投稿時間:2022-06-09 03:32:48 RSSフィード2022-06-09 03:00 分まとめ(34件)

カテゴリー等 サイト名等 記事タイトル・トレンドワード等 リンクURL 頻出ワード・要約等/検索ボリューム 登録日
AWS AWS News Blog Modernize Your Mainframe Applications & Deploy Them In The Cloud https://aws.amazon.com/blogs/aws/modernize-your-mainframe-applications-deploy-them-in-the-cloud/ Modernize Your Mainframe Applications amp Deploy Them In The CloudToday we are launching AWS Mainframe Modernization service to help you modernize your mainframe applications and deploy them to AWS fully managed runtime environments This new service also provides tools and resources to help you plan and implement migration and modernization Since the introduction of System on April mainframe computers have enabled many industries … 2022-06-08 17:45:03
AWS AWS Mobile Blog NEW Amplify Flutter Release Notes 0.5.0 https://aws.amazon.com/blogs/mobile/new-amplify-flutter-release-notes-0-5-0/ NEW Amplify Flutter Release Notes The Amplify Flutter team is announcing the release of version of the Amplify Flutter library Please use this Github repo to inform the Amplify Flutter team about features or issues or visit the Amplify Discord server under the flutter help channel Highlights Below is a high level breakdown of the features we are announcing with … 2022-06-08 17:42:26
AWS AWS Security Blog Use Amazon Cognito to add claims to an identity token for fine-grained authorization https://aws.amazon.com/blogs/security/use-amazon-cognito-to-add-claims-to-an-identity-token-for-fine-grained-authorization/ Use Amazon Cognito to add claims to an identity token for fine grained authorizationWith Amazon Cognito you can quickly add user sign up sign in and access control to your web and mobile applications After a user signs in successfully Cognito generates an identity token for user authorization The service provides a pre token generation trigger which you can use to customize identity token claims before token generation In this … 2022-06-08 17:55:48
AWS AWS Security Blog Use Amazon Cognito to add claims to an identity token for fine-grained authorization https://aws.amazon.com/blogs/security/use-amazon-cognito-to-add-claims-to-an-identity-token-for-fine-grained-authorization/ Use Amazon Cognito to add claims to an identity token for fine grained authorizationWith Amazon Cognito you can quickly add user sign up sign in and access control to your web and mobile applications After a user signs in successfully Cognito generates an identity token for user authorization The service provides a pre token generation trigger which you can use to customize identity token claims before token generation In this … 2022-06-08 17:55:48
AWS AWSタグが付けられた新着投稿 - Qiita AWS無料利用枠について https://qiita.com/kkuwabara/items/67735efb63cb201ccb18 creco 2022-06-09 02:31:23
Git Gitタグが付けられた新着投稿 - Qiita 【Git】in unpopulated submodule解消法 https://qiita.com/P-man_Brown/items/e8366ae7f8e693104f26 nunpopulatedsubmodulesa 2022-06-09 02:36:18
海外TECH Ars Technica Feds seize SSNDOB marketplace that listed personal data of 24 million people https://arstechnica.com/?p=1859669 orders 2022-06-08 17:19:02
海外TECH Ars Technica Dwayne Johnson’s Egyptian antihero kneels before no one in first Black Adam trailer https://arstechnica.com/?p=1859570 black 2022-06-08 17:13:50
海外TECH MakeUseOf Why You Should Never Buy a New DSLR Camera (And Always Buy a Used One) https://www.makeuseof.com/tag/never-buy-new-dslr-always-buy-used-dslr/ lenses 2022-06-08 17:45:14
海外TECH MakeUseOf How 60,000 Parts Were 3D Printed In Under Eight Hours Using Magna 3D Printer https://www.makeuseof.com/how-60000-parts-were-3d-printed-in-under-eight-hours-using-magna-3d-printer/ How Parts Were D Printed In Under Eight Hours Using Magna D PrinterIn the span of only eight hours over parts were churned out The result is a glimpse into what the future of D printing may hold 2022-06-08 17:45:13
海外TECH MakeUseOf Don’t Know What Song to Listen to Next? Try These 4 Websites https://www.makeuseof.com/websites-find-new-music/ music 2022-06-08 17:30:15
海外TECH MakeUseOf The 5 Best USB Drive Encryption Software https://www.makeuseof.com/best-usb-encryption-software/ encryption 2022-06-08 17:30:14
海外TECH MakeUseOf How to Fix the Microsoft Teams Error Code 500 on a Windows PC https://www.makeuseof.com/windows-microsoft-teams-error-500/ microsoft 2022-06-08 17:15:13
海外TECH DEV Community Remote Debugging and Developer Observability https://dev.to/codenameone/remote-debugging-and-developer-observability-22pb Remote Debugging and Developer ObservabilityIn this post we ll go over remote debugging Debugging production with developer observability tools and debugging asynchronous code which presents its own unique challenges This is actually material from four separate videos because I wanted to pool some ideas together into a single blog post and the asynchronous stuff got pulled in So without further ado these are the applicable videos Read on for the analysis and discussion Shai Almog debugagent Duckling the th Remote debugging is a powerful yet risky tool In this video I explain the process the risks and a partial workaround of SSH tunneling CodeNewbie SecondDucklings PM May Shai Almog debugagent Duckling the th Debugging production securely and at scale is difficult Lightrun solves that problem for free Here s how CodeNewbie SecondDucklings PM May Shai Almog debugagent Duckling the th Add metrics to measure production performance and usage for a specific line or block of code Without code changes Harden your production with PII reduction and blocklists CodeNewbie SecondDucklings PM May Remote Debugging SessionA remote debugger is a feature of pretty much any programming language or platform but it s pretty common in Java using the JDWP protocol which we discussed in the past As a refresher JDWP standard for Java Remote Debugging Protocol It s a wire agnostic protocol that defines the connection between the IDE and the JVM when debugging Notice that the real value proposition of remote debugging is on local and not on a remote machine The value is in connecting to a running process that s outside of our development environment E g in a docker container etc We can launch a remote process in debug mode using code such as this in the command prompt java agentlib jdwp transport dt socket server y address ApplicationNameBut this is a bit of a problem JDWP is VERY insecure As a partial workaround we can pipe the connection via SSH to the debug target like this ssh remoteUser remoteHost L NAlternatively with Kubernetes we can use port forwarding like this kubectl port forward podname Once we do that we can use the usual debugging features by connecting directly to the remote server from the IDE by creating a remote debugging target and just running it Notice that you can do all of that in visual studio code as discussed here We now have a debug session of the application as if we launched it directly from the IDE Production DebuggingNow we might be tempted to just open a JDWP port but this approach has many problems Restart Process You need to restart the process to enable debugging this might not be something you can do in productionBreakpoints Break They can stop execution in its place and cause problems in a production environmentSecurity JDWP and other remote debugging protocols are remarkably insecure Risks include remote code execution access to source files and much more Stability This can easily cause a crash of the remote process because of minor mistakes such as a badly crafted expression or even a watch variablePrivacy issues imagine a malicious developer from your organization placing a breakpoint in the user login section of the code and siphoning credentials Or using set value to increase his privileges of security breaches are internal and this removes all checks balances It might violate regulations laws for many industries Scale we have multiple machines in the cluster How do we know which machine to debug right now A request might hit any machineThis is obviously not good But we need a solution that will address all these issues After all the value of tracking a bug on a truly remote machine is tremendous Developer ObservabilityObservability lets us monitor the production environment without shipping new code It has been a part of the DevOps toolchain for a while now At today s scale managing a cluster without observability is simply impossible Developer observability takes these ideas and shifts them left From the DevOps team to the R amp D team It gives us the programming language level of observability directly at the line of code level So it feels like a debugger instance in IntelliJ IDEA or Visual Studio code But it s an observability tool that you can use safely without compromising the integrity of the production environment Unlike DevOps oriented observability these tools integrate into the standard development tools such as IDEs etc We can use the free version of Lightrun to get started and learn how these tools work You need to install the Lightrun plugin in the IDE and then set up the agent into production servers Unlike JDWP the agent is secure and segregated We ll discuss this further But first let s discuss the capabilities LogsThe most simple thing you can do with most developer observability tools is log injection This lets you add a new log to a running process through an IDE context menu We can pipe the log to the debug console in the IDE or we can leave the default which logs it as if you wrote it in the code This means the log will show up with all your other logs Using Elastic or a similar tool The log will be ingested like the other logs and will appear in the right order Furthermore you can print variables method return values etc Expression evaluation is done in your programming language of choice e g Java for JVM apps That way we can print variable values as we do here This raises two important concerns Mutability what if a method invocation changes application state Performance what if this log brings down performance The answer for this differs based on the tool However Lightrun specifically runs these expressions in a sandbox Every expression is analyzed to make sure it s read only and doesn t affect execution When in doubt you will get an error and the action won t be performed This sandbox also verifies performance If a specific quota of CPU usage is exceeded the action is suspended until further details The integrity of the remote process server code is kept SnapshotsAs I mentioned before regular breakpoints are an immense problem when debugging production The core problem is that they break Snapshots AKA Captures or Non Breaking Breakpoints solve this problem by not breaking They provide us with information similar to the typical breakpoints in source code which is remarkably useful We can analyze the stack trace and variable values all around for this point in time They even support conditional expressions similar to conditional breakpoints We can grab a snapshot for a specific use case only The snapshot is the workhorse of such remote debugging tools With it we can get an insight into the production that s normally reserved only for local development tools Amazingly we can get this insight without compromising the integrity of the remote machine TagsScale is probably one of the biggest challenges with remote debugging Developer observability tools let us bind any action log snapshot or metric to a tag This is tantamount to adding the action to all the agents servers in the tag E g you can have a tag based on the platform e g Ubuntu Or based on the type of deployment Green etc This lets you debug at a huge scale removing the need to guess the remote device that will experience the bug next CounterHave you ever asked yourself Are users actually using this method I ve been working so hard to fix write Is this use case even applicable Does a user with this flag ever reach this method If so then how many Getting these deep low level insights into the code can completely change the way you code Why take on a complex task for something that isn t used Or maybe we should put more effort into this code since it s such a focal point APMs provide some insight but they provide very coarse grained information For many cases I would just add a variable increment it every time a condition happens and log that information This is OK for a simple project but it requires deploying such hacks and incurs a lot of noise in the project That s something most of us don t want Counter works just like that without the hassle and without deploying You can use conditional counters as you can with every action to count fine grained usage TicToc amp Method DurationSimilarly we might be curious about the overhead of a specific method or a block of code The latter is exactly what tictoc enables It s the equivalent of storing the current time before the code starts Then logging current time start time when reaching the block end The only difference is that this requires no code changes doesn t affect production and lets us add conditions to the limit The output from all the metrics can be piped to statsd Grafana and plotted to help in the decision making process PII Reduction and BlocklistsThe sandbox is only one part of the security As we discussed earlier one of the biggest risks for such a deployment is from internal developers siphoning off data intentionally or not Furthermore there are regulatory and legal requirements we need to abide by To solve these problems we have two separate tools The first is PII Reduction Personal Identifiable Information PII is a legal term used to qualify private user data that should be kept secure A great example is a credit card number Say our User object includes a credit card number field in cache We log the user object and effectively place the user s credit card number into logs that get ingested everywhere This might violate regulations and laws It s also disallowed by credit card processing and might result in sanctions against the company PII reduction blocks well known patterns credit cards emails etc from appearing in the logs This prevents potential abuse since more people are exposed to the logs than to the database Blocklists let us block specific files classes from action insertion That means we can prohibit a developer from adding a snapshot log etc to a file that might be risky E g a file that handles the login process should be blocked by default With these two features we can harden the deployment further SummaryIn the section titled Production Debugging above I listed a few problems in remote debugging This is how developer observability solves these problems Restart Process A developer observability tool can run always without increasing security concernsBreakpoints Break Snapshots don t breakSecurity It doesn t open an external port and is connected to a secure management server As such it doesn t expose an attack vectorStability This depends on the tool Some do impact stability while others don t Tools that include a sandbox such as Lightrun remove some of that concernPrivacy issues Blocklists and PII Reduction solve thoseScale Tags solve thatAs you can see there are many configuration options and capabilities in these developer tools We can leverage them to solve all the inherent problems in JDWP and fix defective code faster With this post the Second Duckling series on basic debugging is going on hiatus I m going to use the summer months to evaluate the impact of this series and decide whether we want to do another series I like the format and enjoyed doing the videos posts and I hope to revisit this format moving forward 2022-06-08 17:45:53
海外TECH DEV Community What is Cloud Computing and its certifications https://dev.to/sandeepk27/what-is-cloud-computing-and-its-certifications-3jd7 What is Cloud Computing and its certificationsWhat is cloud computing Cloud computing is a network of servers connected using the Internet Its main function is to share information resources and software The Internet acts as the invisible cable that connects everything This includes all physical and virtual servers all over the globe Types of cloud computing The main types of cloud computing services Infrastructure as a Service IaaS Platforms as a Service PaaS and Software as a Service SaaS The list of my top cloud service providers Amazon Web Services AWS Microsoft AzureGoogle Cloud PlatformAlibaba CloudIBM CloudOracleSalesforceSAPRoadmap to learn the Cloud Computing Read about the basics of cloud computing Understand the basic cloud terminology Try to know and understand the different types of cloud computing Know and understand the different cloud deployment models Learn the basic concepts of severs networking and storage Try to complete a free course of cloud computing in udemy or others Pick one cloud provider and start preparing for beginner level of certification Most valuable cloud certificationsBeginner Level Microsoft Azure FundamentalsAWS cloud practitionerCompTIA Cloud EssentialsIntermediate Level Google Associate Cloud EngineerAzure Administrator AssociateAWS Architect AssociateAdvanced Level Azure Solutions Architect ExpertGoogle Cloud ArchitectAWS Architect Professional 2022-06-08 17:24:11
海外TECH DEV Community Cryptle - Wordle clone for Enarx https://dev.to/aryank21/cryptle-wordle-clone-for-enarx-bdf Cryptle Wordle clone for EnarxHi Folks Welcome to another exciting Blog In the previous blog we learned about The Enarx Project an open source framework for running applications in TEEs Trusted Execution Environments using WebAssemby It is the part of Confidential Computing Consortium from the Linux Foundation But today we ll try hands on Enarx application using Cryptle Enarx in briefEnarx aims to minimize the trust relationships required when executing applications meaning that the only components which need to be trusted are the CPU and associated firmware the workload itself and the Enarx middleware which is fully open source and auditable Applications run without any of the layers in the stack e g hypervisor kernel user space being able to look into or alter the Keep or its contents Today we will deep dive into Cryptle a Wordle clone for Enarx The Cryptle game is developed using Rust on the server side and JavaScript on the client side It can either be run on wasmtime which is not secure or on Enarx a trusted secure platform WordleIn Addition Cryptle has a multiplayer support Steps to run Cryptle on your Machine Install Rustcurl proto https tlsv sSf sh s default toolchain nightly ysource HOME cargo env Install Enarxgit clone cd enarx cargo buildcargo install bin enarx path Clone and Run Cryptlegit clone cd cryptle cd Rust CARGO TARGET WASM WASI RUNNER wasmtime run tcplisten env FD COUNT cargo nightly run target wasm wasiServer is running on CryptleThe goal of Cryptle is to demonstrate data encryption in use where the processing of the data is done in a Trusted Execution Environment TEE and only accessible to the Cryptle application The Single Player mode is similar to Wordle A player has to guess a five letter secret word selected by the application with yellow green colored titles shown as hints in each round indicating letters that match with the secret word In the Multi Player mode the secret word is not selected by the application itself but instead is or rather are suggested by the players themselves Each player proposes words that are most likely to match those sent by others The words are sent to the Cryptle application running in an Enarx Keep a specific TEE instance and are only revealed to the players when there s a match between the secret words Standard engagement with the game involves playing Cryptle from the client side and guessing the secret words The Cryptle Hack ChallengeAlternatively players may also write their own application that run on the host side and attempts to deduce or otherwise guess the secret words Implementers have the option to choose a mechanism but the application must be publicly available under an OSI license on GitHub or GitLab Any programming language may be used but it should not be intentionally obscured All root privileges should be granted to the application It should be documented how the application can derive the secret words or guess them Applications will be executed as ELF binaries on a host running a modern Linux kernel There will be no physical access allowed to the host Profian CTO Mr Nathaniel McCallum announcing The Cryptle Hack Challenge at CloudNativecon You can still win prizes if you can hack Cryptle and report it to the team Reach us out via our Chat References list PLjhyzYMNiu ONljTkvuOutyjwq amp index amp t sDo comment your ideas and suggestions related to the blog and please share if you found it useful 2022-06-08 17:09:54
海外TECH DEV Community Getting Oriented with Objects in Ruby https://dev.to/ridhwana/getting-oriented-with-objects-in-ruby-2h44 Getting Oriented with Objects in RubyThis post is co authored by juliannatetreault and ridhwana In our last post we briefly touched upon a few topics such as object orientation dynamic languages and memory management However we barely scratched the surface of these concepts and so in this post we d like to dive deeper into object orientation and how it all comes together in Ruby Ruby ObjectsAs we mentioned in our previous post Ruby is centered around the concept of “objects Everything in Ruby is an object this includes Booleans Strings Integers and more A Ruby Object will contain its own set of attributes which you can think of as data and its own set of methods which you can think of as the behaviour Ruby Objects communicate by sending messages to each other These messages can be thought of as instructions When we talk about “sending a message from Object A to Object B what we actually mean is that we “call or invoke a method on Object B These terms can be used interchangeably If you take a second to look up from reading this article and glance around your surroundings you ll see that there are objects everywhere in the world As I look up at this moment I see my a 🪴 a a and a are some of the objects that jump out to me All of these have the potential to be modelled as Objects each with its own data and behaviour and sometimes these objects send messages to each other like when my cat chews on a leaf from my plant Some of the concepts that we ll need to discuss first before fully understanding Ruby objects are classes attributes and methods What is a Class A Class is a blueprint for the construction of similar objects you can think of it as a template that we use to create objects The template provides the set of attributes and methods for an object which will then help each object to define its own set of data and shared behaviour For example we may want to represent my cat In order to do this we d first create a blueprint that we could use to represent all cats Below we represent the Class y Cat haha get it This blueprint will contain the attributes that a cat may have like name age colour and weight It will also contain behaviour like the sound that a cat will make or how it will move its tail In the future we may want our blueprint to be more general so we may want to make an Animal blueprint and use it to create both a cat and a dog object but that s for later In reality the code for the Cat Class may look something like this class Cat def initialize name age colour weight name name age age colour colour weight weight end def make sound return meow end def move tail return twitching end endIn order to describe my cat we would use this template to instantiate a new object In Ruby the new method is used for instantiating an object This now creates my object as an instance of the Cat Class zeus Cat new Zeus brown Now this may not make sense to you as yet but let s break down the code above by describing the attributes and methods Attributes Data name age colour and weight in the parenthesis are referred to as parameters They describe the characteristics of the object When we instantiate an object like in the code below we pass through the values for these parameters in the form of arguments The arguments are what allow us to provide specific values for that object When we call the method new on a class the class will create a new instance of itself Internally it then calls the method initialize on the new object and it will pass all the arguments to the method initialize The initialize method as outlined in the image above is then responsible for preparing the instance data for the object name age color and weight are referred to as instance variables they can be identified by the prefix Instance variable data is unique to the object Instance variables by default cannot be accessed from outside the object zeus Cat new “Zeus “brown zeus age gt NoMethodError undefined method age But what if we really need to print out Zeus s age from outside Well there are definitely times when we may want to access read and write these instance variables from the outside In these cases we can access the attributes with attribute accessors There are three attribute accessors that we will discuss attribute readerIn order to be able to read an attribute from the outside without the need to change it then you can use an attribute reader class Cat attribute reader age rest of the codeendWhen you add attribute reader to your code Ruby then creates a method on your behalf that looks like the code below and allows you to read the attribute The symbol for the attribute reader is used as the name for this getter method as defined below class Cat def age age end rest of the codeendzeus Cat new “Zeus “brown zeus age gt You ll learn more about methods in the next section attribute writerLikewise in order to be able to write to an attribute from the outside then you can use an attribute writer Just like with attribute reader Ruby then creates a method on your behalf that looks like the code below and allows you to write to the attribute class Cat def age value age value endendzeus Cat new “Zeus “brown Zeus age attribute accessorIn order to be able to both read and write to an attribute we would use attr accesor Ruby then creates both methods on your behalf Now that we ve discussed attributes let s talk about methods Behaviour Methods Methods allow you to bundle code that can perform tasks and return results in a named DRY don t repeat yourself way Methods can be called from other code allowing programmers to use the bundled code without having to rewrite it in every place it s needed When it comes to crafting a method there are a few things you should know about them First methods are defined using the def and end keywords def followed by a name represents the start of a method The end keyword does just that it ends the method What comes in between the def and end keywords is the bundled code or logic def method name insert some behaviour here endNext methods have their own set of naming conventions When creating a method it is important to keep these naming conventions in mind as it ll make it easier to understand the intent of the method for the next programmer or you months down the road The naming conventions we d like to draw your attention to are naming your method the capitalization of your method and what to do when your method name is longer than a single word Let s begin with naming your method When brainstorming method name ideas it is important to ensure that the method is aptly named the method s name should be explanatory giving insight into the method s purpose If you re creating a method that will give your Cat Object the ability to meow then naming the method meow is a good place to start Now let s touch upon method capitalization or the lack thereof Method names should consist of all lowercase letters Finally let s discuss what to do when your method name is longer than a single word Multi word method names in Ruby are written in snake case For example if you had a method that both made your Cat Object meow and move its tail you might write it as meow and move tail where the underscores between each word represent snake casing def meow and move tail insert some behaviour here endFinally the logic within a method is always indented The rule of thumb when it comes to indentation is four spaces or a tab to the right While there is an ongoing feud within the programming community about which approach is right hint neither are it all boils down to preference Tabs or spaces which side are you on On the topic of crafting methods one thing that is important to mention is that methods can accept default arguments and values which can level up your method and make it more reusable A default argument allows a method to be called with or without the provided argument allowing for flexibility It also gives you the option to reassign the value passed to the default argument making the method more extensible To pass a method a default argument with an assigned value open a set of parentheses after the method name and define the argument and its value like so def make sound sound “Meow insert some behaviour here endIn the above make sound method we pass a default argument sound with the value meow By passing this default argument if we were to lean on the default argument in the method s logic we could expect that the string “Meow would be returned whenever the method is called def make sound sound “Meow puts “ sound endNow you may be wondering what those squiggly brackets and hashtag are doing within the make sound method the use of this is called string interpolation which can briefly be explained as embedding the value within the string that it is a part of This is something we may touch upon in a later post so stay tuned folks Similar to default arguments methods can also accept required parameters While default arguments and values are optional required parameters are just that required Just like default arguments required parameters are defined within a set of parentheses that come right after a method s name Unlike default arguments though a required parameter is not given a default value rather its value is defined when the method is invoked def make sound sound puts “ sound endmake sound “Purr So method naming conventions default arguments and string interpolation aside let s briefly touch upon CRUD actions or the widely used methods standard to Ruby CRUD which stands for create read update and delete are a set of methods provided in Ruby that perform basic actions such as creating reading updating or deleting an Object These methods are important to recognize due to their wide use Now with all of this new found knowledge of methods you may be wondering how to actually make use of this behaviour If so then this paragraph is for you We refer to making use of a method s behaviour as “invoking or “calling a method in Ruby This can be accomplished using dot notation which when used invokes a method passing along a message to an Object which in our case is our Cat Zeus Is that really all there is to methods Seems pretty straightforward to me…The above is just the beginning and while there is so much more to learn about methods knowing the above should get you to a good baseline understanding of how Objects are given behaviour and receive messages through methods If you re keen to dive a bit deeper though we ll be releasing a brief follow up post that will touch upon some of the topics that didn t make it into this post And that s it folks…Credits to juliannatetreault for the adorable cat drawings 2022-06-08 17:06:55
海外TECH DEV Community My Next.js Boilerplate now has 2000+ GitHub stars https://dev.to/ixartz/my-nextjs-boilerplate-now-has-2000-github-stars-dne My Next js Boilerplate now has GitHub starsMy Next js boilerplate has just crossed stars on GitHub Thanks to all GitHub stargazers for the support A project I have started years ago for my own personal use and I thought it would be a great idea to share it Now I use it for all my project in React and Next js Now I also get help from the community Other developers makes suggestion to the boilerplate code There are also some external contributors ixartz Next js Boilerplate Boilerplate and Starter for Next js Tailwind CSS and TypeScript ️Made with developer experience first Next js TypeScript ESLint Prettier Husky Lint Staged Jest Testing Library Commitlint VSCode Netlify PostCSS Tailwind CSS Boilerplate and Starter for Next JS Tailwind CSS and TypeScript Boilerplate and Starter for Next js Tailwind CSS and TypeScript ️Made with developer experience first Next js TypeScript ESLint Prettier Husky Lint Staged Jest Testing Library Commitlint VSCode Netlify PostCSS Tailwind CSS Clone this project and use it to create your own Next js project You can check a Next js templates demo FeaturesDeveloper experience first Next js for Static Site GeneratorType checking TypeScriptIntegrate with Tailwind CSSStrict Mode for TypeScript and React Linter with ESLint default NextJS NextJS Core Web Vitals Tailwind CSS and Airbnb configuration Code Formatter with PrettierHusky for Git HooksLint staged for running linters on Git staged filesLint git commit with CommitlintTesting with Jest and React Testing LibraryAbsolute Imports using prefixVSCode configuration Debug Settings… View on GitHubI m currently writing a blog post on how the project reached stars on GitHub you can be notified when the article is published by following me on Twitter 2022-06-08 17:03:25
Apple AppleInsider - Frontpage News Apple's RoomPlan API will enable iPhone & iPad to map out a house https://appleinsider.com/articles/22/06/08/apples-roomplan-api-will-enable-iphone-ipad-to-map-out-a-house?utm_medium=rss Apple x s RoomPlan API will enable iPhone amp iPad to map out a houseThe new RoomPlan Swift API uses the iPhone and iPad s LIDAR sensor to scan indoor spaces ーincluding furniture layouts Launched at WWDC RoomPlan is an augmented reality technology that sought to help collect data about a room and its contents In a dedicated Apple Developer page the company touted the RoomPlan API as being useful in creating floor plans These plans then can be applied directly in real estate and hospitality apps that require a deep knowledge of a building s layout Read more 2022-06-08 17:51:01
海外TECH Engadget Google developer Emma Haruka Iwao has calculated Pi to 100 trillion digits https://www.engadget.com/google-cloud-pi-100-trillion-digits-174908346.html?src=rss Google developer Emma Haruka Iwao has calculated Pi to trillion digitsGoogle Cloud developer advocate Emma Haruka Iwao and her colleagues once again claim to have calculated Pi to a new record number of digits Iwao says that the team has calculated the mathematical constant to trillion digital decimal places Iwao and her team previously set the record in when they carried out a calculation to an accuracy of trillion digits The benchmark has been broken a few times since then including when researchers from a Swiss university calculated Pi to trillion digits last year ーtwice as many as the Google team attained a few years back Iwao and her team are working with Guinness World Records for official validation of their achievement as a world record In a blog post Iwao wrote that finding as many digits of Pi as possible is a way to measure the progress of compute power Her job involves showing off what Google Cloud is capable of so it s not too surprising that Iwao tapped into the power of the platform to perform the calculation nbsp In the calculation which figured out a third as many digits as the most recent attempt took days This time around the calculation ran for days hours minutes and seconds meaning the computers were running more than twice as quickly despite Iwao using quot the same tools and techniques quot Around terabytes of data were processed overall nbsp Iwao also notes that reading all trillion digits out loud at a rate of one per second would take more than million years And in case you re wondering the trillionth decimal place of Pi is nbsp 2022-06-08 17:49:08
海外TECH Engadget What to expect from this summer's big video game shows https://www.engadget.com/summer-game-fest-xbox-devolver-june-2022-e3-173051664.html?src=rss What to expect from this summer x s big video game showsIt s June and video game fans across the globe know what that means it s not E Again The old in person gaming show has been canceled for the third year in a row but this summer will still be filled with news and virtual events thanks in large part to Canada s sweetheart Geoff Keighley It all takes place in early June which is like right now so let s take a look at the schedule for Summer Game Fest and break down what to expect from the studios involved Summer Game Fest is less a singular event and more a state of mind It comprises a handful of virtual shows spread over days starting on June nd with the PlayStation State of Play stream This one already happened and it was short and sweet focusing on content for PlayStation VR Capcom kicked things off with a reveal of the Resident Evil remake the announcement of a VR version of Resident Evil Village and a release window of for Street Fighter Square Enix also showed off the first gameplay trailer for Final Fantasy XVI complete with a timeframe for launch Oddly enough there s still no word on when the PSVR will actually come out Resident Evil CapcomAfter that Activision is hosting its own little party for the reveal of Call of Duty Modern Warfare II on June th at pm ET The game is a sequel to s Modern Warfare and a reboot of the series This show literally just wrapped up and Activision shared its plans to bring Modern Warfare II s technology to the new Warzone which will land after October this year No Russian the controversial airport mission from the original Modern Warfare II will not be included in the reboot Summer Game Fest officially kicks off with a big live streamed event on June th at pm ET Hosted by Keighley the show is expected to be two hours long and will feature announcements from the usual suspects including K Atlus Bloober Team Capcom EA Epic Games Warner Bros and Square Enix The Day of the Devs stream directly after the main show will spotlight indie games specifically backed by iambit and Double Fine Not much has been publicly confirmed for the kickoff show but we ll definitely get a fresh look at Gotham Knights an appearance by The Rock and lots of raw gameplay footage according to Keighley Even with State of Play last week there s still room for Capcom to drop some details about DLC for Resident Evil Village and for Square Enix to showcase Forspoken which comes out in October Atlus may show off something in the Persona universe and rumor has it Bloober Team is working on a Silent Hill game ーbut it could also be building a new Layers of Fear Next on the calendar is indie publisher Devolver Digital with a Twitch stream on June th at pm ET the same night as the main Summer Game Fest event It s Devolver so this show s gonna be weird It s gonna have a lot of f bombs It s gonna leave you with the feeling that Devolver is scrappy and relatable but also way too cool for you It s gonna try really hard to disguise the fact that yes even Devolver s show is simply another long ad from a company entrenched in the video game industry s multibillion dollar corporate system but most of all I bet it ll be funny as hell Devolver always puts on a good show and they always have a rich roster of indie developers to choose from This year should be no different with Suda hosting the stream and recent hits like Death s Door Inscryption Trek to Yomi and Weird West on the publisher s roster ImmortalityHalf MermaidOn June th there s a Netflix Geeked Week stream followed by a Tribeca Games Spotlight focusing on a curated selection of upcoming indie titles including Immortality Thirsty Suitors As Dusk Falls and Oxenfree II And then on June th it s time for the most E event of the summer the Xbox and Bethesda showcase The Xbox and Bethesda stream kicks off at pm ET on Sunday June th There are no confirmed announcements so far but the show s cosmic marketing scheme suggests we ll see something from Starfield Bethesda s huge new sci fi RPG This will be bittersweet for anyone who s been following the game s development just last month Bethesda delayed Starfield nbsp into the first half of pushing it back from an initial release date of November th Aside from a few teaser videos and dev diaries we haven t seen much of Starfield and the Xbox show is the ideal time to break out some actual gameplay and maybe even convince fans that the delay will be worthwhile It s very possible we ll get a good look at another delayed Bethesda property Redfall the open world co op vampire shooter nbsp developed by Dishonored studio Arkane Redfall was originally supposed to come out this summer but Bethesda pushed it into the first half of alongside Starfield It d be great to see some gameplay from this title since so far the marketing has consisted of stylized cinematic videos And to round out the Bethesda properties there s always a chance that Elder Scrolls will make an appearance considering we haven t seen anything about it since you know back when E was still a thing But that s enough about Bethesda Xbox owns game studios and it has Game Pass the company s subscription game streaming service that s sure to be mentioned every other minute during the show Other potential hits for the Xbox stream include Senua s Saga Hellblade II the next Forza Motorsport and maybe even something about the new Fable that was announced in And of course there s always room for Halo Infinite updates Senua s Saga Hellblade IINinja TheoryWith Sony and Microsoft chugging along in the latest console generation the focus right now is on software and both studios have plenty to prove in this space Sony barely participated in the summer s events and the company doesn t seem interested in talking about major in house projects like God of War Ragnarok or Insomniac s Spider Man Meanwhile two significant delays from Xbox this year were a big blow to the company s reputation especially considering how important first party exclusives are in a subscription based ecosystem Xbox promises to include its blockbuster games in Game Pass subscriptions on day one at no extra charge while that isn t the case with Sony s new subscription service PlayStation Plus Premium This poses a significant consumer facing advantage for Xbox and I expect to hear a lot about first party exclusives in Game Pass during the company s big show And with that it looks like Summer Game Fest is done but there s still plenty more gaming news to come this year Nintendo loves to host digital showcases whenever it damn well pleases and we re just about due for another one EA usually has a show of its own at some point Sony still has plenty of PSVR and PS Plus Premium details to share and Microsoft will never stop talking about Game Pass In fact Xbox is hosting a second showcase on June th And when all else fails there are so many indie games you guys Let s all have some fun 2022-06-08 17:30:51
海外TECH Engadget ‘Call of Duty: Modern Warfare II’ is actually all about ‘Warzone 2.0’ https://www.engadget.com/mwii-modern-warfare-ii-warzone-2-no-russian-170044023.html?src=rss Call of Duty Modern Warfare II is actually all about Warzone Let s get this out of the way No Russian will not be included in the new Call of Duty Modern Warfare II In fact the game will penalize friendly fire and fail players who shoot civilians while in combat This is in stark contrast to the No Russian mission from the original Modern Warfare II which came out in in this level players were instructed to shoot their way through a busy airport killing civilians en masse alongside a Russian terrorist organization The protagonist was undercover trying to infiltrate the cell for the CIA and even though it was possible to skip this section or play it without firing a single shot the fictional peer pressure to kill as many people as possible was strong No Russian sparked heavy controversy with the release of Modern Warfare II Though Call of Duty has made billions gamifying the horrors of war many players balked at the idea of role playing as a mass shooter targeting unarmed civilians The mission came with a content warning in the US and it was censored internationally Infinity Ward and Activision were forced to publicly justify its inclusion arguing against the idea that it was tone deaf ham fisted and needlessly disturbing With the version of Modern Warfare II Infinity Ward is avoiding the conversation altogether In response to the question “Can you confirm whether the No Russian mission will be included in the new game in any form an Activision spokesperson responded as follows “No There are NPC civilians in the game but you will be penalized for friendly fires If civilians are caught in the crossfire players will automatically get a mission fail ActivisionThis fits with the overall vibe of the new Modern Warfare II At a media briefing ahead of its reveal Infinity Ward developers emphasized the game s entertainment value over serious wartime themes at one point using the phrase fun for everyone They said they wanted this Modern Warfare II to be realistic but still cool Without mentioning No Russian specifically developers said the goal of the original game was to be provocative while this year s version was aiming to be heroic With Modern Warfare II Infinity Ward is sticking to the fun bits of war The game still deals in real world themes of organized violence large scale military action and shadowy terrorist groups but no joke I ve never heard Call of Duty developers use the word “fun so freely in a pre release briefing This may be because Modern Warfare II marks the beginning of a fresh approach to Call of Duty for Activision with pivotal implications for the future of Warzone specifically When the next version of Warzone comes out after October of this year it will include the AI improvements new vehicle behaviors and upgraded physics of Modern Warfare II and both games will run on the same engine Activision“A wholly new Warzone will launch as an extension of the Modern Warfare II universe an Activision spokesperson said “With it comes new technology new features and new gameplay that work seamlessly together… In order to fully deliver this state of the art experience Warzone will feature new Modern Warfare II content and systems with brand new progression and inventories Today s Warzone will continue on as a separate experience that will include a continuation of player progression and inventories within that Warzone experience Modern Warfare II is scheduled to come out on October th Warzone should land soon after according to Activision Modern Warfare II is a sequel to s Modern Warfare which rebooted the series but kept familiar themes and characters like Captain John Price The new game follows Price s Task Force and Mexican Special Forces as they attempt to thwart terrorist plans across the globe “We love telling stories Infinity Ward head writer Brian Bloom said “Story is character and character is story and that s writery stuff that writers sometimes say internally but it boils down to a simple thing If you have a plot who s in it what s happening With Modern Warfare II developers focused on refining water physics and figuring out how combat works above and below the surface One level they showed off Wet Work had the player sneak into a marina by swimming around docked boats taking out security forces by throwing knives and shooting a pistol upward through the water In the new game shooting underwater reduces the impact of each bullet whether it breaks the surface or not but the pistol otherwise operates normally These new water physics will apply to multiplayer portions of the game as well as Warzone In terms of multiplayer for Modern Warfare II developers have taken observational data from past Call of Duty games to identify three main player behaviors aggressive defensive and reactionary each of them with assault and stealth variants The game s default loadouts fall into the resulting six categories As for vehicles it s possible to shoot their doors and tires off complete on the fly repairs and get a degree view when leaning out of a window Amphibious vehicles and a helicopter troop carrier also make an appearance in multiplayer New multiplayer maps come in large scale and traditional sizes and there s a new v mode called Knockout that infuses Gunfight with a multiplayer component Players have one life with revive and one minute on the timer and a bag randomly spawns in one of three locations The winner is the last person left alive or the person holding the bag when time runs out ActivisionThe AI systems in Modern Warfare II have been tweaked to better facilitate emergent gameplay and mimic real world scenarios while Infinity Ward is running internal tests on maps with AI characters and live players Call of Duty s Ricochet Anti Cheat system will be live in Modern Warfare II and Warzone on day one Infinity Ward creative director and co head Patrick Kelly teased what this could all mean for Warzone and the future of Call of Duty in his introductory speech saying “What if there was tons and tons of AI in the world and things like that and there was tons of players and stuff like that That could be potentially really cool right We want a scenario where everyone is playing together having fun and playing how they want to play and what they want to play As long as it s not No Russian 2022-06-08 17:00:44
Linux OMG! Ubuntu! System76 to Open Distribution Hub in Europe https://www.omgubuntu.co.uk/2022/06/system76-is-opening-a-european-distribution-center System to Open Distribution Hub in EuropeAfter years of wishing by users System is set to start making its products available to buy in Europe It ll start with Launch its mechanical keyboard This post System to Open Distribution Hub in Europe is from OMG Ubuntu Do not reproduce elsewhere without permission 2022-06-08 17:16:34
海外科学 NYT > Science Revised Moderna Vaccine Works Better Against Omicron, Trial Suggests https://www.nytimes.com/2022/06/08/us/politics/moderna-vaccine-omicron-variant.html Revised Moderna Vaccine Works Better Against Omicron Trial SuggestsThe findings indicate that the updated vaccine produced a significantly stronger immune response against Omicron but it is unclear how it will fare against future versions of the virus 2022-06-08 17:39:16
ニュース BBC News - Home Berlin: Teacher dead and pupils hurt as car hits crowd https://www.bbc.co.uk/news/world-europe-61729102?at_medium=RSS&at_campaign=KARANGA attack 2022-06-08 17:53:41
ニュース BBC News - Home Emma Raducanu: British number one expected to be fit for Wimbledon https://www.bbc.co.uk/sport/tennis/61739133?at_medium=RSS&at_campaign=KARANGA Emma Raducanu British number one expected to be fit for WimbledonEmma Raducanu is expected to be fit for Wimbledon after a scan shows the injury which forced her to retire at the Nottingham Open was a side strain 2022-06-08 17:19:58
ビジネス ダイヤモンド・オンライン - 新着記事 【特別対談 世界一の92歳総務課長Xベストセラー作家・本田健】 100まで楽しく働く「自分力」の高めかた - 92歳 総務課長の教え https://diamond.jp/articles/-/303808 2022-06-09 02:55:00
ビジネス ダイヤモンド・オンライン - 新着記事 【Twitterフォロワー30万人超の精神科医が教える】 つい他人と比べてしまうアナタが 嫉妬心を上手に利用できる1つの方法 - 精神科医Tomyが教える 心の荷物の手放し方 https://diamond.jp/articles/-/304315 【Twitterフォロワー万人超の精神科医が教える】つい他人と比べてしまうアナタが嫉妬心を上手に利用できるつの方法精神科医Tomyが教える心の荷物の手放し方生きていれば、不安や悩みは尽きない。 2022-06-09 02:50:00
ビジネス ダイヤモンド・オンライン - 新着記事 医療界史上最悪のデマ「米国はしか感染増加のヤバイ理由」 - デマの影響力 https://diamond.jp/articles/-/304345 世界規模 2022-06-09 02:45:00
ビジネス ダイヤモンド・オンライン - 新着記事 「競合が多い」「後発組」のスタートアップでも圧倒的な力があるかどうか見極めるための2つのポイント - スタートアップ投資のセオリー https://diamond.jp/articles/-/304496 2022-06-09 02:40:00
ビジネス ダイヤモンド・オンライン - 新着記事 自分の人生を大切にする、好循環な生き方を目指す - 勉強が面白くなる瞬間 https://diamond.jp/articles/-/304307 韓国で社会現象を巻き起こした『勉強が面白くなる瞬間』。 2022-06-09 02:35:00
ビジネス ダイヤモンド・オンライン - 新着記事 【全米で話題】ネコがマンションなどの高いところから落ちても助かる「驚きの理由」とは? - 「ネコひねり問題」を超一流の科学者たちが全力で考えてみた https://diamond.jp/articles/-/304370 【全米で話題】ネコがマンションなどの高いところから落ちても助かる「驚きの理由」とは「ネコひねり問題」を超一流の科学者たちが全力で考えてみた猫はなぜ高いところから落ちても足から着地できるのか科学者は何百年も昔から、猫の宙返りに心惹かれ、物理、光学、数学、神経科学、ロボティクスなどのアプローチからその驚くべき謎を探究してきた。 2022-06-09 02:30:00
ビジネス ダイヤモンド・オンライン - 新着記事 株で資産を増やせる人が熟知している「投資の正しいタイミング」 - 株トレ https://diamond.jp/articles/-/303971 運用 2022-06-09 02:25:00
ビジネス ダイヤモンド・オンライン - 新着記事 【新刊案内】ダイヤモンド社6月の新刊書籍 - 書籍オンライン編集部から https://diamond.jp/articles/-/304044 新刊書籍 2022-06-09 02:20:00

コメント

このブログの人気の投稿

投稿時間:2021-06-17 22:08:45 RSSフィード2021-06-17 22:00 分まとめ(2089件)

投稿時間:2021-06-20 02:06:12 RSSフィード2021-06-20 02:00 分まとめ(3871件)

投稿時間:2021-06-17 05:05:34 RSSフィード2021-06-17 05:00 分まとめ(1274件)