並び順

ブックマーク数

期間指定

  • から
  • まで

321 - 360 件 / 1749件

新着順 人気順

first order modelの検索結果321 - 360 件 / 1749件

  • The life and times of an Abstract Syntax Tree

    By Francesco Bertolaccini You’ve reached computer programming nirvana. Your journey has led you down many paths, including believing that God wrote the universe in LISP, but now the truth is clear in your mind: every problem can be solved by writing one more compiler. It’s true. Even our soon-to-be artificially intelligent overlords are nothing but compilers, just as the legends foretold. That sma

      The life and times of an Abstract Syntax Tree
    • How I Hacked Google App Engine: Anatomy of a Java Bytecode Exploit

      Back in college, I was very interested in Java bytecode. When I got an internship at Google in 2013, I was skeptical of the security of the Java version of Google App Engine and got permission to spend the last week of my internship doing a mini red team exercise, trying to break into App Engine. This is the story of how I found a vulnerability and developed an exploit to break out of the App Engi

      • Rails 8.0 Changelog(全項目リンク付き)|TechRacho by BPS株式会社

        【速報】Rails 8.0.0がリリースされました Rails 8.0(v8.0.0タグ)は、7.2.0リリースから半年後のリリースということもあり、メジャーリリースとしてはChangelogの変更件数が少なめなのが特徴です。機能面では、Strong Parametersのexpect追加や、MySQL 5.5のサポート廃止が目につきます。大きなbreaking changesも今のところ見当たりません。 rails/rails at v8.0.0 以下、Rails 8.0のChangelogを件数の多い順に見ていきます。なお、原則として削除のChangelogは、その項目が非推奨化されたときのプルリク情報にリンクしています。 なお、以下の機能にはChangelogがありません。 Action Mailbox Action Mailer 🔗 Active Record(56件) Rail

          Rails 8.0 Changelog(全項目リンク付き)|TechRacho by BPS株式会社
        • Visual Studio Code September 2020

          Version 1.93 is now available! Read about the new features and fixes from August. September 2020 (version 1.50) Update 1.50.1: The update addresses these issues. Downloads: Windows: x64 Arm64 | Mac: Intel | Linux: deb rpm tarball Arm snap Welcome to the September 2020 release of Visual Studio Code. There are a number of updates in this version that we hope you will like, some of the key highlights

            Visual Studio Code September 2020
          • CLIP: Connecting text and images

            We’re introducing a neural network called CLIP which efficiently learns visual concepts from natural language supervision. CLIP can be applied to any visual classification benchmark by simply providing the names of the visual categories to be recognized, similar to the “zero-shot” capabilities of GPT-2 and GPT-3. Although deep learning has revolutionized computer vision, current approaches have se

              CLIP: Connecting text and images
            • Text Editor Data Structures

              Text editors can be an interesting challenge to program. The types of problems that text editors need to solve can range from trivial to mind-bogglingly difficult. Recently, I have been on something of a spiritual journey to rework some internal data structures in an editor I have been building, specifically the most fundamental data structure to any text editor: the text. Table of Contents Resour

                Text Editor Data Structures
              • What I Worked On

                February 2021 Before college the two main things I worked on, outside of school, were writing and programming. I didn't write essays. I wrote what beginning writers were supposed to write then, and probably still are: short stories. My stories were awful. They had hardly any plot, just characters with strong feelings, which I imagined made them deep. The first programs I tried writing were on the

                • GORM v2 触ってみた Major Features 編 - Techtouch Developers Blog

                  この記事はテックタッチアドベントカレンダー3日目の記事です。2日目は国定による「TypeScript 4.1 に更新しました」でした。 SREチームの taisa です。「愛の不時着」をきっかけに韓国ドラマにハマっています。最近は「スタートアップ」と「梨泰院クラス」をみています。Netflix な毎日です。 今回は「GORM v2 Major Features 編」ということで、今年8月にリリースされた GORM v2 の新機能をリリースノートに従って簡単に動かしてみたので紹介します。テックタッチのバックエンドは Go で実装していて ORM には GORM v1 を利用しています。v2 の Major Features と Breaking Changes をチェックして v2 へのアップデートも検討したいところです。 公式ドキュメント GORM v2 リリースノート v1 のファイル構

                    GORM v2 触ってみた Major Features 編 - Techtouch Developers Blog
                  • Building D1: a Global Database

                    This post is also available in Deutsch, Español, Français, 繁體中文, 简体中文, 日本語 and 한국어. Developers who build Worker applications focus on what they're creating, not the infrastructure required, and benefit from the global reach of Cloudflare's network. Many applications require persistent data, from personal projects to business-critical workloads. Workers offer various database and storage options ta

                      Building D1: a Global Database
                    • Deep learning and Physics

                      「ディープラーニングと物理学 オンライン」とはオンラインWeb会議システムを利用したセミナーです。2023年10月より、学習物理領域セミナーと合同で開催されています。 登録する際のメールアドレスは、できるだけ大学もしくは研究機関のものをご使用ください。 ZoomのミーティングURLおよびパスワードは、先着順300名様に限り、登録されたメールアドレスに送信されます。転載・転送は控えてください。 URLが掲載されたメールは当日の朝までに送られます。 参加したい方は下記よりお申し込みください。毎回開催時に参加URLのついたアナウンスのメールを送信します。 登録フォーム (締切は前日の夜11時までとします) 解約フォームは下記でございます。 解約フォーム 参加時の表示名は「登録時の名前@登録した機関名」に設定してください。 ノイズを防ぐためのミュートへご協力ください。 DLAP世話人: 橋本幸士(

                      • IBM, Red Hat and Free Software: An old maddog’s view

                        IBM, Red Hat and Free Software: An old maddog’s view Copyright 2023 by Jon “maddog” Hall Licensed under Creative Commons BY-SA-ND Photo: © Santiago Ferreira Litowtschenko Several people have opined on the recent announcement of Red Hat to change their terms of sales for their software.  Here are some thoughts from someone who has been around a long time and been in the midst of a lot of what occur

                          IBM, Red Hat and Free Software: An old maddog’s view
                        • SSID Confusion Attack WiFi Vulnerability (CVE-2023-52424)

                          This vulnerability exploits a design flaw in the WiFi standard, allowing attackers to trick WiFi clients on any operating system into connecting to a untrusted network. A new vulnerability arising from a design flaw in the WiFi standard allows attackers to trick victims into connecting to less secure networks and intercept their traffic. Additionally, the attack can exploit the auto-disconnect fea

                            SSID Confusion Attack WiFi Vulnerability (CVE-2023-52424)
                          • Golang Select Query [PostgreSQL MySQL]

                            # APITo see the full list of supported methods, see SelectQueryopen in new window. db.NewSelect(). With("cte_name", subquery). Model(&strct). Model(&slice). Column("col1", "col2"). // quotes column names ColumnExpr("col1, col2"). // arbitrary unsafe expression ColumnExpr("count(*)"). ColumnExpr("count(?)", bun.Ident("id")). ColumnExpr("(?) AS alias", subquery). ExcludeColumn("col1"). // all column

                            • Enforcing Modularity in Rails Apps with Packwerk - Shopify

                              Enforcing Modularity in Rails Apps with PackwerkPackwerk is an open source static analysis tool used to enforce boundaries between groups of Ruby files we call packages. On September 30, 2020 we held ShipIt! presents: Packwerk by Shopify. A video for the event is now available for you to learn more about our latest open source tool for creating packages with enforced boundaries in Rails apps. Clic

                                Enforcing Modularity in Rails Apps with Packwerk - Shopify
                              • Best of arXiv.org for AI, Machine Learning, and Deep Learning – July 2020 - insideAI News

                                Best of arXiv.org for AI, Machine Learning, and Deep Learning – July 2020 In this recurring monthly feature, we filter recent research papers appearing on the arXiv.org preprint server for compelling subjects relating to AI, machine learning and deep learning – from disciplines including statistics, mathematics and computer science – and provide you with a useful “best of” list for the past month.

                                  Best of arXiv.org for AI, Machine Learning, and Deep Learning – July 2020 - insideAI News
                                • Code Red: The Business Impact of Code Quality– A Quantitative Study of 39 Proprietary Production Codebases

                                  Code Red: The Business Impact of Code Quality – A Quantitative Study of 39 Proprietary Production Codebases Adam Tornhill CodeScene Malmö, Sweden adam.tornhill@codescene.com Markus Borg RISE Research Institutes of Sweden Lund University Lund, Sweden markus.borg@ri.se ABSTRACT Code quality remains an abstract concept that fails to get traction at the business level. Consequently, software companies

                                  • MY FIRST CSS | Kablamo Engineering Blog

                                    My First CSSWhat I Wish I Knew About CSS When Starting Out As A Frontender CSS can be hard to grasp when you're starting out. It can seem like magic wizardry and you can very easily find yourself playing whack-a-mole adjusting one property only to have something else break. It is frustrating, and that was my experience for quite a long time before things suddenly seemed to "click". Reflecting back

                                      MY FIRST CSS | Kablamo Engineering Blog
                                    • TensorFlow.js for React Native is here!

                                      Posted by Yannick Assogba, Software Engineer, Google Research, Brain team We are pleased to announce that TensorFlow.js for React Native is now available for general use. We would like to thank everyone who gave us feedback, bug reports, and contributions during the alpha release and invite the broader community of React Native developers to try it out! What is React Native?JavaScript runs on a wi

                                        TensorFlow.js for React Native is here!
                                      • How browsers work  |  Articles  |  web.dev

                                        How browsers work Stay organized with collections Save and categorize content based on your preferences. Preface This comprehensive primer on the internal operations of WebKit and Gecko is the result of much research done by Israeli developer Tali Garsiel. Over a few years, she reviewed all the published data about browser internals and spent a lot of time reading web browser source code. She wrot

                                        • The evolution of scalable CSS

                                          The evolution of scalable CSSA deep dive into the problems with scaling CSS on large projects. Understand the evolution of CSS best practices. IntroductionHow we write and think about CSS has changed significantly since the web’s beginning. We’ve come a long way from table-based layouts, to responsive web design, and now into a new era of adaptive layouts powered by modern CSS features. Managing a

                                            The evolution of scalable CSS
                                          • AWS RDS Vulnerability Leads to AWS Internal Service Credentials

                                            AWS RDS Vulnerability Leads to AWS Internal Service Credentials TL; DR Lightspin's Research Team obtained credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension. The internal AWS service was connected to AWS internal account, related to the RDS service. The vulnerability was reported to AWS Security team, who right a

                                            • Edge AI Just Got Faster

                                              When Meta released LLaMA back in February, many of us were excited to see a high-quality Large Language Model (LLM) become available for public access. Many of us who signed up however, had difficulties getting LLaMA to run on our edge and personal computer devices. One month ago, Georgi Gerganov started the llama.cpp project to provide a solution to this, and since then his project has been one o

                                                Edge AI Just Got Faster
                                              • Investigating TLS blocking in India

                                                Simone Basso (OONI), Gurshabad Grover and Kushagra Singh (Centre for Internet and Society, India) 2020-07-08 This report investigates Transport Layer Security (TLS)-based blocking in India. Previous research by the Centre for Internet & Society, India (CIS) has already exposed TLS blocking based on the value of the SNI field. OONI has also implemented and started testing SNI-based TLS blocking mea

                                                  Investigating TLS blocking in India
                                                • How Does BlueSky Work?

                                                  Feb 24 2024 One of the reasons I am enthusiastic about BlueSky is because of the way that it works. So in this post, I am going to lay out some of the design and the principles behind this design, as I understand them. I am not on the BlueSky team, so these are my takes only. Let’s begin. Why does BlueSky exist? Here’s what the BlueSky Website says right now: Social media is too important to be co

                                                  • diziet | MessagePack vs CBOR (RFC7049)

                                                    tl;dr: Use MessagePack, rather than CBOR. Introduction I recently wanted to choose a binary encoding. This was for a project using Rust serde, so I looked at the list of formats there. I ended up reading about CBOR and MessagePack. Both of these are binary formats for a JSON-like data model. Both of them are "schemaless", meaning you can decode them without knowing the structure. (This also provid

                                                    • Error Handling Survey

                                                      Error Handling Survey — 2019-11-13 introduction libraries error-chain failure context-attribute err-derive auto_enums snafu fehler anyhow thiserror std::error::error features returning result from main error-based assertions causes backtraces creating errors from strings early returns with string errors context on result custom errors other / miscellaneous try blocks verbose io errors error pointe

                                                        Error Handling Survey
                                                      • OpenAI API の Structured Outputs の使い方|npaka

                                                        以下の記事が面白かったので、簡単にまとめました。 ・Introducing Structured Outputs in the API 1. Structured Outputs昨年のDevDayで、「JSONモード」を導入しました。これは、OpenAIのモデルを使用して信頼性の高いアプリを構築しようとしている開発者にとって便利な構成要素です。「JSONモード」は、有効なJSON出力を生成するためのモデルの信頼性を向上させますが、モデルの応答が特定のスキーマに準拠することを保証するものではありません。本日、APIに「Structured Outputs」を導入します。これは、モデルによって生成された出力が、開発者が提供するJSONスキーマと完全に一致するように設計された新機能です。 複雑なJSONスキーマのフォローの評価では、「Structured Outputs」を備えた新しいモデル「g

                                                          OpenAI API の Structured Outputs の使い方|npaka
                                                        • AWS Organizations now provides a simple, scalable and more secure way to close your member accounts | Amazon Web Services

                                                          AWS Cloud Operations & Migrations Blog AWS Organizations now provides a simple, scalable and more secure way to close your member accounts Today, you can centrally close member accounts in your AWS organization enabling easier and more efficient account management of your AWS environment. This means you’re able to close member accounts from your organization’s management account without needing to

                                                            AWS Organizations now provides a simple, scalable and more secure way to close your member accounts | Amazon Web Services
                                                          • Implementing Undo History | Redux

                                                            Building an Undo and Redo functionality into an app has traditionally required conscious effort from the developer. It is not an easy problem with classical MVC frameworks because you need to keep track of every past state by cloning all relevant models. In addition, you need to be mindful of the undo stack because the user-initiated changes should be undoable. This means that implementing Undo an

                                                              Implementing Undo History | Redux
                                                            • LAION-5B: A NEW ERA OF OPEN LARGE-SCALE MULTI-MODAL DATASETS | LAION

                                                              The metadata files are parquet files that contain the following attributes: URL, TEXT, the cosine similarity score between the text and image embedding and height and width of the image. Watermark and safety tags can be joined with the metadata prior to downloading by using this script. Once that is done, they can easily be filtered upon with a probability threshold at your choice (we recommend 0.

                                                                LAION-5B: A NEW ERA OF OPEN LARGE-SCALE MULTI-MODAL DATASETS | LAION
                                                              • 18-956 Google LLC v. Oracle America, Inc. (04/05/2021)

                                                                1 (Slip Opinion) OCTOBER TERM, 2020 Syllabus NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus constitutes no part of the opinion of the Court but has been prepared by the Reporter of Decisions for the convenience of the reader. See United States v. Detroit Timber & Lumber Co., 200 U. S

                                                                • Automatic Class Sorting with Prettier - Tailwind CSS

                                                                  People have been talking about the best way to sort your utility classes in Tailwind projects for at least four years. Today we’re excited to announce that you can finally stop worrying about it with the release of our official Prettier plugin for Tailwind CSS. This plugin scans your templates for class attributes containing Tailwind CSS classes, and then sorts those classes automatically followin

                                                                    Automatic Class Sorting with Prettier - Tailwind CSS
                                                                  • Transactions blocks with endless methods

                                                                    I previously wrote a quick intro to the endless method in Ruby and now I will try to use it to name transaction blocks in Rails. This is a technique Kasper Timm Hansen shared in a reply to my previous post. I will try to refactor some examples from two open-source Rails repositories just to explore how the code looks. This open-ended exercise is a playground for experimenting with the code shape a

                                                                      Transactions blocks with endless methods
                                                                    • The Top 100 Video Games of All Time - IGN

                                                                      100. Borderlands 2The original Borderlands captured the attention of gamers, seemingly from out of nowhere, and its sequel took everything that made the original great and expanded on it. From its seamless continuation of the Borderlands vault hunting lore, to its unmatched writing, Borderlands 2 remains the high point in the Borderlands franchise. Borderlands 3 is overflowing with improvements ov

                                                                        The Top 100 Video Games of All Time - IGN
                                                                      • 0.8.0 Release Notes ⚡ The Zig Programming Language

                                                                        Tier 4 Support § Support for these targets is entirely experimental. If this target is provided by LLVM, LLVM may have the target as an experimental target, which means that you need to use Zig-provided binaries for the target to be available, or build LLVM from source with special configure flags. zig targets will display the target if it is available. This target may be considered deprecated by

                                                                        • How to Force Restart an iPhone and Enter Recovery Mode

                                                                          Looking to put your iPhone in recovery mode? You'll need to use this function if your iPhone runs into major problems. But it's not always clear how to put an iPhone in recovery mode, especially since the process differs across devices. We'll show you how to put your iPhone, iPad, or iPod touch in recovery mode, no matter which model you have. Force Restarting and iPhone Recovery Mode Explained Yo

                                                                            How to Force Restart an iPhone and Enter Recovery Mode
                                                                          • Loneliness trajectories over three decades are associated with conspiracist worldviews in midlife - Nature Communications

                                                                            While conspiracy theories are not new1,2, recent events have shown how dangerous and polarizing they can be in a globalized, mediatized world. Conspiracy theories undermined global efforts to contain the COVID-19 virus during the pandemic3,4 and were used in the lead-up to the January 6, 2021, raid on the Capitol1. They lie at the core of political and social polarization5,6, fueling vaccine skept

                                                                              Loneliness trajectories over three decades are associated with conspiracist worldviews in midlife - Nature Communications
                                                                            • Xᴇɴᴏɴ

                                                                              Xenon is the best way to represent information: Native support for arrays. Native support for a graph structure, elements may have multiple parents. Native support for types used in serializing program data. Unambiguous choice of data structure. Readable multiple line indented text. Terse, efficient to write by hand. Can be implemented to be blazingly fast or using a mode-less tokenizer. The xenon

                                                                              • Announcing Official Puppeteer Support for Firefox – Mozilla Hacks - the Web developer blog

                                                                                We’re pleased to announce that, as of version 23, the Puppeteer browser automation library now has first-class support for Firefox. This means that it’s now easy to write automation and perform end-to-end testing using Puppeteer, and run against both Chrome and Firefox. How to Use Puppeteer With Firefox To get started, simply set the product to “firefox” when starting Puppeteer: import puppeteer f

                                                                                  Announcing Official Puppeteer Support for Firefox – Mozilla Hacks - the Web developer blog
                                                                                • Beej's Guide to Network Programming

                                                                                  Wait! You also have to make a call to WSAStartup() before doing anything else with the sockets library. You pass in the Winsock version you desire to this function (e.g. version 2.2). And then you can check the result to make sure that version is available. The code to do that looks something like this: #include <winsock2.h> { WSADATA wsaData; if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0) { fprin