投稿時間:2022-04-10 08:13:46 RSSフィード2022-04-10 08:00 分まとめ(14件)

カテゴリー等 サイト名等 記事タイトル・トレンドワード等 リンクURL 頻出ワード・要約等/検索ボリューム 登録日
python Pythonタグが付けられた新着投稿 - Qiita pygameコピペ用 https://qiita.com/k-shibaike/items/7c83ce499902144bb7b2 screenpgdisplaysetmode 2022-04-10 07:34:55
python Pythonタグが付けられた新着投稿 - Qiita 典型90問003 Longest Circular RoadをPythonで解く! https://qiita.com/Chunky_RBP_chan/items/51f8436d8d5533215928 atcoder 2022-04-10 07:23:11
js JavaScriptタグが付けられた新着投稿 - Qiita WebTransport で RTP-FEC (ProMPEG) を再現してみた話 https://qiita.com/monyo-tech/items/a29d2897129952966734 chromem 2022-04-10 07:00:25
海外TECH DEV Community Automated Customer Care Rating https://dev.to/amoghsingh25/automated-customer-care-rating-1k82 Automated Customer Care Rating Innovative Ideas Challenge IntroductionThe Innovative Ideas category was an ideal choice for me as I was interested in pitching a project that would be useful and allow for quicker results and more accurately Before taking part in Deepgram Hackathon I have had a bit of prior experience with Speech Recognition Technology mainly out of curiosity and exploration My Deepgram Use CaseMy inspiration for this submission comes from customer care centers where the executives are often helpful but there are cases where executives are rude to their customers which has a negative impact larger than the positive impact made A single bad experience can spoil a customers relationship with the organization company and in the long run can be harmful to business Deepgram can be used here to generate transcripts of the call recordings usually stored by the customer care centers and appropriately evaluate a executive s efficiency and their talking style with customers Upon exploration of the Deepgram website and their API documentation I found a few use cases of call transcription and realized this would be an ideal use case for Deepgram and therefore chose this particular topic Dive into DetailsCustomers are the utmost priority for any company or organization and they must be treated so especially when they seek help from a customer care But there are cases where customer care executives are rude to a customer This is where Deepgram comes into picture Deepgram can be used to convert those call center recordings to text which can then be processed by a Machine Learning model to generate the general emotion of the customer care executive through the words they chose and the emotion of the reply given by the customer This can then be used to score and better train the executives to handle customers well and allow for a better service to the end customer This method takes into consideration the emotion or attitude of the customer as well as the executive to better judge the executive and can be utilized appropriately to eliminate cases where the customers are being rude with no fault of the executive ConclusionHaving gone through the Deepgram documentation it can certainly achieve the task of call transcription and coupled with Machine Learning models for emotion detection it could be used for efficient handling of customers and training of customer care executives The idea of speech recognition and the extraction of emotion through text is the two main components of this idea with both of them being highly researched and now widely used technologies for various use cases ranging from hate speech detection to captions generation Through the course of research for this project I feel that with the combination of these two technologies there are many more applications which can be devised and used to automate simple tasks like the one discussed 2022-04-09 22:13:24
海外TECH DEV Community Kth Largest Element in an Array https://dev.to/ashutosh049/kth-largest-element-in-an-array-507c Kth Largest Element in an Array ProblemGiven an integer array nums and an integer k return the kth largest element in the array Note that it is the kth largest element in the sorted order not the kth distinct element ExampleInput nums k Output Approach Using SortingWe can use sorting to first sort the nums array in natural order and then return kth element from end i e n k th element from start K index from end is equal to length k index from startclass Solution public int findKthLargest int nums int k Arrays sort nums return nums nums length k Complexity AnalysisTC O N log N where N is the size of the input arraySC O Approach Using HeapActually there are multiple sub approaches if we choose to use Heap ApproachNumber of elementsnumber of pollMin Heap of size NMin heap to store all N elements at most N K minimum elements at any given time poll for N K times to get kthlargestMin Heap of size KMin heap to store at most K elements Adding new elements after first K elements are added we check if new element is greater than heap root peek and if so we delete it first and then add the new greater element otherwise notpoll for time and return the polled elementMax Heap of size NMax heap to store all N elements at most K maximum elements at any given time poll for K times to get kthlargest Min Heap of size Nclass Solution public int findKthLargest int nums int k int n nums length if n return nums PriorityQueue lt Integer gt minHeap new PriorityQueue for int num nums minHeap offer num int i int kThLargest minHeap poll while i lt n k kThLargest minHeap poll return kThLargest Min Heap of size Kimport java util Arrays import java util Collections Min Heap of size Kclass Solution public int findKthLargest int nums int k int n nums length if n return nums PriorityQueue lt Integer gt minHeap new PriorityQueue k for int i i lt k i minHeap offer nums i for int i k i lt n i if minHeap peek lt nums i minHeap poll minHeap offer nums i return minHeap poll Max Heap of size Nclass Solution public int findKthLargest int nums int k int len nums length if len return nums Since we are using Max Heap we need to sort accordingly Comparator lt Integer gt comp a b gt b compareTo a PriorityQueue lt Integer gt maxHeap new PriorityQueue lt gt comp Add all the elements for int num nums maxHeap offer num we need to poll for k times and return the next polled element int i while i lt k maxHeap poll return maxHeap poll 2022-04-09 22:09:14
海外TECH DEV Community 5 good computer science books to start if you don't know how to start https://dev.to/digomic/5-good-computer-science-books-to-start-if-you-dont-know-how-to-start-3m26 good computer science books to start if you don x t know how to startComputer science is the study of computers and computational systems It is also a branch of engineering mathematics and science Computer scientists research and develop new computer technologies They design software networks and other computer based tools for people to use Computer scientists may develop programs that help solve specific problems or automate processes They may create games or other types of entertainment software that people can use to have fun on their own or with others Some computer scientists work on the design of chips the microchips that are found in devices like laptops They may work in teams to develop new chips for smartphones or tablets Other computer scientists work on improving the security features of computers and networks so they can help protect information from being stolen by hackers How Computers Really WorkHow Computers Really Work is a hands on guide to the computing ecosystem everything from circuits to memory and clock signals machine code programming languages operating systems and the internet But you won t just read about these concepts you ll test your knowledge with exercises and practice what you learn with optional hands on projects Build digital circuits craft a guessing game convert decimal numbers to binary examine virtual memory usage run your own web server and more Explore concepts like how to •Think like a software engineer as you use data to describe a real world concept•Use Ohm s and Kirchhoff s laws to analyze an electrical circuit•Think like a computer as you practice binary addition and execute a program in your mind step by step Introduction to Computer Organization Introduction to Computer Organization gives programmers a practical understanding of what happens in a computer when you execute your code You may never have to write x assembly language or design hardware yourself but knowing how the hardware and software works will give you greater control and confidence over your coding decisions We start with high level fundamental concepts like memory organization binary logic and data types and then explore how they are implemented at the assembly language level The goal isn t to make you an assembly programmer but to help you comprehend what happens behind the scenes between running your program and seeing “Hello World displayed on the screen Classroom tested for over a decade this book will demystify topics like •How to translate a high level language code into assembly language•How the operating system manages hardware resources with exceptions and interrupts•How data is encoded in memory•How hardware switches handle decimal data•How program code gets transformed into machine code the computer understands•How pieces of hardware like the CPU input output and memory interact to make the entire system work Complete A Guide to IT Hardware and SoftwareThis is your all in one real world full color guide to connecting managing and troubleshooting modern devices and systems in authentic IT scenarios Its thorough instruction built on the CompTIA A Core and Core exam objectives includes coverage of Windows Mac Linux Chrome OS Android iOS cloud based software mobile and IoT devices security Active Directory scripting and other modern techniques and best practices for IT management Award winning instructor Cheryl Schmidt also addresses widely used legacy technologiesmaking this the definitive resource for mastering the tools and technologies youll encounter in real IT and business environments Schmidts emphasis on both technical and soft skills will help you rapidly become a well qualified professional and customer friendly technician Learning Objectives and chapter opening lists of CompTIA A Certification Exam Objectives make sure you know exactly what youll be learning and you cover all you need to knowHundreds of photos figures and tables present information in a visually compelling full color designPractical Tech Tips provide real world IT tech support knowledge Computer Science Illuminated th EditionFully revised aDesigned for the introductory computing and computer science course the student friendly Computer Science Illuminated Seventh Edition provides students with a solid foundation for further study and offers non majors a complete introduction to computing Fully revised and updated the Seventh Edition of this best selling text retains the accessibility and in depth coverage of previous editions while incorporating all new material on cutting edge issues in computer science Authored by the award winning team Nell Dale and John nd updated the Seventh Edition of the best selling text Computer Science Illuminated retains the accessibility and in depth coverage of previous editions while incorporating all new material on cutting edge issues in computer science Authored by the award winning Nell Dale and John Lewis Computer Science Illuminated s unique and innovative layered approach moves through the levels of computing from an organized language neutral perspective Computer Systems th EditionComputer Systems Fifth Edition provides a clear detailed step by step introduction to the central concepts in computer organization assembly language and computer architecture It urges students to explore the many dimensions of computer systems through a top down approach to levels of abstraction By examining how the different levels of abstraction relate to one another the text helps students look at computer systems and their components as a unified concept 2022-04-09 22:08:20
海外TECH DEV Community Secure your Kubernetes secrets easily with Trousseau https://dev.to/mhmxs/secure-your-kubernetes-secrets-easily-with-trousseau-4f1p Secure your Kubernetes secrets easily with TrousseauThe term of secret in Kubernetes is a bit deceptive I don t want to go into details this time because the internet is full with posts about this problem In really short they are not real secrets because ETCD or any database behind Kubernetes stores the records in plain text without any encryption We have a few options to solve this problem let s start with the easiest one Kubernetes has official support for encrypting secret data at rest It is disabled by default and requires some cluster administration to enable it The cluster admin has to define an EncryptionConfiguration and restart Kubernetes API service with the new config It supports several en decryption methods out of the box It sounds easy like a flick but there are some major issues with the solution Firstly you have to define keys as plain text in the config so keys should be readable for an attacker and rotating the keys is not a trivial task It is easy to admit that this solution is more than nothing but is far away of real secret protection If built in solution is not enough for you you have to choose an external Key Management Service KMS like Hashicorp Vault and somehow inject secret resolution to your workload There are several options you can use a mutation webhook and create environment variables during pod creation for example or use an extra sidecar to resolve secrets inside the container as volumes The main advantages of this way is you have full control where and how encrypted secrets would be converted into readable values but all the coin has an other side The solutions are complex and most importantly they are not transparent Because Kubernetes secrets are just references to the real ones you must configure everything on every single target cluster or have to write tons of if else in your favorite manifest generation tool What if I say there is something in the middle and let me introduce Trousseau Trousseau is an open source tool which combines Kubernetes built in envelop encryption with an external KMS With Trousseau you should use the same secrets as without it in your manifests Kubernetes saves encrypted version of secrets into ETCD but workloads can have the decrypted version in a transparent way Trousseau supports only Vault at the moment others are on the roadmap 2022-04-09 22:03:57
海外TECH Engadget Twitter reverses change that turned embeds of deleted tweets into blank boxes https://www.engadget.com/twitter-reverts-deleted-tweet-embeds-decision-220147834.html?src=rss Twitter reverses change that turned embeds of deleted tweets into blank boxesTwitter has temporarily walked back a controversial change that made it difficult for people to preserve deleted tweets On Wednesday writer Kevin Marks pointed out that the company had recently tweaked its embedded javascript so that the text of deleted tweets was no longer visible in embeds on third party websites By late Friday evening however one Twitter user noticed the company had reverted the change with Twitter confirming the move one day later “After considering the feedback we heard we re rolling back this change for now while we explore different options a spokesperson for the company told The Verge “We appreciate those who shared their points of view ーyour feedback helps us make Twitter better When the initial change was first spotted Twitter product manager Eleanor Harding said the company made the tweak to “better respect people who decide to delete their tweets Part of what made the move problematic for many was that it simply left a blank space where the embed of a deleted tweet had been previously Harding said Twitter was planning to roll out additional messaging that would explain why a tweet was no longer visible Twitter didn t elaborate on the “different options it was exploring following its reversal For many the decision to change how embeds work was a strange one When Twitter first introduced embedding in it said it intentionally wanted to maintain the text of deleted tweets And for many years afterward company executives including former CEO Jack Dorsey stressed the role of the platform as a kind of “public record 2022-04-09 22:01:47
金融 ニュース - 保険市場TIMES 損保ジャパンら、全国約110万人の新小学一年生に「黄色いワッペン」贈呈 https://www.hokende.com/news/blog/entry/2022/04/10/080000 損保ジャパンら、全国約万人の新小学一年生に「黄色いワッペン」贈呈月日発表損害保険ジャパン株式会社以下、損保ジャパンは、みずほフィナンシャルグループ、明治安田生命保険、第一生命保険との社で、全国約万人の新小学一年生に「黄色いワッペン」を贈呈したと年月日に発表した。 2022-04-10 08:00:00
ニュース BBC News - Home The Papers: PM visits war-torn Kyiv, and Sunak 'on the brink' https://www.bbc.co.uk/news/blogs-the-papers-61055489?at_medium=RSS&at_campaign=KARANGA capital 2022-04-09 22:53:42
ニュース BBC News - Home 'They can be proud of that performance' - How Everton stunned Manchester United https://www.bbc.co.uk/sport/av/football/61055266?at_medium=RSS&at_campaign=KARANGA x They can be proud of that performance x How Everton stunned Manchester UnitedMatch of the Day pundits Danny Murphy and Ian Wright analyse how Everton s work rate and the effort shown by Alex Iwobi helped them beat Manchester United 2022-04-09 22:51:00
北海道 北海道新聞 帯広市長選 投票すれば「センキョ割」 畜大生が若者向け企画 https://www.hokkaido-np.co.jp/article/667727/ 帯広市長選 2022-04-10 07:35:19
北海道 北海道新聞 札幌五輪招致へ全国組織 札幌市やJOCなど 支持拡大へ4月中にも発足 https://www.hokkaido-np.co.jp/article/667749/ 札幌五輪 2022-04-10 07:21:43
ニュース THE BRIDGE アスエネに聞く、世界の再エネトレンド 〜日本を脱炭素社会に導くスタートアップの戦略とは〜 https://thebridge.jp/2022/04/monthlypitch_interview_esg_asuene_nishiwada-cyberagentcapital-insight アスエネに聞く、世界の再エネトレンド日本を脱炭素社会に導くスタートアップの戦略とは本稿はベンチャーキャピタル、サイバーエージェント・キャピタルが運営するサイトに掲載された記事からの転載西和田浩平アスエネCoFounder代表取締役CEO北尾崇サイバーエージェント・キャピタルシニア・ヴァイス・プレジデント東京が計画停電を経験するきっかけとなった東日本大震災から年以上が経ちました。 2022-04-09 22:15:10

コメント

このブログの人気の投稿

投稿時間:2021-06-17 22:08:45 RSSフィード2021-06-17 22:00 分まとめ(2089件)

投稿時間:2021-06-20 02:06:12 RSSフィード2021-06-20 02:00 分まとめ(3871件)

投稿時間:2021-06-17 05:05:34 RSSフィード2021-06-17 05:00 分まとめ(1274件)