PodSecurityPolicy からGatekeeper に移行しました / Kubernetes Meetup Tokyo #57
![著作権、権利って難しい 技術者もこれだけは知っておきたい知識](https://cdn-ak-scissors.b.st-hatena.com/image/square/be00cbe25baa9e3fb5cc524d5d14e9edeec55833/height=288;version=1;width=512/https%3A%2F%2Fcdn.slidesharecdn.com%2Fss_thumbnails%2Frandom-111226031030-phpapp01-thumbnail.jpg%3Fwidth%3D640%26height%3D640%26fit%3Dbounds)
PodSecurityPolicy からGatekeeper に移行しました / Kubernetes Meetup Tokyo #57
Static Code AnalysisThe most important thing I have done as a programmer in recent years is to aggressively pursue static code analysis. Even more valuable than the hundreds of serious bugs I have prevented with it is the change in mindset about the way I view software reliability and code quality.It is important to say right up front that quality isn’t everything, and acknowledging it isn’t some
"The realization came over me with full force that a good part of the remainder of my life was going to be spent in finding errors in my own programs." Last changed on $Date: 2003/04/15 04:18:55 $. A practicing programmer inevitably spends a lot of time tracking down and fixing bugs. Debugging, particularly debugging of other people's code, is a skill separate from the ability to write programs in
An example of a monadic programming in Scheme that juxtaposes Haskell code for a particular state monad with the corresponding Scheme code. Introduction This article sprang from a question posted on comp.lang.functional about building of trees whose nodes are tagged with unique integers. "Ideally every term/node has to have its id associated with it at construction time," the poster said. "An obvi
Overview of AIMA Lisp Code This serves as the starting point for exploring the online code for Artificial Intelligence: A Modern Approach. You can see: The Software License Agreement for the code (you can use it for whatever you want). A User's Guide to the Lisp code. An Installation Guide plus the code itself as a single downloadable file. (Look here for updated Lisp code that runs without errors
www.lambdassociates.org Rasakan Detak Jantung Kemenangan di Setiap Putaran Dunia Gambling! In the high-stakes world of casino poker, understanding the nuances of psychology can be just as important as mastering the game’s mechanics. “Reading the table” refers to the ability to interpret your into Casino Poker Psychology opponents’ behavior, emotional states, and betting patterns to make informed d
When I was a teenager I played high caliber baseball. I’m competitive to a fault and when I decide I want to be good at something, results usually follow. Now I’m a third year undergrad studying computer science. There’s something critically different between programming and sports though: A pitching coach teaches you how to pitch, but a CS professor doesn’t teach you how to code. I was surprised
相関係数と無相関検定 以下のような 2 組のデータ x ,y に相関があるかどうかの検定を行う場合は関数 cor.test() を使う. x <- c(70, 72, 62, 64, 71, 76, 60, 65, 74, 72) y <- c(70, 74, 65, 68, 72, 74, 61, 66, 76, 75) このとき,引数 method に次の文字列を入れることで検定方法を代えることが出来る. "pearson" : ピアソンの積率相関係数の無相関検定を行う. "kendall" : ケンドールの順位相関係数の無相関検定を行う. "spearman" : スピアマンの順位相関係数の無相関検定を行う. 上のデータ形式それぞれの入力例である. cor(x, y, method="spearman") # 単なる相関係数 [1] 0.929878 cor.test(x, y, m
At Khan Academy we’ve been investigating teaching Computer Science to students in some new and interesting ways. The most interesting aspect of which is that we’re likely going to be teaching them JavaScript as their first language. We’re in a very unique position as we’re primarily aiming to teach students who’ve been through our previous math and science-centric curriculum. Because of this we ca
はてなグループの終了日を2020年1月31日(金)に決定しました 以下のエントリの通り、今年末を目処にはてなグループを終了予定である旨をお知らせしておりました。 2019年末を目処に、はてなグループの提供を終了する予定です - はてなグループ日記 このたび、正式に終了日を決定いたしましたので、以下の通りご確認ください。 終了日: 2020年1月31日(金) エクスポート希望申請期限:2020年1月31日(金) 終了日以降は、はてなグループの閲覧および投稿は行えません。日記のエクスポートが必要な方は以下の記事にしたがって手続きをしてください。 はてなグループに投稿された日記データのエクスポートについて - はてなグループ日記 ご利用のみなさまにはご迷惑をおかけいたしますが、どうぞよろしくお願いいたします。 2020-06-25 追記 はてなグループ日記のエクスポートデータは2020年2月28
Sustainable Security Requirements with the ASVS Josh Grossman provides a brief overview of what the ASVS is, but takes a closer look at balancing trade-offs and prioritizing different security requirements. Josh shares how to make the process repeatable and how to implement it as part of your own organization's requirements process.
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く