並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 40 件 / 94件

新着順 人気順

usesの検索結果1 - 40 件 / 94件

タグ検索の該当結果が少ないため、タイトル検索結果を表示しています。

usesに関するエントリは94件あります。 githubセキュリティsecurity などが関連タグです。 人気エントリには 『China is now blocking all encrypted HTTPS traffic that uses TLS 1.3 and ESNI』などがあります。
  • China is now blocking all encrypted HTTPS traffic that uses TLS 1.3 and ESNI

    How the top VPNs compare: Plus, should you try a free VPN? We tested the best VPN services -- focusing on the number of servers, ability to unlock streaming services, and more -- to determine a No. 1 overall. Plus, we tell you whether free VPNs are worth trying. Read now The Chinese government has deployed an update to its national censorship tool, known as the Great Firewall (GFW), to block encry

      China is now blocking all encrypted HTTPS traffic that uses TLS 1.3 and ESNI
    • /uses

      /usesA list of /uses pages detailing developer setups, gear, software and configs. Full Stack Developer from Agra, Uttar Pradesh Tall StackFrontendBackendFull StackReactNext.jsTailwindCSSAlpineJSLaravelLaravel LivewirePHPDesignerDeveloperUIUX

        /uses
      • Shiguredo uses Tailscale to solve the issues that arise with cloud services using bare-metal servers · Tailscale

        Contributed by @voluntas. Shiguredo Inc. develops and provides a software package called WebRTC SFU Sora (Sora) and its cloud service. WebRTC (Real-Time Communication) is a technology for exchanging voice, video, and data in real time over P2P. Sora is a WebRTC SFU (Selective Forwarding Unit), which is different from P2P communication in that it delivers audio and video data “via server.” With Sor

          Shiguredo uses Tailscale to solve the issues that arise with cloud services using bare-metal servers · Tailscale
        • Why SQLite Uses Bytecode

          1. Introduction Every SQL database engine works in roughly the same way: It first translates the input SQL text into a "prepared statement". Then it "executes" the prepared statement to generate a result. A prepared statement is an object that represents the steps needed to accomplish the input SQL. Or, to think of it in another way, the prepared statement is the SQL statement translated into a fo

          • GitHub - ghostty-org/ghostty: 👻 Ghostty is a fast, feature-rich, and cross-platform terminal emulator that uses platform-native UI and GPU acceleration.

            Ghostty is a terminal emulator that differentiates itself by being fast, feature-rich, and native. While there are many excellent terminal emulators available, they all force you to choose between speed, features, or native UIs. Ghostty provides all three. In all categories, I am not trying to claim that Ghostty is the best (i.e. the fastest, most feature-rich, or most native). But Ghostty is comp

              GitHub - ghostty-org/ghostty: 👻 Ghostty is a fast, feature-rich, and cross-platform terminal emulator that uses platform-native UI and GPU acceleration.
            • GitHub - google/osv-scanner: Vulnerability scanner written in Go which uses the data provided by https://osv.dev

              You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                GitHub - google/osv-scanner: Vulnerability scanner written in Go which uses the data provided by https://osv.dev
              • GitHub - alexhallam/tv: 📺(tv) Tidy Viewer is a cross-platform CLI csv pretty printer that uses column styling to maximize viewer enjoyment.

                You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                  GitHub - alexhallam/tv: 📺(tv) Tidy Viewer is a cross-platform CLI csv pretty printer that uses column styling to maximize viewer enjoyment.
                • How Shopify Uses WebAssembly Outside of the Browser - Shopify

                  How Shopify Uses WebAssembly Outside of the BrowserAt Shopify, we’re keeping the flexibility of untrusted Partner code, but executing it on our own infrastructure with WebAssembly. On February 24, 2021, Shipit!, our monthly event series, presented Making Commerce Extensible with WebAssembly. The video is now available. At Shopify we aim to make what most merchants need easy, and the rest possible.

                    How Shopify Uses WebAssembly Outside of the Browser - Shopify
                  • How Netflix uses eBPF flow logs at scale for network insight

                    By Alok Tiagi, Hariharan Ananthakrishnan, Ivan Porto Carrero and Keerti Lakshminarayan Netflix has developed a network observability sidecar called Flow Exporter that uses eBPF tracepoints to capture TCP flows at near real time. At much less than 1% of CPU and memory on the instance, this highly performant sidecar provides flow data at scale for network insight. ChallengesThe cloud network infrast

                      How Netflix uses eBPF flow logs at scale for network insight
                    • GitHub - TachibanaYoshino/AnimeGAN: A Tensorflow implementation of AnimeGAN for fast photo animation ! This is the Open source of the paper 「AnimeGAN: a novel lightweight GAN for photo animation」, which uses the GAN framwork to transform real-world photos

                      You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                        GitHub - TachibanaYoshino/AnimeGAN: A Tensorflow implementation of AnimeGAN for fast photo animation ! This is the Open source of the paper 「AnimeGAN: a novel lightweight GAN for photo animation」, which uses the GAN framwork to transform real-world photos
                      • IDF uses Gazan civilians as human shields to inspect potentially booby-trapped tunnels

                        Haaretz Investigation: Israeli Army Uses Palestinian Civilians to Inspect Potentially Booby-trapped Tunnels in Gaza'Our lives are more important than their lives': Gazans not suspected of terrorism are detained and sent as human shields to search tunnels and houses before IDF soldiers enter, with the full knowledge of senior Israeli officers, several sources say; IDF claims this practice is forbid

                          IDF uses Gazan civilians as human shields to inspect potentially booby-trapped tunnels
                        • GitHub - cozodb/cozo: A transactional, relational-graph-vector database that uses Datalog for query. The hippocampus for AI!

                          Version v0.7: after HNSW vector search from 0.6, in 0.7 we bring to you MinHash-LSH for near-duplicate search, full-text search, Json value support and more! See here for more details. Version v0.6 released! This version brings vector search with HNSW indices inside Datalog, which can be integrated seamlessly with powerful features like ad-hoc joins, recursive Datalog and classical whole-graph alg

                            GitHub - cozodb/cozo: A transactional, relational-graph-vector database that uses Datalog for query. The hippocampus for AI!
                          • GitHub - oracle/bpftune: bpftune uses BPF to auto-tune Linux systems

                            You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                              GitHub - oracle/bpftune: bpftune uses BPF to auto-tune Linux systems
                            • GitHub - ysk8hori/delta-typescript-graph-action: This GitHub Action uses Mermaid to visualize in a diagram the files that were changed in a Pull Request and their related dependency files.

                              You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                GitHub - ysk8hori/delta-typescript-graph-action: This GitHub Action uses Mermaid to visualize in a diagram the files that were changed in a Pull Request and their related dependency files.
                              • GitHub - ErikBjare/gptme: Your agent in your terminal, equipped with local tools: writes code, uses the terminal, browses the web, vision.

                                You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                  GitHub - ErikBjare/gptme: Your agent in your terminal, equipped with local tools: writes code, uses the terminal, browses the web, vision.
                                • GitHub - m1k1o/neko: A self hosted virtual browser that runs in docker and uses WebRTC.

                                  Welcome to Neko, a self-hosted virtual browser that runs in Docker and uses WebRTC technology. Neko is a powerful tool that allows you to run a fully-functional browser in a virtual environment, giving you the ability to access the internet securely and privately from anywhere. With Neko, you can browse the web, run applications, and perform other tasks just as you would on a regular browser, all

                                    GitHub - m1k1o/neko: A self hosted virtual browser that runs in docker and uses WebRTC.
                                  • GitHub - sourcegraph/cody: Type less, code more: Cody is an AI code assistant that uses advanced search and codebase context to help you write and fix code.

                                    You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                      GitHub - sourcegraph/cody: Type less, code more: Cody is an AI code assistant that uses advanced search and codebase context to help you write and fix code.
                                    • Japan uses targeted coronavirus testing; South Korea goes big. The U.S. faces a choice.

                                      Japan uses targeted coronavirus testing; South Korea goes big. The U.S. faces a choice. Commuters make their way to work Thursday in Tokyo. Japan’s infection numbers have remained low, but experts debate whether it’s because the country has tested fewer people. (Tomohiro Ohsumi/Getty Images)

                                        Japan uses targeted coronavirus testing; South Korea goes big. The U.S. faces a choice.
                                      • How Disney uses PyTorch for animated character recognition

                                        Authors: Miquel Àngel Farré, Anthony Accardo, Marc Junyent, Monica Alfaro, Cesc Guitart at Disney Disney’s Content GenomeThe long and incremental evolution of the media industry, from a traditional broadcast and home video model, to a more mixed model with increasingly digitally-accessible content, has accelerated the use of machine learning and artificial intelligence (AI). Advancing the implemen

                                          How Disney uses PyTorch for animated character recognition
                                        • GitHub - Anjok07/ultimatevocalremovergui: GUI for a Vocal Remover that uses Deep Neural Networks.

                                          You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                            GitHub - Anjok07/ultimatevocalremovergui: GUI for a Vocal Remover that uses Deep Neural Networks.
                                          • GitHub Pages now uses Actions by default

                                            AI & MLLearn about artificial intelligence and machine learning across the GitHub ecosystem and the wider industry. Generative AILearn how to build with generative AI. GitHub CopilotChange how you work with GitHub Copilot. LLMsEverything developers need to know about LLMs. Machine learningMachine learning tips, tricks, and best practices. How AI code generation worksExplore the capabilities and be

                                              GitHub Pages now uses Actions by default
                                            • GitHub - webview/webview: Tiny cross-platform webview library for C/C++. Uses WebKit (GTK/Cocoa) and Edge WebView2 (Windows).

                                              You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                                GitHub - webview/webview: Tiny cross-platform webview library for C/C++. Uses WebKit (GTK/Cocoa) and Edge WebView2 (Windows).
                                              • Red Hat Eyeing Innovative eBPF Uses For Linux's HID Subsystem - Phoronix

                                                Red Hat Eyeing Innovative eBPF Uses For Linux's HID Subsystem Written by Michael Larabel in Linux Kernel on 24 February 2022 at 03:14 PM EST. 20 Comments eBPF for sandboxed programs running in the kernel have shown to be very useful beyond the original BPF origins in the networking subsystem to also be very practical for other security, tracing, and other general use-cases for an in-kernel JIT vir

                                                  Red Hat Eyeing Innovative eBPF Uses For Linux's HID Subsystem - Phoronix
                                                • Disrupting deceptive uses of AI by covert influence operations

                                                  May 30, 2024 Disrupting deceptive uses of AI by covert influence operations We’ve terminated accounts linked to covert influence operations; no significant audience increase due to our services. OpenAI is committed to enforcing policies that prevent abuse and to improving transparency around AI-generated content. That is especially true with respect to detecting and disrupting covert influence ope

                                                    Disrupting deceptive uses of AI by covert influence operations
                                                  • Japan uses just a fraction of its coronavirus testing capacity

                                                    TOKYO (Reuters) - Japan is only using a sixth of its capacity to test for the coronavirus even as it is increasing its ability to do so, government data shows, adding to concern that it is not doing enough to contain its outbreak. A man, wearing a protective mask following an outbreak of the coronavirus disease (COVID-19), walks inside a subway station in Tokyo, Japan March 17, 2020. REUTERS/Edgar

                                                      Japan uses just a fraction of its coronavirus testing capacity
                                                    • GNU Coreutils 9.0: cp Now Enables CoW By Default + Copy Offload, wc Now Uses AVX2 - Phoronix

                                                      GNU Coreutils 9.0: cp Now Enables CoW By Default + Copy Offload, wc Now Uses AVX2 Written by Michael Larabel in GNU on 24 September 2021 at 01:36 PM EDT. 18 Comments Coreutils 9.0 is now available and it's a significant update to this collection of common open-source utilities found on effectively all Linux systems. First up, the widely-used cp utility for copying files/directories has some notabl

                                                        GNU Coreutils 9.0: cp Now Enables CoW By Default + Copy Offload, wc Now Uses AVX2 - Phoronix
                                                      • UN aid convoy uses new land route from Israel to reach north Gaza

                                                        The UN said the convoy was able to use an Israeli military road that runs along the Gaza border fence to reach the north The UN says a new land route has been used to deliver food to northern Gaza for the first time in three weeks.

                                                          UN aid convoy uses new land route from Israel to reach north Gaza
                                                        • GitHub - organicmaps/organicmaps: 🍃 Organic Maps is a free Android & iOS offline maps app for travelers, tourists, hikers, and cyclists. It uses crowd-sourced OpenStreetMap data and is developed with love by MapsWithMe (MapsMe) founders and our community

                                                          🍃 Organic Maps is a free Android & iOS offline maps app for travelers, tourists, hikers, and cyclists. It uses crowd-sourced OpenStreetMap data and is developed with love by MapsWithMe (MapsMe) founders and our community. No ads, no tracking, no data collection, no crapware. Please donate to support the development!

                                                            GitHub - organicmaps/organicmaps: 🍃 Organic Maps is a free Android & iOS offline maps app for travelers, tourists, hikers, and cyclists. It uses crowd-sourced OpenStreetMap data and is developed with love by MapsWithMe (MapsMe) founders and our community
                                                          • FOSDEM 2023 - Bizarre and Unusual Uses of DNS

                                                            Rule 53: If you can think of it, someone's done it in the DNS DNS, like almost any protocol or system on the internet, has been used in ways almost from the day it was born that were probably never intended or envisioned by its inventors. This talk is an overview of some of the more interesting ways that people have thought to embrace and extend DNS, from large to small. From static traceroutes to

                                                              FOSDEM 2023 - Bizarre and Unusual Uses of DNS
                                                            • Phishing Campaign Uses Malicious Office 365 App

                                                              Most phishing campaigns use social engineering and brand impersonation to attempt to take over accounts and trick the victim into divulging their credentials. PhishLabs has uncovered a previously unseen tactic by attackers that uses a malicious Microsoft Office 365 App to gain access to a victim's account without requiring them to give up their credentials to the attackers. In this technique, the

                                                                Phishing Campaign Uses Malicious Office 365 App
                                                              • A 27-year-old who says he saves more than 80% of his income and is on track to retire early shares the savings and investing strategies he uses

                                                                An icon in the shape of a person's head and shoulders. It often indicates a user profile.

                                                                  A 27-year-old who says he saves more than 80% of his income and is on track to retire early shares the savings and investing strategies he uses
                                                                • Scala と AWS でフルサーバーレス開発事例 / How Chatworks uses Scala and Serverless

                                                                  https://nakanoshima-dev.connpass.com/event/204733/

                                                                    Scala と AWS でフルサーバーレス開発事例 / How Chatworks uses Scala and Serverless
                                                                  • How Machine Learning Uses Linear Algebra to Solve Data Problems

                                                                    By Harshit Tyagi Machines or computers only understand numbers. And these numbers need to be represented and processed in a way that lets machines solve problems by learning from the data instead of learning from predefined instructions (as in the case of programming). All types of programming use mathematics at some level. Machine learning involves programming data to learn the function that best

                                                                      How Machine Learning Uses Linear Algebra to Solve Data Problems
                                                                    • GitHub - justjake/quickjs-emscripten: Safely execute untrusted Javascript in your Javascript, and execute synchronous code that uses async functions

                                                                      You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                                                        GitHub - justjake/quickjs-emscripten: Safely execute untrusted Javascript in your Javascript, and execute synchronous code that uses async functions
                                                                      • How Uber Uses Zig - Motiejus Jakštys Public Record

                                                                        Disclaimer: I work at Uber and am partially responsible for bringing zig cc to serious internal use. Opinions are mine, this blog post is not affiliated with Uber. I talked at the Zig Milan meetup about “Onboarding Zig at Uber”. This post is a little about “how Uber uses Zig”, and more about “my experience of bringing Zig to Uber”, from both technical and social aspects. The video is here. The res

                                                                        • How Netflix Really Uses Java

                                                                          Transcript Bakker: I'm going to talk about how Netflix is really using Java. You probably know that Netflix is really just about RxJava microservices, with Hystrix and Spring Cloud. Really, Chaos Monkeys are just running the show. I'm only half getting here because a few years ago, this was actually mostly true, maybe except the Chaos Monkeys. This stack was something that we were building on in t

                                                                            How Netflix Really Uses Java
                                                                          • 'Shame on you': How President Zelensky uses speeches to get what he needs

                                                                            'Shame on you': How President Zelensky uses speeches to get what he needs Watch: Zelensky calls on people to 'support freedom' one month after Russia invaded Ukraine While his army has fought tenaciously on the battlefields of Ukraine, Volodymyr Zelensky has waged an information war on the capitals of the Western world.

                                                                              'Shame on you': How President Zelensky uses speeches to get what he needs
                                                                            • How Cloudflare uses Terraform to manage Cloudflare

                                                                              How Cloudflare uses Terraform to manage Cloudflare2022-11-17 Configuration management is far from a solved problem. As organizations scale beyond a handful of administrators, having a secure, auditable, and self-service way of updating system settings becomes invaluable. Managing a Cloudflare account is no different. With dozens of products and hundreds of API endpoints, keeping track of current c

                                                                                How Cloudflare uses Terraform to manage Cloudflare
                                                                              • YUNG HIRAY on Twitter: "完全にこれじゃん https://t.co/m808vpjhhH https://t.co/fN5ZS5uSeS"

                                                                                完全にこれじゃん https://t.co/m808vpjhhH https://t.co/fN5ZS5uSeS

                                                                                  YUNG HIRAY on Twitter: "完全にこれじゃん https://t.co/m808vpjhhH https://t.co/fN5ZS5uSeS"
                                                                                • Merged Manifest を使って uses-permission を調査した話 - TRILL Tech Blog

                                                                                  どもです、TRILLのAndroid担当してます永井です。 この記事は「dely #2 Advent Calendar 2020」の17日目の記事です。 adventar.org 「dely #1 Advent Calendar 2020」はこちら↓ adventar.org 昨日は @MeilCli さんの C# 9.0時代のnull判定解剖 という記事でした。 様々なnull判定の比較検証がまとまってますので、こちらもぜひ御覧ください! さて 今回は APK で要求している uses-permission の手軽な解析方法について話したいと思います。 先日、新しく広告SDKを実装したAPKをビルドしていたところ、心当たりのない uses-permission が付与されていることに気づき、要求元を調査していました。 そこで直近実装したものを一つづつ外して追いかけようとしていたところ、

                                                                                    Merged Manifest を使って uses-permission を調査した話 - TRILL Tech Blog

                                                                                  新着記事