IT |
ITmedia 総合記事一覧 |
[ITmedia ビジネスオンライン] 東池袋に新たなランドマーク 地上33階建ビル、27年竣工へ |
https://www.itmedia.co.jp/business/articles/2207/27/news098.html
|
itmedia |
2022-07-27 11:41:00 |
IT |
ITmedia 総合記事一覧 |
[ITmedia PC USER] VR HMD「Meta Quest 2」が2万円超の大幅値上げ 8月1日から |
https://www.itmedia.co.jp/pcuser/articles/2207/27/news105.html
|
itmediapcuservrhmd |
2022-07-27 11:35:00 |
IT |
ITmedia 総合記事一覧 |
[ITmedia News] メルカリ、SIMカードの出品禁止に 「トラブル防止などの観点で判断」 |
https://www.itmedia.co.jp/news/articles/2207/27/news102.html
|
itmedia |
2022-07-27 11:19:00 |
IT |
ITmedia 総合記事一覧 |
[ITmedia News] Apple、8月にデベロッパー向けオンラインセッションを開催 日本での質疑応答も |
https://www.itmedia.co.jp/news/articles/2207/27/news099.html
|
itmedianewsapple |
2022-07-27 11:03:00 |
TECH |
Techable(テッカブル) |
駐車場の路面に太陽光パネルを敷設。発電しながら自家消費する駐車場実現へ |
https://techable.jp/archives/182851
|
mirailabo |
2022-07-27 02:00:42 |
python |
Pythonタグが付けられた新着投稿 - Qiita |
自分用メモ openpyxl基本 |
https://qiita.com/baubautaro/items/3e244cbab9d72529fbbc
|
insertcols |
2022-07-27 11:23:48 |
js |
JavaScriptタグが付けられた新着投稿 - Qiita |
自作ライブラリでReact有利ベンチマークに挑んでみた |
https://qiita.com/iMasanari/items/64c578664ae8596e6ede
|
imasanari |
2022-07-27 11:57:13 |
Ruby |
Rubyタグが付けられた新着投稿 - Qiita |
【RSpec】createアクションに関するテスト(リクエストスペックでUserモデルとリレーションのあるデータが追加されるかをテストする) |
https://qiita.com/Myuuki/items/c4d59854092696e81bb0
|
create |
2022-07-27 11:36:48 |
Ruby |
Railsタグが付けられた新着投稿 - Qiita |
【RSpec】createアクションに関するテスト(リクエストスペックでUserモデルとリレーションのあるデータが追加されるかをテストする) |
https://qiita.com/Myuuki/items/c4d59854092696e81bb0
|
create |
2022-07-27 11:36:48 |
技術ブログ |
Developers.IO |
[動画公開してます] dbtとLookerの境界線を定めます #devio2022 |
https://dev.classmethod.jp/articles/dbbit-to-lokkaeru/
|
deviodevelopersio |
2022-07-27 02:30:48 |
技術ブログ |
Developers.IO |
[AWS IoT Core] Route53のプライベートホストゾーンを使用して IoT CoreのVPCエンドポイントの名前解決ができるVPCをCDKで作ってみました |
https://dev.classmethod.jp/articles/iot-core-endpoint-resolve/
|
awsiotcoreroute |
2022-07-27 02:30:14 |
技術ブログ |
Developers.IO |
AWS CDK(L2)で作成したサブネットのCIDRを指定する方法 |
https://dev.classmethod.jp/articles/specify-subnet-cidr-on-aws-cdk-l2/
|
awscdkl |
2022-07-27 02:17:54 |
技術ブログ |
Developers.IO |
การเชื่อมต่อ CloudFront กับ Elastic Beanstalk และทำให้เป็น HTTPS |
https://dev.classmethod.jp/articles/use-cloudfront-to-elastic-beanstalk-and-ssl/
|
การเชื่อมต่อCloudFront กับElastic Beanstalk และทำให้เป็นHTTPSครั้งนี้ผมจะมาแนะนำการเชื่อมต่อCloudFront กับElastic Beanstalk และทำให้เป็นHTTPS ครับสิ่งที่ต้องมีให้ทำก |
2022-07-27 02:14:26 |
海外TECH |
DEV Community |
ActiveRecord Methods to keep Your Databases Clean |
https://dev.to/nickmendez/activerecord-methods-to-keep-your-databases-clean-14e4
|
ActiveRecord Methods to keep Your Databases Clean Contaminated databases are a drag on performance In machine learning datasets contaminated with duplicates cause models to learn artificial patterns that do not exist In the real life context of emergency dispatch call centers multiple calls about the same complaint cause multiple officers to respond to the same incident Consequently misallocated resources resulting from poor dataset structure create larger problems than originally encountered The solution is naïvely simple Don t enter conflicting records in our dataset While the constraints and parameters of every dataset will vary the general process and application of said solution is the same Identify which parameters will be used to find existing records in your model s dataset Uniquely identify each entry when submitting an entry record Handle all responses from querying the dataset Simple enough right Fortunately ActiveRecord offers a few finder methods These methods allow us to determine whether or not a conflicting record exists prior to entering a new record into our database Let s explore how to maintain a stable and clean database through practical examples Queue Wag n Walk a schedule planner tailored to dog walking There are a few different headaches that will come from contaminating the database let s identify the different entries that may compromise our table of appointments This example requires a basic understanding of ActiveRecord gem table associations and SQL tables Identify Useful ParametersEach scheduled appointment has different user inputs a date time a dog a walker employee and the walk duration A few potential scheduling conflicts should stand out Scheduling a walker for a time slot that conflicts with their current appointmentsScheduling a dog for a time slot that conflicts with their current appointmentsScheduling the same appointment twiceThe first method to consider is the find or create by method This method either finds the first record with the provided attributes or creates a new record if one is not found This method used on its own is useful when we re searching for an exact record or when our dataset is simple Appointment find or create by employee id params employee id start params start If no record with the provided employee id and starting appointment date time is found in our Appointments Table then a new record is entered If we attempt schedule an appointment while an existing appointment is in progress our find or create by method will not notice and will enter a conflicting appointment for our walker into our schedule Method ChainingThe second method to consider is actually a combination of multiple methods known as method chaining By method chaining we are able to apply multiple conditions to vet and find records in our database where Methodexist Appointment where start params start dog id params dog id where selects all records that match the attributes passed to the method In this case exist will equal all appointments with the start time matching the provided start time and the dog id matching the dog id or Method exist Appointment where start params start dog id params dog id or Appointment where start params start employee id params employee id Chain the or method to add a second condition to your query In this case we are looking for any appointment matching the provided start time and dog id or any appointment matching the provided start time and employee id find all Methodappt in progress dogs Appointment all find all a a dog id params dog id The find all method returns an array containing the records selected for which the given block returns a true value In this case we are finding all records from the Appointments table whose dog id matches the provided dog id between Methodappt in progress dogs Appointment all find all a a dog id params dog id find all a params start between a start a end The between method returns a true or false value It determines whether or not a value is between a provided minimum or maximum In this case we want to find all records with a dog id matching the provided dog id Then out of those records we want to find all cases where the new appointment starts while an existing appointment for the provided dog is in progress In other words we do not want to schedule a walk for a dog if the dog is in the middle of a walk The same case applies for any walker employee find in batches MethodAppointment find in batches batch size do a a find by start params start endThe find in batches method is useful when working with large datasets Provided the size of a batch this method will only query the provided batch size at a time This method will cut some of the performance issues that occur from working with larger datasets We are able to be more intentional and specific about the types of records we want to find through method chaining Uniquely Identify RecordsThis answer is fairly simple with Active Record By using Active Record Migrations a primary key column is automatically generated and each record entered to our table is assigned a unique id Handling Query ResponsesNow that we ve queried the appointments table we will conditionally respond to the user s new appointment request IF Statementif exist exists amp amp appt in progress dogs appt in progress walkers length lt The IF statement in our POST method makes use of the queries we executed If the new appointment request does not match any existing record exactly then it passes the first condition in the IF statement The exists method returns true or false In this case if no record exists then we proceed to test the second condition The second condition of the IF statement utilizes the splat operator which functions similarly to Javascript ES spread operator If no appointments in progress are found for the provided dog or walker then the length of our array will be zero If both conditions are met then a new Appointment will be created with the provided attributes sent by our front end and our response will be sent as a JSON object Else StatementIf either of the conditions return false then our backend will send an error message response as a JSON object Some errors may be more complex than others and therefore you may setup multiple conditions for multiple errors fetch http localhost appointments method POST headers Content Type application json body JSON stringify newAppointment then r gt r json then appointment gt if Object keys appointment length alert appointment error else setAppointments appointments appointment alert Appointment for newDate at time has been scheduled Given the response received from our initial POST request we alert the user of either a successfully scheduled appointment or with an error we sent from out backend The same queries and conditions may also be applied to PATCH request We also need to validate whether updating an existing appointment will cause the same contamination as our POST request In ConclusionActiveRecord provides many useful methods for querying our databases Chaining methods allow us to be more intentional and specific with our queries Determine whether or not a conflicting record exists in our database and conditionally respond to the possible outcomes ResourcesHow to Deal With Duplicate EntriesCS Duplicate RecordsWhat is Data CleaningRuby on Rails DocsActive Record Migrations Docs |
2022-07-27 02:46:00 |
海外TECH |
DEV Community |
DistSQL Applications: Building a Dynamic Distributed Database |
https://dev.to/apache_shardingsphere/distsql-applications-building-a-dynamic-distributed-database-lbk
|
DistSQL Applications Building a Dynamic Distributed Database BackgroundEver since the release of ShardingSphere DistSQL has been providing strong dynamic management capabilities to the ShardingSphere ecosystem Thanks to DistSQL users have been empowered to do the following Create logical databases online Dynamically configure rules i e sharding data encryption read write splitting database discovery shadow DB and global rules Adjust storage resources in real time Switch transaction types instantly Turn SQL logs on and off at any time Preview the SQL routing results At the same time in the context of increasingly diversified scenarios more and more DistSQL features are being created and a variety of valuable syntaxes have been gaining popularity among users OverviewThis post takes data sharding as an example to illustrate DistSQL s application scenarios and related sharding methods A series of DistSQL statements are concatenated through practical cases to give you a complete set of practical DistSQL sharding management schemes which create and maintain distributed databases through dynamic management The following DistSQL will be used in this example Practical CaseRequired scenariosCreate two sharding tables t order and t order item For both tables database shards are carried out with the user id field and table shards with the order id field The number of shards is databases tables As shown in the figure below Setting up the environment Prepare a MySQL database instance for access Create two new databases demo ds and demo ds Here we take MySQL as an example but you can also use PostgreSQL or openGauss databases Deploy Apache ShardingSphere Proxy and Apache ZooKeeper ZooKeeper acts as a governance center and stores ShardingSphere metadata information Configure server yaml in the Proxy conf directory as follows mode type Cluster repository type ZooKeeper props namespace governance ds server lists localhost ZooKeeper address retryIntervalMilliseconds timeToLiveSeconds maxRetries operationTimeoutMilliseconds overwrite falserules AUTHORITY users root root Start ShardingSphere Proxy and connect it to Proxy using a client for example mysql h P u root pCreating a distributed databaseCREATE DATABASE sharding db USE sharding db Adding storage resources Add storage resources corresponding to the prepared MySQL database ADD RESOURCE ds HOST PORT DB demo ds USER root PASSWORD ds HOST PORT DB demo ds USER root PASSWORD View storage resourcesmysql gt SHOW DATABASE RESOURCES G row name ds type MySQL host port db demo ds Omit partial attributes row name ds type MySQL host port db demo ds Omit partial attributesAdding G to the query statement aims to make the output format more readable and it is not a must Creating sharding rulesShardingSphere s sharding rules support regular sharding and automatic sharding Both sharding methods have the same effect The difference is that the configuration of automatic sharding is more concise while regular sharding is more flexible and independent Please refer to the following links for more details on automatic sharding Intro to DistSQL An Open Source and More Powerful SQLAutoTable Your Butler Like Sharding Configuration ToolNext we ll adopt regular sharding and use the INLINE expression algorithm to implement the sharding scenarios described in the requirements Primary key generatorThe primary key generator can generate a secure and unique primary key for a data table in a distributed scenario For details refer to the document Distributed Primary Key Create the primary key generator CREATE SHARDING KEY GENERATOR snowflake key generator TYPE NAME SNOWFLAKE Query primary key generatormysql gt SHOW SHARDING KEY GENERATORS name type props snowflake key generator snowflake row in set sec Sharding algorithm Create a database sharding algorithm used by t order and t order item in common Modulo based on user id in database shardingCREATE SHARDING ALGORITHM database inline TYPE NAME INLINE PROPERTIES algorithm expression ds user id Create different table shards algorithms for t order and t order item Modulo based on order id in table shardingCREATE SHARDING ALGORITHM t order inline TYPE NAME INLINE PROPERTIES algorithm expression t order order id CREATE SHARDING ALGORITHM t order item inline TYPE NAME INLINE PROPERTIES algorithm expression t order item order id Query sharding algorithmmysql gt SHOW SHARDING ALGORITHMS name type props database inline inline algorithm expression ds user id t order inline inline algorithm expression t order order id t order item inline inline algorithm expression t order item order id rows in set sec Default sharding strategySharding strategy consists of sharding key and sharding algorithm Please refer to Sharding Strategy for its concept Sharding strategy consists of databaseStrategy and tableStrategy Since t order and t order item have the same database sharding field and sharding algorithm we create a default strategy that will be used by all shard tables with no sharding strategy configured Create a default database sharding strategyCREATE DEFAULT SHARDING DATABASE STRATEGY TYPE STANDARD SHARDING COLUMN user id SHARDING ALGORITHM database inline Query default strategymysql gt SHOW DEFAULT SHARDING STRATEGY G row name TABLE type NONE sharding column sharding algorithm name sharding algorithm type sharding algorithm props row name DATABASE type STANDARD sharding column user id sharding algorithm name database inline sharding algorithm type inlinesharding algorithm props algorithm expression ds user id rows in set sec The default table sharding strategy is not configured so the default strategy of TABLE is NONE Sharding rulesThe primary key generator and sharding algorithm are both ready Now create sharding rules t orderCREATE SHARDING TABLE RULE t order DATANODES ds t order TABLE STRATEGY TYPE STANDARD SHARDING COLUMN order id SHARDING ALGORITHM t order inline KEY GENERATE STRATEGY COLUMN order id KEY GENERATOR snowflake key generator DATANODES specifies the data nodes of shard tables TABLE STRATEGY specifies the table strategy among which SHARDING ALGORITHM uses created sharding algorithm t order inline KEY GENERATE STRATEGY specifies the primary key generation strategy of the table Skip this configuration if primary key generation is not required t order itemCREATE SHARDING TABLE RULE t order item DATANODES ds t order item TABLE STRATEGY TYPE STANDARD SHARDING COLUMN order id SHARDING ALGORITHM t order item inline KEY GENERATE STRATEGY COLUMN order item id KEY GENERATOR snowflake key generator Query sharding rulesmysql gt SHOW SHARDING TABLE RULES G row table t order actual data nodes ds t order actual data sources database strategy type STANDARD database sharding column user id database sharding algorithm type inlinedatabase sharding algorithm props algorithm expression ds user id table strategy type STANDARD table sharding column order id table sharding algorithm type inline table sharding algorithm props algorithm expression t order order id key generate column order id key generator type snowflake key generator props row table t order item actual data nodes ds t order item actual data sources database strategy type STANDARD database sharding column user id database sharding algorithm type inlinedatabase sharding algorithm props algorithm expression ds user id table strategy type STANDARD table sharding column order id table sharding algorithm type inline table sharding algorithm props algorithm expression t order item order id key generate column order item id key generator type snowflake key generator props rows in set sec So far the sharding rules for t order and t order item have been configured A bit complicated Well you can also skip the steps of creating the primary key generator sharding algorithm and default strategy and complete the sharding rules in one step Let s see how to make it easier SyntaxNow if we have to add a shard table t order detail we can create sharding rules as follows CREATE SHARDING TABLE RULE t order detail DATANODES ds t order detail DATABASE STRATEGY TYPE STANDARD SHARDING COLUMN user id SHARDING ALGORITHM TYPE NAME INLINE PROPERTIES algorithm expression ds user id TABLE STRATEGY TYPE STANDARD SHARDING COLUMN order id SHARDING ALGORITHM TYPE NAME INLINE PROPERTIES algorithm expression t order detail order id KEY GENERATE STRATEGY COLUMN detail id TYPE NAME snowflake Note The above statement specified database sharding strategy table strategy and primary key generation strategy but it didn t use existing algorithms Therefore the DistSQL engine automatically uses the input expression to create an algorithm for the sharding rules of t order detail Now the primary key generator sharding algorithm and sharding rules are as follows Primary key generatormysql gt SHOW SHARDING KEY GENERATORS name type props snowflake key generator snowflake t order detail snowflake snowflake rows in set sec Sharding algorithmmysql gt SHOW SHARDING ALGORITHMS name type props database inline inline algorithm expression ds user id t order inline inline algorithm expression t order order id t order item inline inline algorithm expression t order item order id t order detail database inline inline algorithm expression ds user id t order detail table inline inline algorithm expression t order detail order id rows in set sec Sharding rulesmysql gt SHOW SHARDING TABLE RULES G row table t order actual data nodes ds t order actual data sources database strategy type STANDARD database sharding column user id database sharding algorithm type inlinedatabase sharding algorithm props algorithm expression ds user id table strategy type STANDARD table sharding column order id table sharding algorithm type inline table sharding algorithm props algorithm expression t order order id key generate column order id key generator type snowflake key generator props row table t order item actual data nodes ds t order item actual data sources database strategy type STANDARD database sharding column user id database sharding algorithm type inlinedatabase sharding algorithm props algorithm expression ds user id table strategy type STANDARD table sharding column order id table sharding algorithm type inline table sharding algorithm props algorithm expression t order item order id key generate column order item id key generator type snowflake key generator props row table t order detail actual data nodes ds t order detail actual data sources database strategy type STANDARD database sharding column user id database sharding algorithm type inlinedatabase sharding algorithm props algorithm expression ds user id table strategy type STANDARD table sharding column order id table sharding algorithm type inline table sharding algorithm props algorithm expression t order detail order id key generate column detail id key generator type snowflake key generator props rows in set sec Note In the CREATE SHARDING TABLE RULE statement DATABASE STRATEGY TABLE STRATEGY and KEY GENERATE STRATEGY can all reuse existing algorithms Alternatively they can be defined quickly through syntax The difference is that additional algorithm objects are created Users can use it flexibly based on scenarios After the configuration verification rules are created you can verify them in the following ways Checking node distributionDistSQL provides SHOW SHARDING TABLE NODES for checking node distribution and users can quickly learn the distribution of shard tables We can see the node distribution of the shard table is consistent with what is described in the requirement SQL PreviewPreviewing SQL is also an easy way to verify configurations Its syntax is PREVIEW SQL Query with no shard key with all routes Specify user id to query with a single database route Specify user id and order id with a single table routeSingle table routes scan the least shard tables and offer the highest efficiency DistSQL auxiliary queryDuring the system maintenance algorithms or storage resources that are no longer in use may need to be released or resources that need to be released may have been referenced and cannot be deleted The following DistSQL can solve these problems Query unused resources Syntax SHOW UNUSED RESOURCES Sample Query unused primary key generator Syntax SHOW UNUSED SHARDING KEY GENERATORS Sample Query unused sharding algorithm Syntax SHOW UNUSED SHARDING ALGORITHMS Sample Query rules that use the target storage resources Syntax SHOW RULES USED RESOURCE Sample All rules that use the resource can be queried not limited to the Sharding Rule Query sharding rules that use the target primary key generator Syntax SHOW SHARDING TABLE RULES USED KEY GENERATOR Sample Query sharding rules that use the target algorithm Syntax SHOW SHARDING TABLE RULES USED ALGORITHM Sample ConclusionThis post takes the data sharding scenario as an example to introduce DistSQL s applications and methods DistSQL provides flexible syntax to help simplify operations In addition to the INLINE algorithm DistSQL supports standard sharding compound sharding Hint sharding and custom sharding algorithms More examples will be covered in the coming future If you have any questions or suggestions about Apache ShardingSphere please feel free to post them on the GitHub Issue list Project Links ShardingSphere GithubShardingSphere TwitterShardingSphere SlackContributor GuideGitHub IssuesContributor Guide ReferencesConcept DistSQLConcept Distributed Primary KeyConcept Sharding StrategyConcept INLINE ExpressionBuilt in Sharding AlgorithmUser Manual DistSQL AuthorJiang LongtaoSphereEx Middleware R amp D Engineer amp Apache ShardingSphere Committer Longtao focuses on the R amp D of DistSQL and related features |
2022-07-27 02:40:27 |
海外TECH |
DEV Community |
How we can use data science to make our nations better |
https://dev.to/johnsheehan8/how-we-can-use-data-science-to-make-our-nations-better-3mld
|
How we can use data science to make our nations better OverviewAs i am heading towards the end of my time in my computer science boot camp i have realized i needed to see some real life examples of things i could potentially do in the future the easiest way to do that was look at real life examples of big projects that have been taken in the past i wanted to find a research paper withing the last few years as computer science is ever evolving so taking things from the recent past will hold more weight for me now the paper i chose was from december nd so its been less than a year since this came out and it was called How We Determined Crime Prediction Software Disproportionately Targeted Low Income Black and Latino Neighborhoods the title instantly hooked me because these are things i have always believed happened but would have trouble finding defined evidence to present other people Now as someone who has a decent amount of knowledge in this field i was able to fully understand all of the code and techniques but how would i be able to explain this to someone who is not as tech savvy Summaryto begin what exactly are the writers of this paper looking at to make their claims and how do we know its correct well according to the author they obtained PredPol crime prediction data that has never before been released by PredPol One of their associates Gizmodo found it exposed on the open web the portal is now secured and downloaded more than seven million PredPol crime predictions for between and After securing the data and categorizing it they were able to find a number of factors that happen during most police interactions such as number of times arrested how many uses of force amount of patrols by police and many more then compared those metrics between different ethnicities and income ranges this is one of their final models and clearly shows that the low end of the spectrum in terms of blocks targeted by PredPol was vast majority white people while blocks with the highest amount of targets from PredPol are considerably disproportionate towards black and latino groups this clearly shows in real data what a lot of people in America have known for a long time but their data not only showed statistics unfairly targeting those not of white ethnicity but also how income ranges come into affect Once again you can see the very drastic difference between the most targeted blocks and least target blocks of households households that have high diversity of both ethnicity and wealth numbers often see similar amounts of patrols regarless of any circumstance but blocks with disproportionately large amount of poor residence see such a jump up in targeting from the PredPol Final thoughtsobviously a lot of the stuff talked about in this paper is seen as common sense to certain groups but that only is because those groups might have had first hand experience with these troubles with police being able to take data from PredPol which is a data collection agency themselves just shows how much data reveals truths they tried to hide this data but it was eventually leaked and now we can point to real life companies that work with cops to try and target marginalized groups this paper was really informative to me because Ive always been interested in figuring out very broad problems in our country today and learning how to take data and present them plainly to others will be a huge boost in what i want to do in the future for government work if i were to try and better explain this paper in plain words to either a business stakeholder who has interests in human resources or even a politician who wants to see change in our country like i do this paper would be extraordinary in pointing to facts when deciding policies to help others in conclusion i would recommend people read the whole paper as it is too much to explain in a short blog but i hope i was able to represent at least a little of their points well The paper i referenced predpol methodology race percentile |
2022-07-27 02:34:10 |
海外TECH |
Engadget |
TikTok owner ByteDance reportedly pushed pro-China messages in defunct news app |
https://www.engadget.com/tiktok-owner-bytedance-reportedly-pushed-pro-china-messages-topbuzz-024207681.html?src=rss
|
TikTok owner ByteDance reportedly pushed pro China messages in defunct news appByteDance TikTok s parent company based in China used its now defunct news app called TopBuzz to spread pro China messages according to BuzzFeed News Former employees who worked at the English language news aggregator told the publication that ByteDance ordered staff members to quot pin quot content that showed China in a positive light or content that promoted the country to the top of the app They were even reportedly required to provide proof such as screenshots of the live content to show that they had complied with the company s orders TopBuzz managed to reach million monthly active users by The content the former employees helped promote included panda videos along with videos endorsing travel to China At least one staff member also remember pinning a video featuring a white man talking about the benefits of moving his startup to the country As one of the former employees put it the content ByteDance wanted them to promote wasn t anything overtly political and took more of a soft sell approach However they added quot Let s be real this was not something you could say no to quot nbsp In addition to promoting pro China content former staff members claimed that TopBuzz had a review system that would flag reports on the Chinese government for removal They said the flagged content included coverage of Hong Kong protests pieces that mention President Xi Jinping and even those that reference Winnie the Pooh Some employees also said that content depicting openly LGBTQ people were removed at times A ByteDance spokesperson denied the former employees claims and called them quot false and ridiculous quot In a statement sent to BuzzFeed they said quot The claim that TopBuzz ーwhich was discontinued years ago ーpinned pro Chinese government content to the top of the app or worked to promote it is false and ridiculous TopBuzz had over two dozen top tier US and UK media publishing partners including BuzzFeed which clearly did not find anything of concern when performing due diligence quot While TopBuzz was shut down back in June TikTok is very much alive and well Authorities and critics have long been worried that ByteDance would use TikTok to spread pro China propaganda in the US and we re guessing that these new claims won t be assuaging anybody s fears Another BuzzFeed News report published in June shed light on how ByteDance employees in China had repeatedly accessed private information on TikTok users in the US The company quickly migrated US user traffic to a new Oracle Cloud Infrastructure but FCC commissioner Brendan Carr called on Apple and Google to ban the app quot for its pattern of surreptitious data practices quot anyway CNN s Brian Stelter previously asked TikTok s head of public policy for the Americas Michael Beckerman on whether the app could be used to influence politics and culture in the US Beckerman replied that TikTok is quot not the go to place for politics quot and that quot the primary thing that people are coming and using TikTok for is entertainment and joyful and fun content quot As BuzzFeed News notes though a lot of young people now use TikTok as their primary source of information including politics and breaking news |
2022-07-27 02:42:07 |
医療系 |
内科開業医のお勉強日記 |
amph-vaccineによる経鼻ワクチンの可能性 |
https://kaigyoi.blogspot.com/2022/07/amph-vaccine.html
|
さらに、この方法では、両親媒性免疫原を膜に繋ぎ止めて、NALTや鼻の部位での抗原の利用可能性を高め、その後、局所的な免疫プライミングを可能にすることができる可能性がある。 |
2022-07-27 02:48:00 |
ニュース |
@日本経済新聞 電子版 |
「ゾンビ企業」16.5万社か、利払い猶予で延命 民間試算
https://t.co/esuEUpI7Fo |
https://twitter.com/nikkei/statuses/1552121784526598145
|
猶予 |
2022-07-27 02:40:45 |
ニュース |
@日本経済新聞 電子版 |
パナソニック系など40社、ドラレコのデータの形式共通化
https://t.co/P2xLaA5XLl |
https://twitter.com/nikkei/statuses/1552118225399578624
|
形式 |
2022-07-27 02:26:36 |
ニュース |
@日本経済新聞 電子版 |
ロシア、宇宙ステーション離脱へ プーチン氏承認
https://t.co/x7vpWDfZ2r |
https://twitter.com/nikkei/statuses/1552118004431077376
|
宇宙ステーション |
2022-07-27 02:25:43 |
ニュース |
@日本経済新聞 電子版 |
大豆から創るほぼウニ 進化する代替食品、大阪の最前線
https://t.co/4wnD70BRzl |
https://twitter.com/nikkei/statuses/1552114207755489280
|
食品 |
2022-07-27 02:10:38 |
ニュース |
@日本経済新聞 電子版 |
大阪・ミナミ再生幕開け ブロードウエー化への筋書きは
https://t.co/xiPM1zdrmR |
https://twitter.com/nikkei/statuses/1552113982991122432
|
幕開け |
2022-07-27 02:09:45 |
ニュース |
@日本経済新聞 電子版 |
国防の意識欠く公共事業 空港や港湾は有事の要
https://t.co/VseMgRq3xU |
https://twitter.com/nikkei/statuses/1552113722055081984
|
公共事業 |
2022-07-27 02:08:42 |
ニュース |
@日本経済新聞 電子版 |
韓国、出生率0.81の袋小路 若者縛る「育児は女性」
https://t.co/GuKgplyvMV |
https://twitter.com/nikkei/statuses/1552113720893263872
|
韓国 |
2022-07-27 02:08:42 |
ニュース |
BBC News - Home |
Gaming time has no link with levels of well-being, study finds |
https://www.bbc.co.uk/news/technology-62293235?at_medium=RSS&at_campaign=KARANGA
|
animal |
2022-07-27 02:26:37 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
グーグルの検索事業、力強さ健在 - WSJ発 |
https://diamond.jp/articles/-/307116
|
検索 |
2022-07-27 11:19:00 |
北海道 |
北海道新聞 |
札幌五輪招致プロモ委、大倉山ジャンプ競技場視察 |
https://www.hokkaido-np.co.jp/article/710612/
|
五輪招致 |
2022-07-27 11:32:31 |
北海道 |
北海道新聞 |
アポロ11船内服、3億8千万円 競売、オルドリンさん着用 |
https://www.hokkaido-np.co.jp/article/710619/
|
月面着陸 |
2022-07-27 11:31:00 |
北海道 |
北海道新聞 |
北海道の新規感染、最多5500人前後の見通し 札幌市は2330人前後 |
https://www.hokkaido-np.co.jp/article/710611/
|
新型コロナウイルス |
2022-07-27 11:10:15 |
北海道 |
北海道新聞 |
青森ねぶたを「台上げ」 3年ぶり開催、準備万全 |
https://www.hokkaido-np.co.jp/article/710613/
|
青森ねぶた祭 |
2022-07-27 11:15:00 |
北海道 |
北海道新聞 |
<デジタル発>硫黄島学徒兵 最期の証言(上)地上戦“前夜”、絶望の島で待っていたのは |
https://www.hokkaido-np.co.jp/article/710335/
|
先の大戦 |
2022-07-27 11:04:33 |
北海道 |
北海道新聞 |
日本ハム・谷川ら4人がコロナ陽性 |
https://www.hokkaido-np.co.jp/article/710606/
|
日本ハム |
2022-07-27 11:02:33 |
ビジネス |
東洋経済オンライン |
バチェロレッテ2主役が恋愛下手だった「意外」 美容コスメで「年商15億円」の20代経営者女性 | 今見るべきネット配信番組 | 東洋経済オンライン |
https://toyokeizai.net/articles/-/605437?utm_source=rss&utm_medium=http&utm_campaign=link_back
|
netflix |
2022-07-27 12:00:00 |
ビジネス |
東洋経済オンライン |
夫婦げんかで「子はかすがい」というけれど…… こうの史代『さんさん録』:春雷 | さんさん録 | 東洋経済オンライン |
https://toyokeizai.net/articles/-/603366?utm_source=rss&utm_medium=http&utm_campaign=link_back
|
子はかすがい |
2022-07-27 11:30:00 |
ニュース |
Newsweek |
水害対策だけじゃない? 調節池は平常時にどう活用されているのか |
https://www.newsweekjapan.jp/stories/technology/2022/07/post-99185.php
|
|
2022-07-27 11:30:00 |
ニュース |
Newsweek |
性格が暗くても大丈夫 「明るい気持ち」になれる科学的な方法...ほか、いまイチオシの本 |
https://www.newsweekjapan.jp/stories/business/2022/07/post-99202.php
|
不自由な毎日が長く続いていますから、自分のことを「明るい」と考えている人でも、「最近、ちょっと暗くなっているかも」と感じているのではないでしょうか。 |
2022-07-27 11:20:00 |
ビジネス |
プレジデントオンライン |
「チビ・デブ・ハゲ」は問題ないが…オタク専門の婚活コンサルが「こういう人はムリ」と白旗をあげる"あるタイプ" - 「一人での食事に慣れてしまっている人」は要注意 |
https://president.jp/articles/-/59729
|
食事 |
2022-07-27 12:00:00 |
マーケティング |
MarkeZine |
1年間でフォロワー20万人増、リツイート数は約7倍!NTTドコモの公式Twitter急成長の秘訣 |
http://markezine.jp/article/detail/39356
|
年間でフォロワー万人増、リツイート数は約倍NTTドコモの公式Twitter急成長の秘訣TwitterのNTTドコモ公式アカウントが躍進している。 |
2022-07-27 11:30:00 |
マーケティング |
MarkeZine |
PARCOが語る、商業施設の最新CX戦略/アプリにとどまらないCRMとは?【参加無料】 |
http://markezine.jp/article/detail/39549
|
参加無料 |
2022-07-27 11:30:00 |
マーケティング |
AdverTimes |
香川照之がプロデュースする自然教育アニメが、屋内プレイグラウンドになって登場 |
https://www.advertimes.com/20220727/article391248/
|
insectpark |
2022-07-27 02:03:18 |
コメント
コメントを投稿