並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 40 件 / 90件

新着順 人気順

usesの検索結果1 - 40 件 / 90件

タグ検索の該当結果が少ないため、タイトル検索結果を表示しています。

usesに関するエントリは90件あります。 githubsecurityセキュリティ などが関連タグです。 人気エントリには 『China is now blocking all encrypted HTTPS traffic that uses TLS 1.3 and ESNI』などがあります。
  • China is now blocking all encrypted HTTPS traffic that uses TLS 1.3 and ESNI

    How the top VPNs compare: Plus, should you try a free VPN? We tested the best VPN services -- focusing on the number of servers, ability to unlock streaming services, and more -- to determine a No. 1 overall. Plus, we tell you whether free VPNs are worth trying. Read now The Chinese government has deployed an update to its national censorship tool, known as the Great Firewall (GFW), to block encry

      China is now blocking all encrypted HTTPS traffic that uses TLS 1.3 and ESNI
    • /uses

      /usesA list of /uses pages detailing developer setups, gear, software and configs. Product designer, frontend developer and musician. Building HomeHero and making other things. DesignerDeveloperDesign SystemsFront EndUXUIHTMLCSSVue.jsNuxt.jsCosmic.jsAccessibilityEntrepreneur

        /uses
      • Shiguredo uses Tailscale to solve the issues that arise with cloud services using bare-metal servers · Tailscale

        Contributed by @voluntas. Shiguredo Inc. develops and provides a software package called WebRTC SFU Sora (Sora) and its cloud service. WebRTC (Real-Time Communication) is a technology for exchanging voice, video, and data in real time over P2P. Sora is a WebRTC SFU (Selective Forwarding Unit), which is different from P2P communication in that it delivers audio and video data “via server.” With Sor

          Shiguredo uses Tailscale to solve the issues that arise with cloud services using bare-metal servers · Tailscale
        • Why SQLite Uses Bytecode

          1. Introduction Every SQL database engine works in roughly the same way: It first translates the input SQL text into a "prepared statement". Then it "executes" the prepared statement to generate a result. A prepared statement is an object that represents the steps needed to accomplish the input SQL. Or, to think of it in another way, the prepared statement is the SQL statement translated into a fo

          • GitHub - alexhallam/tv: 📺(tv) Tidy Viewer is a cross-platform CLI csv pretty printer that uses column styling to maximize viewer enjoyment.

            You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

              GitHub - alexhallam/tv: 📺(tv) Tidy Viewer is a cross-platform CLI csv pretty printer that uses column styling to maximize viewer enjoyment.
            • How Shopify Uses WebAssembly Outside of the Browser - Shopify

              How Shopify Uses WebAssembly Outside of the BrowserAt Shopify, we’re keeping the flexibility of untrusted Partner code, but executing it on our own infrastructure with WebAssembly. On February 24, 2021, Shipit!, our monthly event series, presented Making Commerce Extensible with WebAssembly. The video is now available. At Shopify we aim to make what most merchants need easy, and the rest possible.

                How Shopify Uses WebAssembly Outside of the Browser - Shopify
              • GitHub - google/osv-scanner: Vulnerability scanner written in Go which uses the data provided by https://osv.dev

                You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                  GitHub - google/osv-scanner: Vulnerability scanner written in Go which uses the data provided by https://osv.dev
                • How Netflix uses eBPF flow logs at scale for network insight

                  By Alok Tiagi, Hariharan Ananthakrishnan, Ivan Porto Carrero and Keerti Lakshminarayan Netflix has developed a network observability sidecar called Flow Exporter that uses eBPF tracepoints to capture TCP flows at near real time. At much less than 1% of CPU and memory on the instance, this highly performant sidecar provides flow data at scale for network insight. ChallengesThe cloud network infrast

                    How Netflix uses eBPF flow logs at scale for network insight
                  • GitHub - TachibanaYoshino/AnimeGAN: A Tensorflow implementation of AnimeGAN for fast photo animation ! This is the Open source of the paper 「AnimeGAN: a novel lightweight GAN for photo animation」, which uses the GAN framwork to transform real-world photos

                    You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                      GitHub - TachibanaYoshino/AnimeGAN: A Tensorflow implementation of AnimeGAN for fast photo animation ! This is the Open source of the paper 「AnimeGAN: a novel lightweight GAN for photo animation」, which uses the GAN framwork to transform real-world photos
                    • IDF uses Gazan civilians as human shields to inspect potentially booby-trapped tunnels

                      Haaretz Investigation: Israeli Army Uses Palestinian Civilians to Inspect Potentially Booby-trapped Tunnels in Gaza'Our lives are more important than their lives': Gazans not suspected of terrorism are detained and sent as human shields to search tunnels and houses before IDF soldiers enter, with the full knowledge of senior Israeli officers, several sources say; IDF claims this practice is forbid

                        IDF uses Gazan civilians as human shields to inspect potentially booby-trapped tunnels
                      • GitHub - ysk8hori/delta-typescript-graph-action: This GitHub Action uses Mermaid to visualize in a diagram the files that were changed in a Pull Request and their related dependency files.

                        You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                          GitHub - ysk8hori/delta-typescript-graph-action: This GitHub Action uses Mermaid to visualize in a diagram the files that were changed in a Pull Request and their related dependency files.
                        • GitHub - cozodb/cozo: A transactional, relational-graph-vector database that uses Datalog for query. The hippocampus for AI!

                          Version v0.7: after HNSW vector search from 0.6, in 0.7 we bring to you MinHash-LSH for near-duplicate search, full-text search, Json value support and more! See here for more details. Version v0.6 released! This version brings vector search with HNSW indices inside Datalog, which can be integrated seamlessly with powerful features like ad-hoc joins, recursive Datalog and classical whole-graph alg

                            GitHub - cozodb/cozo: A transactional, relational-graph-vector database that uses Datalog for query. The hippocampus for AI!
                          • GitHub - oracle/bpftune: bpftune uses BPF to auto-tune Linux systems

                            You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                              GitHub - oracle/bpftune: bpftune uses BPF to auto-tune Linux systems
                            • GitHub - m1k1o/neko: A self hosted virtual browser that runs in docker and uses WebRTC.

                              Welcome to Neko, a self-hosted virtual browser that runs in Docker and uses WebRTC technology. Neko is a powerful tool that allows you to run a fully-functional browser in a virtual environment, giving you the ability to access the internet securely and privately from anywhere. With Neko, you can browse the web, run applications, and perform other tasks just as you would on a regular browser, all

                                GitHub - m1k1o/neko: A self hosted virtual browser that runs in docker and uses WebRTC.
                              • Japan uses targeted coronavirus testing; South Korea goes big. The U.S. faces a choice.

                                Commuters make their way to work Thursday in Tokyo. Japan’s infection numbers have remained low, but experts debate whether it’s because the country has tested fewer people. (Tomohiro Ohsumi/Getty Images)

                                  Japan uses targeted coronavirus testing; South Korea goes big. The U.S. faces a choice.
                                • How Disney uses PyTorch for animated character recognition

                                  Authors: Miquel Àngel Farré, Anthony Accardo, Marc Junyent, Monica Alfaro, Cesc Guitart at Disney Disney’s Content GenomeThe long and incremental evolution of the media industry, from a traditional broadcast and home video model, to a more mixed model with increasingly digitally-accessible content, has accelerated the use of machine learning and artificial intelligence (AI). Advancing the implemen

                                    How Disney uses PyTorch for animated character recognition
                                  • GitHub Pages now uses Actions by default

                                    AI & MLLearn about artificial intelligence and machine learning across the GitHub ecosystem and the wider industry. Generative AILearn how to build with generative AI. GitHub CopilotChange how you work with GitHub Copilot. LLMsEverything developers need to know about LLMs. Machine learningMachine learning tips, tricks, and best practices. How AI code generation worksExplore the capabilities and be

                                      GitHub Pages now uses Actions by default
                                    • GitHub - Anjok07/ultimatevocalremovergui: GUI for a Vocal Remover that uses Deep Neural Networks.

                                      You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                        GitHub - Anjok07/ultimatevocalremovergui: GUI for a Vocal Remover that uses Deep Neural Networks.
                                      • Red Hat Eyeing Innovative eBPF Uses For Linux's HID Subsystem - Phoronix

                                        Red Hat Eyeing Innovative eBPF Uses For Linux's HID Subsystem Written by Michael Larabel in Linux Kernel on 24 February 2022 at 03:14 PM EST. 20 Comments eBPF for sandboxed programs running in the kernel have shown to be very useful beyond the original BPF origins in the networking subsystem to also be very practical for other security, tracing, and other general use-cases for an in-kernel JIT vir

                                          Red Hat Eyeing Innovative eBPF Uses For Linux's HID Subsystem - Phoronix
                                        • GitHub - webview/webview: Tiny cross-platform webview library for C/C++. Uses WebKit (GTK/Cocoa) and Edge WebView2 (Windows).

                                          You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                            GitHub - webview/webview: Tiny cross-platform webview library for C/C++. Uses WebKit (GTK/Cocoa) and Edge WebView2 (Windows).
                                          • Disrupting deceptive uses of AI by covert influence operations

                                            May 30, 2024 Disrupting deceptive uses of AI by covert influence operations We’ve terminated accounts linked to covert influence operations; no significant audience increase due to our services. OpenAI is committed to enforcing policies that prevent abuse and to improving transparency around AI-generated content. That is especially true with respect to detecting and disrupting covert influence ope

                                              Disrupting deceptive uses of AI by covert influence operations
                                            • Japan uses just a fraction of its coronavirus testing capacity

                                              TOKYO (Reuters) - Japan is only using a sixth of its capacity to test for the coronavirus even as it is increasing its ability to do so, government data shows, adding to concern that it is not doing enough to contain its outbreak. A man, wearing a protective mask following an outbreak of the coronavirus disease (COVID-19), walks inside a subway station in Tokyo, Japan March 17, 2020. REUTERS/Edgar

                                                Japan uses just a fraction of its coronavirus testing capacity
                                              • GNU Coreutils 9.0: cp Now Enables CoW By Default + Copy Offload, wc Now Uses AVX2 - Phoronix

                                                GNU Coreutils 9.0: cp Now Enables CoW By Default + Copy Offload, wc Now Uses AVX2 Written by Michael Larabel in GNU on 24 September 2021 at 01:36 PM EDT. 18 Comments Coreutils 9.0 is now available and it's a significant update to this collection of common open-source utilities found on effectively all Linux systems. First up, the widely-used cp utility for copying files/directories has some notabl

                                                  GNU Coreutils 9.0: cp Now Enables CoW By Default + Copy Offload, wc Now Uses AVX2 - Phoronix
                                                • UN aid convoy uses new land route from Israel to reach north Gaza

                                                  The UN said the convoy was able to use an Israeli military road that runs along the Gaza border fence to reach the north The UN says a new land route has been used to deliver food to northern Gaza for the first time in three weeks.

                                                    UN aid convoy uses new land route from Israel to reach north Gaza
                                                  • GitHub - organicmaps/organicmaps: 🍃 Organic Maps is a free Android & iOS offline maps app for travelers, tourists, hikers, and cyclists. It uses crowd-sourced OpenStreetMap data and is developed with love by MapsWithMe (MapsMe) founders and our community

                                                    🍃 Organic Maps is a free Android & iOS offline maps app for travelers, tourists, hikers, and cyclists. It uses crowd-sourced OpenStreetMap data and is developed with love by MapsWithMe (MapsMe) founders and our community. No ads, no tracking, no data collection, no crapware. Please donate to support the development!

                                                      GitHub - organicmaps/organicmaps: 🍃 Organic Maps is a free Android & iOS offline maps app for travelers, tourists, hikers, and cyclists. It uses crowd-sourced OpenStreetMap data and is developed with love by MapsWithMe (MapsMe) founders and our community
                                                    • FOSDEM 2023 - Bizarre and Unusual Uses of DNS

                                                      Rule 53: If you can think of it, someone's done it in the DNS DNS, like almost any protocol or system on the internet, has been used in ways almost from the day it was born that were probably never intended or envisioned by its inventors. This talk is an overview of some of the more interesting ways that people have thought to embrace and extend DNS, from large to small. From static traceroutes to

                                                        FOSDEM 2023 - Bizarre and Unusual Uses of DNS
                                                      • Phishing Campaign Uses Malicious Office 365 App

                                                        Most phishing campaigns use social engineering and brand impersonation to attempt to take over accounts and trick the victim into divulging their credentials. PhishLabs has uncovered a previously unseen tactic by attackers that uses a malicious Microsoft Office 365 App to gain access to a victim's account without requiring them to give up their credentials to the attackers. In this technique, the

                                                          Phishing Campaign Uses Malicious Office 365 App
                                                        • A 27-year-old who says he saves more than 80% of his income and is on track to retire early shares the savings and investing strategies he uses

                                                          An icon in the shape of a person's head and shoulders. It often indicates a user profile.

                                                            A 27-year-old who says he saves more than 80% of his income and is on track to retire early shares the savings and investing strategies he uses
                                                          • Scala と AWS でフルサーバーレス開発事例 / How Chatworks uses Scala and Serverless

                                                            https://nakanoshima-dev.connpass.com/event/204733/

                                                              Scala と AWS でフルサーバーレス開発事例 / How Chatworks uses Scala and Serverless
                                                            • How Machine Learning Uses Linear Algebra to Solve Data Problems

                                                              By Harshit Tyagi Machines or computers only understand numbers. And these numbers need to be represented and processed in a way that lets machines solve problems by learning from the data instead of learning from predefined instructions (as in the case of programming). All types of programming use mathematics at some level. Machine learning involves programming data to learn the function that best

                                                                How Machine Learning Uses Linear Algebra to Solve Data Problems
                                                              • GitHub - justjake/quickjs-emscripten: Safely execute untrusted Javascript in your Javascript, and execute synchronous code that uses async functions

                                                                You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                                                  GitHub - justjake/quickjs-emscripten: Safely execute untrusted Javascript in your Javascript, and execute synchronous code that uses async functions
                                                                • How Uber Uses Zig - Motiejus Jakštys Public Record

                                                                  Disclaimer: I work at Uber and am partially responsible for bringing zig cc to serious internal use. Opinions are mine, this blog post is not affiliated with Uber. I talked at the Zig Milan meetup about “Onboarding Zig at Uber”. This post is a little about “how Uber uses Zig”, and more about “my experience of bringing Zig to Uber”, from both technical and social aspects. The video is here. The res

                                                                  • GitHubにおける GitHub Actions利用法/How GitHub uses GitHub Actions

                                                                    CI/CD Test Night #5 発表資料 https://testnight.connpass.com/event/145238/

                                                                      GitHubにおける GitHub Actions利用法/How GitHub uses GitHub Actions
                                                                    • CSS { In Real Life } | 7 Uses for CSS Custom Properties

                                                                      Custom properties (also known as CSS variables) allow us to store property values for re-use in our stylesheets. If you’re relatively new to them, you might wonder when you might use them over and above preprocessor variables (if indeed you use a preprocessor). I’m using custom properties a lot in my workflow these days, and thought I would collate some of the use cases here. This isn’t an in-dept

                                                                        CSS { In Real Life } | 7 Uses for CSS Custom Properties
                                                                      • How Netflix Really Uses Java

                                                                        Transcript Bakker: I'm going to talk about how Netflix is really using Java. You probably know that Netflix is really just about RxJava microservices, with Hystrix and Spring Cloud. Really, Chaos Monkeys are just running the show. I'm only half getting here because a few years ago, this was actually mostly true, maybe except the Chaos Monkeys. This stack was something that we were building on in t

                                                                          How Netflix Really Uses Java
                                                                        • 'Shame on you': How President Zelensky uses speeches to get what he needs

                                                                          'Shame on you': How President Zelensky uses speeches to get what he needs Watch: Zelensky calls on people to 'support freedom' one month after Russia invaded Ukraine While his army has fought tenaciously on the battlefields of Ukraine, Volodymyr Zelensky has waged an information war on the capitals of the Western world.

                                                                            'Shame on you': How President Zelensky uses speeches to get what he needs
                                                                          • How GitHub uses GitHub Actions and Actions larger runners to build and test GitHub.com

                                                                            EngineeringHow GitHub uses GitHub Actions and Actions larger runners to build and test GitHub.comRecently, we’ve been working to make our CI experience better by leveraging the newly released GitHub feature, Actions larger runners, to run our CI. The Developer Experience (DX) team at GitHub collaborated with a number of other teams to work on moving our continuous integration (CI) system to GitHub

                                                                              How GitHub uses GitHub Actions and Actions larger runners to build and test GitHub.com
                                                                            • YUNG HIRAY on Twitter: "完全にこれじゃん https://t.co/m808vpjhhH https://t.co/fN5ZS5uSeS"

                                                                              完全にこれじゃん https://t.co/m808vpjhhH https://t.co/fN5ZS5uSeS

                                                                                YUNG HIRAY on Twitter: "完全にこれじゃん https://t.co/m808vpjhhH https://t.co/fN5ZS5uSeS"
                                                                              • Merged Manifest を使って uses-permission を調査した話 - TRILL Tech Blog

                                                                                どもです、TRILLのAndroid担当してます永井です。 この記事は「dely #2 Advent Calendar 2020」の17日目の記事です。 adventar.org 「dely #1 Advent Calendar 2020」はこちら↓ adventar.org 昨日は @MeilCli さんの C# 9.0時代のnull判定解剖 という記事でした。 様々なnull判定の比較検証がまとまってますので、こちらもぜひ御覧ください! さて 今回は APK で要求している uses-permission の手軽な解析方法について話したいと思います。 先日、新しく広告SDKを実装したAPKをビルドしていたところ、心当たりのない uses-permission が付与されていることに気づき、要求元を調査していました。 そこで直近実装したものを一つづつ外して追いかけようとしていたところ、

                                                                                  Merged Manifest を使って uses-permission を調査した話 - TRILL Tech Blog
                                                                                • SolarWinds Supply Chain Attack Uses SUNBURST Backdoor | Google Cloud Blog

                                                                                  Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor Written by: FireEye UPDATE (May 2022): We have merged UNC2452 with APT29. The UNC2452 activity described in this post is now attributed to APT29. Executive Summary We have discovered a global intrusion campaign. We are tracking the actors behind this campaign as UNC2452. FireEye d

                                                                                    SolarWinds Supply Chain Attack Uses SUNBURST Backdoor | Google Cloud Blog

                                                                                  新着記事