投稿時間:2023-02-24 09:16:26 RSSフィード2023-02-24 09:00 分まとめ(22件)

カテゴリー等 サイト名等 記事タイトル・トレンドワード等 リンクURL 頻出ワード・要約等/検索ボリューム 登録日
IT 気になる、記になる… 「Google Pixel」の消しゴムマジックがiPhoneや他のAndroid端末でも利用可能に ー 「Google One」の加入特典として https://taisy0.com/2023/02/24/168873.html android 2023-02-23 23:04:41
IT ITmedia 総合記事一覧 [ITmedia ビジネスオンライン] びっくりドンキー、「いろどりセット」をリニューアル 健康志向の女性にも訴求 https://www.itmedia.co.jp/business/articles/2302/24/news063.html itmedia 2023-02-24 08:15:00
AWS AWS Partner Network (APN) Blog How CyberArk Built a Tenant Management Service for its SaaS Offering https://aws.amazon.com/blogs/apn/how-cyberark-built-tenant-management-service-for-its-saas-offering/ How CyberArk Built a Tenant Management Service for its SaaS OfferingA tenant management service manages the tenant s provisioning and lifecycle and tenant management is usually one of the first services SaaS providers build for their SaaS control plane as the tenant onboarding experience must be simple and fast Learn how CyberArk built a serverless simple and scalable tenant management service Its primary responsibility is adding new tenants and provisioning multiple CyberArk products to the tenants according to the customer s subscription 2023-02-23 23:47:18
AWS AWS Marketplace Accelerating Spark workloads on Amazon EMR with Windjammer’s Spark plugin https://aws.amazon.com/blogs/awsmarketplace/accelerating-spark-workloads-amazon-emr-windjammers-spark-plugin/ Accelerating Spark workloads on Amazon EMR with Windjammer s Spark pluginAWS customers often use Apache Spark for distributed big data processing Spark has gained popularity due to its fast in memory computing that enables parallel computation of tasks across multiple nodes To aid customers with running Spark workloads Amazon EMR provides a managed cluster platform that makes it easy to run frameworks such as Apache Hadoop … 2023-02-23 23:27:20
AWS AWS Big Data Blog Introducing AWS Glue crawlers using AWS Lake Formation permission management https://aws.amazon.com/blogs/big-data/introducing-aws-glue-crawlers-using-aws-lake-formation-permission-management/ Introducing AWS Glue crawlers using AWS Lake Formation permission managementData lakes provide a centralized repository that consolidates your data at scale and makes it available for different kinds of analytics AWS Glue crawlers are a popular way to scan data in a data lake classify it extract schema information from it and store the metadata automatically in the AWS Glue Data Catalog AWS Lake … 2023-02-23 23:25:31
AWS AWS Government, Education, and Nonprofits Blog Mapping litter and plastic pollution with citizen science https://aws.amazon.com/blogs/publicsector/mapping-litter-plastic-pollution-citizen-science/ Mapping litter and plastic pollution with citizen scienceAs part of the Amazon Sustainability Data Initiative ASDI AWS invited Seán Lynch the founder of OpenLitterMap to share how AWS technologies and open data are helping to solve global challenges like biodiversity loss and plastic pollution with citizen science Solutions like OpenLitterMap help unlock the potential that a global abundance of technology has for the collection and dissemination of pertinent data that is an instrumental part of positive social change 2023-02-23 23:14:59
AWS AWS Amazon Lex: Bot Templates | Amazon Web Services https://www.youtube.com/watch?v=P3eh5f5Q2Wc Amazon Lex Bot Templates Amazon Web ServicesYou can now deploy bot templates for industry verticals right from the Amazon Lex console Accelerate your bot development by using our bot templates for inspiration Learn more about Amazon Lex at Subscribe More AWS videos More AWS events videos ABOUT AWSAmazon Web Services AWS is the world s most comprehensive and broadly adopted cloud platform offering over fully featured services from data centers globally Millions of customers ーincluding the fastest growing startups largest enterprises and leading government agencies ーare using AWS to lower costs become more agile and innovate faster AmazonLex ConversationalAI CAI Chatbot AWS AmazonWebServices CloudComputing 2023-02-23 23:05:11
Ruby Rubyタグが付けられた新着投稿 - Qiita 【Ruby on Rails】Ajaxを利用してフォームの自動入力機能を実装する方法 https://qiita.com/kdbrnm24/items/7f3e04ae70bdeda3b67a rubyonrails 2023-02-24 08:46:39
Ruby Railsタグが付けられた新着投稿 - Qiita 【Ruby on Rails】Ajaxを利用してフォームの自動入力機能を実装する方法 https://qiita.com/kdbrnm24/items/7f3e04ae70bdeda3b67a rubyonrails 2023-02-24 08:46:39
技術ブログ Developers.IO [新機能] Amazon Detectiveで概要ページおよび検索結果からデータをエクスポートできるようになりました https://dev.classmethod.jp/articles/update-amazon-detective-data-export/ amazondetective 2023-02-23 23:00:54
海外TECH DEV Community The Science Of Allocating Dev Resources In 2023 https://dev.to/linearb/the-science-of-allocating-dev-resources-in-2023-30a2 The Science Of Allocating Dev Resources In The days of growth at all costs are over your engineering strategy needs to be about scaling efficiently In the first Labs episode of the year Dan invites LinearB s VP of Product Eran Shitrit to discuss how teams are proactively addressing concerns around cost reduction and efficiency through smarter project allocation Dan and Eran also discuss the rollout of LinearB s resource allocation dashboard and the success of the Scaling Developer Efficiency workshop Episode Highlights Introduction What is project allocation Why companies should be thinking about project allocation The metrics used to measure resource allocation Good vs bad project allocation Dan s hard lessons Building the resource allocation features Workflow relationship between VPE VP Product amp CEOWhile you re here check out this video from our YouTube channel and be sure to like and subscribe when you do Want to cut code review time by up to Add estimated review time to pull requests automatically gitStream is the free dev tool from LinearB that eliminates the No bottleneck in your team s workflow pull requests and code reviews After reviewing the work of dev teams LinearB s engineers and data scientists found that pickup times and code review were lasting to days longer than they should be The good news is that they found these delays could be eliminated largely by adding estimated review time to pull requests Learn more about how gitStream is making coding better HERE 2023-02-23 23:24:32
海外TECH DEV Community How To Safely Verify MACs With Go And PHP Examples https://dev.to/breda/how-to-safely-verify-macs-with-go-and-php-examples-3nde How To Safely Verify MACs With Go And PHP ExamplesI wanted to write this short article to explain the recent learning I had while reading on Message Authentication Codes MACs First let s briefly explain what MACs are and how they can be useful to us MACs Message Authentication Code are cryptographic algorithms that use a hash function and a secret key they are also called symmetric cryptographic algorithms to generate what s called an authentication tag or just tag which is used to verify the integrity the message wasn t changed amp authenticity the sender s identity of the message given knowledge of the secret key The most widely used MAC in the wild is what s called an HMAC Hash based MAC Like its name suggests it s a way to use hash function with a secret key HMACs can be used with SHA SHA SHA etc The result of an HMAC function is called hmac or tag I ll use the lowercase hmac from here on in this article In other words if you and I agree on a secret key and a hash algorithm to use we can effectively share messages that only we can verify the authenticity amp integrity of No one can tamper with our messages in transit Let s start off by creating an example Go program that creates an HMAC of some data and then verifies it using SHA hashing algorithm and a strong randomly generated secret key package mainimport crypto hmac crypto sha encoding hex fmt strconv var secretKey randomly generated secure secret key var data This is private information func hmac data secretKey string string hash hmac New sha New byte secretKey hash Write byte data return hex EncodeToString hash Sum nil func verify data hmac secretKey string bool Recompute the signature correctHmac sign data secretKey Check if they are equal return correctHmac hmac func main hmac hmac data secretKey fmt Printf Data s nHMAC s data hmac fmt Println correct verify data hmac secretKey fmt Printf nIs HMAC s correct s hmac strconv FormatBool correct And here s a PHP example of the same functionality lt phpconst secretKey randomly generated secure secret key const data This is private information function hmac string data string secretKey string return hash hmac algo sha data data key secretKey function verify string data string hmac string secretKey bool correctHmac sign data secretKey return correctHmac hmac function run hmac hmac data secretKey print sprintf Data s nHMAC s data hmac print n correct verify data hmac secretKey print sprintf Is HMAC s correct s hmac correct true false run Both programs output are Data This is private informationHMAC cfebfbcacafcaafaceddccdadfcIs HMAC cfebfbcacafcaafaceddccdadfc correct true The Problem with our codeUsing to compare hashes makes us vulnerable to a type of attack called Timing Attack Because the comparison returns as soon as it detects that the two hmacs differ it s not suitable for this use case Because an attacker can recreate the valid hmac by measuring how long it takes for the comparison to finish To put this into better perspective let s make an example Say we have bit hmacs and each bit takes exactly ms to compare it to the other hmac bit The valid signature looks like this If I send you the correct hmac then it should take exactly ms for you to verify that it is in fact valid If I now send you you ll reply in less than ms that it s incorrect because the first bit is incorrect Remember it takes ms to verify each bit If I send you your reply will take about ms because the first bits are correct but not the last etc and I keep doing this until you reply with ms which then I know that it s the valid hmac And like that I was able to re create the valid hmac by updating my forged hmac and measuring how long it took you the secret key owner to verify it Of course this is an overly simplified example authentication tags produced by MACs should be at least bit to be strong enough and to avoid collisions The takeaway though is that MAC tags comparison verification should ALWAYS be done in constant time In our simplified example whether the hmacs were equal or not it should always take the same ms to return with the result Note that this also applies to Digital Signatures the asymmetric brother to MAC Signatures also need to be verified in constant time to avoid timing attacks The SolutionI purposefully used the operator in both languages to illustrate this problem but we should always use good and well known libraries when it comes to cryptographic operations and algorithms In Go we can verify hmacs in constant time using hmac Equal from crypto hmac package In PHP we can compare hmacs and hashes using hash equals function Let s rewrite our Go amp PHP examples using the correct way I ll just rewrite the verify function as it s all we need func verify data signature secretKey string bool Recompute the signature correctSignature sign data secretKey Check if they are equal return hmac Equal byte correctSignature byte signature and the PHP example will look like thisfunction verify string data string signature string secretKey bool correctSignature sign data secretKey return hash equals correctSignature signature How to do constant time comparisonLet s dive a bit deep and see how hmac Equals is implemented The source code reveals that it actually uses a function from the crypto subtle package called ConstantTimeCompare which is implemented like this func ConstantTimeCompare x y byte int if len x len y return var v byte for i i lt len x i v x i y i return ConstantTimeByteEq v We return early if the two slices are not of equal length because in that case we know that entirely different hashing algorithms were used Next create a byte variable v which will hold our result Then we iterate over the slices and we XOR each slice element and the result is ORed with the variable v That is if the two bytes we re comparing are different the XOR will be ORed with v v will be equal to and will stay for the entirety of the loop v will only be if all bytes from the two slices are the same Then taking another precaution and we also compare the two bytes v and in a time constant manner using ConstantTimeByteEq Whether the two slices were equal or not the function takes the exact same time to return which makes it timing attack safe And that s it Thanks for reading and until the next episode have a great day 2023-02-23 23:06:51
海外科学 NYT > Science After Long Delay, Moderna Pays N.I.H. for Covid Vaccine Technique https://www.nytimes.com/2023/02/23/science/moderna-covid-vaccine-patent-nih.html After Long Delay Moderna Pays N I H for Covid Vaccine TechniqueModerna has paid million to the government for a chemical technique key to its vaccine But the parties are still locked in a high stakes dispute over a different patent 2023-02-23 23:25:31
海外科学 NYT > Science Wind and Solar Energy Projects Risk Overwhelming America’s Antiquated Electrical Grids https://www.nytimes.com/2023/02/23/climate/renewable-energy-us-electrical-grid.html Wind and Solar Energy Projects Risk Overwhelming America s Antiquated Electrical GridsAn explosion in proposed clean energy ventures has overwhelmed the system for connecting new power sources to homes and businesses 2023-02-23 23:17:47
金融 ニッセイ基礎研究所 コロナ禍で落ち込んだ高齢者の対面型サービス消費~2022年もコロナ前比2割減。個人消費回復のボトルネックに https://www.nli-research.co.jp/topics_detail1/id=73993?site=nli 目次ーはじめにーコロナ禍の外出頻度の低下ー外出を伴う消費活動の低迷対面型サービスへの支出額の減少項目別にみた対面型サービスへの消費支出額と変化率ー個人消費の動向コロナ前と比べた家計の消費支出の状況総消費動向指数の動向ー終わりにコロナ禍で、高齢者を中心として外出自粛傾向が続いていることを、これまでの基礎研レポートで発信してきた。 2023-02-24 08:58:03
金融 日本銀行:RSS 国内銀行の資産・負債等(銀行勘定)(12月末) http://www.boj.or.jp/statistics/asli_fi/ald2212.pdf 銀行 2023-02-24 08:50:00
海外ニュース Japan Times latest articles North Korea fires strategic cruise missiles as U.S.-South Korea hold nuclear attack drill https://www.japantimes.co.jp/news/2023/02/24/asia-pacific/north-korea-strategic-cruise-missiles/ North Korea fires strategic cruise missiles as U S South Korea hold nuclear attack drillNorth Korea says it has conducted a rare strategic cruise missile drill as Washington and Seoul announces a tabletop military exercise focusing on nuclear weapons 2023-02-24 08:40:42
ニュース BBC News - Home Omagh police attack: John Caldwell 'has suffered life-changing injuries' https://www.bbc.co.uk/news/uk-northern-ireland-64740066?at_medium=RSS&at_campaign=KARANGA omagh 2023-02-23 23:24:34
ニュース BBC News - Home Ukraine war: Six sporting lives lost - 'We will not forgive, or forget' https://www.bbc.co.uk/sport/64641089?at_medium=RSS&at_campaign=KARANGA Ukraine war Six sporting lives lost x We will not forgive or forget x Numerous Ukrainian sportspeople signed up to fight after Russia invaded a year ago Not all those who swapped the sports field for the battlefield have survived the conflict 2023-02-23 23:35:46
ビジネス ダイヤモンド・オンライン - 新着記事 生成AIに沸く半導体業界、未来のドル箱狙う - WSJ発 https://diamond.jp/articles/-/318352 生成 2023-02-24 08:28:00
ビジネス プレジデントオンライン 「結局、朝食は食べた方がいいのか、食べない方がいいのか」睡眠のプロが導いた朝食の最終結論 - 判断基準は前日のエネルギーが体内に残っているかどうか https://president.jp/articles/-/66749 判断基準 2023-02-24 09:00:00
ビジネス プレジデントオンライン なぜラッシュ時間帯の本数を減らしてしまうのか…鉄道会社が"ダイヤ改悪"に踏み切る切実な事情 - 「混雑を緩和せよ」という国の命令に無理がある https://president.jp/articles/-/66554 鉄道会社 2023-02-24 09:00:00

コメント

このブログの人気の投稿

投稿時間:2021-06-17 22:08:45 RSSフィード2021-06-17 22:00 分まとめ(2089件)

投稿時間:2021-06-20 02:06:12 RSSフィード2021-06-20 02:00 分まとめ(3871件)

投稿時間:2021-06-17 05:05:34 RSSフィード2021-06-17 05:00 分まとめ(1274件)