並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 40 件 / 72件

新着順 人気順

therefore thus consequentlyの検索結果1 - 40 件 / 72件

  • Google TypeScript Style Guide

    // Good: choose between two options as appropriate (see below). import * as ng from '@angular/core'; import {Foo} from './foo'; // Only when needed: default imports. import Button from 'Button'; // Sometimes needed to import libraries for their side effects: import 'jasmine'; import '@polymer/paper-button'; Import paths TypeScript code must use paths to import other TypeScript code. Paths may be r

    • Announcing PartiQL: One query language for all your data | Amazon Web Services

      AWS Open Source Blog Announcing PartiQL: One query language for all your data Data is being gathered and created at rates unprecedented in history. Much of this data is intended to drive business outcomes but, according to the Harvard Business Review, “…on average, less than half of an organization’s structured data is actively used in making decisions…” The root of the problem is that data is typ

        Announcing PartiQL: One query language for all your data | Amazon Web Services
      • Network Architecture Design for Microservices on GCP

        This is our goal architecture design, please read the article to understand the journey :)This blog article is participating in the Mercari Bold Challenge month (#6) Hi everyone, this is Raphael from the Microservices Platform team at Mercari. Bluntly introduced, we are a post-IPO Japanese C2C (Customer to Customer) marketplace transitioning from a monolithic to a microservices architecture. A few

          Network Architecture Design for Microservices on GCP
        • The Linux Kernel Module Programming Guide

          Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang 1 Introduction 1.1 Authorship 1.2 Acknowledgements 1.3 What Is A Kernel Module? 1.4 Kernel module package 1.5 What Modules are in my Kernel? 1.6 Is there a need to download and compile the kernel? 1.7 Before We Begin 2 Headers 3 Examples 4 Hello World 4.1 The Simplest Module 4.2 Hello and Goodbye 4.3 The __init and __exit Mac

          • BashPitfalls - Greg's Wiki

            Bash Pitfalls This page is a compilation of common mistakes made by bash users. Each example is flawed in some way. 1. for f in $(ls *.mp3) One of the most common mistakes BASH programmers make is to write a loop like this: for f in $(ls *.mp3); do # Wrong! some command $f # Wrong! done for f in $(ls) # Wrong! for f in `ls` # Wrong! for f in $(find . -type f) # Wrong! for f in `find . -type f` # W

            • 英語ビジネスメールの書き方 <記号> - Pioneer of the Star

              英語のビジネスメールでは英語圏特有の記号をよく使います。記号を適切に使うことで読みやすくわかりやすいメールを書くことができます。日本語の文化とは少し異なった使い方をする英語の記号の上手な書き方をご紹介します。 英語記号の種類 文末に使う記号 文や単語をつなぐ記号 引用や補足説明の記号 その他の記号 英語の記号の使い方 《 . 》ピリオド(Period) 《 ? 》クエスチョンマーク(Question Mark) 《 ! 》エクスクラメーションマーク (Exclamation Mark) 《 , 》カンマ(Comma) 《 : 》コロン(Colon) 《 ; 》セミコロン(Semicolon) 《 - 》ハイフン(Hyphen) 《 / 》スラッシュ(Slash) 《 " 》ダブルクォーテーション(Double Quotation Mark) 《 ' 》シングルクォーテーション(Single

                英語ビジネスメールの書き方 <記号> - Pioneer of the Star
              • Prettier 2.0 “2020” · Prettier

                Better defaults, a better CLI and better heuristics. Oh, and TypeScript 3.8. After a long and careful consideration, we decided to change the default values for the trailingComma, arrowParens, and endOfLine options. We made the CLI more intuitive. And we've finally dropped support for Node versions older than 10, which had grown to become a huge maintenance hassle and an obstacle for contributors.

                  Prettier 2.0 “2020” · Prettier
                • Optimizing your LLM in production

                  Note: This blog post is also available as a documentation page on Transformers. Large Language Models (LLMs) such as GPT3/4, Falcon, and LLama are rapidly advancing in their ability to tackle human-centric tasks, establishing themselves as essential tools in modern knowledge-based industries. Deploying these models in real-world tasks remains challenging, however: To exhibit near-human text unders

                    Optimizing your LLM in production
                  • Understanding Garbage Collection in JavaScriptCore From Scratch

                    JavaScript relies on garbage collection (GC) to reclaim memory. In this post, we will dig into JSC’s garbage collection system. Before we start, let me briefly introduce myself. I am Haoran Xu, a PhD student at Stanford University. While I have not yet contributed a lot to JSC, I found JSC a treasure of elegant compiler designs and efficient implementations, and my research is exploring ways to tr

                    • Xbox Architecture | A Practical Analysis

                      OriginalMarkedMotherboard Showing first revision. Controllers are plugged using a separate daughterboard. Missing SDRAM chips are on the back and there are four unpopulated SDRAM slots.Motherboard with important parts labelled A quick introductionIt seems that Microsoft has decided to pick up where Sega left off. Their offer? A system with familiarities appreciated by developers and online service

                        Xbox Architecture | A Practical Analysis
                      • The OpenSSL punycode vulnerability (CVE-2022-3602): Overview, detection, exploitation, and remediation | Datadog Security Labs

                        emerging vulnerabilities The OpenSSL punycode vulnerability (CVE-2022-3602): Overview, detection, exploitation, and remediation November 1, 2022 emerging vulnerability On November 1, 2022, the OpenSSL Project released a security advisory detailing a high-severity vulnerability in the OpenSSL library. Deployments of OpenSSL from 3.0.0 to 3.0.6 (included) are vulnerable and are fixed in version 3.0.

                          The OpenSSL punycode vulnerability (CVE-2022-3602): Overview, detection, exploitation, and remediation | Datadog Security Labs
                        • Powerlessness and the Politics of Blame - ABC Religion & Ethics

                          Martha C. Nussbaum is the Ernst Freund Distinguished Service Professor of Law and Ethics at the University of Chicago. She is a recipient of the 2016 Kyoto Prize in Arts and Philosophy and has been named the 2017 Jefferson Lecturer in the Humanities. When people feel themselves powerless, out of control of their own lives, and fearful for themselves and their loved ones, it is all too easy to conv

                            Powerlessness and the Politics of Blame - ABC Religion & Ethics
                          • 18-956 Google LLC v. Oracle America, Inc. (04/05/2021)

                            1 (Slip Opinion) OCTOBER TERM, 2020 Syllabus NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus constitutes no part of the opinion of the Court but has been prepared by the Reporter of Decisions for the convenience of the reader. See United States v. Detroit Timber & Lumber Co., 200 U. S

                            • Macroprudentialism

                              COVID ECONOMICS VETTED AND REAL-TIME PAPERS FROM THE GREAT RECESSION TO THE PANDEMIC RECESSION Francis X. Diebold ELECTORAL POLITICS AND SMALL BUSINESS LOANS Ran Duchin and John Hackney GROWTH FORECASTS AT END-2020 Javier G. Gómez-Pineda STOP-AND-GO EPIDEMIC CONTROL Claudius Gros and Daniel Gros CONSUMPTION RESPONSES TO STIMULUS PAYMENTS So Kubota, Koichiro Onishi and Yuta Toyama CHILD CARE CLOSUR

                              • Attack matrix for Kubernetes | Microsoft Security

                                Updated on May 10, 2021: An updated version of the threat matrix for containers is available here. Kubernetes, the most popular container orchestration system and one of the fastest-growing projects in the history of open source, becomes a significant part of many companies’ compute stack. The flexibility and scalability of containers encourage many developers to move their workloads to Kubernetes

                                  Attack matrix for Kubernetes | Microsoft Security
                                • WTO | dispute settlement - DS504: Korea — Anti-Dumping Duties on Pneumatic Valves from Japan

                                  DISPUTE SETTLEMENT DS: Korea — Anti-Dumping Duties on Pneumatic Valves from Japan This summary has been prepared by the Secretariat under its own responsibility. The summary is for general information only and is not intended to affect the rights and obligations of Members. See also: back to topSummary of the dispute to date The summary below was up-to-date at Consultations Complaint by Japan On 1

                                  • Network Architecture Design for Microservices on GCP

                                    This is our goal architecture design, please read the article to understand the journey :)This blog article is participating in the Mercari Bold Challenge month (#6) Hi everyone, this is Raphael from the Microservices Platform team at Mercari. Bluntly introduced, we are a post-IPO Japanese C2C (Customer to Customer) marketplace transitioning from a monolithic to a microservices architecture. A few

                                      Network Architecture Design for Microservices on GCP
                                    • ejabberd & Nintendo Switch NPNS / ProcessOne

                                      Colissimo For Colissimo, ProcessOne reworked a critical piece of their events processing chain for the high-speed parcel sorters. BBC News For the BBC, ProcessOne created and maintained a notification system for breaking news delivery to mobile devices that sends millions of pushes per day. Social Platform for Football Fans For a well known sports brand on a tight schedule, ProcessOne rapidly deve

                                        ejabberd & Nintendo Switch NPNS / ProcessOne
                                      • 2020’s Top AI & Machine Learning Research Papers

                                        TOPBOTS The Best of Applied Artificial Intelligence, Machine Learning, Automation, Bots, Chatbots Despite the challenges of 2020, the AI research community produced a number of meaningful technical breakthroughs. GPT-3 by OpenAI may be the most famous, but there are definitely many other research papers worth your attention. For example, teams from Google introduced a revolutionary chatbot, Meena,

                                          2020’s Top AI & Machine Learning Research Papers
                                        • ledgerdigest

                                          Soccer is the game that everyone is fond of. The popularity of the football game is at the crest among the young generation. The interest of the person in gambling is increasing as it increases the bankroll of the person. Conventionally, betting in the football game was done at a real place. It costs additional expenses to the person for their involvement in the betting. With the limitations, ther

                                          • ledgerdigest

                                            Soccer is the game that everyone is fond of. The popularity of the football game is at the crest among the young generation. The interest of the person in gambling is increasing as it increases the bankroll of the person. Conventionally, betting in the football game was done at a real place. It costs additional expenses to the person for their involvement in the betting. With the limitations, ther

                                            • ledgerdigest

                                              Soccer is the game that everyone is fond of. The popularity of the football game is at the crest among the young generation. The interest of the person in gambling is increasing as it increases the bankroll of the person. Conventionally, betting in the football game was done at a real place. It costs additional expenses to the person for their involvement in the betting. With the limitations, ther

                                              • systemd, 10 years later: a historical and technical retrospective

                                                systemd, 10 years later: a historical and technical retrospective by V.R. I am not sure I am such a big fan of reimplementing NetworkManager… – Lennart Poettering’s famous last words, March 2011 10 years ago, systemd was announced and swiftly rose to become one of the most persistently controversial and polarizing pieces of software in recent history, and especially in the GNU/Linux world. The qua

                                                • ledgerdigest

                                                  Soccer is the game that everyone is fond of. The popularity of the football game is at the crest among the young generation. The interest of the person in gambling is increasing as it increases the bankroll of the person. Conventionally, betting in the football game was done at a real place. It costs additional expenses to the person for their involvement in the betting. With the limitations, ther

                                                  • JEP 425: Virtual Threads (Preview)

                                                    Summary Introduce virtual threads to the Java Platform. Virtual threads are lightweight threads that dramatically reduce the effort of writing, maintaining, and observing high-throughput concurrent applications. This is a preview API. Goals Enable server applications written in the simple thread-per-request style to scale with near-optimal hardware utilization. Enable existing code that uses the j

                                                    • ledgerdigest

                                                      Soccer is the game that everyone is fond of. The popularity of the football game is at the crest among the young generation. The interest of the person in gambling is increasing as it increases the bankroll of the person. Conventionally, betting in the football game was done at a real place. It costs additional expenses to the person for their involvement in the betting. With the limitations, ther

                                                      • Mozilla's Vision of the Web

                                                        Firefox is no longer supported on macOS 10.14 and below. Please download Firefox ESR (Extended Support Release) to use Firefox. Mozilla’s vision for the evolution of the Web March 23, 2022 Mozilla's mission is to ensure that the Internet is a global public resource, open and accessible to all. We believe in an Internet that puts people first, where individuals can shape their own experience and ar

                                                          Mozilla's Vision of the Web
                                                        • Getting Started With CSS Cascade Layers — Smashing Magazine

                                                          Cascade layers introduce the new at-rule of @layer. The intent is to help CSS authors be more intentional about ordering the “layers” of CSS rules as a new method of cascade management. CSS recently turned 25 years old, and over that time, many techniques and tools have been created to help developers work with the cascade. Within the last year, a new spec to orchestrate the “C” in CSS was drafted

                                                            Getting Started With CSS Cascade Layers — Smashing Magazine
                                                          • Attacking Titan M with Only One Byte

                                                            Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip. Introduction During the last year and a half, we (Damiano Melotti, Maxime Rossi Bellom & Philippe Teuwen) studied the Titan M, a security chip introduced by Google in their Pixel smartph

                                                            • Understanding Deep Learning (Still) Requires Rethinking Generalization – Communications of the ACM

                                                              CACM Web Account Membership in ACM includes a subscription to Communications of the ACM (CACM), the computing industry's most trusted source for staying connected to the world of advanced computing. Sign In Sign Up Despite their massive size, successful deep artificial neural networks can exhibit a remarkably small gap between training and test performance. Conventional wisdom attributes small gen

                                                              • Transformer Architecture: The Positional Encoding - Amirhossein Kazemnejad's Blog

                                                                Transformer architecture was introduced as a novel pure attention-only sequence-to-sequence architecture by Vaswani et al. Its ability for parallelizable training and its general performance improvement made it a popular option among NLP (and recently CV) researchers. Thanks to the several implementations in common deep learning frameworks, it became an easy option to experiment with for many stud

                                                                • 英語の副詞の位置はどこが正しいの? - ネイティブキャンプ英会話ブログ

                                                                  ※この記事は12分で読めます。 みなさんこんにちは! 学校での英語の勉強というと、まず文法の勉強から始まると思います。 文法は基本の5文型があって、様々な品詞が組み合わさってできています。 今回のブログでは「副詞」の位置について解説します。 英文の基本的ルールや原則って? 「副詞」とは? 「副詞の分類」 「副詞の位置はどこ?」 【動詞を修飾する副詞の位置】 【頻度を表す副詞の位置】 部分否定(否定 + 副詞) 語順の逆転 まとめ 英文の基本的ルールや原則って? 副詞の具体的な説明に入る前に、英文の基本的ルールや原則をご説明します。 英語は主語(名詞)と動詞が文の骨組みの中心となります。 それに目的語や補語(形容詞や代名詞など)が加わり文中でさまざまな働きをしています。 これらの単語(名詞、形容詞、代名詞など)は、その形態や機能から8つの品詞に分けることができます。 ① 名詞 ② 代名詞 ③

                                                                    英語の副詞の位置はどこが正しいの? - ネイティブキャンプ英会話ブログ
                                                                  • 2021 Trafficking in Persons Report - United States Department of State

                                                                    Message From the Secretary of State Dear Reader: This year’s Trafficking in Persons Report sends a strong message to the world that global crises, such as the COVID-19 pandemic, climate change, and enduring discriminatory policies and practices, have a disproportionate effect on individuals already oppressed by other injustices.  These challenges further compound existing vulnerabilities to exploi

                                                                      2021 Trafficking in Persons Report - United States Department of State
                                                                    • Twelve-factor app anno 2022 | Xenit

                                                                      The Twelve-factor app is a methodology for building software-as-a-service apps that was first formulated by developers associated with Heroku. It's been ten years since the first presentation of this methodology. Despite the criticism that it is only applicable to Heroku and similar webapp services, it remains a relevant yard stick for software-as-a-service development. Some of its tenets have bee

                                                                      • What's New in Emacs 28.1?

                                                                        What’s New in Emacs 28.1? Learn what's new in Emacs 28.1 It’s that time again: there’s a new major version of Emacs and, with it, a treasure trove of new features and changes. Notable features include the formal inclusion of native compilation, a technique that will greatly speed up your Emacs experience. A critical issue surrounding the use of ligatures also fixed; without it, you couldn’t use li

                                                                        • Announcing Internet Computer “Mainnet” and a 20-Year Roadmap

                                                                          The Internet Computer is the world’s first blockchain that runs at web speed and can increase its capacity without bound. DFINITY Status Update, New Year 2021I HAVE SOME EXCITING NEWS.On December 18, 2020, a crucial initial stage of Internet Computer blockchain’s decentralization occurred. This means that the Internet Computer’s mainnet now exists, and is hosted by standardized “node machines” tha

                                                                            Announcing Internet Computer “Mainnet” and a 20-Year Roadmap
                                                                          • Introduction to the Zettelkasten Method • Zettelkasten Method

                                                                            Why are you reading this introduction? The chances are that you either have an immediate need to solve the riddle of knowledge work, feel overwhelmed by your master’s thesis, try to level up your blog, want to write a book because it’s cool, try to get on top as a consultant, excel at research, or something like that. But the Zettelkasten Method is more than just a tool to finish some work or proj

                                                                            • 英語の副詞の使い方と位置を完全説明

                                                                              英語の副詞って、難しいと感じていませんか? 日本語でさえ副詞とは何か説明してください、と言われたらパッと答えられないかもしれません。 ただ、副詞は難しくありません。「とても」や「ほとんど」などが副詞にあたりますが、私たちは普段から会話で意識せずとも使っていますよね。 それと同じように使い方やパターンさえ覚えてしまえば、英語の副詞も使いこなせるようになります。 ということでこの記事では英語の副詞について、形容詞との違いや副詞の種類、また副詞の使い方や位置、形容詞の形やTOEICで出やすい副詞などをお伝えしていきます。 英語の表現の幅が広がるので、これを機に改めてマスターしていきましょう。 英語の副詞とは副詞とは、ある言葉や文章を修飾する役割を持つ言葉です。 例えば、「very(とても)」や「always(いつも)」、「there(そこに)」や「then(その時」などがあります。 また、副詞は

                                                                              • dbs-002.dvi

                                                                                Foundations and Trends R � in Databases Vol. 1, No. 2 (2007) 141–259 c � 2007 J. M. Hellerstein, M. Stonebraker and J. Hamilton DOI: 10.1561/1900000002 Architecture of a Database System Joseph M. Hellerstein1 , Michael Stonebraker2 and James Hamilton3 1 University of California, Berkeley, USA, hellerstein@cs.berkeley.edu 2 Massachusetts Institute of Technology, USA 3 Microsoft Research, USA Abstra

                                                                                • Trademarks in Open Source

                                                                                  Trademarks in Open Source Introduction Cases Unmanaged Trademarks: Naked Licensing FreecycleSunnyvale v. Freecycle Network Discussion Common Law Trademarks Planetary Motion, Inc. v. Techsplosion, Inc. Discussion Fair Use Defense to Trademark Infringement: Nominative Use Playboy Enters. v. Welles Discussion License Terms’ Bearing on Trademark Use MIT Discussion BSD-3-Clause Discussion PHP-3.0 Discu