並び順

ブックマーク数

期間指定

  • から
  • まで

121 - 160 件 / 473件

新着順 人気順

step up recordsの検索結果121 - 160 件 / 473件

  • Why I'm leaving Elm

    Over the past year or so, I've reluctantly come to the conclusion I need to leave Elm and migrate to some other language (most likely Bucklescript via philip2), and I definitely cannot recommend it to anyone else. This post is about my reasons for that, which are mostly about the way in which the leadership behave. I'm not going to talk about the good points of Elm as a technology. You can read th

    • The origin of COVID: Did people or nature open Pandora’s box at Wuhan?

      The origin of COVID: Did people or nature open Pandora’s box at Wuhan? Members of the World Health Organization (WHO) team investigating the origins of the COVID-19 coronavirus arrive by car at the Wuhan Institute of Virology on February 3. (Photo by HECTOR RETAMAL/AFP via Getty Images) The COVID-19 pandemic has disrupted lives the world over for more than a year. Its death toll will soon reach th

        The origin of COVID: Did people or nature open Pandora’s box at Wuhan?
      • Functors and Monads For People Who Have Read Too Many "Tutorials" - iRi

        Celebrating Over 10 Years Of Being Too Lazy To Pick A Tagline Title is literally true. This may not be the best place to learn about these concepts for the first time, because I'm going to focus on knocking down the misconceptions about them. Then again, it may not be the worst place, for the same reason. I had promised myself I would not add to the pile of functor or monad "tutorials", but I've b

        • DevAx::Academy - Monoliths To Microservices

          Monoliths To Microservices 0. Getting Started 1. Remote environment 1.1 AWS Console Login and EC2 Windows instance remote connection 1.2 Configure the AWS CLI Option A Provided account Option B Own account 1. Migrating the Monolith 1. Download Project Files 2. Explore the environment 2.1 Explore Amazon VPC 2.2 Explore Amazon EC2 2.3 Explore Amazon RDS 3. Database setup 4. Test locally 4.1 Use Ecli

          • Chapter 2 - Implementing SLOs, Google SRE Book

            Implementing SLOs By Steven Thurgood and David Ferguson with Alex Hidalgo and Betsy Beyer Service level objectives (SLOs) specify a target level for the reliability of your service. Because SLOs are key to making data-driven decisions about reliability, they’re at the core of SRE practices. In many ways, this is the most important chapter in this book. Once you’re equipped with a few guidelines, s

            • Getting started with Jitsi, an open source web conferencing solution | Amazon Web Services

              AWS Open Source Blog Getting started with Jitsi, an open source web conferencing solution Teams across the world are looking for solutions that help them to work and collaborate online in these unprecedented times. There are many options that customers have, so this post will help provide you with some options if you are looking. Many teams choose to use managed solutions to enable collaboration.

                Getting started with Jitsi, an open source web conferencing solution | Amazon Web Services
              • Publishing Node modules with TypeScript and ES modules - LogRocket Blog

                Editor’s note: This article was last updated by Ikeh Akinyemi on 1 May 2023 to include information about TypeScript module exports and how to import modules that were previously exported. For further reading, check out our post “How to organize code in TypeScript using modules.” TypeScript has become a very popular language to write JavaScript in, and for good reason. Its typing system and compile

                  Publishing Node modules with TypeScript and ES modules - LogRocket Blog
                • Database Migrations

                  Table of Contents I consider database migrations one of the most annoying problems to deal with during a software engineer’s life. Not only that, if it goes wrong, as it often does, people tend to develop anxiety related to any schema changes. So why is it so annoying? It looks simple at first glance but is deceptively tricky when you start thinking about it. My primary framework of choice is the

                    Database Migrations
                  • Reasons why SELECT * is bad for SQL performance - Tanel Poder Consulting

                    Here’s a list of reasons why SELECT * is bad for SQL performance, assuming that your application doesn’t actually need all the columns. When I write production code, I explicitly specify the columns of interest in the select-list (projection), not only for performance reasons, but also for application reliability reasons. For example, will your application’s data processing code suddenly break whe

                    • Migrating to Cloudflare Email Routing

                      This post is also available in 简体中文. A few days ago Google announced that the users from the "G Suite legacy free edition" would need to switch to the paid edition before May 1, 2022, to maintain their services and accounts working. Because of this, many people are now considering alternatives. One use case for G Suite legacy was handling email for custom domains. In September, during Birthday Wee

                        Migrating to Cloudflare Email Routing
                      • Debugging Rust

                        name: inverse layout: true class: center, middle, inverse --- background-image: url(bugs.jpg) # Debugging & Rust .left[.footnote[[*] bug screenshot courtesy of Assasin's Creed]] ??? --- layout: false # Overview * Printing and logging * Panic and backtraces * Symbols and debuggers * Debugging in reverse --- template: inverse background-image: url(printing.jpg) # Printing & Logging --- # println! Im

                        • SAML is insecure by design

                          What is SAML? Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties. Source: Wikipedia SAML is often used for single-sign on (“Sign in with Google”, “Sign in with Twitter” etc.). It means when you want to log in to example.com, example.com can trust & use an external authentication provider to assert the user’s identity f

                          • Migrating Critical Traffic At Scale with No Downtime — Part 2

                            Shyam Gala, Javier Fernandez-Ivern, Anup Rokkam Pratap, Devang Shah Picture yourself enthralled by the latest episode of your beloved Netflix series, delighting in an uninterrupted, high-definition streaming experience. Behind these perfect moments of entertainment is a complex mechanism, with numerous gears and cogs working in harmony. But what happens when this machinery needs a transformation?

                              Migrating Critical Traffic At Scale with No Downtime — Part 2
                            • HuggingFaceFW/fineweb · Datasets at Hugging Face

                              "},"dump":{"kind":"string","value":"CC-MAIN-2013-20"},"url":{"kind":"string","value":"http://%20jwashington@ap.org/Content/Press-Release/2012/How-AP-reported-in-all-formats-from-tornado-stricken-regions"},"date":{"kind":"string","value":"2013-05-18T05:48:54Z"},"file_path":{"kind":"string","value":"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-

                                HuggingFaceFW/fineweb · Datasets at Hugging Face
                              • How Netflix Really Uses Java

                                Transcript Bakker: I'm going to talk about how Netflix is really using Java. You probably know that Netflix is really just about RxJava microservices, with Hystrix and Spring Cloud. Really, Chaos Monkeys are just running the show. I'm only half getting here because a few years ago, this was actually mostly true, maybe except the Chaos Monkeys. This stack was something that we were building on in t

                                  How Netflix Really Uses Java
                                • Coronavirus: the first three months as it happened

                                  Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript. The first US deaths related to coronavirus might have occurred wee

                                    Coronavirus: the first three months as it happened
                                  • Building a cost efficient, petabyte-scale lake house with Amazon S3 lifecycle rules and Amazon Redshift Spectrum: Part 1 | Amazon Web Services

                                    AWS Big Data Blog Building a cost efficient, petabyte-scale lake house with Amazon S3 lifecycle rules and Amazon Redshift Spectrum: Part 1 The continuous growth of data volumes combined with requirements to implement long-term retention (typically due to specific industry regulations) puts pressure on the storage costs of data warehouse solutions, even for cloud native data warehouse services such

                                      Building a cost efficient, petabyte-scale lake house with Amazon S3 lifecycle rules and Amazon Redshift Spectrum: Part 1 | Amazon Web Services
                                    • NXNSAttack - NXNSAttack by Lior Shafir, New DNS DDoS vulnerability

                                      The NXNSAttack is a new vulnerability that exploits the way DNS recursive resolvers operate when receiving NS referral response that contains nameservers but without their corresponding IP addresses (i.e., missing glue-records). Ensuring a secure DNS infrastructure can assist online gambling platforms in reducing the chances of potential vulnerabilities. Implementing fortified DNS security protoco

                                      • The Big Cloud Exit FAQ

                                        Just over a year ago, we announced our intention to leave the cloud. We then shared our complete $3.2 million cloud budget for 2022, and the fact that we were going to build our own tooling rather than pay for overpriced enterprise service contracts. The mission was set! A month later, we placed an order for $600,000 worth of Dell servers to carry our exit, and did the math to conservatively estim

                                          The Big Cloud Exit FAQ
                                        • Host your own Mastodon instance on a Raspberry Pi - Raspberry Pi

                                          The ongoing emergency at Twitter has made a lot of us take a serious look at social media. After a lot of debate here at Pi Towers, we’ve now spun up our own Mastodon instance. The best thing about it? It’s running on a Raspberry Pi 4 hosted at Mythic Beasts. Last time we talked about Mastodon, we told you why we were doing it. Today’s post talks about how you can join us. Our own Mastodon instanc

                                            Host your own Mastodon instance on a Raspberry Pi - Raspberry Pi
                                          • 38TB of data accidentally exposed by Microsoft AI researchers | Wiz Blog

                                            Executive summary Microsoft’s AI research team, while publishing a bucket of open-source training data on GitHub, accidentally exposed 38 terabytes of additional private data — including a disk backup of two employees’ workstations. The backup includes secrets, private keys, passwords, and over 30,000 internal Microsoft Teams messages. The researchers shared their files using an Azure feature call

                                              38TB of data accidentally exposed by Microsoft AI researchers | Wiz Blog
                                            • 2021 Trafficking in Persons Report - United States Department of State

                                              Message From the Secretary of State Dear Reader: This year’s Trafficking in Persons Report sends a strong message to the world that global crises, such as the COVID-19 pandemic, climate change, and enduring discriminatory policies and practices, have a disproportionate effect on individuals already oppressed by other injustices.  These challenges further compound existing vulnerabilities to exploi

                                                2021 Trafficking in Persons Report - United States Department of State
                                              • Data Engineering is Not Software Engineering

                                                In recent years, it would appear that data engineering is converging with DevOps. Both have embraced cloud infrastructure, containerization, CI/CD, and GitOps to deliver reliable digital products to their customers. The convergence on a subset of tooling has led many to the opinion that there is no significant distinction between data engineering and software engineering. Consequently, the fact th

                                                  Data Engineering is Not Software Engineering
                                                • Work with IndexedDB  |  Articles  |  web.dev

                                                  Work with IndexedDB Stay organized with collections Save and categorize content based on your preferences. This guide covers the basics of the IndexedDB API. We're using Jake Archibald's IndexedDB Promised library, which is very similar to the IndexedDB API, but uses promises, which you can await for more concise syntax. This simplifies the API while maintaining its structure. What is IndexedDB? I

                                                  • What I learned from making a DNS client in Rust

                                                    Over the last few weeks I built my own DNS client. Mostly because I thought dig (the standard DNS client) was kinda clunky. Partly because I wanted to learn more about DNS. So here's how I built it, and how you can build your own too. It's a great weekend project, and I learned a lot from finishing it. Why? Julia Evans gave me the idea of making a DNS client. She's one of my favourite tech blogger

                                                      What I learned from making a DNS client in Rust
                                                    • Generalizing 'jq' and Traversal Systems using optics and standard monads

                                                      Hi folks! Today I'll be chatting about Traversal Systems like jq and XPath; we're going to discover which properties make them useful, then see how we can replicate their most useful behaviours in Haskell using (almost entirely) pre-ols!existing standard Haskell tools! Let's go! What's a Traversal System? First off I'll admit that "Traversal System" is a name I just came up with, you probably won'

                                                      • Integrating web workers in a React app with Comlink - LogRocket Blog

                                                        John Reilly MacGyver turned Dev 🌻❤️ TypeScript / ts-loader / fork-ts-checker-webpack-plugin / DefinitelyTyped: The Movie JavaScript is famously single-threaded. However, if you’re developing for the web, you may well know that this is not quite accurate. There are web workers: A worker is an object created using a constructor (e.g., Worker()) that runs a named JavaScript file — this file contains

                                                          Integrating web workers in a React app with Comlink - LogRocket Blog
                                                        • New – Serverless Streaming ETL with AWS Glue | Amazon Web Services

                                                          AWS News Blog New – Serverless Streaming ETL with AWS Glue When you have applications in production, you want to understand what is happening, and how the applications are being used. To analyze data, a first approach is a batch processing model: a set of data is collected over a period of time, then run through analytics tools. To be able to react quickly, you can use a streaming model, where dat

                                                            New – Serverless Streaming ETL with AWS Glue | Amazon Web Services
                                                          • A Chrome feature is creating enormous load on global root DNS servers

                                                            The Chromium browser—open source, upstream parent to both Google Chrome and the new Microsoft Edge—is getting some serious negative attention for a well-intentioned feature that checks to see if a user's ISP is "hijacking" non-existent domain results. The Intranet Redirect Detector, which makes spurious queries for random "domains" statistically unlikely to exist, is responsible for roughly half o

                                                              A Chrome feature is creating enormous load on global root DNS servers
                                                            • Origin of Covid — Following the Clues

                                                              The Covid-19 pandemic has disrupted lives the world over for more than a year. Its death toll will soon reach three million people. Yet the origin of pandemic remains uncertain: the political agendas of governments and scientists have generated thick clouds of obfuscation, which the mainstream press seems helpless to dispel. In what follows I will sort through the available scientific facts, which

                                                                Origin of Covid — Following the Clues
                                                              • SolarWinds Supply Chain Attack Uses SUNBURST Backdoor | Google Cloud Blog

                                                                Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor Written by: FireEye UPDATE (May 2022): We have merged UNC2452 with APT29. The UNC2452 activity described in this post is now attributed to APT29. Executive Summary We have discovered a global intrusion campaign. We are tracking the actors behind this campaign as UNC2452. FireEye d

                                                                  SolarWinds Supply Chain Attack Uses SUNBURST Backdoor | Google Cloud Blog
                                                                • New – AWS CloudTrail Lake Supports Ingesting Activity Events From Non-AWS Sources | Amazon Web Services

                                                                  AWS News Blog New – AWS CloudTrail Lake Supports Ingesting Activity Events From Non-AWS Sources In November 2013, we announced AWS CloudTrail to track user activity and API usage. AWS CloudTrail enables auditing, security monitoring, and operational troubleshooting. CloudTrail records user activity and API calls across AWS services as events. CloudTrail events help you answer the questions of “who

                                                                    New – AWS CloudTrail Lake Supports Ingesting Activity Events From Non-AWS Sources | Amazon Web Services
                                                                  • Email Authentication: A Developer's Guide · Resend

                                                                    Email Authentication: A Developer's GuideLearn the importance of SPF, DKIM, DMARC, and BIMI in ensuring email delivery. Proper email authentication can be the difference between reaching the human or the spam folder, but it is often overlooked or misunderstood. Think of your emails as a startup getting into a competitive accelerator program. SPF (Receiving Applications) Competitive startup program

                                                                      Email Authentication: A Developer's Guide · Resend
                                                                    • Good Apps Behaving Badly: Dissecting Zoom’s macOS Installer Workaround

                                                                      Good Apps Behaving Badly: Dissecting Zoom’s macOS Installer Workaround Apr 01st 2020 This post was updated on April 3, 2020 to reflect Zoom’s response. It seems like overnight half the world switched to working from home and depending on Zoom for daily human interaction. Our own team is no exception, so it came as a surprise that the widely-used application installs itself on Macs by working aroun

                                                                        Good Apps Behaving Badly: Dissecting Zoom’s macOS Installer Workaround
                                                                      • Patterns for building an API to upload files to Amazon S3 | Amazon Web Services

                                                                        AWS Compute Blog Patterns for building an API to upload files to Amazon S3 This blog is written by Thomas Moore, Senior Solutions Architect and Josh Hart, Senior Solutions Architect. Applications often require a way for users to upload files. The traditional approach is to use an SFTP service (such as the AWS Transfer Family), but this requires specific clients and management of SSH credentials. M

                                                                          Patterns for building an API to upload files to Amazon S3 | Amazon Web Services
                                                                        • Today, the Trident Era Ends

                                                                          When I was a child, I was always fascinated by stories about ancient civilizations. I devoured books about Atlantis, or the story of Heinrich Schliemann's discovery of Troy, stories about the Greek, the Romans, the Inca Empire, or Ancient Egypt. And I was always fascinated by the extent of their capabilities in the fields of astronomy, math, and medicine, their incredible achievements, like buildi

                                                                            Today, the Trident Era Ends
                                                                          • NIST Special Publication 800-207 Zero Trust Architecture

                                                                            NIST Special Publication 800-207 Zero Trust Architecture Scott Rose Oliver Borchert Stu Mitchell Sean Connelly This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-207 C O M P U T E R S E C U R I T Y NIST Special Publication 800-207 Zero Trust Architecture Scott Rose Oliver Borchert Advanced Network Technologies Division Information Technology Laboratory Stu Mitch

                                                                            • CARBIS BAY G7 SUMMIT COMMUNIQUÉ | The White House

                                                                              We, the leaders of the Group of Seven, met in Cornwall on 11-13 June 2021 determined to beat COVID-19 and build back better.  We remembered everyone who has been lost to the pandemic and paid tribute to those still striving to overcome it. Inspired by their example of collaboration and determination, we gathered united by the principle that brought us together originally, that shared beliefs and s

                                                                                CARBIS BAY G7 SUMMIT COMMUNIQUÉ | The White House
                                                                              • Type Parameters Proposal

                                                                                Ian Lance Taylor Robert Griesemer August 20, 2021 StatusThis is the design for adding generic programming using type parameters to the Go language. This design has been proposed and accepted as a future language change. We currently expect that this change will be available in the Go 1.18 release in early 2022. AbstractWe suggest extending the Go language to add optional type parameters to type an

                                                                                • Authorization@Edge using cookies: Protect your Amazon CloudFront content from being downloaded by unauthenticated users | Amazon Web Services

                                                                                  Networking & Content Delivery Authorization@Edge using cookies: Protect your Amazon CloudFront content from being downloaded by unauthenticated users Enterprise customers who host private web apps on Amazon CloudFront may struggle with a challenge: how to prevent unauthenticated users from downloading the web app’s source code (for example, React, Angular, or Vue). In a separate blog post, you can

                                                                                    Authorization@Edge using cookies: Protect your Amazon CloudFront content from being downloaded by unauthenticated users | Amazon Web Services