IT |
気になる、記になる… |
「iOS 16」に偽物の「AirPods」を接続するとどうなる?! − 警告文の常時表示やアイコン変更など |
https://taisy0.com/2022/09/14/161999.html
|
airpods |
2022-09-13 16:09:41 |
AWS |
AWS Partner Network (APN) Blog |
AdaptX Uses AWS Serverless to Modernize Clinical Data Ingestion |
https://aws.amazon.com/blogs/apn/adaptx-uses-aws-serverless-to-modernize-clinical-data-ingestion/
|
AdaptX Uses AWS Serverless to Modernize Clinical Data IngestionAdaptX clinical management software uses electronic medical records EMRs to derive insights and enable providers and clinical leaders to efficiently leverage real world data and transform patient care This post explores how AdaptX built a modern data architecture leveraging Amazon Athena AWS Lambda and AWS Step Functions to automate the extraction transformation and loading ETL of clinical data from provider EMR systems Results included improved accuracy scalability and a better end customer experience |
2022-09-13 16:56:15 |
AWS |
AWS Big Data Blog |
Choose the k-NN algorithm for your billion-scale use case with OpenSearch |
https://aws.amazon.com/blogs/big-data/choose-the-k-nn-algorithm-for-your-billion-scale-use-case-with-opensearch/
|
Choose the k NN algorithm for your billion scale use case with OpenSearchWhen organizations set out to build machine learning ML applications such as natural language processing NLP systems recommendation engines or search based systems often times k Nearest Neighbor k NN search will be used at some point in the workflow As the number of data points reaches the hundreds of millions or even billions scaling a k NN search … |
2022-09-13 16:13:46 |
AWS |
AWS Machine Learning Blog |
Get better insight from reviews using Amazon Comprehend |
https://aws.amazon.com/blogs/machine-learning/get-better-insight-from-reviews-using-amazon-comprehend/
|
Get better insight from reviews using Amazon Comprehend“ of buyers trust online reviews as much as a personal recommendation Gartner Consumers are increasingly engaging with businesses through digital surfaces and multiple touchpoints Statistics show that the majority of shoppers use reviews to determine what products to buy and which services to use As per Spiegel Research Centre the purchase likelihood for … |
2022-09-13 16:19:18 |
AWS |
AWS Machine Learning Blog |
Prepare data at scale in Amazon SageMaker Studio using serverless AWS Glue interactive sessions |
https://aws.amazon.com/blogs/machine-learning/prepare-data-at-scale-in-amazon-sagemaker-studio-using-serverless-aws-glue-interactive-sessions/
|
Prepare data at scale in Amazon SageMaker Studio using serverless AWS Glue interactive sessionsAmazon SageMaker Studio is the first fully integrated development environment IDE for machine learning ML It provides a single web based visual interface where you can perform all ML development steps including preparing data and building training and deploying models AWS Glue is a serverless data integration service that makes it easy to discover prepare and … |
2022-09-13 16:01:15 |
海外TECH |
Ars Technica |
Senators blast Twitter’s alleged security failures as whistleblower testifies |
https://arstechnica.com/?p=1880866
|
twitter |
2022-09-13 16:25:27 |
海外TECH |
Ars Technica |
Amazon’s new Kindle offers twice the storage, a sharper screen, and USB-C for $100 |
https://arstechnica.com/?p=1880793
|
amazon |
2022-09-13 16:15:59 |
海外TECH |
Ars Technica |
GoldenEye 007 re-release finally confirmed—but it’s not the leaked remake |
https://arstechnica.com/?p=1880816
|
preservationists |
2022-09-13 16:07:26 |
海外TECH |
MakeUseOf |
How to Use Canva Whiteboard to Brainstorm Ideas |
https://www.makeuseof.com/use-canva-whiteboard-to-brainstorm/
|
right |
2022-09-13 16:31:13 |
海外TECH |
MakeUseOf |
How to Uninstall Microsoft Edge From Windows 11 |
https://www.makeuseof.com/windows-11-uninstall-microsoft-edge/
|
browser |
2022-09-13 16:15:13 |
海外TECH |
DEV Community |
Creating a NoSQL Database on AWS |
https://dev.to/securityminded/creating-a-nosql-database-on-aws-5247
|
Creating a NoSQL Database on AWSToday we will be using the DynamoDB service on AWS to create a NoSQL database on Amazon NoSQL databases also known as not only SQL are non tabular databases and store data differently than relational tables Depending on the data model there are many types of NoSQL databases Document key value wide column and graph are the primary types They offer flexible schemas and scale well under heavy user loads and data loads Scenario A streaming company wants to track customers movie streaming and so we will create a database to help track their customers behaviors from metadata such as movies watched and device types Solution This solution uses Amazon DynamoDB which has a flexible schema meaning each row can have any number of attributes at any point in time In this lab we will Create a NoSQL database as anAmazon DynamoDB table add records using dynamic schema toAmazon DynamoDB and query an Amazon DynamoDB table Amazon DynamoDB is serverless with no servers to provision patch or manage and no software to install maintain or operate AmazonDynamoDB automatically scales tables up and down to adjust for capacity and maintain performance Tasks to achieve our goalCreate an Amazon DynamoDB table Enter a new record and search for the record by partition ID Create a new user item with a unique id Add a new attribute named rating Number Step Log into your AWS console click services on the top left hand side of your management console navigate to database and select DynamoDB Step Click on Tables on the left then click on create table on the right Amazon DynamoDB supports both Key value and document data models This enables Amazon DynamoDB to have a flexible schema so each row can have any number of columns at any point in time This allows you to easily adapt the tables as your business requirements change without having to redefine the table schema as you would in relational databases Step Under Table name type UserVideoHistory Under Partition key type userIdNote You must type the partition key exactly as shown It is userId with an uppercase i Choose String data type from the dropdown list Under Sort key type lastDateWatched Choose Number data type from the dropdown list Scroll down to the end of the page Accept the default settings Click Create table When you create a table in addition to the table name you must specify the primary key of the table The primary key uniquely identifies each item in the table so that no two items can have the same key Review the Status of the table Once the status changes to Active click the table name Step Under Tables click the radio button to select the created table Click Actions to expand the dropdown list Choose Create item Under Attributes for the userId Attribute name type abcd For the lastDateWatched attribute type This is a UNIX timestamp Click Add new attribute to expand the dropdown list Choose String For the Attribute name type videoId For the value type djac To add another attribute click the Add new attribute dropdown list Choose String For the Attribute name type preferredLanguage For the value type English Click Add new attribute to expand the dropdown list again to add another attribute Choose List For the Attribute name type supportedDeviceTypes Click Insert a field to expand the dropdown list Choose String Click beside the supportDeviceTypes Attribute In the value field type Amazon Fire TV Click Insert a field to expand the dropdown list again to add another field to the list Choose String In the value field type Amazon Fire Tablet Click Create item After you ve created a record you can still edit it That includes the contents of the record and its attributes Step On the left menu under Tables click Explore items Click the userId abcd to edit the record again Click Add new attribute to expand the dropdown list to add another attribute Choose Number In the attribute name field type lastStopTime In the value field type Click Save changes QUERYINGThe Query operation in Amazon DynamoDB finds items based onprimary key values You must provide the name of the partition key attribute and a single value for that attribute The query returns all items with that partition key value Optionally you can provide a sort key attribute and use acomparison operator to refine the search results Click to expand Scan Query items Click the Query tab Under userId Partition key type abcd Under lastDateWatch Sort Key choose Greater than In the value field type Click Run Next stepWhen running a Query operation the table looks for an exact match for the partition key and uses the sort key if provided as way to further limit the results Under Items returned review the record returned To change the query criteria in the userId field type abd zxcg Click Run Review the results Nothing is returned since there is no record that matches the partition key and has a sort key greater than what has been entered SCANNINGThe Scan operation returns one or more items and item attributes by accessing every item in a table or a secondary index If the total number of scanned items exceeds the maximum datasetsize limit of MB the scan stops and results are returned to the user as a LastEvaluatedKey value to continue the scan in a subsequent operation The results also include the number of items exceeding the limit A scan can result in no table data meeting the filter criteria Click the Scan tab Click Run Review the results All items in your Amazon DynamoDB table should be displayed Congratulations you have successfully created queried and scanned your first NoSQL Database |
2022-09-13 16:53:48 |
海外TECH |
DEV Community |
CLI vs API: What's the Difference? |
https://dev.to/deanjones/cli-vs-api-whats-the-difference-39a
|
CLI vs API What x s the Difference In this article we will discuss why API and CLI automation tools are required as well as how to use them using Netooze as an example What is Command Line Interface CLI API Application Programming Interface is a method for one program to interact with another when elements from one application are used within another It s difficult to know what to do next with these tools based on their definitions so let s take a closer look at each one in a detail Command Lind InterfaceBefore graphical user interfaces we re created the only way to interact with a computer was via command language which was second nature to most people at that point How many of you remember using ms dos Does not seem that long ago at all but that was more than years ago and despite the advent of graphical interfaces over the last couple of decades the command line still remains an important tool today But why Well i believe it is because it provides quick and direct access to the necessary functions of a computer and or server over and above the new graphical interfaces How the Command Lind Interface CLI s OperatesA users first needs to enter text commands into the interface command line and then sit and wait for the computer to respond The tool then translates user requests into operating system friendly functions and responds to the user Proving you have entered something the the computer can understand You ll get back a positive response or command line error The Command Line displays errors for incorrect command syntax commands that are not valid for the active window or commands that are lacking required parameter or have incorrect parameters Commands in the CLI can be either one word or multiple lines known as scripts For example you can determine the volume of the created disk using the Netooze command line interface as follows gt sctl server get volume ls volume id Netooze tool sctl allows you to control your infrastructure from the terminal As a result you will receive detailed server information as foolows id name boot server id ls size mb created T Z The Command Line Inferface tool can be used to automate routine tasks You or your programming team can create a set of commands that the computer will execute at a specific time or when a specific situation occurs With quick commands and the input line you can do everything that is available in the Netooze control panel GUI What is API Well the wikipedia definition is a programming interface that allows two or more computer programs to communicate with one another It is a type of software interface that provides a service to other programs An API specification is a document or standard that describes how to build or use such a connection or interface The API essentially acts as a bridge between two programs allowing them to communicate with each another via a set of protocols Most developers do not need to understand how a third party API work but instead use the interface to communicate with other products and services An API can also be viewed as standing contract between two services that defines how the services interact with one another The contract is written documentation that describes how developers should structure requests and responses You can for example read the Netooze API documentation which includes a description of the API request and response structures error codes and operation examples To begin you must use authorization data to gain access to the API API key password Secret key To use the Netooze API for example the user must first generate an API key for the project which must then be passed with each request in the X API KEY header exmaple H X API KEY lmGwbvllpIqIrKROOCefefefeffKPEYf gfXUTpuYRefefefefShmmr The operating principleMulesoft experts provide a good example of how the API works by comparing this tool to a restaurant Consider sitting at a restaurant table and selecting a dish The restaurant kitchen is a component of the system that will prepare the dishes you requested However there is insufficient link to send your order to the kitchen and deliver the food to your table This is where the waiter in our case the API comes in taking your request or order and informing the kitchen i e the system of what to do Then he provides you with the answer in the form of delectable food example curl X GET server id H content type application json H x api key lmGwbvllpIqIrKROOCLgEZefefeefYf gfXUTpuYRpNQkCqShmmr The Netooze API accepts this request sends it to the kitchen the system and returns a response in the form of server information servers id ls location id am cpu ram mb volumes id name boot size mb created T id name additional size mb created T nics id network id ln mac ca ff ip address mask bandwidth mbps id network id ln mac ca a f ip address mask bandwidth mbps image id CentOS X is power on true name public api login root password EuvzlqKpv ssh key ids state Active created T Z tags production elastic id ls location id am cpu ram mb volumes id name boot size mb created T nics id network id ln mac ca e e d ip address mask bandwidth mbps image id CentOS X is power on false name example login root password TzJYPpAVP ssh key ids state Active created T Z tags production gitlab application ids nginx gitlab wordpress As a result the task ID is returned allowing you to track the process of changing the VPS settings as well as its ID You can automate application interaction by using the APIs of various services sending requests and parsing responses The use of APIs can be automated to make software development processes more flexible allowing programmers to concentrate on more important tasks Today mosts applications makes use of the API Web applications use APIs to connect user facing front ends with all important back end functionality and data Streaming services like Spotify and Netflix use APIs to distribute content Automotive companies like Tesla send software updates via APIs Others use APIs to unlock car data for third parties An interesting fact is that if all APIs in the world were to be removed one day almost all services and most applications would cease to function Both tools CLI and API enable you to automate the process of working with Netooze virtual machines and receive quick responses to requests without having to navigate to the control panel What you can do with these tools is as follows and more control virtual machinesscale virtual machine configurationdomain name creation and deletionconnect networksconfigure NAT and Firewall rules and create and delete border gatewaysview project details in the control panelview server information and control server powermanage SSH keyscontrol snapshots |
2022-09-13 16:49:05 |
海外TECH |
DEV Community |
Clean up your code with destructors and Array.includes |
https://dev.to/hi_iam_chris/clean-up-your-code-with-destructors-and-arrayincludes-i9k
|
Clean up your code with destructors and Array includes IntroductionThere are two things in JavaScript that I love using for cleaner code And if you read the title you can guess that those are destructors and includes function In this post I will give you a short overview of them and the use case where I use them DestructorsWhat is destructing Destructing is the assignment syntax where it is possible to unpack values of arrays and objects It is still not fully clear Maybe it will be better with an example Let s take an example of the following simple object containing two properties const person firstName John lastName Doe If we wanted to unpack properties in the old way we would use dot or square brackets const firstName person firstName const lastName person “lastName With the destructors there is no need for either We use curly brackets on the left side and names of the properties and the source object on right to unpack them const firstName lastName person You have to agree much cleaner than either option above Especially if you want to keep variable names the same as property names on the source object There is more to this way of assignment You can unpack them under an alias and use them on arrays But that is not something I will go into in this post You understand the idea Array includesThis is a simple built in function of arrays where you pass one argument the value you are looking for and if the array contains it returns true Otherwise returns false The functionality was already possible in different ways More complex one like looping array using for of forEach loops Or simpler ones like using the find method or the indexOf method where any returned value equal to or larger than zero means array containing element This way is just cleaner and more obvious const numbers numbers includes truenumbers includes false Use caseNow we come to the real life application of combining both the includes function and destructors Let us say you have a situation where you are checking if the value of your variable is equal to either of your constants And because you want to have cleaner code you added all your constants under the same map const NAMESPAC VALUE value VALUE value VALUE value VALUE value … VALUE N value N const myVariable value The first solution you could use for this is simple if statements if myVariable NAMESPACE VALUE myVariable NAMESPACE VALUE do something else if myVariable NAMESPACE VALUE myVariable NAMESPACE VALUE do something else else default action This can be ok but what if you have long variable names and more of them in the same case You end up with the if statement stretching over multiple lanes which are both difficult to read and easy to make a mistake And then we get to the next possible solution Did you notice how the first sentence of this paragraph contains a word case If you did you can guess it a possible improvement used by many is switch case Especially when many add linting restrictions on how many ifs are allowed to be in a function So let us look at this example switch myVariable case NAMESPACE VALUE case NAMESPACE VALUE do somethingbreak case NAMESPACE VALUE case NAMESPACE VALUE do something elsebreak default default action This is quite a good solution And hey any solution that solves a problem is a good solution But for me while used it a lot in the past I am not a big fan of it anymore Reason I just don t feel like it reads as naturally That is why we come to the includes function if NAMESPACE VALUE NAMESPACE VALUE includes myVariable do something else if NAMESPACE VALUE NAMESPACE VALUE includes myVariable do something else else default action Now this one is kind of like the first solution but shorter and easier to read Also it can grow and we can improve it even further That is why this post also included destructors const VALUE VALUE VALUE VALUE NAMESPACE if VALUE VALUE includes myVariable do something else if VALUE VALUE includes myVariable do something else else default action As you can see much less code and is easier to read Someone might argue that there is a reason why constants were under a namespace Conflicting names better organization and that is all true But none of that is removed in your code If you keep your functions clean meaning small and aiming at pure functions these unpacked values are visible in the small scope of your function and are only used so that you don t need to constantly type the full category name Wrap upIn this post I am demonstrating the way I find code to look cleaner and to be easier to read But that does not mean you should start writing this way This is something that works for me and if it works for you as well great But every problem has multiple solutions and it is up to you to choose the right one for your problem For more you can follow me on Twitter LinkedIn GitHub or Instagram |
2022-09-13 16:35:57 |
海外TECH |
DEV Community |
GitHub commit verification using SSH keys |
https://dev.to/pwd9000/github-commit-verification-using-ssh-2pim
|
GitHub commit verification using SSH keys OverviewToday we will discuss a very important security question that may not be as obvious at first glance We will take a look at verifying git commits by signing each commit with a SSH key and why it is important Implementing commit verification gives assurance about the authenticity of the author of commits made to your code GitHub now supports SSH commit verification so you can sign commits and tags locally using a self generated SSH public key which will give others confidence about the origin of a change you have made If a commit or tag has an SSH signature that is cryptographically verifiable GitHub makes the commit or tag Verified or Partially Verified Signing commits adds a layer of protection for your codebase We will also look at how we can actively enforce signature verification to prevent unsigned commits from being pushed to your repositories Example Security liabilityLet s take a quick look at an example first Recently a user called Pwd ML has made a code change on my repository and committed those changes to my projects codebase Have a look at the following git commit Doesn t look like anything out of the norm As you might have guessed my own user account is called Pwd ML this change didn t actually come from me In fact anyone can spoof a git commit author name with just a few terminal commands and pretend to be someone else for example git config user name Pwd ML git config user email fake email spoofed com git commit m Added awesome new feature This poses a big security question Hpw can you verify who is pushing code to your repository SolutionThankfully GitHub has made it so easy for us to secure our codebase even further by making the following easy to implement features available Enable vigilant modeFirst let s turn on something called vigilant mode where we enable displaying verification statuses for all git commits Notice that the spoofed commit now shows as Unverified To enable vigilant mode Navigate to your GitHub account Settings Navigate to SSH and GPG keys and tick Flag unsigned commits as unverified Create a SSH signing keyNext we will enable SSH commit verification so that any future commits will be signed and shown as Verified To enable SSH commit verification you can either use an existing SSH key or generate a new SSH key Open a command terminal and run ssh keygen t ed C your email example com If you use the defaults for the above command in Windows it will save your SSH key in the path c Users you ssh id algorithmWe are only interested in the pub file as that contains the Public Key Open the pub file and copy the entire contents of the file to your clipboard Next navigate to your GitHub account Settings Navigate to SSH and GPG keys and select New SSH key Give the SSH key a Title select the Key type as Signing Key and copy the entire contents of the pub file into the Key field Next we will run a few git commands so that will configure git to sign all commits using the SSH key Make sure that the minimum version of git is at least v or above To configure git commit signing on an individual repository open a command prompt and navigate to the path of your cloned GitHub repository and run the following commands Navigate to cloned repo root for individual repos Configure name git config user name Your User Name Configure email same as what was specified in SSH key gen git config user email your email example com Specify the location of the SSH public key default path is c Users you ssh id algorithm git config user signingkey C Users Monkey ssh id ed pub Enable Enforce commit signing git config commit gpgsign true Configure commit signing format git config gpg format sshTo configure git commit signing on all repositories open a command prompt run the following global commands Global signing on all repos Configure name git config global user name Your User Name Configure email same as what was specified in SSH key gen git config global user email your email example com Specify the location of the SSH public key default path is c Users you ssh id algorithm git config global user signingkey C Users Monkey ssh id ed pub Enable Enforce commit signing git config global commit gpgsign true Configure commit signing format git config global gpg format sshThat s it now when you make any changes to your code and commit those changes they will be signed using the SSH public key and be displayed as Verfied on your git commit history on your GitHub repo Enable a branch policyThe last thing I wanted to cover was how you can actively enforce signature verification to prevent unsigned commits from being pushed to your repositories We can easily achieve this by configuring a Branch protection ruleNavigate to the repository you want to protect and select Settings gt Branches gt Add branch protection rule Configure a Branch name pattern for the branch the policy should be applied to and select Require signed commits Select Create You should now have a branch policy applied that will enforce signed commits ConclusionAs you can see it is vey easy to configure commit signing in GitHub using SSH keys which will protect your codebase and also verify the authors and contributors to your code by following the easy steps shown above I hope you have enjoyed this post and have learned something new ️ AuthorLike share follow me on GitHub Twitter LinkedIn Marcel LFollow Microsoft DevOps MVP Cloud Solutions amp DevOps Architect Technical speaker focused on Microsoft technologies IaC and automation in Azure Find me on GitHub |
2022-09-13 16:16:10 |
Apple |
AppleInsider - Frontpage News |
High demand for iPhone 14 Pro line crashed Chinese servers |
https://appleinsider.com/articles/22/09/13/high-demand-for-iphone-14-pro-line-crashed-chinese-servers?utm_medium=rss
|
High demand for iPhone Pro line crashed Chinese serversHigh demand for the iPhone Pro and iPhone Pro Max led to Apple server crashes in China as consumers placed over two million preorders in hours iPhone Pro and iPhone Pro MaxConsumers placed the preorders through the official Apple Store on JD com a Chinese e commerce company in Beijing The iPhone Pro received over a million preorders while the iPhone Pro Max hovered around Read more |
2022-09-13 16:39:17 |
Apple |
AppleInsider - Frontpage News |
How to enable the the haptic keyboard in iOS 16 |
https://appleinsider.com/inside/ios-16/tips/how-to-enable-the-the-haptic-keyboard-in-ios-16?utm_medium=rss
|
How to enable the the haptic keyboard in iOS In iOS Apple introduced Haptic Feedback to the iPhone keyboard Here s how to use it The iPhone keyboardApple first introduced haptic feedback to the iPhone with the Taptic Engine in iPhone It powered D Touch using slight vibrations in the physical device to let the user know that certain actions were taking place such as pressing onto a notification to generate a menu of options Read more |
2022-09-13 16:37:26 |
Apple |
AppleInsider - Frontpage News |
New video shows how Crash Detection works on iPhone 14 and Apple Watch |
https://appleinsider.com/articles/22/09/13/new-video-shows-how-crash-detection-works-on-iphone-14-and-apple-watch?utm_medium=rss
|
New video shows how Crash Detection works on iPhone and Apple WatchApple has shared a new video that explains how its new Crash Detection feature can detect serious car crashes and alert emergency responders automatically The feature relies on the high dynamic range gyroscope accelerometer GPS barometer and microphone Using the data provided the device then uses complex algorithms to detect when a serious car crash has occurred Crash Detection works on the iPhone iPhone Pro second generation Apple Watch SE Apple Watch Series and the Apple Watch Ultra Read more |
2022-09-13 16:27:51 |
Apple |
AppleInsider - Frontpage News |
Compared: New AirPods Pro versus original AirPods Pro |
https://appleinsider.com/inside/airpods-pro/vs/compared-new-airpods-pro-versus-original-airpods-pro?utm_medium=rss
|
Compared New AirPods Pro versus original AirPods ProApple announced the second generation of AirPods Pro at its Far Out event on September Here s how it compares to the first generation Left AirPods Pro Gen Right AirPods Pro Gen Like the new Apple Watch SE AirPods Pro keeps most of the same features as AirPods Pro Gen with a few notable upgrades Read more |
2022-09-13 16:26:30 |
海外TECH |
Engadget |
Co-op adventure game 'It Takes Two' hits Switch on November 4th |
https://www.engadget.com/it-takes-two-switch-release-date-november-4-164734664.html?src=rss
|
Co op adventure game x It Takes Two x hits Switch on November thIt Takes Two was a breakout hit when it came out in and now the cooperative adventure game is coming to a fresh platform It Takes Two is due to hit Switch on November th for and pre orders are open today The game will take advantage of the Friend s Pass feature from developer Hazelight and publisher EA unlocking co op play even if one person doesn t own the game It Takes Two is a distinctly two player experience and on Switch it ll be playable three ways in couch co op mode with two Switches over a local wireless network or with a friend online It s not playable cross platform The Friend s Pass feature is already a thing for PC and console versions of It Takes Two and it allows someone who doesn t own the game to play with someone who does The Switch port was handled by Turn Me Up Games the studio that brought Tony Hawk s Pro Skater and the Borderlands Legendary Collection to Nintendo s latest console It Takes Two is also getting the silver screen treatment though its storyline is arguably the most distressing part of the game Amazon Studios is adapting it into a movie with The Rock rumored as a potential star |
2022-09-13 16:47:34 |
海外TECH |
Engadget |
Facebook is trying to be Discord with 'Community Chats' |
https://www.engadget.com/facebook-messenger-community-chats-163119498.html?src=rss
|
Facebook is trying to be Discord with x Community Chats x Meta is introducing a new way for Facebook s nearly billion users to connect with one another In the coming weeks the company plans to expand the availability of Community Chats a feature that will allow Facebook and Messenger groups to organize discussions around their favorite topics On top of the usual text conversations Community Chats will support audio and video channels and allow admins to broadcast messages to their groups Since Meta envisions you using Community Chats to communicate with people outside of your immediate social circle admins will have access to a handful of moderation tools to ensure conversations stay civil An “Admin Assist feature will allow them to create a list of words and phrases they want the platform to automatically flag and take action against Admins also have the power to block mute and suspend individuals who don t play by their community s rules They can also host admin only chats where they can talk privately with their moderation team nbsp If all of this sounds familiar it s because Meta is effectively replicating how Discord works On Discord you can join Community Servers that are organized around a single game or interest and it s even possible for admins to create multiple sub channels for people to discuss specific aspects of their interest much like Meta will allow Community Chats users to do Even the moderation tools are reminiscent of features Discord has released in recent months to combat trolls |
2022-09-13 16:31:19 |
金融 |
金融庁ホームページ |
「サステナブルファイナンス有識者会議」(第14回)を開催します。 |
https://www.fsa.go.jp/news/r4/singi/20220913.html
|
有識者会議 |
2022-09-13 17:00:00 |
ニュース |
BBC News - Home |
Crowds line streets as Queen's coffin makes final Scottish journey |
https://www.bbc.co.uk/news/uk-scotland-62887168?at_medium=RSS&at_campaign=KARANGA
|
giles |
2022-09-13 16:55:43 |
ニュース |
BBC News - Home |
King Charles III says Queen prayed for Northern Ireland |
https://www.bbc.co.uk/news/uk-northern-ireland-62878272?at_medium=RSS&at_campaign=KARANGA
|
historic |
2022-09-13 16:49:46 |
ニュース |
BBC News - Home |
Backlash as Center Parcs to close for Queen's funeral |
https://www.bbc.co.uk/news/business-62893476?at_medium=RSS&at_campaign=KARANGA
|
parcs |
2022-09-13 16:36:46 |
ニュース |
BBC News - Home |
Graham Potter: Challenge of being Chelsea manager 'too big to turn down' |
https://www.bbc.co.uk/sport/football/62893344?at_medium=RSS&at_campaign=KARANGA
|
chelsea |
2022-09-13 16:52:53 |
ニュース |
BBC News - Home |
Worcester Warriors owners 'agree terms of sale of club' to interested party |
https://www.bbc.co.uk/sport/rugby-union/62876136?at_medium=RSS&at_campaign=KARANGA
|
warriors |
2022-09-13 16:32:16 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
ホンダ、電動バイク事業の上場検討 - WSJ発 |
https://diamond.jp/articles/-/309723
|
電動バイク |
2022-09-14 01:01:00 |
北海道 |
北海道新聞 |
苦手の好機、清宮連発 日本ハム(13日) |
https://www.hokkaido-np.co.jp/article/730651/
|
日本ハム |
2022-09-14 01:07:17 |
北海道 |
北海道新聞 |
日本ハムの近藤にサヨナラ賞 |
https://www.hokkaido-np.co.jp/article/730650/
|
日本ハム |
2022-09-14 01:02:21 |
コメント
コメントを投稿