並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 30 件 / 30件

新着順 人気順

identifyの検索結果1 - 30 件 / 30件

タグ検索の該当結果が少ないため、タイトル検索結果を表示しています。

identifyに関するエントリは30件あります。 aws医療セキュリティ などが関連タグです。 人気エントリには 『GitHub - rcmaehl/WhyNotWin11: Detection Script to help identify why your PC is not Windows 11 Release Ready. Now Supporting Update Checks!』などがあります。
  • GitHub - rcmaehl/WhyNotWin11: Detection Script to help identify why your PC is not Windows 11 Release Ready. Now Supporting Update Checks!

    You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

      GitHub - rcmaehl/WhyNotWin11: Detection Script to help identify why your PC is not Windows 11 Release Ready. Now Supporting Update Checks!
    • Evolving “nofollow” – new ways to identify the nature of links

      accessibility 10 advanced 195 AMP 13 Android 2 API 7 apps 7 autocomplete 2 beginner 173 CAPTCHA 1 Chrome 2 cms 1 crawling and indexing 158 encryption 3 events 51 feedback and communication 83 forums 5 general tips 90 geotargeting 1 Google Assistant 3 Google I/O 3 Google Images 3 Google News 2 hacked sites 12 hangout 2 hreflang 3 https 5 images 12 intermediate 205 interstitials 1 javascript 8 job s

        Evolving “nofollow” – new ways to identify the nature of links
      • Google Cloud Batchを使ってバッチの処理待ち時間を1/30以下にしたので紹介させて欲しい - DeLMO(identify)エンジニアブログ

        この記事について 今回、Google CloudのBatchを利用した動画変換処理を実装したので、どのようにしたのか、どこにハマったのか(ハマっているのか)、その効果についてまとめました。端的に現状を3行でまとめると、以下のようになります。 動画変換処理にGoogle CloudのBatchを使いました GPUを利用することで処理時間を短くできました コンテナでGPUをうまく使えずシェルスクリプトとGoで作ったバイナリを活用しています(コンテナ化の知見募集中です) はじめに はじめまして。identify株式会社 CTOの@suthioです。 弊社、identify株式会社では動画素材サービスDeLMOの運営を行っています。 service.delm0.jp 簡単に言うと、動画素材を提供するサービスとなります。 課題 弊社ではGoogle Cloud Platformをインフラとして利用し

          Google Cloud Batchを使ってバッチの処理待ち時間を1/30以下にしたので紹介させて欲しい - DeLMO(identify)エンジニアブログ
        • Identify and optimize public IPv4 address usage on AWS | Amazon Web Services

          Networking & Content Delivery Identify and optimize public IPv4 address usage on AWS Update: February 1, 2024 – AWS now charges for public IPv4 addresses provided by AWS. This blog post has more details on this topic. Today AWS announced new charges for AWS-provided public IPv4 addresses beginning February 1, 2024. In this blog post, we introduce two new features launching today to help you track

            Identify and optimize public IPv4 address usage on AWS | Amazon Web Services
          • identify CTO兼「ワインと鍋」オーナー岩崎さんに聞く。過去の技術選定とそこから得た学び - what we use(技術スタックデータベース)

            identify株式会社は、個人が販売した動画素材を企業が購入して、マーケティングへ活用することを支援する「DeLMO」というクリエイタープラットフォームを運営しています。その「DeLMO」では、クリエイターがスキマ時間に動画を撮影・販売し、報酬を得ることができる複業支援サービス「DeLMO for creator」と、企業が縦型ショート動画素材を簡単に収集し、クリエイティブ制作に活用できるサービス「DeLMO for advertiser」の2つを提供しているのです。 同社の取締役CTOを務めるのが岩崎 裕馬さん。彼は水天宮前(茅場町、人形町、日本橋)にあるレストラン「ワインと鍋」のオーナーでもあるという変わった経歴の持ち主です。これまで岩崎さんは、CTOとしてどのような技術選定を行ってきたのでしょうか。 GoやNext.jsを採用。“攻めた”技術選定をした意図とは――このインタビューで

              identify CTO兼「ワインと鍋」オーナー岩崎さんに聞く。過去の技術選定とそこから得た学び - what we use(技術スタックデータベース)
            • New- Amazon DevOps Guru Helps Identify Application Errors and Fixes | Amazon Web Services

              AWS News Blog New- Amazon DevOps Guru Helps Identify Application Errors and Fixes Today, we are announcing Amazon DevOps Guru, a fully managed operations service that makes it easy for developers and operators to improve application availability by automatically detecting operational issues and recommending fixes. DevOps Guru applies machine learning informed by years of operational excellence fro

                New- Amazon DevOps Guru Helps Identify Application Errors and Fixes | Amazon Web Services
              • GitHub - bee-san/pyWhat: 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙‍♀️

                You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                  GitHub - bee-san/pyWhat: 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙‍♀️
                • 【書評】A/Identify―アイデンティファイ― - 本が友達の大人の読書感想文

                  どうも。takaです。今回は、現役ITエンジニアITである大隆哲裕氏の作品、A/Identify―アイデンティファイ―(幻冬舎)についてです!! A/Identify [ 大隆哲裕 ] ストーリー この作品は、主にアプリ開発に携わっているエンジニアが、AIを使った犯罪対策関連の案件を請けることとなり、案件に携わっていく過程でAIについて触れながらAIとは何か理解していく物語です。 AIと人間 AIは取り込まれたデータをもとに、効率的な作業等を割り出します。与えられたデータの質が良ければ良いほど効率が上がります。そして、知能も人間が到底及ばないくらいになる言われています。囲碁でプロを負かしたので真実だと思います。 ただ、AIはデータが無ければ何も出来ない。それに対して人間は0から何かを生み出せることが出来ます。知能は1からどんどん生み出していく能力のことなので1から生み出すことはAIの方が上

                    【書評】A/Identify―アイデンティファイ― - 本が友達の大人の読書感想文
                  • Google Chrome Can Identify Any Song in a Movie While You Stream It

                    Google Chrome Can Identify Any Song in a Movie While You Stream It We live in magical times. Sure, the world’s on fire, but our devices can tell you the name of just about any song playing in your vicinity. The future is now! Solutions for this problem have existed for a while in various apps and built-in services, but now, a new solution comes to Chrome: the next time you hear a good tune on Netf

                      Google Chrome Can Identify Any Song in a Movie While You Stream It
                    • Helping You Better Identify Vulnerabilities in Partnership with Snyk | Docker

                      Helping You Better Identify Vulnerabilities in Partnership with Snyk We are really excited that Docker and Snyk are now partnering together to engineer container security scanning deeply into Docker Desktop and Docker Hub. Image vulnerability scanning has been one of your most requested items on our public roadmap. Modern software uses a lot of third party open source libraries, indeed this is one

                        Helping You Better Identify Vulnerabilities in Partnership with Snyk | Docker
                      • How to kickstart and scale a consumer business—Step 2: Identify your super-specific who

                        👋 Hey, I’m Lenny and welcome to a 🔒 subscriber-only edition 🔒 of my weekly newsletter. Each week I tackle reader questions about product, growth, working with humans, and anything else that’s stressing you out about work. Send me your questions and in return I’ll humbly offer actionable real-talk advice. Welcome to part two of our six-part series on kickstarting and scaling a consumer business.

                          How to kickstart and scale a consumer business—Step 2: Identify your super-specific who
                        • IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance

                          IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance This post is also available in: 日本語 (Japanese) Executive Summary In a recent blog, “Information Leakage in AWS Resource-Based Policy APIs,” Unit 42 researchers disclosed a class of Amazon Web Services (AWS) APIs that can be abused to find existing users and Identity and Access Management (IAM) roles in arbitrary

                            IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance
                          • Geolocation with BigQuery: De-identify 76 million IP addresses in 20 seconds | Google Cloud Blog

                            Geolocation with BigQuery: De-identify 76 million IP addresses in 20 seconds BigQuery is Google Cloud’s serverless data warehouse designed for scalability and fast performance. Using it lets you explore large datasets to find new and meaningful insights. To comply with current policies and regulations, you might need to de-identify the IP addresses of your users when analyzing datasets that contai

                              Geolocation with BigQuery: De-identify 76 million IP addresses in 20 seconds | Google Cloud Blog
                            • How to Identify and Remove VPN Applications That Contain 911 S5 Backdoors | Federal Bureau of Investigation

                              The FBI, the Defense Criminal Investigative Service, and the Department of Commerce's Office of Export Enforcement have published a public service announcement (the “PSA”) for individuals and businesses to better understand and guard against the 911 S5 residential proxy service and botnet. The PSA is available at ic3.gov/Media/Y2024/PSA240529. As explained in the PSA, 911 S5 began operating in May

                                How to Identify and Remove VPN Applications That Contain 911 S5 Backdoors | Federal Bureau of Investigation
                              • GitHub - cisagov/log4j-scanner: log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.

                                Configure your own DNS Server - Preferred) - Add DNS records to your domain. (example.com) A record with a value of your IP address (test.example.com -> ) NS record (ns1.example.com) with a value of the test.example.com as chosen above. Host a DNS server to log DNS requests made to your domain. Install the requirement modules -> pip3 install -r requirements.txt Modify the dns/ddnsserver.py script

                                  GitHub - cisagov/log4j-scanner: log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.
                                • モノレポ管理ツールを Nx から Turborepo へ移行した話 - DeLMO(identify)エンジニアブログ

                                  これは何 今回モノレポ管理ツールを Nx から Turborepo へと移行したのですが、ポリレポからモノレポへの移行に関する記事はあっても管理ツールのリプレイスというのはあまり見当たらなかったため、その知見を共有したいと思います。 弊社サービスとフロントエンドの構成について identify株式会社で副業エンジニアとして主にフロントエンドをお手伝いしている @uekenu です。 弊社identify株式会社では動画素材サービスDeLMOの運営を行っています。DeLMOは動画をダウンロードする広告主様/代理店様と動画提供者のクリエイターに利用いただいており、そこに特権管理者である弊社のスタッフを加えるとユーザーの属性としては3種類に分けることができます。そして3種のユーザーにそれぞれ別々の環境の画面を用意しています。 アーキテクチャとしては、バックエンドに GraphQL サーバーがあり

                                    モノレポ管理ツールを Nx から Turborepo へ移行した話 - DeLMO(identify)エンジニアブログ
                                  • Easily Identify Malicious Servers on the Internet with JARM - Salesforce Engineering Blog

                                    TL;DR JARM is an active Transport Layer Security (TLS) server fingerprinting tool. Scanning with JARM provides the ability to identify and group malicious servers on the Internet. JARM is available here: https://github.com/salesforce/jarm JARM fingerprints can be used to: Quickly verify that all servers in a group have the same TLS configuration.Group disparate servers on the internet by configura

                                      Easily Identify Malicious Servers on the Internet with JARM - Salesforce Engineering Blog
                                    • Identify Unintended Resource Access with AWS Identity and Access Management (IAM) Access Analyzer | Amazon Web Services

                                      AWS News Blog Identify Unintended Resource Access with AWS Identity and Access Management (IAM) Access Analyzer Today I get to share my favorite kind of announcement. It’s the sort of thing that will improve security for just about everyone that builds on AWS, it can be turned on with almost no configuration, and it costs nothing to use. We’re launching a new, first-of-its-kind capability called A

                                        Identify Unintended Resource Access with AWS Identity and Access Management (IAM) Access Analyzer | Amazon Web Services
                                      • What Are the Four Productivity Styles? How to Identify Yours

                                        There are four types of productivity styles, and knowing which one is yours can help you manage your time more effectively & efficiently. Here's how! Do you often find it difficult to get much done despite using several productivity methods? If so, it's probably because you haven't figured out what productivity style actually works best for you. There are four different types of productivity style

                                          What Are the Four Productivity Styles? How to Identify Yours
                                        • Researchers identify a cellular defect common to familial and sporadic forms of ALS

                                          Researchers identify a cellular defect common to familial and sporadic forms of ALS When CHMP7 accumulates in the nucleus, certain proteins become missing from nuclear pores (outlined in white). This causes the pores to break apart, leading to downstream effects that may cause ALS.Rothstein Lab Amyotrophic lateral sclerosis (ALS) is a rapidly progressive and fatal degenerative disease affecting th

                                            Researchers identify a cellular defect common to familial and sporadic forms of ALS
                                          • Can coat identify is which you yours | ならべかえ 英語 リスニング

                                            単語をならべかえて英文を完成させよう(レベル7)「Can coat identify is which you yours」「どのコートがあなたのものか、ご確認いただけますか。」#英語学習 | ならべかえ 英語 リスニング

                                              Can coat identify is which you yours | ならべかえ 英語 リスニング
                                            • アメリカ食品医薬品局(FDA)による、健康関連の詐欺に騙されないためのヒント。「FDA offers some tip-offs to help you identify rip-offs.」

                                              リンク U.S. Food and Drug Administration 6 Tip-offs to Rip-offs: Don't Fall for Health Fraud Scams Been scammed? Don't be duped into buying fraudulent health products. Learn the tip-offs to rip-offs. 峰 宗太郎 @minesoh 翻訳されたものが流れてきたので、ソースを紹介👶 アメリカ食品医薬品局(FDA)による健康関連の詐欺に騙されないためのヒント。 「FDA offers some tip-offs to help you identify rip-offs.」 fda.gov/consumers/cons… 2019-08-03 05:23:56

                                                アメリカ食品医薬品局(FDA)による、健康関連の詐欺に騙されないためのヒント。「FDA offers some tip-offs to help you identify rip-offs.」
                                              • Identify developer-owned apps  |  Android Developers

                                                Modern Android Quickly bring your app to life with less code, using a modern declarative approach to UI, and the simplicity of Kotlin.

                                                  Identify developer-owned apps  |  Android Developers
                                                • Identify bottlenecks, improve resource utilization, and reduce ML training costs with the deep profiling feature in Amazon SageMaker Debugger | Amazon Web Services

                                                  AWS Machine Learning Blog Identify bottlenecks, improve resource utilization, and reduce ML training costs with the deep profiling feature in Amazon SageMaker Debugger Machine learning (ML) has shown great promise across domains such as predictive analysis, speech processing, image recognition, recommendation systems, bioinformatics, and more. Training ML models is a time- and compute-intensive pr

                                                    Identify bottlenecks, improve resource utilization, and reduce ML training costs with the deep profiling feature in Amazon SageMaker Debugger | Amazon Web Services
                                                  • Early Findings from Fitbit COVID-19 Study Suggest Fitbit Devices Can Identify Signs of Disease at Its Earliest Stages - Fitbit Blog

                                                    Early Findings from Fitbit COVID-19 Study Suggest Fitbit Devices Can Identify Signs of Disease at Its Earliest Stages The COVID-19 pandemic has underscored the importance of staying healthy, and our mission to help people live healthier lives has never been more important. Since the start of this global health crisis, the Fitbit research team has been diligently working to help make a difference i

                                                      Early Findings from Fitbit COVID-19 Study Suggest Fitbit Devices Can Identify Signs of Disease at Its Earliest Stages - Fitbit Blog
                                                    • Immunization stress-related response: a manual for program managers and health professionals to prevent, identify and respond to stress-related responses following immunization

                                                      Home/ Publications detail/ Immunization stress-related response: a manual for program managers and health professionals to prevent, identify and respond to stress-related responses following immunization Immunization stress-related response: a manual for program managers and health professionals to prevent, identify and respond to stress-related responses following immunization Overview The term “

                                                        Immunization stress-related response: a manual for program managers and health professionals to prevent, identify and respond to stress-related responses following immunization
                                                      • Researchers identify mechanism behind brain fog in long COVID

                                                        Disruptions in the blood-brain barrier along with a hyperactive immune system are the likely mechanisms behind "brain fog" in patients who are experiencing long COVID, an Irish research team reported today in Nature Neuroscience. Brain fog has been reported during acute COVID infection and has also been reported in nearly 50% of patients who experience long COVID, or symptoms well past the acute p

                                                          Researchers identify mechanism behind brain fog in long COVID
                                                        • Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles | Amazon Web Services

                                                          AWS Security Blog Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles September 28, 2023: IAM is incrementally adding support for actions from more services. For a list of services that report action last accessed information, see IAM action last accessed information services and actions. AWS Identity and Access Management (IAM

                                                            Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles | Amazon Web Services
                                                          • VERMILLION(ヴァーミリオン)公式 - IDENTIFY JEWELRY

                                                            12種類の星座石と星座サインの刻印を選んでカスタマイズできる、特別なパーソナルリングが登場。 自分らしさや大切な人を表すストーンやモチーフをカスタマイズして、あなただけの特別なリングをお仕立てします。 ▶︎カスタマイズオーダーはこちら

                                                              VERMILLION(ヴァーミリオン)公式 - IDENTIFY JEWELRY
                                                            • How to identify a given string is hex color format

                                                              I'm looking for a regular expression to validate hex colors in ASP.NET C# and am also looking code for validation on server side. For instance: #CCCCCC

                                                                How to identify a given string is hex color format
                                                              1

                                                              新着記事