{"blog_url":"https://security-log.hatenablog.com/","author_name":"tanigawa","published":"2025-08-21 00:00:00","description":"\u3010\u30cb\u30e5\u30fc\u30b9\u3011 \u25c6MIXI\u3001\u65b0\u5352\u5411\u3051\u6280\u8853\u7814\u4fee\u8cc7\u6599\u3092\u516c\u958b AI\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306a\u3069\u8a0815\u79d1\u76ee 4\u6642\u9593\u8d85\u306e\u300ciOS\u7814\u4fee\u300d\u52d5\u753b\u3082 (ITmedia, 2025/08/21 15:33) https://www.itmedia.co.jp/news/articles/2508/21/news109.html \u3010\u8cc7\u6599\u3011 \u25c6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7814\u4fee\u3010MIXI 25\u65b0\u5352\u6280\u8853\u7814\u4fee\u3011(MIXI) https://speakerdeck.com/mixi_engineers/2025_new_grad_training_security_day1","title":"MIXI\u3001\u65b0\u5352\u5411\u3051\u6280\u8853\u7814\u4fee\u8cc7\u6599\u3092\u516c\u958b\u3000AI\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306a\u3069\u8a0815\u79d1\u76ee\u30004\u6642\u9593\u8d85\u306e\u300ciOS\u7814\u4fee\u300d\u52d5\u753b\u3082","width":"100%","provider_name":"Hatena Blog","height":"190","blog_title":"TT Security Log","provider_url":"https://hatena.blog","type":"rich","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsecurity-log.hatenablog.com%2Fentry%2F2025%2F08%2F21%2F000000_1\" title=\"MIXI\u3001\u65b0\u5352\u5411\u3051\u6280\u8853\u7814\u4fee\u8cc7\u6599\u3092\u516c\u958b\u3000AI\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306a\u3069\u8a0815\u79d1\u76ee\u30004\u6642\u9593\u8d85\u306e\u300ciOS\u7814\u4fee\u300d\u52d5\u753b\u3082 - TT Security Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","url":"https://security-log.hatenablog.com/entry/2025/08/21/000000_1","image_url":null,"categories":["IT\u4f01\u696d: MIXI","IT\u6559\u6750","*\u4eba\u6750: \u4eba\u6750\u80b2\u6210"],"author_url":"https://blog.hatena.ne.jp/tanigawa/","version":"1.0"}