投稿時間:2023-07-24 21:30:56 RSSフィード2023-07-24 21:00 分まとめ(37件)

カテゴリー等 サイト名等 記事タイトル・トレンドワード等 リンクURL 頻出ワード・要約等/検索ボリューム 登録日
IT InfoQ Presentation: Streaming from Apache Iceberg - Building Low-Latency and Cost-Effective Data Pipelines https://www.infoq.com/presentations/apache-iceberg-streaming/?utm_campaign=infoq_content&utm_source=infoq&utm_medium=feed&utm_term=global Presentation Streaming from Apache Iceberg Building Low Latency and Cost Effective Data PipelinesSteven Wu discusses the design of the Flink Iceberg comparing the Kafka and Iceberg sources for streaming and how the Iceberg streaming source can power many common stream processing use cases By Steven Wu 2023-07-24 11:30:00
IT ITmedia 総合記事一覧 [ITmedia PC USER] 林信行が見てきた「Twitter」の美学と信念 この十数年を振り返って https://www.itmedia.co.jp/pcuser/articles/2307/24/news159.html itmediapcuser 2023-07-24 20:15:00
IT ITmedia 総合記事一覧 [ITmedia News] 東京スカイツリー、4年ぶりの「隅田川花火大会」に合わせて特別ライトアップ https://www.itmedia.co.jp/news/articles/2307/24/news171.html itmedia 2023-07-24 20:13:00
AWS lambdaタグが付けられた新着投稿 - Qiita NestJSをAPI Gateway + AWS Lambdaで構成する(その3)- Controllersコントローラー https://qiita.com/ssugimoto/items/fcfbc9a176bcf41d7b45 apigatewayawslambda 2023-07-24 20:38:06
python Pythonタグが付けられた新着投稿 - Qiita 競プロでPythonを使用している人はChatGPT(GPT-3.5)を使用して悩みのTLEを解決できるかもというお話 https://qiita.com/H20/items/c9612d20e0f7e2d139eb atcoder 2023-07-24 20:58:51
python Pythonタグが付けられた新着投稿 - Qiita 【Python】Pandasを利用して、同じ数値から始まる二つのCSVファイルの中身を一瞬で結合する方法 https://qiita.com/Ryo-0131/items/3d1737fe88bf1eb5f158 pandas 2023-07-24 20:57:36
python Pythonタグが付けられた新着投稿 - Qiita ChatGPT For Python https://qiita.com/brgd/items/fa157f13f90fe90737a6 chatgpt 2023-07-24 20:37:46
js JavaScriptタグが付けられた新着投稿 - Qiita JavaScriptで消費税の計算 https://qiita.com/mogamoga1337/items/483db1824a294a8a164f httpsc 2023-07-24 20:57:26
Ruby Rubyタグが付けられた新着投稿 - Qiita 注文ステータス enum日本語での実装 https://qiita.com/mirimu/items/ab8b8ba14ceda9173b66 gimfai 2023-07-24 20:44:07
Git Gitタグが付けられた新着投稿 - Qiita ハンズオンで学ぶGit(2023年_新人研修用) https://qiita.com/kanekanekaneko/items/c55bf4fc74babf23bbfa statusdiffloggithub 2023-07-24 20:23:36
Git Gitタグが付けられた新着投稿 - Qiita WSL2 にて Git Clone がうまくできなかった話 https://qiita.com/winzu44/items/f8c2576a809642094f3c windowshomewslubuntult 2023-07-24 20:02:16
Ruby Railsタグが付けられた新着投稿 - Qiita 注文ステータス enum日本語での実装 https://qiita.com/mirimu/items/ab8b8ba14ceda9173b66 gimfai 2023-07-24 20:44:07
技術ブログ Developers.IO 移植性を最大限にするにはARNのパーティションをハードコーディングしてはいけない(中国リージョンの話) https://dev.classmethod.jp/articles/maximize-portability-avoid-hardcoding-arn-partitions/ arnamazonresourcename 2023-07-24 11:11:44
海外TECH Ars Technica The IBM mainframe: How it runs and why it survives https://arstechnica.com/?p=1930955 business 2023-07-24 11:00:36
海外TECH DEV Community Top 10 Best Web Application Security Best Practices for Developers to Follow https://dev.to/dhruvjoshi9/top-10-best-web-application-security-best-practices-for-developers-to-follow-239e Top Best Web Application Security Best Practices for Developers to FollowWeb application security is a critical aspect that every developer and business should prioritize As technology advances and online threats become more sophisticated it is essential to implement robust security measures to safeguard sensitive information and protect users In this Blog we will outline the top web application security best practices that developers should follow to ensure the integrity and safety of their web applications In most scenarios contacting the best web app development company is suggested to acquire the best web development services to ensure the web app is protected from threats and other issues Top Best Web Application Security Best Practices You Should FollowWeb app security is a primary concern among all businesses and developers Day by day it s going to be tough to face the threats So following these Web application security best practices can help you protect your web app Before that let s quickly see why to care about web app security Why Care About Your Web App s Security Web application security is a critical concern that should never be overlooked Failing to prioritize security can lead to severe consequences such as Data breaches Financial loss Damage to reputation By investing in robust security measures you demonstrate your commitment to protecting sensitive information and ensuring the safety of your users A secure web application inspires trust among your customers fostering strong relationships and repeat business Moreover compliance with regulatory requirements becomes more accessible with a solid security framework Don t underestimate the importance of web app security it s an investment that pays off in safeguarding your business and its stakeholders Use Secure Coding PracticesDevelopers should adhere to secure coding practices to minimize vulnerabilities in web applications It embraces using safe programming languages validating user inputs and avoiding using deprecated or insecure functions Top Best Practices for Code Review Quokka Labs A successful code review follows a some step process including understanding the code s purpose and functionality Know more how improve the quality and security quokkalabs com Secure Coding ExampleTo further illustrate the importance of secure coding practices consider an example where user input is not properly validated and sanitized leading to a potential security vulnerability Insecure Code Example def login username input Enter your username password input Enter your password query SELECT FROM users WHERE username username AND password password result execute query query If result print Login successful Else print Invalid username or password In the above code snippet the login function takes user inputs for the username and password and directly inserts them into an SQL query without validation or sanitization It leaves the code susceptible to SQL injection attacks where an attacker could manipulate the input to execute arbitrary SQL queries To address this vulnerability developers should implement input validation and parameterized queries or prepared statements Here s an updated and secure version of the code Secure Code Example def login username input Enter your username password input Enter your password query SELECT FROM users WHERE username AND password result execute query query username password if result print Login successful else print Invalid username or password In the secure code the user inputs are passed as parameters to the SQL query eliminating the possibility of SQL injection By using parameterized queries or prepared statements the database driver handles the proper escaping and sanitization of user inputs Employ Proper Authentication and Authorization MechanismsImplementing robust authentication and authorization mechanisms is essential to verify the identity of users and control their access to sensitive resources It involves strong password policies multi factor authentication and role based access control Implement Input Validation and SanitizationEnsuring the safety of user inputs is crucial in shielding against potential security risks like SQL injection and cross site scripting XSS attacks To achieve this developers must carefully validate and sanitize all data users provide By doing so they can effectively thwart any malicious code or unexpected characters from causing harm Prevent Cross Site Scripting XSS AttacksXSS attacks occur when malicious scripts are injected into web applications and executed in users browsers Developers should employ input validation output encoding and proper context aware escaping to mitigate the risk of XSS vulnerabilities Mitigate Cross Site Request Forgery CSRF VulnerabilitiesCSRF attacks trick users into performing unintended actions on web applications without their consent Developers should implement measures like anti CSRF tokens referrer header checks and strict checking of HTTP request methods to prevent CSRF attacks Protect Against SQL Injection AttacksSQL injection attacks are sneaky tricks that take advantage of weaknesses in web application databases by inserting harmful SQL queries But worry not developers have a powerful defense Using parameterized queries or prepared statements they can safeguard their databases from unauthorized access or manipulation It s like putting a sturdy lock on the door keeping those malicious intruders out for good Secure Session ManagementMaintaining secure session management is crucial to prevent session hijacking and unauthorized access to user accounts Developers should use secure session handling techniques such as generating unique session IDs enforcing session expiration and utilizing secure session storage mechanisms Encrypt Sensitive DataSensitive data such as passwords and personal information should be encrypted both in transit and at rest Developers should use robust encryption algorithms and ensure secure key management to protect confidential data from unauthorized access Regularly Update and Patch Application DependenciesOutdated or vulnerable application dependencies can pose significant security risks Developers should regularly update and patch libraries frameworks and plugins used in their web applications to leverage the latest security enhancements and bug fixes Implement Access Control MeasuresImplementing proper access control measures ensures that users can only access the resources they are approved to use Developers should apply the principle of least privilege implement role based access control RBAC and enforce access control through authentication mechanisms Bonus Web Application Security Best Practices Utilize Web Application Firewalls WAFs Web Application Firewalls WAFs provide an additional layer of security by inspecting and filtering HTTP traffic Developers should consider implementing WAFs to detect and prevent various types of web application attacks including SQL injection XSS and CSRF Conduct Regular Security Testing and AuditingRegular security testing and auditing help identify vulnerabilities and weaknesses in web applications Developers should perform penetration testing vulnerability scanning and code reviews to identify and remediate security issues proactively Perform Security Incident Response and Recovery PlanningDespite preventive measures security incidents may still occur Developers should have a well defined incident response and recovery plan to minimize security breaches impact It includes incident detection containment eradication and post incident analysis procedures ConclusionWeb application security is of paramount importance in today s digital landscape By following these Web application security best practices developers and businesses can significantly enhance their web applications security posture Prioritizing security from the initial development stages and adopting a proactive approach will help protect sensitive data maintain user trust and safeguard the overall integrity of web applications Want to secure your web application Reach to best web application development services provider today FAQs Frequently Asked Questions What is web application security Web application security is like a virtual shield that keeps our precious web applications safe and sound It s all about fending off potential dangers like those sneaky unauthorized access attempts data breaches that could expose sensitive information and those nasty malicious attacks that could wreak havoc With web application security standing guard we can rest assured that our online world remains protected and our users can interact with our apps without any worries Why is web application security important Web application security is crucial to ensure the confidentiality integrity and the availability of web applications and their underlying data It helps protect sensitive information and maintain user trust What are some common web application vulnerabilities Here are some common web application vulnerabilities like SQL injection cross site scripting XSS cross site request forgery CSRF and insecure authentication mechanisms How can developers prevent SQL injection attacks Developers can prevent SQL injection attacks by using parameterized queries or prepared statements validating and sanitizing user inputs and implementing proper access controls What is the role of web application firewalls WAFs in security Web Application Firewalls WAFs provide an additional layer of security by inspecting and filtering HTTP traffic helping to detect and prevent 2023-07-24 11:45:24
海外TECH DEV Community Yes! OpenTelemetry is a Critical Part of Securing Your Systems https://dev.to/mbogan/yes-opentelemetry-is-a-critical-part-of-securing-your-systems-f6g Yes OpenTelemetry is a Critical Part of Securing Your SystemsOpenTelemetry OTel is an open source standard used in the collection instrumentation and export of telemetry data from distributed systems As a framework widely adopted by SRE teams and security teams OTel is more than just one nice to have tool among many it is critical In this post we ll explore the role that OTel plays in system security We ll look at how telemetry data is used to secure systems along with how OTel securely handles telemetry data Then we ll consider concrete practicesーbasic and advancedーthat you can adopt as you use OTel in your organization Let s begin by looking at the relationship between system security and telemetry data Telemetry data is essentialRobust system security relies on the application of many practices including Defense in depthRisk mitigationGranular access controlEarly threat detection and responseResiliency and business continuityDesigning and implementing solid security requires a deep understanding of your systems coupled with high visibility into both your business systems and your security mechanisms That visibility comes through the capturing and monitoring of telemetry data Telemetry data logs metrics distributed tracing provides information about the normal behavior of a system By continuously collecting and analyzing this data security teams can establish baselines and thresholds that help identify deviations from the norm The role of telemetry data in securityTelemetry data is pivotal in enhancing the security posture of organizations It not only facilitates incident response and forensic investigations but also aids in proactive threat hunting and compliance auditing Its importance becomes even more pronounced when identifying patterns trends and possible indicators of compromise IOCs in complex systems thus enabling robust security measures and strategies OTel is the framework for working telemetry dataIn the quest for tools to help with collecting and normalizing telemetry data several options have come and gone However OTel has emerged as the industry standard for working with telemetry data It provides a standardized way to capture and transmit telemetry data across various components and services within your systems In addition to its role in instrumentation OTel brings secure practices to its handling of telemetry data OTel as instrumental to zero trust architectureOTel s focus on observability and telemetry data collection is enhanced and supported by various security capabilities First OTel ensures the secure transmission of telemetry data across distributed systems It supports secure communication protocols like HTTPS and gRPC which use Transport Layer Security TLS This ensures that telemetry data is encrypted during transmission protecting it from unauthorized access or tampering OTel can also leverage existing authentication strategies within your system By integrating OTel with authentication systems like OAuth JWT or API keys you ensure that only authorized entities can access and transmit telemetry data As per compliance policies your systems may need role based access control RBAC OTel instrumentation works within the boundaries of your RBAC policies By defining fine grained access control rules you can specify which authenticated users or services have permission to perform instrumentation actions or access telemetry data through an OTel collector OTel contributes significantly to auditing and compliance efforts By capturing logs as part of the telemetry data it provides visibility into the actions and behaviors of a distributed system This can be valuable for detecting security incidents investigating breaches and complying with regulatory requirements This is particularly true if your organization is using highly federated service mesh architecture The goal of which could be to separate customer data from a payment portal and the application data As the industry standard OTel enjoys seamless integration on the receiving end with countless systems and components that support OTel out of the box Similarly on the exporting end cloud providers and observability platforms support the ingestion of telemetry data from OTel Therefore a major advantage of using OTel is the avoidance of vendor technology lock in If you want to use multiple collection agents for logs metrics security event data traces or migrate away from a specific vendor you can do so without losing all the hard work you put into instrumenting your applications and the processes you created around monitoring Finally the OTel project actively involves the developer community in addressing security related concerns Through community contributions code reviews and security audits efforts are made to identify and mitigate potential security vulnerabilities Regular updates and patches are released to address any security issues discovered ensuring a more secure framework Now that we ve looked at the what let s look at the how How might you enhance the security of your systems with telemetry data and OTel Best practices for securing your systems with OTelLet s consider concrete steps that you can take to begin securing your systems with OTel Identify applications and security componentsBefore you can effectively instrument your system for security you must first identify which parts would be the most beneficial to instrument Identify your applications and the security components of your system The security related components include FirewallsIntrusion detection systems IDS Antivirus softwareAuthentication mechanisms Use auto instrumentation to quickly collect logs metrics and trace dataUse OTel libraries to instrument the components you ve identified Instrumentation allows you to capture relevant telemetry data from these components Define and collect data from the applications and security components to monitor their health and performance Metrics such as CPU usage memory utilization network traffic and event counts can provide insights into your system s overall health and resource utilization OTel allows you to define and capture custom metrics specific to your security infrastructure Log security eventsUse the distributed tracing capabilities of OTel to trace security events across different components and services By capturing traces you can gain visibility into the flow of security related activities identify bottlenecks and analyze the effectiveness of security controls Traces help you understand the sequence of events during security incidents or breaches aiding in incident response and forensic investigations Export and visualize security related telemetry dataConfigure OTel exporters to transmit the collected telemetry data to backend systems for storage analysis and visualization Choose an appropriate observability platform You can use open source solutions such as Grafana Prometheus and Elasticsearch Or you can use a comprehensive turnkey integrated platform like Sumo Logic to receive and process all of the telemetry data in the form of logs metrics traces and events These platforms provide dashboards and visualization tools to monitor and analyze your system s real time health performance and security Enable alerts on anomaly detectionSet up alerting mechanisms based on predefined thresholds or anomaly detection algorithms By leveraging the collected telemetry data you can configure alerts to notify security teams when certain metrics or events fall outside of normal or expected ranges This enables proactive monitoring rapid incident response and the mitigation of potential security breaches Use logs for incident investigationBy combining distributed traces with application logs you bring context that can help reconstruct the sequence of events leading up to an incident Utilize all the information to perform a root cause analysis and better understand the impact of the incident Define log filtering and retention policies to ensure you have the relevant data and enough historic context Balance the amount and duration of logs you keep with the storage cost The above list would be considered baseline practices for organizations seeking to use OTel for enhancing system security If you re looking to level up your security practices the following advanced practices may interest you Advanced security practices with OTelAdvanced security analysis with OTel can provide valuable insights and capabilities to further enhance security monitoring and incident response Let s look at three key opportunities Leverage metadata to aid in security analysis and auditingOTel allows you to attach custom metadata to telemetry data You might attach user IDs transaction IDs or any other contextual information relevant to security analysis and auditing By incorporating this metadata you can enrich the telemetry data with additional details that might aid you in the following ways Identifying the source of security eventsTracing the actions of specific users or transactionsConducting forensic investigations during security incidents Identify deviations from policies and best practicesTelemetry data collected by OTel can play a vital role in identifying deviations from security policies and best practices within your systems By defining policies and desired security configurations you can compare the telemetry data against these benchmarks to identify any deviations or non compliant behaviors Automatic incident response with AIOpsWhen telemetry data collected and exported by OTel is used in conjunction with AIOps tools you can implement proactive security measures such as automatic incident response By using machine learning algorithms and anomaly detection techniques to analyze system telemetry data you can identify patterns of unusual behavior and potential security threats The result is early detection of incidentsーor even prediction of potential incidents You can couple this early detection with an automatic response or simply collect and consolidate the relevant information devising an action plan which your human security engineers can approve and apply ConclusionCapturing and monitoring telemetry data is essential if you are to understand your systems and keep them secure With it you can detect anomalous system behavior identify policy deviations and enable rapid incident response OTel is a powerful frameworkーthe industry standardーfor collecting and analyzing telemetry data in systems It provides security capabilities such as secure data transmission authentication integration access control and auditing With OTel you can instrument applications and security components to collect metrics and trace security events As you export that telemetry data to observability platforms you can visualize your data and set up alerts By combining telemetry data with AIOps tools you unlock capabilities for early incident detection and automatic incident response The ability to secure your systems ultimately revolves around your adoption of OTel Without it you cut off access to an essential tool that helps you gather the data you need for effective security incident detection and response 2023-07-24 11:26:04
Apple AppleInsider - Frontpage News Beats Studio Pro vs. Beats Studio 3 -- compared https://appleinsider.com/inside/beats-by-dre/vs/beats-studio-pro-vs-beats-studio-3----compared?utm_medium=rss Beats Studio Pro vs Beats Studio comparedAfter months of rumors Beats officially announced the new Studio Pro over ear headphones with a design reminiscent of the Studio and a lot has changed in five years Here s how the two models specs batteries and more compare Beats Studio Pro and Beats Studio Over the years Beats has made its name for distinct style and sound while bridging the gap between both iOS and Android as far as features are concerned In Beats are just as recognizable as Apple s headphones or offerings from Sony Bose and others Read more 2023-07-24 11:40:22
Apple AppleInsider - Frontpage News Spotify announces Premium price increase worldwide https://appleinsider.com/articles/23/07/24/spotify-announces-premium-price-increase-worldwide?utm_medium=rss Spotify announces Premium price increase worldwideSpotify Premium will now cost more per month in the US and the service is increasing an equivalent amount in over other countries Credit SpotifyAn increase to the US pricing was recently rumored as Spotify struggles to stay profitable However it was expected that the US increase would come perhaps months before the rest of the world and instead Spotify as announced it across the board Read more 2023-07-24 11:37:42
Apple AppleInsider - Frontpage News Apple is considering making the iPhone 15 Pro more expensive https://appleinsider.com/articles/23/07/24/apple-is-considering-making-the-iphone-15-pro-more-expensive?utm_medium=rss Apple is considering making the iPhone Pro more expensiveApple is reportedly looking to keep iPhone shipments steady year over year and is looking to increase its revenue by raising the price of the iPhone Pro models Render of the iPhone Pro by AppleInsiderBefore the COVID pandemic and then during chip supply problems in China Apple had been tending to produce million iPhones annually For each of the last two tumultuous years it has been ordering around million and now Bloomberg says that s the new target for too Read more 2023-07-24 11:08:16
海外TECH Engadget Spotify raises the price of its Premium plans https://www.engadget.com/spotify-raises-iprice-of-premium-plans-115138529.html?src=rss Spotify raises the price of its Premium plansListening to your favorite songs uninterrupted is about to get a little pricier Spotify has announced it s raising the price of all its Premium plans In the United States this means a Premium Single subscription is going from a month to a month ーits first increase since Spotify launched over a decade ago Its Premium Family and Student plans are also going up by a dollar now costing and per month respectively Premium Duo has the largest bump going up two dollars per month from to The move follows similar price hikes by competitors with Apple Music Amazon Music and YouTube Music all raising their ad free individual plans to in the past year Last October Spotify CEO Daniel Ek seemed to revel in other companies increased costs quot When our competitors are raising their prices that is really good for us quot At the time Ek said he would like to charge more for subscriptions especially in the US and felt confident Spotify would be able to in nbsp People keep coming to Spotify with the music streamer reporting five million more users during s first quarter worldwide and an extra a year might not impact that much Updated prices are rolling out in countries across the world from the United Kingdom to Thailand Spotify says it will contact users via email to share how much their bill will go up and when it will happen nbsp This article originally appeared on Engadget at 2023-07-24 11:51:38
海外TECH Engadget The best MacBooks for 2023: How to pick the best Apple laptop https://www.engadget.com/best-macbook-140032524.html?src=rss The best MacBooks for How to pick the best Apple laptopWhether you re looking to replace an aging MacBook or are diving into Apple hardware for the first time Apple s laptop lineup is not as simple as it seems There are just two options the MacBook Air and MacBook Pro but depending on the configuration a new MacBook can cost between and so there s considerable variation between the two makes All current models run on the company s own M series processors that combine CPU GPU unified memory and other functions on a single chip giving the latest MacBooks longer battery lives better multitasking performance and faster operating speeds over the previous Intel chips If you re not sure which model would work best for you we re here to make things a little more clear Based on our testing here s what we think are the best MacBooks for everyone from students to power users Best overall MacBook Air MOur resident laptop expert Devindra Hardawar called the MacBook Air M a “near perfect Mac in his review awarding it a high score of It s the newer of the two Air models Apple still sells and notably a better buy than the inch MacBook Pro as the latter is both heavier and more expensive The Air was built around the new M chip and completely refreshed for with a new squared off design that ditches the wedge shape The inch Liquid Retina screen hits up to nits making it both bigger and brighter than the previous generation The Hz refresh rate doesn t deliver the butter smooth scrolling you get on Pro models but it s lovely nonetheless The quad speaker array pumps out great sound filling a room at max volume without distortion and the three mic array does a good job of picking up your voice for video calls The p webcam is an improvement over previous generations It even beats our top Windows laptop Dell s XPS Plus which still sports a p camera but Devindra found the image the Air captures to be drab Despite being thinner than ever the M Air manages to hang on to its mm headphone jack and includes two USB C Thunderbolt ports and a MagSafe connector That means you don t have to block a potential data port while charging The battery life is ample lasting hours and minutes in our rundown test which should be more than enough for a day or two of work The M chip gives the Air enough speed to play games particularly those from Apple Arcade Streaming and cloud gaming work well through Safari and you ll find a handful of compatible titles on Steam However many of the bigger AAA releases still aren t compatible with Macs though Apple is looking to change that Our review unit performed well in benchmark tests beating the Air M and nearly matching the performance of the inch MacBook Pro M It s a fanless system which means it s quiet but to keep things cool the CPU does have to be throttled occasionally Overall it s an excellent choice for everyday use and can handle most tasks Of course if you re planning on doing intensive video editing you ll likely want something more powerful such as the MacBook Pro M but the Air is arguably the best multipurpose ultraportable laptop that Apple makes Our review MacBook Air had an M chip with a core GPU along with GB of memory and TB of storage That configuration will run you We think the processing power of the Air is plenty capable without the GPU bump and the terabyte of storage is probably overkill for most casual users Instead we recommend the setup with an core GPU GB of memory and GB of SSD storage The inch Air is certainly the way to go for anyone that prizes portability above all else However if slightly more screen real estate is tempting to you don t sleep on the inch MacBook Air M The new laptop does everything that inch model does well while giving you a larger screen to work with in a still svelte package It doesn t side step the very Apple issue of having a little less RAM and storage than we d prefer in its base model GB GB SSD but that doesn t hold it back It s one of the best MacBooks we ve used recently and it gives fans of the Air lineup a new configuration to consider And since it s starting price is only more than that of the inch Air the jump isn t as cost prohibitive as say the inch MacBook Pro which starts at a whopping Read our full review of the inch Apple MacBook Air MBest budget option MacBook Air MThe MacBook Air M may not have the most current Apple silicon but it gets so much right that it s still an excellent laptop and probably the best MacBook for college students It earned a high score of in our review and Devindra declared it one of the fastest ultraportables you could buy at the time Of course now that the M is on the scene its numbers are comparatively less impressive but with a base price of and often on sale for less it s a relatively affordable way for students or those with tight budgets to snag an entry level machine that s both fast and capable The Air s inch Retina display looks beautiful and is ideal for binge sessions The laptop s sturdy wedge shaped unibody case weighs just pounds making it easy to take to class or work You can even fire it up in the quietest library without making a sound thanks to a heat sink and passive cooling that eliminate the need for a fan The keyboard offers a satisfying amount of depth despite its thin profile and the trackpad is smooth The performance of the M chip really makes the MacBook Air M stand out It s impressively responsive launching apps nearly instantly and running them effortlessly Safari delivers a slick browsing experience loading complex pages quickly The M chip is also behind the Air s great battery life We managed to get hours and minutes during our video rundown test which should be more than enough to get you through a full day grind Of course it s not without drawbacks The M Air houses a p webcam which isn t as sharp as the M Air s p camera and it only comes with two Thunderbolt ports and a headphone jack If you re charging your computer there s only one available plug for accessories There s no SD card slot either and since Apple hardware isn t the easiest to upgrade yourself you ll want to buy all the storage you need right out of the gate We recommend sticking with the base configuration GB RAM GB SSD if you ll mostly be using web based programs and cloud based apps For an extra you can upgrade to GB of memory which is good if you stream heavily like to have a lot of open tabs or want to run a ton of apps at once Alternatively the same amount could get you GB of storage if you want to keep a lot of files and photos locally Read our full review of the inch Apple MacBook Air MBest for creatives MacBook Pro M nbsp The and inch MacBook Pros came out in January of both using more powerful versions of the M chip the M Pro and the M Max For creatives the new machines are a blessing positioning them as the best MacBooks for video editing and music production The inch MacBook Pro with a core GPU M Pro chip can easily handle K video editing effects processing and whichever Mac compatible digital audio workstation you prefer The inch screen is a bright and vibrant MiniLED Liquid Retina XDR display with a Hz refresh rate for smooth scrolling and animations A six speaker array produces crisp punchy sound that s better than what most laptops can deliver and the built in mics are great for video calls As you d expect with a Pro model you get a full complement of ports including an SD card slot headphone jack HDMI port and three Thunderbolt sockets There s even a MagSafe power connector dedicated to charging We got a respectable hours and minutes of battery life out of the inch model and according to Apple the inch model can get up to hours on a charge If you re planning on processing a lot of K video complex D scenes or more expansive music compositions you may want the better performance provided by the faster M Max chip In that case we recommend the inch MacBook Pro as its larger battery can better match the chip s higher power consumption As long as cost isn t a deciding factor the inch Pro with the M Max is the way to go It s one of the more powerful MacBooks available with a bigger screen core CPU core GPU GB of memory and TB of storage Those options will run you but should serve even the most demanding user well for years Read our full review of the Apple MacBook Pro MThis article originally appeared on Engadget at 2023-07-24 11:45:49
海外TECH Engadget The Morning After: Twitter rebrands itself as X and ditches the bird https://www.engadget.com/the-morning-after-twitter-rebrands-itself-as-x-and-ditches-the-bird-111524841.html?src=rss The Morning After Twitter rebrands itself as X and ditches the birdIn a series of tweets last Saturday Musk said the company s famous bird logo and name would soon disappear The company will change from Twitter to “X According to Platformer Musk emailed staff later over the weekend saying the company would become X and his note “was the last email he ll ever send from a Twitter email address And a lot of those changes have now happened Twitter s own account is now all “X branding and it s rolled out quickly elsewhere Twitter employees are getting an “X tag to their Twitter handles next to their blue check while the “X logo has already been projected on a building like a bat signal for self aggrandizing tech executives and their minions I m still not sure what this tweet X even means X com was once an online bank co founded by Musk in It eventually became PayPal and was bought by eBay Of course we already have SpaceX his recently announced AI venture is called xAI and Twitter s holding company was rammed to X Corp in April Musk has also talked about how X would help Twitter become an “everything app Terms that still need to be rebranded subtweets retweets fail whales Mat SmithYou can get these reports delivered daily direct to your inbox Subscribe right here The biggest stories you might have missedChatGPT s Android app arrives in the last week of July Star Trek Strange New Worlds season will include a musical episode Oppenheimer review Sympathy for the destroyer of worlds What we bought Engadget s favorite backpacksSummer Samsung Unpacked What to expect Engadget Podcast How AI created a South Park episode around usPlus we chat with the director and writers of Netflix s They Cloned Tyrone AI can now place us inside South Park episodes should we be worried This week Devindra and Deputy Editor Nathan Ingraham chat with Edward Saatchi the CEO of The Simulation about his company s new AI technology that can generate TV episodes movies and more We preview a test South Park episode featuring Devindra and discuss if this technology is actually a good thing for creatives Also Editor at Large James Trew joins to discuss his piece on AI powered immortality Continue reading Redditors troll AI content farm into covering a fake WoW featureThe hugely anticipated Glorbo feature is not a feature BlizzardSome redditors were very excited about a new World of Warcraft feature called Glorbo Just one problem Glorbo isn t real Their faux enthusiasm for Glorbo caught the attention of a blog named The Portal which publishes quot gaming content powered by Z League quot often tenuously rewritten subreddit scraping seemingly done by AI We hope it s not a human Redditor u kaefer kriegerin noticed The Portal was turning discussions from some gaming subreddits into blog posts They decided to try to trick the content farm into covering a fake WoW feature The ruse was a success The Portal s now deleted blog post even quoted u kaefer kriegerin as stating quot Honestly this new feature makes me so happy I just really want some major bot operated news websites to publish an article about this quot Continue reading Our favorite VPN is Express VPNIt s the best one for gaming and streaming The best VPNs stay out of your way and you ll barely even notice they re running But ExpressVPN internet speeds outperformed even our baseline internet speed measures The service is likely circumventing traffic shaping by the internet service provider or a similar anomaly because every other VPN will hurt internet speed in some way It was also easy to access geo blocked content using ExpressVPN with little to no buffering which is the cheeky reason a lot of us invest in a VPN Continue reading ​​This article originally appeared on Engadget at 2023-07-24 11:15:24
医療系 医療介護 CBnews 介護報酬の訪問看護、ターミナルケアなど推進へ-特定行為研修修了者の活用を複数委員が求める https://www.cbnews.jp/news/entry/20230724204232 介護報酬 2023-07-24 21:00:00
医療系 医療介護 CBnews 訪問介護、ICT化による業務効率化への評価を-介護給付費分科会・委員 https://www.cbnews.jp/news/entry/20230724195521 介護報酬 2023-07-24 20:47:00
海外ニュース Japan Times latest articles As Japan aligns with U.S. chip curbs on China, some in Tokyo feel uneasy https://www.japantimes.co.jp/news/2023/07/24/business/tech/japan-china-chip-curbs-unease/ electric 2023-07-24 20:00:49
ニュース BBC News - Home George Alagiah: BBC journalist and newsreader dies aged 67 https://www.bbc.co.uk/news/entertainment-arts-65949435?at_medium=RSS&at_campaign=KARANGA british 2023-07-24 11:41:32
ニュース BBC News - Home Watch: George Alagiah's extraordinary career https://www.bbc.co.uk/news/uk-66200509?at_medium=RSS&at_campaign=KARANGA longest 2023-07-24 11:10:53
ニュース BBC News - Home Rhodes fires: Rhodes rescue flights under way as fires continue https://www.bbc.co.uk/news/uk-66286741?at_medium=RSS&at_campaign=KARANGA british 2023-07-24 11:39:02
ニュース BBC News - Home Ukraine war: Russia attacks grain stores at River Danube ports https://www.bbc.co.uk/news/world-europe-66289136?at_medium=RSS&at_campaign=KARANGA member 2023-07-24 11:05:15
ニュース BBC News - Home 'Barbenheimer' sparks biggest UK box office opener since 2019 https://www.bbc.co.uk/news/entertainment-arts-66288459?at_medium=RSS&at_campaign=KARANGA barbenheimer 2023-07-24 11:48:11
ニュース BBC News - Home Spain's conservatives miss out on all-out victory as left celebrates https://www.bbc.co.uk/news/world-europe-66285245?at_medium=RSS&at_campaign=KARANGA parties 2023-07-24 11:34:29
ニュース BBC News - Home Michael Gove relaxes planning rules to create more homes in city centres https://www.bbc.co.uk/news/uk-politics-66287810?at_medium=RSS&at_campaign=KARANGA struggle 2023-07-24 11:10:23
ニュース BBC News - Home Elon Musk: Twitter unveils X logo to replace blue bird https://www.bbc.co.uk/news/business-66284304?at_medium=RSS&at_campaign=KARANGA billionaire 2023-07-24 11:42:56
ニュース BBC News - Home Greece fires: What are holidaymakers' rights? https://www.bbc.co.uk/news/business-66288521?at_medium=RSS&at_campaign=KARANGA holidaymakers 2023-07-24 11:38:32
ニュース BBC News - Home Israel judicial reform: Water cannon used outside parliament ahead of key vote https://www.bbc.co.uk/news/world-middle-east-66258416?at_medium=RSS&at_campaign=KARANGA cannon 2023-07-24 11:41:26
ニュース BBC News - Home Kylian Mbappe: Al Hilal 'make £259m offer' for PSG and France forward https://www.bbc.co.uk/sport/football/66291108?at_medium=RSS&at_campaign=KARANGA Kylian Mbappe Al Hilal x make £m offer x for PSG and France forwardSaudi Arabian side Al Hilal make a world record £m bid for Paris St Germain forward Kylian Mbappe reports the Press Association 2023-07-24 11:06:28
ビジネス 東洋経済オンライン 損保ジャパン、ビッグモーター問題で社外調査へ 大量出向者で問われる保険金不正請求の癒着 | 金融業界 | 東洋経済オンライン https://toyokeizai.net/articles/-/689338?utm_source=rss&utm_medium=http&utm_campaign=link_back 損保ジャパン 2023-07-24 20:05:00

コメント

このブログの人気の投稿

投稿時間:2021-06-17 05:05:34 RSSフィード2021-06-17 05:00 分まとめ(1274件)

投稿時間:2021-06-20 02:06:12 RSSフィード2021-06-20 02:00 分まとめ(3871件)

投稿時間:2020-12-01 09:41:49 RSSフィード2020-12-01 09:00 分まとめ(69件)