be able to learn when to use digital signatures and how using RSA and schemes based on Elliptic Curve Cryptography ECDSA and EdDSA As per the title of the book it includes code samples written in JavaScript for both Node js and platforms based on Node js like Electron and for client side code that runs within a web browser I chose JavaScript because it s a very popular language and it has vast applications from front ends to servers to desktop and mobile apps However if you primarily work with another programming language or framework you will still be able to learn principles and techniques that can be ported to your preferred stack Why I wrote this bookI believe that having at least some knowledge of cryptography is an important skill for every software developer and it s becoming even more important every day Us developers are facing increased pressure to build apps that are safe against more widespread and more sophisticated attacks We are also being asked to design solutions that comply with more stringent privacy requirements either due to external regulation like GDPR or simply because of business requirementsーmore commonly privacy is a selling point for apps and more customers are demanding that For both these reasons and more cryptography is an immensely powerful tool that we can leverage to accomplish those goalsーnot sufficient but almost always necessary Yet as a software developer learning about cryptography is not always easy To start cryptography is a vast topic has many confusing things and mistakes are not always immediately clear There are of course lots of resources to learn cryptography including many books that have already been written However a large part of those tutorials videos articles and lectures and perhaps almost all books seem to have a focus on cryptography as a science and are generally written for an audience of aspiring cryptographers As such they spend a good chunk of time on the formal descriptions of the algorithms with lots and lots of complex math While resources like those are incredibly valuable for people who want to learn the science and art of cryptography as a software developer myself I was always more interested in the practical applications and found the math distractingーif not outright confusing at times With Essential Cryptography for JavaScript Developers I ve attempted to collect all my learnings from over a decade of using cryptographic operations to develop many different apps and share them with other developers so they can avoid the same mistakes I ve made It s a book written for other software developers who want to know which are the most common cryptographic operations what they re used for and how they can use them in their code safely relying on proven implementations such as those built into JavaScript and Node js This book took quite a lot of time to put together but I m very excited about the end result and I can t wait for other developers to read it and then see what they build with that And please do share any feedback you have about the book with meーincluding showcasing the projects you ve written You can order Essential Cryptography for JavaScript Developers on Amazon in any country or directly from Packt 2022-03-30 00:19:03
海外TECH DEV Community Pluck Func in JavaScript with .reduce() https://dev.to/365erik/pluck-func-in-javascript-with-reduce-2od5 Pluck Func in JavaScript with reduce Implement a simple pluck using Array prototype reduce const pluck list key gt list reduce pV cV gt key in cV pV cV key pV UsageProvide an array list of objects and a property name key to pluck and the function will return a list of all values found in list n key Sample dataconst movies title Invasion of the Body Snatchers releaseDate mpar R rating comments This is my favorite title Invasion of the Body Snatchers releaseDate comments This a good film but doesn t have Jeff Goldblum Leonard Nimoy or even Donald Sutherland in it title The Invasion releaseDate rating comments Not my favorite but it was watchable title Attack the Block releaseDate rating comments A fun movie innit title Ubik comments It s just as well they probably would have ruined it anyway mpar null Pluck all title values from movies console log pluck movies title Invasion of the Body Snatchers Invasion of the Body Snatchers The Invasion Attack the Block Ubik Pluck all mpar Motion Picture Association ratings from movies console log pluck movies mpar R null Note that pluck is not fooled by falsie values because key in cV explicitly checks for the key and returns whatever value it s pointed at even if the value is undefined I think this is what you want from pluck to keep it generic You could clean out any unwanted values like undefined or false on a second pass or extend this to accept a filtering callback after the key in cV but I m stupid so I m keeping it simple 2022-03-30 00:05:38
Apple AppleInsider - Frontpage News B&H launches 14-inch MacBook Pro deals: free upgrade to 10-core CPU https://appleinsider.com/articles/22/03/30/bh-launches-14-inch-macbook-pro-deals-free-upgrade-to-10-core-cpu?utm_medium=rss B amp H launches inch MacBook Pro deals free upgrade to core CPUB amp H Photo has partnered with AppleInsider this week to offer readers the lowest price on record on a popular inch MacBook Pro configuration Get a core CPU for the price of the core with this MacBook Pro dealThe exclusive deals deliver to in cash savings when shopping through the activation links below from a laptop or desktop Read more 2022-03-30 00:05:16
海外TECH Engadget Apple faces €5.5 billion lawsuit from Netherlands over its app store https://www.engadget.com/apple-faces-class-action-lawsuit-from-netherlands-over-its-app-store-001610098.html?src=rss Apple faces € billion lawsuit from Netherlands over its app storeA Dutch foundation has hit Apple with a lawsuit over the App Store s developer fees seeking € billion euro in damages for what it alleges is monopolistic behavior In a press release the Dutch Consumer Competition Claims Foundation stated it was filing a quot collective claim quot for damages on behalf of any iPhone or iPad owners in the EU who have downloaded a paid app or made purchases within an app Suing Apple for its app store policies on behalf of consumersーinstead of developers ーmight seem like an unusual move on the Dutch foundation s part Most of the scrutiny over the tech giant s so called “Apple tax has focused on its deleterious impact on the profits of developers Just this past January Apple agreed to settle a class action settlement by US developers for million The Consumer Competition Claims Foundation alleges that Apple s developer fees were passed on to consumers in the form of higher prices “App developers are forced to pass on to consumers the increased costs caused by Apple s monopolistic practices and unfair terms wrote the foundation in its press release The foundation is asking EU consumers who purchased an app in Apple s App Store or made an in app purchase since September to join its complaint The lawsuit is set to be filed in the Amsterdam District Court This isn t the first time Apple is taking heat from Dutch authorities Apple has yet to comply with a January order from Dutch regulators that requires the company to offer third party payment options for dating app customers The Netherlands Authority for Consumers and Markets ACM is fining Apple € million for every week it doesn t follow through with the order Dutch regulators have already fined Apple more than € million and counting nbsp But according to TechCrunch there s a sign of a potential compromise Apple is working on an amended proposal of its dating app policy which will be reviewed by ACM But even if the two parties reach a consensus Apple will soon have much larger battles to fight in the EU The EU is working on finalizing the Digital Markets Act which will among a number of other anti competitive measures require companies like Apple and Google to allow alternatives for in app payments 2022-03-30 00:16:10
海外科学 NYT > Science How to Watch a NASA Astronaut’s Return to Earth Tonight https://www.nytimes.com/2022/03/29/science/nasa-russia-mark-vande-hei.html How to Watch a NASA Astronaut s Return to Earth TonightAlthough the U S and Russia have halted cooperation in many areas over the invasion of Ukraine they ve continued to work together aboard the International Space Station 2022-03-30 00:56:06
海外科学 BBC News - Science & Environment Climate change: Wind and solar reach milestone as demand surges https://www.bbc.co.uk/news/science-environment-60917445?at_medium=RSS&at_campaign=KARANGA electricity 2022-03-30 00:20:09
海外科学 BBC News - Science & Environment Fast fashion: EU Europe plans fast fashion crackdown https://www.bbc.co.uk/news/science-environment-60913226?at_medium=RSS&at_campaign=KARANGA crackdownfast 2022-03-30 00:22:06
金融 ニッセイ基礎研究所 「大阪オフィス市場」の現況と見通し(2022年) https://www.nli-research.co.jp/topics_detail1/id=70693?site=nli 大阪市についても、空室率が前年から上昇した一方で、賃料は前年と同水準となった。 2022-03-30 09:55:17
金融 article ? The Finance ゼロトラストとは?わかりやすい解説とおすすめ製品・書籍 https://thefinance.jp/security/220330 違い 2022-03-30 00:16:12
ニュース BBC News - Home Endometriosis: A hidden disease affecting one in 10 women https://www.bbc.co.uk/news/world-60922369?at_medium=RSS&at_campaign=KARANGA reproductive 2022-03-30 00:25:41
ニュース BBC News - Home Ukraine war: Youngsters in Finland worried conflict could spread https://www.bbc.co.uk/news/world-europe-60867684?at_medium=RSS&at_campaign=KARANGA ukraine 2022-03-30 00:05:47
ニュース BBC News - Home 'Greatest picture' of Indian colonial defeat for sale https://www.bbc.co.uk/news/world-asia-india-60911182?at_medium=RSS&at_campaign=KARANGA sotheby 2022-03-30 00:16:06
ニュース BBC News - Home Ukraine war: What next for the African students who fled? https://www.bbc.co.uk/news/world-africa-60899738?at_medium=RSS&at_campaign=KARANGA african 2022-03-30 00:14:54
ニュース BBC News - Home Climate change: Wind and solar reach milestone as demand surges https://www.bbc.co.uk/news/science-environment-60917445?at_medium=RSS&at_campaign=KARANGA electricity 2022-03-30 00:20:09
ニュース BBC News - Home Tiger Woods' Masters return stories fuelled by Augusta round https://www.bbc.co.uk/sport/golf/60923106?at_medium=RSS&at_campaign=KARANGA augusta 2022-03-30 00:25:51
ビジネス ダイヤモンド・オンライン - 新着記事 米企業「経営トップ250」 技術革新はアマゾンが1位 - WSJ発 https://diamond.jp/articles/-/300540 技術革新 2022-03-30 09:29:00
ビジネス ダイヤモンド・オンライン - 新着記事 アブラモビッチ氏、ウクライナ側交渉団の正式メンバーに - WSJ発 https://diamond.jp/articles/-/300542 正式メンバー 2022-03-30 09:01:00
GCP Google Cloud Platform Japan 公式ブログ 2022 年の NRF「Big Show」で、デジタル接続とデータを活用してビジネスを変革する小売業者のニーズを検証 https://cloud.google.com/blog/ja/topics/retail/idc-shares-retail-trends--themes-from-the-2022-nrf-big-show/ NRFで重点的に紹介された代表的なテーマとテクノロジーは他に、メタバースへの関与の拡大、サステナビリティ、物理的なセキュリティとデジタルセキュリティ、アジリティと適応性の必要性などがありました。 2022-03-30 02:00:00
GCP Google Cloud Platform Japan 公式ブログ Cloud Run で、新規市場へ迅速にスケーリング - ウェブ モダナイゼーションの物語 https://cloud.google.com/blog/ja/products/serverless/paris-based-news-organization-expands-markets-with-serverless-containers-and-php-cms/ 新しいサイトを追加するのに必要な時間は、数時間から数分に短縮されました。 2022-03-30 01:00:00
北海道 北海道新聞 米「ロシア軍撤退せず」 首都近郊、移動は小規模 https://www.hokkaido-np.co.jp/article/662932/ 国防総省 2022-03-30 09:01:27
北海道 北海道新聞 ロケ地流山、誘致実り歓喜 「ドライブ」次回作も期待 https://www.hokkaido-np.co.jp/article/662912/ 米アカデミー賞 2022-03-30 09:12:05
北海道 北海道新聞 カブス鈴木は2打数無安打 ダイヤモンドバックス戦 https://www.hokkaido-np.co.jp/article/662938/ 鈴木 2022-03-30 09:09:00
北海道 北海道新聞 昨年の食中毒件数 直近20年で最少 衛生対策や時短影響か https://www.hokkaido-np.co.jp/article/662899/ 発生件数 2022-03-30 09:02:36
GCP Cloud Blog JA 2022 年の NRF「Big Show」で、デジタル接続とデータを活用してビジネスを変革する小売業者のニーズを検証 https://cloud.google.com/blog/ja/topics/retail/idc-shares-retail-trends--themes-from-the-2022-nrf-big-show/ NRFで重点的に紹介された代表的なテーマとテクノロジーは他に、メタバースへの関与の拡大、サステナビリティ、物理的なセキュリティとデジタルセキュリティ、アジリティと適応性の必要性などがありました。 2022-03-30 02:00:00
GCP Cloud Blog JA Cloud Run で、新規市場へ迅速にスケーリング - ウェブ モダナイゼーションの物語 https://cloud.google.com/blog/ja/products/serverless/paris-based-news-organization-expands-markets-with-serverless-containers-and-php-cms/ 新しいサイトを追加するのに必要な時間は、数時間から数分に短縮されました。 2022-03-30 01:00:00

コメント

このブログの人気の投稿

投稿時間:2021-06-17 22:08:45 RSSフィード2021-06-17 22:00 分まとめ(2089件)

投稿時間:2021-06-20 02:06:12 RSSフィード2021-06-20 02:00 分まとめ(3871件)

投稿時間:2021-06-17 05:05:34 RSSフィード2021-06-17 05:00 分まとめ(1274件)