並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 25 件 / 25件

新着順 人気順

identifyの検索結果1 - 25 件 / 25件

タグ検索の該当結果が少ないため、タイトル検索結果を表示しています。

identifyに関するエントリは25件あります。 セキュリティtechaws などが関連タグです。 人気エントリには 『GitHub - rcmaehl/WhyNotWin11: Detection Script to help identify why your PC is not Windows 11 Release Ready. Now Supporting Update Checks!』などがあります。
  • GitHub - rcmaehl/WhyNotWin11: Detection Script to help identify why your PC is not Windows 11 Release Ready. Now Supporting Update Checks!

    You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

      GitHub - rcmaehl/WhyNotWin11: Detection Script to help identify why your PC is not Windows 11 Release Ready. Now Supporting Update Checks!
    • Google Cloud Batchを使ってバッチの処理待ち時間を1/30以下にしたので紹介させて欲しい - DeLMO(identify)エンジニアブログ

      この記事について 今回、Google CloudのBatchを利用した動画変換処理を実装したので、どのようにしたのか、どこにハマったのか(ハマっているのか)、その効果についてまとめました。端的に現状を3行でまとめると、以下のようになります。 動画変換処理にGoogle CloudのBatchを使いました GPUを利用することで処理時間を短くできました コンテナでGPUをうまく使えずシェルスクリプトとGoで作ったバイナリを活用しています(コンテナ化の知見募集中です) はじめに はじめまして。identify株式会社 CTOの@suthioです。 弊社、identify株式会社では動画素材サービスDeLMOの運営を行っています。 service.delm0.jp 簡単に言うと、動画素材を提供するサービスとなります。 課題 弊社ではGoogle Cloud Platformをインフラとして利用し

        Google Cloud Batchを使ってバッチの処理待ち時間を1/30以下にしたので紹介させて欲しい - DeLMO(identify)エンジニアブログ
      • Identify and optimize public IPv4 address usage on AWS | Amazon Web Services

        Networking & Content Delivery Identify and optimize public IPv4 address usage on AWS Update: February 1, 2024 – AWS now charges for public IPv4 addresses provided by AWS. This blog post has more details on this topic. Today AWS announced new charges for AWS-provided public IPv4 addresses beginning February 1, 2024. In this blog post, we introduce two new features launching today to help you track

          Identify and optimize public IPv4 address usage on AWS | Amazon Web Services
        • identify CTO兼「ワインと鍋」オーナー岩崎さんに聞く。過去の技術選定とそこから得た学び - what we use(技術スタックデータベース)

          identify株式会社は、個人が販売した動画素材を企業が購入して、マーケティングへ活用することを支援する「DeLMO」というクリエイタープラットフォームを運営しています。その「DeLMO」では、クリエイターがスキマ時間に動画を撮影・販売し、報酬を得ることができる複業支援サービス「DeLMO for creator」と、企業が縦型ショート動画素材を簡単に収集し、クリエイティブ制作に活用できるサービス「DeLMO for advertiser」の2つを提供しているのです。 同社の取締役CTOを務めるのが岩崎 裕馬さん。彼は水天宮前(茅場町、人形町、日本橋)にあるレストラン「ワインと鍋」のオーナーでもあるという変わった経歴の持ち主です。これまで岩崎さんは、CTOとしてどのような技術選定を行ってきたのでしょうか。 GoやNext.jsを採用。“攻めた”技術選定をした意図とは――このインタビューで

            identify CTO兼「ワインと鍋」オーナー岩崎さんに聞く。過去の技術選定とそこから得た学び - what we use(技術スタックデータベース)
          • New- Amazon DevOps Guru Helps Identify Application Errors and Fixes | Amazon Web Services

            AWS News Blog New- Amazon DevOps Guru Helps Identify Application Errors and Fixes Today, we are announcing Amazon DevOps Guru, a fully managed operations service that makes it easy for developers and operators to improve application availability by automatically detecting operational issues and recommending fixes. DevOps Guru applies machine learning informed by years of operational excellence fro

              New- Amazon DevOps Guru Helps Identify Application Errors and Fixes | Amazon Web Services
            • GitHub - bee-san/pyWhat: 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙‍♀️

              You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                GitHub - bee-san/pyWhat: 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙‍♀️
              • 【書評】A/Identify―アイデンティファイ― - 本が友達の大人の読書感想文

                どうも。takaです。今回は、現役ITエンジニアITである大隆哲裕氏の作品、A/Identify―アイデンティファイ―(幻冬舎)についてです!! A/Identify [ 大隆哲裕 ] ストーリー この作品は、主にアプリ開発に携わっているエンジニアが、AIを使った犯罪対策関連の案件を請けることとなり、案件に携わっていく過程でAIについて触れながらAIとは何か理解していく物語です。 AIと人間 AIは取り込まれたデータをもとに、効率的な作業等を割り出します。与えられたデータの質が良ければ良いほど効率が上がります。そして、知能も人間が到底及ばないくらいになる言われています。囲碁でプロを負かしたので真実だと思います。 ただ、AIはデータが無ければ何も出来ない。それに対して人間は0から何かを生み出せることが出来ます。知能は1からどんどん生み出していく能力のことなので1から生み出すことはAIの方が上

                  【書評】A/Identify―アイデンティファイ― - 本が友達の大人の読書感想文
                • Google Chrome Can Identify Any Song in a Movie While You Stream It

                  (e.target !== $refs.button && e.target.closest('button') !== $refs.button) && close($refs.button)" :class="{ 'border border-black': toggled }"> Copied We live in magical times. Sure, the world’s on fire, but our devices can tell you the name of just about any song playing in your vicinity. The future is now! Solutions for this problem have existed for a while in various apps and built-in services,

                    Google Chrome Can Identify Any Song in a Movie While You Stream It
                  • How to kickstart and scale a consumer business—Step 2: Identify your super-specific who

                    👋 Hey, I’m Lenny and welcome to a 🔒 subscriber-only edition 🔒 of my weekly newsletter. Each week I tackle reader questions about product, growth, working with humans, and anything else that’s stressing you out about work. Send me your questions and in return I’ll humbly offer actionable real-talk advice. Welcome to part two of our six-part series on kickstarting and scaling a consumer business.

                      How to kickstart and scale a consumer business—Step 2: Identify your super-specific who
                    • IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance

                      IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance Executive Summary In a recent blog, “Information Leakage in AWS Resource-Based Policy APIs,” Unit 42 researchers disclosed a class of Amazon Web Services (AWS) APIs that can be abused to find existing users and Identity and Access Management (IAM) roles in arbitrary accounts. The root cause of the issue is that

                        IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance
                      • モノレポ管理ツールを Nx から Turborepo へ移行した話 - DeLMO(identify)エンジニアブログ

                        これは何 今回モノレポ管理ツールを Nx から Turborepo へと移行したのですが、ポリレポからモノレポへの移行に関する記事はあっても管理ツールのリプレイスというのはあまり見当たらなかったため、その知見を共有したいと思います。 弊社サービスとフロントエンドの構成について identify株式会社で副業エンジニアとして主にフロントエンドをお手伝いしている @uekenu です。 弊社identify株式会社では動画素材サービスDeLMOの運営を行っています。DeLMOは動画をダウンロードする広告主様/代理店様と動画提供者のクリエイターに利用いただいており、そこに特権管理者である弊社のスタッフを加えるとユーザーの属性としては3種類に分けることができます。そして3種のユーザーにそれぞれ別々の環境の画面を用意しています。 アーキテクチャとしては、バックエンドに GraphQL サーバーがあり

                          モノレポ管理ツールを Nx から Turborepo へ移行した話 - DeLMO(identify)エンジニアブログ
                        • Geolocation with BigQuery: De-identify 76 million IP addresses in 20 seconds | Google Cloud Blog

                          Geolocation with BigQuery: De-identify 76 million IP addresses in 20 seconds BigQuery is Google Cloud’s serverless data warehouse designed for scalability and fast performance. Using it lets you explore large datasets to find new and meaningful insights. To comply with current policies and regulations, you might need to de-identify the IP addresses of your users when analyzing datasets that contai

                            Geolocation with BigQuery: De-identify 76 million IP addresses in 20 seconds | Google Cloud Blog
                          • How to Identify and Remove VPN Applications That Contain 911 S5 Backdoors | Federal Bureau of Investigation

                            The FBI, the Defense Criminal Investigative Service, and the Department of Commerce's Office of Export Enforcement have published a public service announcement (the “PSA”) for individuals and businesses to better understand and guard against the 911 S5 residential proxy service and botnet. The PSA is available at ic3.gov/Media/Y2024/PSA240529. As explained in the PSA, 911 S5 began operating in May

                              How to Identify and Remove VPN Applications That Contain 911 S5 Backdoors | Federal Bureau of Investigation
                            • Easily Identify Malicious Servers on the Internet with JARM - Salesforce Engineering Blog

                              TL;DR JARM is an active Transport Layer Security (TLS) server fingerprinting tool. Scanning with JARM provides the ability to identify and group malicious servers on the Internet. JARM is available here: https://github.com/salesforce/jarm JARM fingerprints can be used to: Quickly verify that all servers in a group have the same TLS configuration.Group disparate servers on the internet by configura

                                Easily Identify Malicious Servers on the Internet with JARM - Salesforce Engineering Blog
                              • GitHub - cisagov/log4j-scanner: log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.

                                Configure your own DNS Server - Preferred) - Add DNS records to your domain. (example.com) A record with a value of your IP address (test.example.com -> ) NS record (ns1.example.com) with a value of the test.example.com as chosen above. Host a DNS server to log DNS requests made to your domain. Install the requirement modules -> pip3 install -r requirements.txt Modify the dns/ddnsserver.py script

                                  GitHub - cisagov/log4j-scanner: log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.
                                • VERMILLION(ヴァーミリオン)公式 - IDENTIFY JEWELRY

                                  12星座の始まりを担う、情熱的でエネルギッシュな星座。情熱を宿すカラーストーン、自分らしさのお守りであるホーンモチーフがこの季節のフォーチュンアイテム。 ▶︎ZODIACシリーズ おひつじ座アイテム

                                    VERMILLION(ヴァーミリオン)公式 - IDENTIFY JEWELRY
                                  • What Are the Four Productivity Styles? How to Identify Yours

                                    Do you often find it difficult to get much done despite using several productivity methods? If so, it's probably because you haven't figured out what productivity style actually works best for you. There are four different types of productivity styles for everyone. And if you want to get things done without experiencing burnout, you'll have to take a personalized approach to find yours. So without

                                      What Are the Four Productivity Styles? How to Identify Yours
                                    • Researchers identify a cellular defect common to familial and sporadic forms of ALS

                                      Researchers identify a cellular defect common to familial and sporadic forms of ALS When CHMP7 accumulates in the nucleus, certain proteins become missing from nuclear pores (outlined in white). This causes the pores to break apart, leading to downstream effects that may cause ALS.Rothstein Lab Amyotrophic lateral sclerosis (ALS) is a rapidly progressive and fatal degenerative disease affecting th

                                        Researchers identify a cellular defect common to familial and sporadic forms of ALS
                                      • Can coat identify is which you yours | ならべかえ 英語 リスニング

                                        単語をならべかえて英文を完成させよう(レベル7)「Can coat identify is which you yours」「どのコートがあなたのものか、ご確認いただけますか。」#英語学習 | ならべかえ 英語 リスニング

                                          Can coat identify is which you yours | ならべかえ 英語 リスニング
                                        • Immunization stress-related response: a manual for program managers and health professionals to prevent, identify and respond to stress-related responses following immunization

                                          Immunization stress-related response: a manual for program managers and health professionals to prevent, identify and respond to stress-related responses following immunization Overview The term “immunization stress-related responses (ISRR)” covers an entire spectrum of manifestations to a stress response in the context of immunization. Individual responses to stress vary from person to person or

                                          • Identify bottlenecks, improve resource utilization, and reduce ML training costs with the deep profiling feature in Amazon SageMaker Debugger | Amazon Web Services

                                            AWS Machine Learning Blog Identify bottlenecks, improve resource utilization, and reduce ML training costs with the deep profiling feature in Amazon SageMaker Debugger Machine learning (ML) has shown great promise across domains such as predictive analysis, speech processing, image recognition, recommendation systems, bioinformatics, and more. Training ML models is a time- and compute-intensive pr

                                              Identify bottlenecks, improve resource utilization, and reduce ML training costs with the deep profiling feature in Amazon SageMaker Debugger | Amazon Web Services
                                            • Researchers identify mechanism behind brain fog in long COVID

                                              Disruptions in the blood-brain barrier along with a hyperactive immune system are the likely mechanisms behind "brain fog" in patients who are experiencing long COVID, an Irish research team reported today in Nature Neuroscience. Brain fog has been reported during acute COVID infection and has also been reported in nearly 50% of patients who experience long COVID, or symptoms well past the acute p

                                                Researchers identify mechanism behind brain fog in long COVID
                                              • Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles | Amazon Web Services

                                                AWS Security Blog Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles September 28, 2023: IAM is incrementally adding support for actions from more services. For a list of services that report action last accessed information, see IAM action last accessed information services and actions. AWS Identity and Access Management (IAM

                                                  Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles | Amazon Web Services
                                                • Identify developer-owned apps  |  Identity  |  Android Developers

                                                  Get started Start by creating your first app. Go deeper with our training courses or explore app development on your own.

                                                    Identify developer-owned apps  |  Identity  |  Android Developers
                                                  • How to identify a given string is hex color format

                                                    I'm looking for a regular expression to validate hex colors in ASP.NET C# and am also looking code for validation on server side. For instance: #CCCCCC

                                                      How to identify a given string is hex color format
                                                    1

                                                    新着記事