並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 27 件 / 27件

新着順 人気順

life hacking skillsの検索結果1 - 27 件 / 27件

  • Go: A Documentary

    Go: A Documentary by Changkun Ou <changkun.de> (and many inputs from contributors) This document collects many interesting (publicly observable) issues, discussions, proposals, CLs, and talks from the Go development process, which intends to offer a comprehensive reference of the Go history. Disclaimer Most of the texts are written as subjective understanding based on public sources Factual and ty

    • 非認知能力とGritは本当に有効か?|Daiki Nakamura

      この記事は、慶應義塾・社会学研究科の開講科目「社会心理学特論 I :心理学方法論の新展開」での課題活動と、ReproducibiliTea Tokyo の活動の一環として、まとめられたものです。ReproducibiliTea は、信頼できる科学を目指す、国際的な草の根ジャーナルクラブ活動で、Tokyo は文字通り、その東京バージョンです。各記事の対象論文の選定ならびに記事内容には、執筆者を含む参加メンバー全員の意見が反映されています。記事についてのご質問・ご意見等は、repteatokyo@gmail.com までお送りください。 本記事は,Smithersらによる “A systematic review and meta-analysis of effects of early life non-cognitive skills on academic”とCredéらによる”Much

        非認知能力とGritは本当に有効か?|Daiki Nakamura
      • The End of Silicon Valley as We Know It?

        Join the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful. Learn more Consumer internet entrepreneurs lack many of the skills needed for the life sciences revolution.Internet regulation is upon us.Climate response is capital intensive, and inherently local.The end of the betting economy. Inventing the future “The best way to

          The End of Silicon Valley as We Know It?
        • AaaSからZaaSまで「as a Service」を探したら色々なサービスが見えた話 - Qiita

          はじめに 近年IT界隈では、IaaS(Infrastructure as a Service)やPaaS(Platform as a Service)などの~~ as a Serviceという言葉をよく聞くと思います。 ここでは、それらをまとめて、 [A-Z]aaS と呼びたいと思います。 FirebaseなどのBaaS(Backend as a Service)やAWS LambdaなどのFaaS(Function as a Service)など色々な[A-Z]aaSを聞く機会が増えてきたんじゃないでしょうか。 今回は色々な[A-Z]aaSを探してみました。結果としては 910個 もの[A-Z]aaSを見つけることができました。(探した結果を全て、後半に表示してあります。) [A-Z]aaSの探し方 最初の二文字を固定して、グーグル検索のサジェストに表示されるものを収集することにします。

            AaaSからZaaSまで「as a Service」を探したら色々なサービスが見えた話 - Qiita
          • Download Realm Of The Mad God (free For Mac

            Visiteurs depuis le 28/01/2019 : 5581 Connectés : 1 Record de connectés : 91 Download Realm Of The Mad God (free For Mac FreeRealm Of The Mad God Free Download FULL PC Game Realm Of The Mad God Free Download Full Version RG Mechanics Repack PC Game In Direct Download Links. This Game Is Cracked And Highly Compressed Game. Specifications Of Realm Of The Mad God PC Game Genre: Action, Indie, RPG Pla

              Download Realm Of The Mad God (free For Mac
            • Objectively comparing Unity and Unreal Engine

              I have read from Unity Blog long time ago that talks about project stripping, explaining reproduce steps, making it easier for the QA team to make it... It's scary. If you are Unity devs, you know the feeling of checking Unity Hub every morning for update, and hope that it will randomly fix your years old bug, while introducing the less amount of new bugs as possible. It really make you sweats ner

                Objectively comparing Unity and Unreal Engine
              • Ryan Dahl, Node.js Creator, Wants to Rebuild the Runtime of the Web

                Photography: BRYAN DERBALLA Published February 9, 2023 In June 2018, Ryan Dahl took the stage at JSConf EU in Berlin, the largest nonprofit JavaScript conference in the world. Despite it being a high-profile event (and the fact that the majority of the 1,500 conference attendees had filed into this particular warehouse just to see him), Dahl wore a loose-fitting black T-shirt and jeans and kept th

                  Ryan Dahl, Node.js Creator, Wants to Rebuild the Runtime of the Web
                • Arti 1.0.0 is released: Our Rust Tor implementation is ready for production use. | Tor Project

                  Arti 1.0.0 is released: Our Rust Tor implementation is ready for production use. by nickm | September 2, 2022 Back in 2020, we started work on a new implementation of the Tor protocols in the Rust programming language. Now we believe it's ready for wider use. In this blog post, we'll tell you more about the history of the Arti project, where it is now, and where it will go next. Background: Why Ar

                    Arti 1.0.0 is released: Our Rust Tor implementation is ready for production use. | Tor Project
                  • Why We Use Julia, 10 Years Later

                    Exactly ten years ago today, we published "Why We Created Julia", introducing the Julia project to the world. At this point, we have moved well past the ambitious goals set out in the original blog post. Julia is now used by hundreds of thousands of people. It is taught at hundreds of universities and entire companies are being formed that build their software stacks on Julia. From personalized me

                      Why We Use Julia, 10 Years Later
                    • GitHub - blaCCkHatHacEEkr/PENTESTING-BIBLE: articles

                      -1- 3 Ways Extract Password Hashes from NTDS.dit: https://www.hackingarticles.in/3-ways-extract-password-hashes-from-ntds-dit -2- 3 ways to Capture HTTP Password in Network PC: https://www.hackingarticles.in/3-ways-to-capture-http-password-in-network-pc/ -3- 3 Ways to Crack Wifi using Pyrit,oclHashcat and Cowpatty: www.hackingarticles.in/3-ways-crack-wifi-using-pyrit-oclhashcat-cowpatty/ -4-BugBou

                        GitHub - blaCCkHatHacEEkr/PENTESTING-BIBLE: articles
                      • Plan 9 Desktop Guide

                        PLAN 9 DESKTOP GUIDE INDEX What is Plan 9? Limitations and Workarounds Connecting to Other Systems VNC RDP SSH 9P Other methods Porting Applications Emulating other Operating Systems Virtualizing other Operating Systems Basics Window Management Copy Pasting Essential Programs Manipulating Text in the Terminal Acme - The Do It All Application Multiple Workspaces Tiling Windows Plumbing System Admin

                        • Dark Patterns: Past, Present, and Future - ACM Queue

                          May 17, 2020 Volume 18, issue 2 PDF Dark Patterns: Past, Present, and Future The evolution of tricky user interfaces Arvind Narayanan, Arunesh Mathur, Marshini Chetty, and Mihir Kshirsagar Dark patterns are user interfaces that benefit an online service by leading users into making decisions they might not otherwise make. Some dark patterns deceive users while others covertly manipulate or coerce

                          • What's new in Swift 5.5?

                            What's new in Swift 5.5? Async/await, actors, throwing properties, and more! Swift 5.5 comes with a massive set of improvements – async/await, actors, throwing properties, and many more. For the first time it’s probably easier to ask “what isn’t new in Swift 5.5” because so much is changing. In this article I’m going to walk through each of the changes with code samples, so you can see how each of

                              What's new in Swift 5.5?
                            • Sodinokibi Ransomware gang threatens to disclose data from Kenneth Cole fashion firm

                              APT41: The threat of KeyPlug against Italian industries | Critical SQL Injection flaws impact Ivanti Endpoint Manager (EPM) | Chinese actor 'Unfading Sea Haze' remained undetected for five years | A consumer-grade spyware app found in check-in systems of 3 US hotels | Critical Veeam Backup Enterprise Manager authentication bypass bug | Cybercriminals are targeting elections in India with influence

                                Sodinokibi Ransomware gang threatens to disclose data from Kenneth Cole fashion firm
                              • GitHub - wesbos/awesome-uses: A list of /uses pages detailing developer setups, gear, software and configs.

                                ▄████████ ▄█ █▄ ▄████████ ▄████████ ▄██████▄ ▄▄▄▄███▄▄▄▄ ▄████████ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ▄██▀▀▀███▀▀▀██▄ ███ ███ ███ ███ ███ ███ ███ █▀ ███ █▀ ███ ███ ███ ███ ███ ███ █▀ ███ ███ ███ ███ ▄███▄▄▄ ███ ███ ███ ███ ███ ███ ▄███▄▄▄ ▀███████████ ███ ███ ▀▀███▀▀▀ ▀███████████ ███ ███ ███ ███ ███ ▀▀███▀▀▀ ███ ███ ███ ███ ███ █▄ ███ ███ ███ ███ ███ ███ ███ █▄ ███ ███ ███ ▄█▄ ███ ███ ███ ▄█

                                  GitHub - wesbos/awesome-uses: A list of /uses pages detailing developer setups, gear, software and configs.
                                • Experts discovered millions of .git folders exposed to public

                                  Crooks manipulate GitHub's search results to distribute malware | BatBadBut flaw allowed an attacker to perform command injection on Windows | Roku disclosed a new security breach impacting 576,000 accounts | LastPass employee targeted via an audio deepfake call | TA547 targets German organizations with Rhadamanthys malware | CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulner

                                    Experts discovered millions of .git folders exposed to public
                                  • Turn your old speakers or Hi-Fi into Bluetooth, Airplay and Spotify receivers with a Raspberry Pi and this step-by-step guide - balena Blog

                                    Turn your old speakers or Hi-Fi into Bluetooth, Airplay and Spotify receivers with a Raspberry Pi and this step-by-step guide Learn how to transform an old Hi-Fi or sound system with an AUX input into a bluetooth/wireless speaker with a Raspberry Pi and balena. Last updated: 16th March 2021 If you’ve got an old Hi-Fi or sound system with an AUX input, this project is for you. Try balenaSound, a st

                                      Turn your old speakers or Hi-Fi into Bluetooth, Airplay and Spotify receivers with a Raspberry Pi and this step-by-step guide - balena Blog
                                    • Bullshit Jobs

                                      Notes: ISBN 978-1-5011-4331-1, ISBN 978-1-5011-4334-2 (ebook); Most names and many identifying characteristics have been changed.; Interior design by Carly Loman; Jacket design by David L Itman To anyone who would rather be doing something useful with themselves. Preface: On the Phenomenon of Bullshit Jobs In the spring of 2013, I unwittingly set off a very minor international sensation. It all be

                                        Bullshit Jobs
                                      • GitHub - suzukiiichiro/Rogue2.Official: 【公式ローグII】rougeclone2 (データ分離版ローグ・クローンII UTF-8版)ターミナルへの出力はもちろん、メッセージファイル、ソースコードなどすべての処理と資源がUTF-8対応しています。Rogueのすばらしさを楽しみたい人、ソースコードを見て完成度を共感したい人、さらにオリジナルアイディアでゲームを拡張したいひと、待望の日本語UTF-8最終FIX版

                                        ============================================================================== 日本語版ローグ・クローンによる『運命の洞窟』への招待 鈴木維一郎 <suzuki.iichiro@gmail.com> 太田純氏の「ローグ・クローン2 日本語版1.3」、伊藤康史氏の「データ分離版ローグ・ クローンII」、FUNABARA Masao氏の「rogueclone2s」、 Naohiro Aota氏の 「rogueclone2s-utf8」、を経て本バージョンとなりました。 ○説明 rougeclone2s (データ分離版ローグ・クローンII  メンテナンスバージョン のUTF-8版) はターミナルへの出力のみが UTF-8対応となっていましたが、本バージョンは、ターミナ ルへの出力はもちろん、メッセージファイル、ソースコ

                                          GitHub - suzukiiichiro/Rogue2.Official: 【公式ローグII】rougeclone2 (データ分離版ローグ・クローンII UTF-8版)ターミナルへの出力はもちろん、メッセージファイル、ソースコードなどすべての処理と資源がUTF-8対応しています。Rogueのすばらしさを楽しみたい人、ソースコードを見て完成度を共感したい人、さらにオリジナルアイディアでゲームを拡張したいひと、待望の日本語UTF-8最終FIX版
                                        • Track Awesome List Updates Daily

                                          Track Awesome List Updates DailyWe track over 500 awesome list updates, and you can also subscribe to daily or weekly updates via RSS or News Letter. This repo is generated by trackawesomelist-source, visit it Online or with Github. 📅 Weekly · 🔍 Search · 🔥 Feed · 📮 Subscribe · ❤️ Sponsor · 😺 Github · 🌐 Website · 📝 04/22 · ✅ 04/22 Table of Contents Recently Updated Top 50 Awesome List All Tr

                                            Track Awesome List Updates Daily
                                          • GPT-3 Creative Fiction · Gwern.net

                                            Creative writing by OpenAI’s GPT-3 model, demonstrating poetry, dialogue, puns, literary parodies, and storytelling. Plus advice on effective GPT-3 prompt programming & avoiding common errors. I continue my AI poetry generation experiments with OpenAI’s GPT-3 (released mid-2020), which is 116× larger, and much more powerful, than the 2019 GPT-2. GPT-3, however, is not merely a quantitative tweak y

                                              GPT-3 Creative Fiction · Gwern.net
                                            • What to learn

                                              It's common to see people advocate for learning skills that they have or using processes that they use. For example, Steve Yegge has a set of blog posts where he recommends reading compiler books and learning about compilers. His reasoning is basically that, if you understand compilers, you'll see compiler problems everywhere and will recognize all of the cases where people are solving a compiler

                                              • New EvilQuest ransomware targets macOS users ...

                                                Google fixes fifth actively exploited Chrome zero-day this year | Russia-linked APT28 targets government Polish institutions | Citrix warns customers to update PuTTY version installed on their XenCenter system manually | Dell discloses data breach impacting millions of customers | Mirai botnet also spreads through the exploitation of Ivanti Connect Secure bugs | Zscaler is investigating data breac

                                                  New EvilQuest ransomware targets macOS users ...
                                                • A flaw in LastPass password manager leaks credentials from previous site

                                                  Magento flaw exploited to deploy persistent backdoor hidden in XML | Cyberattack disrupted services at Omni Hotels & Resorts | HTTP/2 CONTINUATION Flood technique can be exploited in DoS attacks | US cancer center City of Hope: data breach impacted 827149 individuals | Ivanti fixed for 4 new issues in Connect Secure and Policy Secure | Jackson County, Missouri, discloses a ransomware attack | Goog

                                                    A flaw in LastPass password manager leaks credentials from previous site
                                                  • New research, tooling, and partnerships for more secure AI and machine learning | Microsoft Security Blog

                                                    Today we’re on the verge of a monumental shift in the technology landscape that will forever change the security community. AI and machine learning may embody the most consequential technology advances of our lifetime, bringing huge opportunities to build, discover, and create a better world. Brad Smith recently pointed out that 2023 will likely mark the inflection point for AI going mainstream, t

                                                      New research, tooling, and partnerships for more secure AI and machine learning | Microsoft Security Blog
                                                    • Two kids found a screensaver bypass in Linux Mint

                                                      Dirty stream attack poses billions of Android installs at risk | ZLoader Malware adds Zeus's anti-analysis feature | Ukrainian REvil gang member sentenced to 13 years in prison | HPE Aruba Networking addressed four critical ArubaOS RCE flaws | Threat actors hacked the Dropbox Sign production environment | CISA adds GitLab flaw to its Known Exploited Vulnerabilities catalog | Panda Restaurant Group

                                                        Two kids found a screensaver bypass in Linux Mint
                                                      • GitHub flaw could have allowed attackers to takeover repositories of other users

                                                        BatBadBut flaw allowed an attacker to perform command injection on Windows | Roku disclosed a new security breach impacting 576,000 accounts | LastPass employee targeted via an audio deepfake call | TA547 targets German organizations with Rhadamanthys malware | CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulnerabilities catalog | US CISA published an alert on the Sisense data

                                                          GitHub flaw could have allowed attackers to takeover repositories of other users
                                                        1