投稿時間:2023-06-16 18:30:51 RSSフィード2023-06-16 18:00 分まとめ(38件)

カテゴリー等 サイト名等 記事タイトル・トレンドワード等 リンクURL 頻出ワード・要約等/検索ボリューム 登録日
IT 気になる、記になる… ヤマダウェブコム、M1搭載「MacBook Pro」が最大205,000円オフになる最終在庫特別セールを今週末も開催中(6月18日) https://taisy0.com/2023/06/16/173077.html macbookpro 2023-06-16 08:56:08
IT 気になる、記になる… Anker、公式ストアと直営店でポータブル電源などが最大80,000円オフ&ポイント2倍になるセールを開催中 https://taisy0.com/2023/06/16/173074.html anker 2023-06-16 08:48:37
IT 気になる、記になる… ahamoの契約数が500万件を突破 ー 最大5,500円相当の機種変更割引クーポンが先着で貰えるキャンペーンを実施中 https://taisy0.com/2023/06/16/173072.html ahamo 2023-06-16 08:30:17
ROBOT ロボスタ 【世界初】ソフトバンクが2拠点を「光無線通信」で繋ぎ、屋外で8Kリアルタイム映像を伝送 真鍋大度氏の個展「EXPERIMENT」で https://robotstart.info/2023/06/16/sb-experiment-optical-wireless.html 【世界初】ソフトバンクが拠点を「光無線通信」で繋ぎ、屋外でKリアルタイム映像を伝送真鍋大度氏の個展「EXPERIMENT」でシェアツイートはてブソフトバンク株式会社は、山梨県の清春芸術村と共同で、アーティストの真鍋大度まなべ・だいと氏の個展「EXPERIMENT」を開催した年月日月日。 2023-06-16 08:36:19
IT ITmedia 総合記事一覧 [ITmedia Mobile] ahamoが500万契約突破 先着50万人に最大5500円の機種変更割引キャンペーン https://www.itmedia.co.jp/mobile/articles/2306/16/news160.html ahamo 2023-06-16 17:01:00
AWS lambdaタグが付けられた新着投稿 - Qiita 【Amazon SES】同一のメール配信リクエストに対するメールイベントの発生の仕方について調べてみた https://qiita.com/htsutsumi/items/35bb70342de6803373ff amazon 2023-06-16 17:18:01
python Pythonタグが付けられた新着投稿 - Qiita 【AWS CDK (Python)】 カスタムリソースの使い方 https://qiita.com/takataka987/items/240300e665bf7e82efde awscdk 2023-06-16 17:41:22
python Pythonタグが付けられた新着投稿 - Qiita 【AWS CDK (Python)】 CDKスタックへパラメータを渡す方法 https://qiita.com/takataka987/items/1d7c31e82d4cd3306b8d awscdk 2023-06-16 17:37:45
python Pythonタグが付けられた新着投稿 - Qiita 【AWS CDK (Python)】 AWS CDKの始め方 https://qiita.com/takataka987/items/4448dbf06d8c70173305 awscdk 2023-06-16 17:25:46
python Pythonタグが付けられた新着投稿 - Qiita AstraDB/Cassandraで実現するベクトル検索のご紹介〜最小限のコードによる理解 https://qiita.com/yoshiyuki_kono/items/02cb9ff90597ce02b652 astradbcassandra 2023-06-16 17:02:45
AWS AWSタグが付けられた新着投稿 - Qiita 【AWS CDK (Python)】 カスタムリソースの使い方 https://qiita.com/takataka987/items/240300e665bf7e82efde awscdk 2023-06-16 17:41:22
AWS AWSタグが付けられた新着投稿 - Qiita 【AWS CDK (Python)】 CDKスタックへパラメータを渡す方法 https://qiita.com/takataka987/items/1d7c31e82d4cd3306b8d awscdk 2023-06-16 17:37:45
AWS AWSタグが付けられた新着投稿 - Qiita 【AWS CDK (Python)】 よく使うCDKコマンド https://qiita.com/takataka987/items/60c68efd51c87c7332a7 awscdk 2023-06-16 17:35:58
AWS AWSタグが付けられた新着投稿 - Qiita 【AWS CDK (Python)】 AWS CDKの始め方 https://qiita.com/takataka987/items/4448dbf06d8c70173305 awscdk 2023-06-16 17:25:46
golang Goタグが付けられた新着投稿 - Qiita チーム開発参加の記録【2023-06~2023-08】(2) sqlc + jackc/pgx/v5(v5.4.0)を使ってみた https://qiita.com/kanedaq/items/dcc6b3e50a0b2690033d goginsqlc 2023-06-16 17:34:24
技術ブログ Mercari Engineering Blog なめらかなナレッジシェアリング文化を創る https://engineering.mercari.com/blog/entry/20230615-fc507a43af/ hellip 2023-06-16 10:00:07
技術ブログ Developers.IO Rustでシリアル通信する https://dev.classmethod.jp/articles/serial-rust/ macbookpro 2023-06-16 08:58:49
技術ブログ Developers.IO Stripeのインボイスで、支払い期日を超えた場合の動作を試してみた https://dev.classmethod.jp/articles/stripe-invoice-over-due-date-payment/ stripe 2023-06-16 08:48:47
技術ブログ Developers.IO チーム開発でVSCodeの拡張機能やフォーマット設定などを統一したい時に便利な設定ファイルについて https://dev.classmethod.jp/articles/vscode_settings_file_for_team_dev/ vscode 2023-06-16 08:32:13
海外TECH DEV Community What is a Man-in-the-Middle (MITM) Attack? https://dev.to/shivamchamoli18/what-is-a-man-in-the-middle-mitm-attack-3g6m What is a Man in the Middle MITM Attack What is MITM attack A Man in the Middle MITM attack is a cyber attack where an attacker intercepts and potentially alters communications between a user and an application or service without their knowledge or consent The attacker positions themselves between the two parties and relays messages between them making it appear they are communicating directly This allows the attacker to intercept modify or inject malicious content into the communication To carry out a MITM attack the attacker typically exploits vulnerabilities in the network infrastructure or compromises trusted entities such as Wi Fi access points DNS servers or routers How does the MITM attack work Below is a step by step breakdown of how a Man in the Middle MITM attack works • The attacker identifies a vulnerable communication channel between two parties such as a Wi Fi network or an unsecured website • The attacker positions itself between the two parties by exploiting vulnerabilities or impersonating a trusted entity like Wi Fi access points or DNS servers • When the legitimate sender Alice initiates communication with the intended recipient Bob the attacker intercepts the traffic without their knowledge • The attacker can eavesdrop on the communication or actively manipulate it They may read modify or inject malicious content into the messages exchanged between Alice and Bob • Both Alice and Bob remain unaware of the interception as the attacker relays the communication between them making it appear they are directly communicating • By doing so the attacker can gather sensitive information such as login credentials financial details or personal data and use it for malicious purposes What are the different types of MITM attacks Here are some common types of MITM attacks •ARP spoofing The attacker manipulates the Address Resolution Protocol ARP to redirect network traffic through their device •DNS spoofing The attacker forges DNS responses redirecting users to malicious websites by mapping legitimate domain names to incorrect IP addresses •IP spoofing The attacker manipulates IP packets source addresses to appear as trusted entities allowing them to intercept and modify data •SSL TLS stripping The attacker intercepts and decrypts encrypted SSL TLS connections allowing them to view and modify the traffic •Session hijacking The attacker steals session identifiers or cookies to impersonate a legitimate user and gain unauthorized access to an application or service How can InfosecTrain help Enroll in InfosecTrain s Certified Ethical Hacker training course to learn about various types of cyber attacks including Man in the Middle MITM attacks Our well structured curriculum expert led instruction and hands on labs and exercises on cyberattacks will boost your learning experience 2023-06-16 08:47:24
海外TECH DEV Community Cronjob tutorial https://dev.to/irishgeoff11/cronjob-tutorial-1eac Cronjob tutorialCertainly Here s a tutorial on using cron jobs a time based job scheduler in Unix like operating systems Step Understanding CronCron is a utility that allows you to schedule and automate recurring tasks on your system Cron jobs are defined using a special syntax called cron expressions which specify when and how often a task should run Each cron job is associated with a command or script that will be executed at the specified time Step Accessing the Cron TabOpen a terminal or SSH into your server Enter the following command to edit the cron tab crontab eThis will open the default text editor for editing the cron tab Step Creating a Cron JobIn the cron tab file each line represents a separate cron job The basic structure of a cron job is as follows command to be executedThe five asterisks represent the schedule for the job minute hour day of month month day of week Specify the desired schedule using the cron expressions For example indicates any value or all possible values means every units e g every minutes means the specific values and Ranges can be specified using a hyphen e g for You can use special shortcuts like reboot runs once at startup or daily runs once per day at midnight After specifying the schedule provide the command or script you want to run at that time Step Saving and ExitingOnce you ve defined your cron job save the file and exit the editor In Vim press Esc to exit insert mode then type wq and press Enter In nano press Ctrl O to save and Ctrl X to exit The cron tab will be automatically updated and the cron daemon will take care of executing the scheduled jobs Step Managing Cron JobsTo list all your scheduled cron jobs use the following command crontab lTo edit your existing cron jobs use crontab eThis will open the cron tab file for editing To remove all your cron jobs use crontab rBe careful when using this command as it permanently deletes all your cron jobs Step Handling Output and Errors Optional By default the output generated by a cron job is sent via email to the user who owns the cron job To redirect the output to a file modify the cron job entry to include the redirection For example command to be executed gt path to output file log gt amp This redirects both standard output and error output to the specified file Make sure the user running the cron job has write permissions to the output file That s it You now have the basic knowledge to create and manage cron jobs Use cron to automate repetitive tasks and make your system more efficient About the author Geoffrey Callaghan is a programmer at fabform io working on the form backend team 2023-06-16 08:43:08
海外TECH DEV Community 10 Containerization Best Practices to Keep in Mind https://dev.to/dyrectorio/10-containerization-best-practices-to-keep-in-mind-j64 Containerization Best Practices to Keep in MindContainerization s mission is to increase usability but that rarely happens to containers out of thin air When you have user friendly applications in mind it s in everyone s best interest to go the extra mile Here s things you can do to create and maintain a user friendly containerized application Isolate Build amp Runtime DependenciesMulti stage build or not don t put build time dependencies into the runtime make the attack surface smaller by giving up less to entities with malicious intent to use and exploit in the container This approach aligns with the best practice represented by distroless images while there are arguments that images without dependency aren t any less secure than the ones abundant in dependencies Pick the Right Image for the JobKeep in mind when an image you d like to use fits your exact use case There are generic sort of de facto images that might be helpful in any given scenario but a general rule of thumb is to check image size and basic behavior A few examples scratch scratch is an empty image you can use to create a new image It comes with no files or folders whatsoever all you can do with it is call the FROM scratch command to add files etc to it Works best if something has absolute zero dependency busybox This lightweight image has over customizable utilities and it s the self proclaimed Swiss Army knife of Embedded Linux alpine Lightweight Linux distribution that you can imagine as busybox on steroids since it s literally built around it With a growing community around it alpine is destined to become one of the most popular distros since it s only megabytes and it s lightning fast with a lot of security focus Important notice it has musl over glibc debian Versatile Linux distribution that provides feature rich package management due to apt capabilities It s one of the first free open source projects dating back to which makes it inevitably a more mature Linux distro than Alpine Alpine or Debian Alpine is more suitable for usage with restricted resources as a container and while Debian is a bit slower with packages it also offers more capabilities and is more supported systemd glibc Organize Cache Layers LogicallyEach Docker build directive in the Dockerfile spawns a new layer and those layers are stored therefore cached To save time start with static directives and move towards dynamic ones For example copying the compiled application should typically be the last step Make Sure You Have Reproducible BuildsReproducible builds are important to achieve consistent behavior of your image It ll allow you to verify the source of the binary resolve issues that occur faster enabling you to have the same output given the specs One Process One ContainerGenerally speaking it s the right thing to do Separating processes from each other is the easiest way to reduce the complexity of your stack Isolating a process eliminates the risk of interfering with others allows easier upgrading helps with builds and testing Single concern containers also pave the way for general use which can serve as building blocks If you need other utility processes check out the sidecar pattern Run Containers Without RootUnless you change the default behavior of container runtimes and deploy them they run as root Containers don t need root privileges most of the time It s an unnecessary vulnerability factor because if someone exploits it your previously set permissions will be useless against them since the root privilege will enable them to do as they will taking complete ownership of the given machine It is like having your keychain hanger outside of the house Podman and OpenShift are viable solutions that run containers rootless but Docker supports rootless runtimes as well Besides if you need to run it with root privileges you can do so without using the host s root user Well engineered containers are non root by default Add Default Exposed PortsContainers with exposed ports by default are easier to use since they re rarely used on their own When a container s creator defines exposed ports users don t have to go out of their way to configure it for themselves and when the container is started with docker it exposes those ports Using EXPOSE makes the container listen on their local environment and you can also configure whether the protocol is TCP or UDP Default is TCP when you use it Define ENTRYPOINT and CMDENTRYPOINT and CMD are indispensable within a container that s designed for usability Users without context won t be able to understand the behavior of the container therefore it s essential to set constraints that ll help with usability Add OCI AnnotationsBy adding annotations using the LABEL directive within a Dockerfile you can provide extra information to a container s users These annotations can help with usability or verification of a container There s a bunch of annotations that are pre defined by OCI standards but we suggest using source license revision vendor and title Do Frequent Security AnalysisIf there s a vulnerability you can evaluate if you have the impacted code piece and if it s in use within your application It s possible that the vulnerability is severe and while you have the library in your container the code never calls the affected part There are static image analyzers you can use like Trivy Anchore Engine or Quay Container Security Operator Relevant resourcesIf you d like to learn more about containes check out these factor netOCI image specificationThis blogpost was written by the team of dyrector io dyrector io is an open source container management platform Find the project on GitHub 2023-06-16 08:34:28
海外TECH DEV Community How to get Started and Ace in Software Development in the era of A.I. https://dev.to/lovepreetsingh/how-to-get-started-and-ace-in-software-development-in-the-era-of-ai-245h How to get Started and Ace in Software Development in the era of A I In the era of AI Generative AI most of the people are worried about the web development Questions like Is web development gonna end Will there be few hirings around web development The answers to the above questions are Yes Basic Web development jobs will end where your brain is not being challenged UI development has the higher chances of being replaced UX User experience will become more relevant instead of UIAnd I don t think CSS is gonna survive ‍ ️Conclusion is developers having their fundaments clear will survive People nowadays are ignoring fundamentals like Operating Systems Databases Computer Networks and System Design They are running behind new flashy things like MERN stack NextJS and building average apps there It is not gonna help So the question is what should one do in today s world to make an impact Learning and building projects which makes an impact is more preferable instead of making average projectsFor ex Building a todo app having reminders instead of a simple todo appFocus more on the user side instead of tech side User doesn t care if your tech stack is awesome or not He She should get the best experience and that s all Now how one can learn fundamentals and which fundamentals to focus on Focus on How internet works when you ask for a websiteFocus on How websites are being deployed and how cloud worksFocus on How virtual machines and server works How they scale out and scale in How to use Docker and Ks or any other Container management toolsFocus on How computer networking works like ipv ipv subnets etcFocus on How different OS concepts work like Multi threading Multiprocessing Locks Race conditions Thread pools etcFocus on how a system can be made scalable and secureand there is much more These things will surely be irreplaceable for a long time On our YouTube channel we are trying to do the same You ll get the content which will be beginner friendly and will be more aligned towards how things work Now last thing be comfortable with using AI How to use AI for your benefit Ask ChatGPT to code and then optimize and fix the code on your own 2023-06-16 08:15:28
海外科学 BBC News - Science & Environment Climate change: UN to unmask fossil fuel delegates at climate talks https://www.bbc.co.uk/news/science-environment-65917660?at_medium=RSS&at_campaign=KARANGA climate 2023-06-16 08:30:55
医療系 医療介護 CBnews 介護職員の基本給、ベースアップ加算で4.4%上昇-処遇改善支援補助金では4.0%アップ 厚労省調査 https://www.cbnews.jp/news/entry/20230616164013 介護報酬 2023-06-16 17:05:00
金融 ニッセイ基礎研究所 ロシアGDP(2023年1-3月期)-前年比伸び率のマイナス幅縮小が続く https://www.nli-research.co.jp/topics_detail1/id=75129?site=nli 月期の名目成長率は前年同期比年月期は、GDPデフレータ伸び率は前年同期比同といずれも大幅に低下している図表。 2023-06-16 17:29:22
海外ニュース Japan Times latest articles COVID-19 wave looms in Japan after case numbers nearly double https://www.japantimes.co.jp/news/2023/06/16/national/ninth-covid19-wave-possibility/ average 2023-06-16 17:47:18
ニュース BBC News - Home Boris Johnson: Conservative MPs face dilemma on Partygate vote https://www.bbc.co.uk/news/uk-politics-65919086?at_medium=RSS&at_campaign=KARANGA boris 2023-06-16 08:03:52
ニュース BBC News - Home Kent and Sussex hosepipe ban announced from 26 June https://www.bbc.co.uk/news/uk-england-65927032?at_medium=RSS&at_campaign=KARANGA levels 2023-06-16 08:37:55
ニュース BBC News - Home Greece boat disaster: Brothers' tearful reunion through gates https://www.bbc.co.uk/news/world-europe-65926133?at_medium=RSS&at_campaign=KARANGA disaster 2023-06-16 08:28:00
ニュース BBC News - Home Tesco sees early signs inflation is starting to ease https://www.bbc.co.uk/news/business-65925217?at_medium=RSS&at_campaign=KARANGA price 2023-06-16 08:01:53
ニュース BBC News - Home Felix calls for better maternity care for black women after team-mate's death https://www.bbc.co.uk/sport/athletics/65925398?at_medium=RSS&at_campaign=KARANGA Felix calls for better maternity care for black women after team mate x s deathOlympic great Allyson Felix calls for better maternity care for black women to ensure the death of team mate Tori Bowie is not in vain 2023-06-16 08:33:06
ニュース BBC News - Home Climate change: UN to unmask fossil fuel delegates at climate talks https://www.bbc.co.uk/news/science-environment-65917660?at_medium=RSS&at_campaign=KARANGA climate 2023-06-16 08:30:55
ニュース BBC News - Home Al Pacino welcomes fourth child at 83, with girlfriend Noor Alfallah https://www.bbc.co.uk/news/entertainment-arts-65925640?at_medium=RSS&at_campaign=KARANGA robert 2023-06-16 08:09:44
ビジネス 不景気.com 秋葉原の免税店運営「TMD」に特別清算決定、負債68億円 - 不景気com https://www.fukeiki.com/2023/06/takarada-electric-tmd.html 東京都千代田区丸の内 2023-06-16 08:54:09
ニュース Newsweek 「能力の差」はもう重要ではない...AIが進化した今、社会と乖離してしまった「教育」はどうあるべきか? https://www.newsweekjapan.jp/stories/business/2023/06/post-101891.php 根拠のない防衛本能を乗り越えた世界に飛び込んでみたら、そこには解放された世界があります。 2023-06-16 17:32:00
ニュース Newsweek 二度見不可避... ヘビをむしゃむしゃ食べるシカの映像に世界が驚愕 https://www.newsweekjapan.jp/stories/world/2023/06/post-101914.php 日に撮影されたこの動画に映っているのは、道路脇でヘビを食べている若いオジロジカの姿。 2023-06-16 17:25:00
IT 週刊アスキー インフキュリオンの「Wallet Station」をツルハホールディングスのスマホ決済サービス「HAPPAY」に導入 https://weekly.ascii.jp/elem/000/004/141/4141345/ happay 2023-06-16 17:45:00

コメント

このブログの人気の投稿

投稿時間:2021-06-17 05:05:34 RSSフィード2021-06-17 05:00 分まとめ(1274件)

投稿時間:2021-06-20 02:06:12 RSSフィード2021-06-20 02:00 分まとめ(3871件)

投稿時間:2020-12-01 09:41:49 RSSフィード2020-12-01 09:00 分まとめ(69件)