text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
A shortage of human cybersecurity talent is causing companies to turn to artificial intelligence (AI) to fill in the gaps. An estimated one million cybersecurity jobs are expected to go unfulfilled this year around the world, according to the Information Systems Audit and Control Association. The need for qualified cyb...
<urn:uuid:8464c969-f54b-4741-b8bf-5bc16ac82916>
CC-MAIN-2022-40
https://www.lifars.com/2017/10/cybersecurity-talent-shortage-forces-companies-to-turn-to-ai/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00236.warc.gz
en
0.942512
455
2.6875
3
Data has become the most critical factor in business today. As a result, different technologies, methodologies, and systems have been invented to process, transform, analyze, and store data in this data-driven world. However, there is still much confusion regarding the key areas of Big Data, Data Analytics, and Data Sc...
<urn:uuid:16931f88-15d6-428b-a1f5-54da33e855a2>
CC-MAIN-2022-40
https://www.bmc.com/blogs/big-data-vs-analytics/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00236.warc.gz
en
0.891216
1,983
3.296875
3
One development in the post-Sept. 11 world that aids security personnel is the Homeland Security Presidential Directive 3 (HSPD 3). As this page details, HSPD 3 established the Homeland Security Advisory System that created “a common vocabulary, context, and structure for an ongoing national discussion about the nature...
<urn:uuid:418e8c86-f3c4-40e2-8936-5db2fc4f414b>
CC-MAIN-2022-40
https://www.arksysinc.com/blog/hspd-3-explained/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00236.warc.gz
en
0.930583
280
2.65625
3
In order to properly utilize static routes, it is vital to understand the role that they play. The following list provides situations in which overriding the default outbound load-balancing behavior is recommended and sometimes necessary. - Destinations and/or end point hosts require specific paths. For example a secur...
<urn:uuid:c938b216-ad1b-47d9-a3bc-f1a3602f8c63>
CC-MAIN-2022-40
https://support.ecessa.com/hc/en-us/articles/200143916-Static-Routes-Versions-10-5-and-earlier-
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00236.warc.gz
en
0.872609
706
2.84375
3
Frauchiger’s & Renato’s New Thought Experiment Shaking Foundations of Quantum Physics (QuantaMagazine) A new thought experiment is confronting the theoretical assumptions of quantum mechanics head-on and shaking the foundations of quantum physics. The experiment is decidedly strange. For example, it requires making mea...
<urn:uuid:434bbbae-dd5e-4539-83ec-f86cb44a707e>
CC-MAIN-2022-40
https://www.insidequantumtechnology.com/news-archive/frauchigers-renatos-new-thought-experiment-shaking-foundations-quantum-physics/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00236.warc.gz
en
0.920931
244
2.734375
3
A major new international research programme is responding to the overwhelming demand of internet traffic to develop ubiquitous wireless data coverage with unprecedented speed at millimetre waves. For the first time in the Internet’s history, the data used by tablets and smartphones now exceeds that of desktops. Emergi...
<urn:uuid:c6057d93-cdea-4cae-95cd-9919c64a2399>
CC-MAIN-2022-40
https://daspedia.com/archives/5718
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00236.warc.gz
en
0.899627
905
3.171875
3
The medical device remains a crucial component in improving the quality of life. Key players in the medical technology arena are going on the AI track to invent cutting-edge devices with high precision and automation. Expectations are high as the future of healthcare delivery is poised for steady growth with AI onboard...
<urn:uuid:5f08d2d9-9ff6-44c4-a373-3e319a61e4e1>
CC-MAIN-2022-40
https://dataconomy.com/2021/06/ai-in-medical-device-development/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00236.warc.gz
en
0.931295
1,766
3.109375
3
You’ve probably heard this before: “Have you tried turning your computer off and on again?” It seems IT support has been offering this advice since the dawn of the computer. Considering the complex inner workings of today’s technology, it may seem hard to believe that such a simple step could actually fix the problem—a...
<urn:uuid:ee9c9663-3ab6-47e3-95b3-0a103a7a4398>
CC-MAIN-2022-40
https://integrisit.com/the-real-reasons-it-support-tells-you-to-restart-your-computer/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00236.warc.gz
en
0.947873
584
2.75
3
Today just about every organization has virtualized servers on their network, with the benefit of cost, efficient use of hardware, and improved recovery. Software-defined networking (SDN) brought virtualizing the network a step closer. We’ve long had some kind of network virtualization, VLANs for example virtualized la...
<urn:uuid:867f2216-d8c5-4fcd-9a5a-9e72078a79f6>
CC-MAIN-2022-40
https://www.catonetworks.com/blog/a-history-of-sd-wan/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00236.warc.gz
en
0.954227
1,418
2.828125
3
Let’s discuss container management systems. So far, we’ve explored the history of containers, and talked about what a container actually is from an ops perspective. In the last post, we discussed how devs use containers: to build applications. Let’s delve deeper into how they actually plan to do that. As a reminder, th...
<urn:uuid:4e2f3e21-bf2c-4eef-8338-83694a6e445b>
CC-MAIN-2022-40
https://24x7itconnection.com/2019/07/09/what-are-container-management-systems/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00236.warc.gz
en
0.942965
896
2.578125
3
You don’t need to reboot a Linux server, they are not running only 2-3 weeks even years without interruption. Still, I am explaining the most popular commands to reboot Linux server and system. If you are window user then you know simple way to reboot you system using graphical interface. Linux is not one step back the...
<urn:uuid:50413d25-987a-448c-ae65-674bfe184da3>
CC-MAIN-2022-40
https://www.cyberpratibha.com/commands-to-reboot-linux/?amp=1
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00236.warc.gz
en
0.813328
2,415
2.71875
3
11 March 2022 Reading Time: 8 mins 11 March 2022 Reading Time: 8 mins IoT is a gigantic network of connected “things” – unique hardware devices that transmit critical operational, transactional or sensor data. Anything can be connected from your toothbrush, a vending machine to wearable technology in healthcare. IoT ca...
<urn:uuid:daad5a9f-90a3-44fd-baa5-90db27f6871a>
CC-MAIN-2022-40
https://www.eseye.com/resources/iot-explained/cellular-iot-connectivity-what-business-leaders-need-to-know/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00236.warc.gz
en
0.920101
3,066
2.59375
3
This is a question that many people have in mind. Especially since virus and malware infections are on the rise. And because the majority of internet users go online to access all kinds of websites. But along with this question come many others, all of which are interconnected. What kind of websites contain viruses? Do...
<urn:uuid:ce4abfe0-8557-49e2-8234-395eefc20aa4>
CC-MAIN-2022-40
https://antivirusjar.com/viruses-or-malware-by-visiting-a-website/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00436.warc.gz
en
0.925448
2,272
3.109375
3
To listen a Audio we need headphones, whereas to record we need Microphones. But Security researchers at Israel’s Ben Gurion University have created a proof-of-concept exploit that lets them turn headphones into microphones to secretly record conversations. Malware that turn Headphone as Microphone In earlier days Head...
<urn:uuid:26055145-d142-407f-881f-27e8716ad860>
CC-MAIN-2022-40
https://gbhackers.com/headphones-can-act-spyware/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00436.warc.gz
en
0.906687
730
2.703125
3
Synchronisation in Telecommunications networks (ISDN, Digital Networks, GSM, 3G, 4G, 5G, etc..) is the process of aligning the time scales of transmission and Switching Equipment (e.g. Stored Program Control nodes) so equipment operations occur at the correct time and in the correct order. Synchronisation requires the ...
<urn:uuid:a939015d-b1bc-4030-985e-29577c064784>
CC-MAIN-2022-40
https://www.erlang.com/reply/69937/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00436.warc.gz
en
0.813917
226
3.328125
3
Article by Tracy Gregorio as appearing in the Virginia Ship Repair Journal Phishing attempts and other types of malicious email are some of the most dangerous messages received. According to the Anti-Phishing Working Group (APWG), the total number of phishing attacks in 2016 was 1,220,523, a 65% increase over 2015 (Feb...
<urn:uuid:37ad9837-a54a-4dea-8838-f77b75973122>
CC-MAIN-2022-40
https://g2-ops.com/blog/ten-ways-to-identify-a-dangerous-email-2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334915.59/warc/CC-MAIN-20220926175816-20220926205816-00436.warc.gz
en
0.920327
817
2.75
3
Everyday uses of artificial intelligence that can talk, listen and see are coming. Is government ready? When the 2008 Summer Olympics were about to open in Beijing, China, government authorities grew increasingly concerned about the city’s notorious pollution problem. Rather than risk the health of athletes and guests ...
<urn:uuid:30fd178d-d731-43d5-b6bf-1f458c3f298a>
CC-MAIN-2022-40
https://swisscognitive.ch/2018/07/04/is-government-ready-for-ai/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00436.warc.gz
en
0.961849
628
3.234375
3
The advancement in technology released through 5G, artificial intelligence, and machine learning in the last decade has seen a tremendous increase in cyber-attacks and data breaches. Recent reports show that hackers attack computers across the US every 39 seconds this compromising data from individuals, companies, and ...
<urn:uuid:d1958eda-42e7-4952-82e9-1de4e9dfce31>
CC-MAIN-2022-40
https://cybersainik.com/understanding-the-5-types-of-cyber-security/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00436.warc.gz
en
0.929274
1,360
3.46875
3
Has WannaCry set a Precedent? Enterprises Need to Stay Prepared! The Impact of WannaCry WannaCry Computer virus had caused quite an uproar in mid-May as it affected over 200,000 computers all over the world. This affected systems in over 150 countries, including Asia, Europe, and even North America. This was perhaps th...
<urn:uuid:75ca396e-e225-4ff8-95b9-735900e432e8>
CC-MAIN-2022-40
https://www.computersolutionseast.com/blog/cybersecurity-trends/has-wannacry-set-a-precedent-enterprises-need-to-stay-prepared/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00436.warc.gz
en
0.975466
1,012
2.546875
3
The scene is all too familiar: a pivotal case against a suspected child predator is being analyzed by digital forensic experts, and it has all come down to a single grainy JPEG image. Cybersecurity experts and law enforcement officers pack a room filled with aerodynamically-crafted desks, custom-made quad-LCD screens a...
<urn:uuid:7c361b1c-ab4a-470f-b02c-ad03e5a4042a>
CC-MAIN-2022-40
https://blogs.blackberry.com/en/2017/04/this-week-in-security-4-07-2017
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00436.warc.gz
en
0.929519
1,228
2.84375
3
In the digital age, personal data is one of the most valuable commodities — it wields the potential to sway elections and affect the economy. Being a lucrative asset, big tech companies like Facebook make huge profits from gathering and selling the information we share online, from names to physical locations to web se...
<urn:uuid:0cd04fec-5a02-4b03-8005-456dc0402c27>
CC-MAIN-2022-40
https://www.cpomagazine.com/data-privacy/americans-dont-trust-the-us-government-especially-with-their-data/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00436.warc.gz
en
0.93842
855
3
3
Phishing attacks are on the rise, and cybersecurity experts are sounding the alarm. These attacks use fraudulent emails and websites to try to steal your personal information, such as your login credentials and credit card numbers, as well as sensitive data that small and medium-sized businesses may host on company com...
<urn:uuid:2413db54-da18-4592-8b92-dffee07fb2c4>
CC-MAIN-2022-40
https://www.digitalboardwalk.com/2022/08/how-to-block-phishing-attacks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00436.warc.gz
en
0.933424
1,052
3.1875
3
Thanks to a continuous onslaught of nation-state cyberattacks, exploited vulnerabilities and ransomware, the term Zero Trust has been thrust into the mainstream, but the term isn’t new. In fact, it’s about a decade old, but the ideas and concepts behind the term are even older. However, there isn’t one Zero Trust solut...
<urn:uuid:d4bd1bec-9c0c-4fe6-9b5d-0749baf513c5>
CC-MAIN-2022-40
https://mytechdecisions.com/it-infrastructure/what-is-zero-trust-and-how-do-you-implement-it/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00636.warc.gz
en
0.951503
1,019
2.875
3
What is Data Mining? According to Berry and Linoff (Mastering Data Mining, John Wiley & Sons Inc. 2000) ?Data mining is the process of exploration and analysis of large amounts of data in order to discover meaningful patterns and rules.? This is often achieved by automatic and semi-automatic means. Data mining came out...
<urn:uuid:430a1039-8762-4f95-a589-e9dc5660da86>
CC-MAIN-2022-40
https://hurwitz.com/diving-into-data-mining/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00636.warc.gz
en
0.94526
1,152
3.375
3
In new legislation, California decided to ban easy to guess, default passwords. The bill entitled SB-327, or Information Privacy: Connected Devices demands that electronics manufacturers in California equip their products with “reasonable” security features. What does this mean practically for users? All those generic ...
<urn:uuid:051b7248-41b7-4ba4-9c4f-e2eed87178e9>
CC-MAIN-2022-40
https://doubleoctopus.com/blog/general/california-weak-password-ban/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00636.warc.gz
en
0.93001
866
2.640625
3
The Associated Press (via Yahoo) writes that IP addresses are to be considered as Personal Information according to the man in charge of the EU's group of data privacy regulators. IP addresses allow companies such as Google or Yahoo to identify the geographical location of a computer and this can be used to provide wit...
<urn:uuid:2c5508cc-e315-4ded-9c26-c349b0a8f05b>
CC-MAIN-2022-40
https://www.itproportal.com/2008/01/24/your-ip-address-private-says-eu/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337529.69/warc/CC-MAIN-20221004215917-20221005005917-00636.warc.gz
en
0.950815
269
2.859375
3
We look at how the world is moving towards electric vehicles and how the UK plans to use this industry to reach its net zero goals by 2050. We take a closer look at the important role technology is expected to play in reaching the world’s net zero goals in the next few years. We look back at the last two weeks of the C...
<urn:uuid:2ee05d78-bbbc-4125-baa5-4749bf157561>
CC-MAIN-2022-40
https://www.tbtech.co/tag/cop26/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337529.69/warc/CC-MAIN-20221004215917-20221005005917-00636.warc.gz
en
0.944843
263
2.6875
3
A Black Box for Everything In the aftermath of a plane crash, one of the first things the accident investigators look for is the flight recorder. Inaptly named the “black box”, it is neither a box, nor is it black – a very bright shade of red is much easier to locate. Recording on a virtual continuous loop, it presumab...
<urn:uuid:79ee9685-98c9-43e3-bc71-a123507e8806>
CC-MAIN-2022-40
https://www.networkdatapedia.com/post/a-black-box-for-everything
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337731.82/warc/CC-MAIN-20221006061224-20221006091224-00636.warc.gz
en
0.947832
781
2.703125
3
With talk of a growing skills gap that is causing some employers to say there aren’t enough workers qualified to fill available positions, educators have begun talking about how they can better prepare students for future careers. While the conversation is ongoing, companies, schools and government officials are beginn...
<urn:uuid:5b14b6fd-eb4b-411a-af9a-2fa6c9eb8fa2>
CC-MAIN-2022-40
https://www.faronics.com/news/blog/skills-gap-prompts-schools-companies-to-better-prepare-students-for-work
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00636.warc.gz
en
0.963766
808
3.390625
3
Constraint satisfaction problems (CSPs) are mathematical problems defined as a set of objects whose state must satisfy one or more constraints. - Map coloring problems — Assign colors to regions (US states, for instance) on a map such that no adjacent regions have the same color. - Logical puzzles such as Sudoku — Comp...
<urn:uuid:a8552a03-a621-47e5-ab2c-94d9abffcdef>
CC-MAIN-2022-40
https://support.dwavesys.com/hc/en-us/articles/360002750294-What-Is-a-Constraint-Satisfaction-Problem-
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00036.warc.gz
en
0.912887
149
3.625
4
New logical technologies are helping create operational efficiencies at all layers of the data center model. New terms and technological concepts are born because of gaps in the cloud deployment model. This has led to the introduction of software-defined technologies (SDx), which abstract a number of different services...
<urn:uuid:03e82920-4105-4469-aae1-75a46b7f2dc5>
CC-MAIN-2022-40
https://www.datacenterknowledge.com/archives/2014/02/21/dck-guide-software-defined-technologies/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335254.72/warc/CC-MAIN-20220928113848-20220928143848-00036.warc.gz
en
0.917513
1,745
2.75
3
It seems you can barely turn on the news or read headlines from your favorite news site without seeing yet another major corporation falling prey to cyber attacks. Whether they are caused by phishing, data infiltration or even brute force, the barrage of assaults seems never-ending. However, for every organization that...
<urn:uuid:e92ce7ba-a84c-47fc-98b8-cd85b8a4112c>
CC-MAIN-2022-40
https://coretelligent.com/insights/most-common-types-of-cyber-attacks-how-to-prevent-them/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335365.63/warc/CC-MAIN-20220929194230-20220929224230-00036.warc.gz
en
0.94412
822
2.75
3
What is a NoSQL database? NoSQL, also referred to as “not only SQL”, “non-SQL”, is an approach to database design that enables the storage and querying of data outside the traditional structures found in relational databases. While it can still store data found within relational database management systems (RDBMS), it ...
<urn:uuid:bd67e955-385c-4487-9577-9e652621f70c>
CC-MAIN-2022-40
https://www.ibm.com/cloud/learn/nosql-databases
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335365.63/warc/CC-MAIN-20220929194230-20220929224230-00036.warc.gz
en
0.910805
2,751
3.640625
4
Researchers with the U.S. Geological Survey have been working to create geographic information system software to assist pedestrian evacuation from sudden disasters. The spate of recent natural disasters, from the 2011 earthquake and tsunami in Tohoku, Japan, to this year’s mudslides in Oso, Wash., have raised concerns...
<urn:uuid:a2c50e29-9306-48b3-9054-60e721e217d1>
CC-MAIN-2022-40
https://gcn.com/data-analytics/2014/09/usgs-software-visualizes-evacuation-scenarios/303392/?oref=gcn-next-story
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335530.56/warc/CC-MAIN-20221001035148-20221001065148-00036.warc.gz
en
0.921212
694
3
3
A wave of ransomware attacks on public schools in the southern U.S. state of Louisiana has prompted an unusual response, as the governor declared an official emergency to kick-start a coordinated response by several state-level law-enforcement and technology agencies. This latest ransomware attack, which locks up the d...
<urn:uuid:bc85102e-64ae-4909-a5fe-ef9f1a9bb9c4>
CC-MAIN-2022-40
https://www.acronis.com/en-us/blog/posts/louisiana-ransomware-attack-prompts-statewide-emergency/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337432.78/warc/CC-MAIN-20221003200326-20221003230326-00036.warc.gz
en
0.942045
1,071
2.84375
3
Drug-involved overdose rates and deaths have been increasing at alarming rates across the country, and a majority of those deaths have been attributed to opioids in recent years. Amid the growing crisis, the National Institutes of Health started the Helping to End Addiction Long-Term Initiative (HEAL) to study and addr...
<urn:uuid:708073fe-4b95-43d2-a580-e52262facbaf>
CC-MAIN-2022-40
https://governmentciomedia.com/listen-inside-trans-nih-effort-address-opioid-crisis
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337537.25/warc/CC-MAIN-20221005042446-20221005072446-00036.warc.gz
en
0.919631
151
2.8125
3
Modern industrial and critical infrastructure organizations rely on the operational technology (OT) environment to produce their goods and services. Beyond traditional information technology (IT) operations that use servers, routers, PCs and switches, these organizations also rely on OT, such as programmable logic cont...
<urn:uuid:be4481cb-43a6-40b0-bea9-349b3c33ee72>
CC-MAIN-2022-40
https://www.industrialcybersecuritypulse.com/it-ot/beware-of-accidental-convergence/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00036.warc.gz
en
0.944949
1,979
2.65625
3
Getting behind the buzzwords: The true meanings of AI, machine learning, and deep learning, and understanding how they relate to each other. Algorithmic IT Operations (AIOps) is a new category created by Gartner, primarily to deal with the challenges associated with operating the next-generation of infrastructure. AIOp...
<urn:uuid:ff2e1aa9-a7af-4795-882e-971604541011>
CC-MAIN-2022-40
https://www.moogsoft.com/blog/aiops/understanding-machine-learning-aiops/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00036.warc.gz
en
0.954147
1,902
2.75
3
In 2018, billions of people were affected by data breaches and cyberattacks and not only did people lose money, but they also lost their security. We hear about these cyberattacks every day and it's easy to think, "Why should I protect myself if the stats are against me?" Or are we against the stats? 52% of us use the ...
<urn:uuid:0ec5bdea-7501-43db-8f34-d5ac53e032bb>
CC-MAIN-2022-40
https://blog.fivenines.com/topic/password
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338280.51/warc/CC-MAIN-20221007210452-20221008000452-00036.warc.gz
en
0.959512
685
2.53125
3
Food could become independent of sunlight through artificial photosynthesis technology, increasing the conversion efficiency of sunlight into food by up to 18 times Scientists are creating food which will become independent of sunlight by using artificial photosynthesis technology, with only about 1% of the energy foun...
<urn:uuid:c06750d4-5eab-492c-896a-ff5051548b94>
CC-MAIN-2022-40
https://blog.johnadly.com/using-artificial-photosynthesis-technology-to-produce-food/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030331677.90/warc/CC-MAIN-20220924151538-20220924181538-00237.warc.gz
en
0.942496
826
3.40625
3
The word “football” means one thing in the US, another thing in Australia and something very different in most of the rest of the world. The same is true with the word “privacy.” In the U.S., our private personal data is the property of the people who hold it. In most other parts of the world, personal data is the prop...
<urn:uuid:5fe2ec02-9858-4f37-b7a4-d854c5b6c0e5>
CC-MAIN-2022-40
https://cioupdate.com/global-privacy-compliance-an-oxymoron/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030331677.90/warc/CC-MAIN-20220924151538-20220924181538-00237.warc.gz
en
0.939772
742
2.640625
3
Digital Rights Management (DRM) are measures taken to protect digital media copyrights. DRM tries to prevent unauthorized redistribution of digital media and places restrictions on the ways consumers can copy content they’ve purchased. DRM products were developed in response to the rapid increase in online piracy of co...
<urn:uuid:a2393d7a-6a10-4e1f-8990-7d6387259452>
CC-MAIN-2022-40
https://cyberhoot.com/cybrary/digital-rights-management-drm/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030331677.90/warc/CC-MAIN-20220924151538-20220924181538-00237.warc.gz
en
0.918921
174
3.40625
3
News broke last April, at the height of the pandemic fears, that Google, Apple, and MIT were working together to build a smartphone app that would conduct contact tracing much faster and more efficiently than the old way of hiring humans to do the same thing. Contact tracing is the laborious process by which human inve...
<urn:uuid:06688ecb-9665-4aa2-875f-5f0cc3c2ed94>
CC-MAIN-2022-40
https://www.msp360.com/resources/blog/contact-tracing-apps-covid-19/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030331677.90/warc/CC-MAIN-20220924151538-20220924181538-00237.warc.gz
en
0.945796
1,385
2.875
3
How can we safely agree on a shared secret when we are in an insecure environment? If you don't have a secure channel, then how can you securely agree on a shared secret key for symmetric cryptography? Diffie-Hellman key exchange saves the day! It's really key agreement or key negotiation rather than key exchange. This...
<urn:uuid:178f0578-cc8c-4a0e-8dad-5ab5aa1c138a>
CC-MAIN-2022-40
https://cromwell-intl.com/cybersecurity/crypto/diffie-hellman.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334620.49/warc/CC-MAIN-20220925225000-20220926015000-00237.warc.gz
en
0.930067
2,814
3.453125
3
Natural Language Processing, 4 Key Techniques, New Tech Natural language Processing or NLP for short refers to the various technological processes that enable software programs and machines to decipher spoken and written language or text. This can be accomplished using a number of different methods and techniques. For ...
<urn:uuid:15c5852d-14f1-4c7e-a1ee-b07b1969dc5b>
CC-MAIN-2022-40
https://caseguard.com/articles/natural-language-processing-4-key-techniques-new-tech/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335396.92/warc/CC-MAIN-20220929225326-20220930015326-00237.warc.gz
en
0.939227
892
3.5625
4
What do CIOs need to know about the changing profile of data center energy usage? And what role should IT leadership play in holding the line on expenses without reducing operating efficiencies? Data center energy usage is dominated by servers and other infrastructure. But growing energy consumption by storage is also ...
<urn:uuid:967d5c2e-4930-45d6-b435-bc36263290e8>
CC-MAIN-2022-40
https://www.cioinsight.com/news-trends/gain-control-of-enterprises-great-energy-hog-the-data-center/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00237.warc.gz
en
0.933064
904
2.5625
3
The COVID-19 pandemic has forced companies to rapidly implement remote access solutions for their staff to continue operations. Work tasks are now conducted from employees’ homes via personal computers. This has increased IT security risks for businesses, both large and small. In October 2019, CNBC reported that 43% of...
<urn:uuid:36caa04a-f972-4881-b37c-22f75e113ce2>
CC-MAIN-2022-40
https://ascendantusa.com/2020/06/15/diving-into-the-it-security-risks-of-working-remotely-during-quarantine/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337338.11/warc/CC-MAIN-20221002150039-20221002180039-00237.warc.gz
en
0.928803
2,821
2.59375
3
Fiber optic cables are seemingly everywhere, and responsible for the Internet connection we rely on every day. But how much do we know about these cables? Unless you consistently work with them up close, you may not know what makes up these cables and how important they are to everyday life. Even if you consider yourse...
<urn:uuid:5ef4b6ba-5997-48fc-925e-722b4e1819ad>
CC-MAIN-2022-40
https://www.fiberplusinc.com/helpful-information/fiber-optic-cables-facts/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337338.11/warc/CC-MAIN-20221002150039-20221002180039-00237.warc.gz
en
0.933869
803
3.03125
3
To understand what this article is about it’s important that we have an agreement on what we mean when we use the term “adaptive authentication”. It isn’t a difficult concept, but it’s best if we’re all on the same page, so to speak. First, the basics: authentication is the ceremony which allows someone to present cred...
<urn:uuid:d42735aa-b9e4-42c0-9890-a65a2b8bf7d2>
CC-MAIN-2022-40
https://www.kuppingercole.com/blog/kearns/adaptive-authentication-explained
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337338.11/warc/CC-MAIN-20221002150039-20221002180039-00237.warc.gz
en
0.942828
799
2.78125
3
Quantum Computer Error Correction Is Getting Practical (SpectrumIEEE) Michael J. Biercuk, a professor of quantum physics and quantum technology at the University of Sydney, is the founder and CEO of Q-CTRL.contributed this SpectrumIEEE guest post. Quantum error correction—or QEC for short—is an algorithm designed to id...
<urn:uuid:fd2dfb9b-be78-451e-9888-da1720e4b578>
CC-MAIN-2022-40
https://www.insidequantumtechnology.com/news-archive/quantum-computer-error-correction-is-getting-practical/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00237.warc.gz
en
0.900225
468
3.125
3
Authentication Types: SSO and MFA In the past, you protected your assets with a lock and key and in the digital world, the equivalent is a username and password. This however is not enough anymore as cyber criminals are becoming much more creative in their tactics to break-in and steal your digital assets. It’s now a s...
<urn:uuid:dec72a1e-d9d9-448e-aec1-07e82d2ef797>
CC-MAIN-2022-40
https://blog.yournucleus.ca/sso-and-mfa
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00237.warc.gz
en
0.956306
629
2.75
3
Tuesday, September 27, 2022 Published 5 Months Ago on Saturday, Apr 23 2022 By Ahmad El Hajj The internet of things (IoT) is certainly not a new concept in the world of technology and engineering. With the improvement in connectivity, new use cases notably IoT healthcare applications have emerged. The idea of connected...
<urn:uuid:f99ca541-0dc4-4f32-9579-e67a26966b99>
CC-MAIN-2022-40
https://insidetelecom.com/iot-healthcare-when-overcoming-challenges-holds-the-key-for-a-flourishing-market/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00437.warc.gz
en
0.942127
1,121
2.671875
3
Skimming attacks occur when malicious actors steal credit or debit card data, create fake accounts, and then spend money that doesn’t belong to them. Skimming costs customers and businesses more than $1 billion each year. The rise of e-commerce presents a new opportunity for attackers to compromise and capture data onl...
<urn:uuid:8642ef65-4520-4b0c-9f2f-5932bd1605be>
CC-MAIN-2022-40
https://www.halock.com/understanding-skimming-in-cyber-security/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00437.warc.gz
en
0.934928
964
2.59375
3
Encryption functions are algorithms designed to render data unreadable to anyone that does not have the decryption key. Data encrypted with a strong encryption algorithm can be transmitted over a public channel with no fear of eavesdroppers. By default, email protocols have no built-in encryption, meaning that someone ...
<urn:uuid:20963dc9-1b77-4978-a737-dec1ac3ad44b>
CC-MAIN-2022-40
https://www.avanan.com/blog/what-is-email-encryption
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335276.85/warc/CC-MAIN-20220928180732-20220928210732-00437.warc.gz
en
0.915155
1,010
3.546875
4
According to estimates from 2020, data centers around the world utilize about one percent of all electricity generated. While this may not sound like much, it’s important to look at the raw numbers as well. The best estimates in 2018 placed global data center energy consumption at about 205 terawatt hours (TWh), which ...
<urn:uuid:e44ec982-1270-4d1b-9707-8eb4e3ca8c5e>
CC-MAIN-2022-40
https://www.evoquedcs.com/blog/the-age-of-data-center-sustainability-3.0
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00437.warc.gz
en
0.94179
1,105
3.328125
3
"NASA's Mars Perseverance Rover is equipped with sophisticated scientific instruments to aid in the search for signs of past life on Mars," said Jacobs Critical Mission Solutions senior vice president Steve Arnette. "The calibration device is another example of Jacobs' long standing partnership with NASA in delivering ...
<urn:uuid:283e5be2-051b-4904-9f58-6e3040dea5f2>
CC-MAIN-2022-40
https://executivegov.com/2020/08/jacobs-teams-with-nasas-jpl-to-support-mars-perseverance-rover-steve-arnette-trevor-graff-quoted/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00437.warc.gz
en
0.921079
423
3.0625
3
June 15, 2022 — In this series, Argonne is examining the range of activities and collaborations that ALCF staff undertake to guide the facility and its users into the next era of scientific computing. Bethany Lusch and Murali Emani are computer scientists at the U.S Department of Energy’s (DOE) Argonne National Laborat...
<urn:uuid:2cf352d1-af17-4760-86a4-6f278beb6baf>
CC-MAIN-2022-40
https://www.hpcwire.com/off-the-wire/argonnes-bethany-lusch-and-murali-emani-help-enable-ml-capabilities-on-aurora/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00437.warc.gz
en
0.921331
1,185
2.765625
3
Sesame Workshop, which brought Elmo, Big Bird and other beloved characters to countless children worldwide, is teaming up with IBM to advance early-childhood education. By combining Sesame Workshop’s expertise in children’s content with the cognitive computing technology of IBM’s Watson, the partners plan to develop an...
<urn:uuid:d5a9b5c9-cf71-49d4-9400-622776b90df8>
CC-MAIN-2022-40
https://www.baselinemag.com/innovation/big-bird-and-watson-team-up-to-teach-preschoolers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00437.warc.gz
en
0.951368
772
2.84375
3
When Alex Rosenberg, PhD, and Charlie Roco, PhD, were graduate students in Georg Seelig’s lab at the University of Washington, they drew out their idea for how to increase the scalablility of single-cell RNA sequencing (scRNA-seq) on a whiteboard. At that time, roughly five years ago, “large scale was about 100 cells,”...
<urn:uuid:19b95da5-2490-4220-86d4-c5371776aef4>
CC-MAIN-2022-40
https://biopharmacurated.com/single-cell-rna-sequencing-may-be-split-by-parse-biosciences/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00437.warc.gz
en
0.980123
166
2.65625
3
New Training: Explain Linux Kernel and Boot Concepts In this 8-video skill, CBT Nuggets trainer Shawn Powers explains the Linux boot process, including UEFI and BIOS, the Grub bootloader, and kernel modules. Watch this new Linux training. Watch the one of these courses: This training includes: 43 minutes of training Yo...
<urn:uuid:87b8bfab-c105-4d99-9a12-0f58e13a0d04>
CC-MAIN-2022-40
https://www.cbtnuggets.com/blog/new-skills/new-training-explain-linux-kernel-and-boot-concepts
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00437.warc.gz
en
0.842891
400
3.328125
3
In January of 2021, law enforcement and judicial authorities across the globe disrupted one of the most notable botnets of the past decade: Emotet. Investigators have taken control of its infrastructure in an internationally-coordinated operation. For readers who don’t know, Emotet is malware operated by a Russian cybe...
<urn:uuid:a289722c-4a68-4eec-959a-96c138fa6502>
CC-MAIN-2022-40
https://cyberhoot.com/blog/emotet-operation-takedown/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337855.83/warc/CC-MAIN-20221006191305-20221006221305-00437.warc.gz
en
0.932534
768
2.75
3
“To see a world in a grain of sand,” the opening sentence of the poem by William Blake, is an oft-used phrase that additionally captures a few of what geologists do. We observe the composition of mineral grains, smaller than the width of a human hair. Then, we extrapolate the chemical processes they recommend to ponder...
<urn:uuid:f7214e16-e7ab-4fd3-807d-8b4f668b057d>
CC-MAIN-2022-40
https://blingeach.com/scientists-have-traced-earths-path-by-the-galaxy-by-way-of-tiny-crystals-discovered-within-the-crust/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333541.98/warc/CC-MAIN-20220924213650-20220925003650-00637.warc.gz
en
0.917881
1,254
2.703125
3
Today cryptocurrencies have become a global phenomenon known to most people. They are quickly going mainstream and more people are exploring the crypto world. However, investors aren’t the only ones interested in cryptocurrency - cybercriminals are thrilled with the idea of unregulated money. It has opened new attack v...
<urn:uuid:5d277533-209c-4bc9-8ada-29aad268b05a>
CC-MAIN-2022-40
https://www.allot.com/cyberhub/cryprocurrency-and-cybercrime/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00637.warc.gz
en
0.93971
2,347
3.171875
3
Need to know more about ransomware, including how to prevent ransomware and how to remove it following an infection? In this post, we explore elaborate on why ransomware is a dangerous security threat for businesses and individuals alike. We also offer targeted strategies you can use right now to reduce your risk of ge...
<urn:uuid:db444541-cb56-4189-be59-a580c7df8217>
CC-MAIN-2022-40
https://www.comparitech.com/blog/information-security/ransomware-removal-handbook/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335286.15/warc/CC-MAIN-20220928212030-20220929002030-00637.warc.gz
en
0.920878
6,858
2.78125
3
Symmetric encryption algorithms are categorized into two: block and stream ciphers. This article explores block cipher vs. stream cipher, their respective operation modes, examples, and key differences. However, before delving into these in detail, let us understand the basics first. Symmetric cryptography (key cryptog...
<urn:uuid:717d16cb-a939-4908-87d1-253baa14da81>
CC-MAIN-2022-40
https://crashtest-security.com/block-cipher-vs-stream-cipher/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336674.94/warc/CC-MAIN-20221001132802-20221001162802-00637.warc.gz
en
0.861995
2,213
4.03125
4
The global pandemic has created an added dimension of complexity where access is concerned. Company heads, across every department, are now faced with the challenge of keeping their workforce healthy, as well as protecting them from security threats. As a result, access control has taken on even greater importance, bec...
<urn:uuid:5b0d4fe7-0aa8-49f3-bc50-2893fe602793>
CC-MAIN-2022-40
https://www.nedapsecurity.com/the-ultimate-guide-to-physical-access-control-systems-in-2022/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337360.41/warc/CC-MAIN-20221002212623-20221003002623-00637.warc.gz
en
0.941058
5,760
2.640625
3
To minimise user friction, many apps cache the user’s username and password. However, storing passwords in a mobile device poses a security risk. To mitigate this risk, developers are looking at OIDC and OAuth 2.0 tokens. But do these make sense? Read more about user and app authentication in our previous blog post. OI...
<urn:uuid:0ad5ded3-484d-493b-a5a6-646dd5c640c0>
CC-MAIN-2022-40
https://www.nextauth.com/mobile-app-authentication-tokens/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337360.41/warc/CC-MAIN-20221002212623-20221003002623-00637.warc.gz
en
0.908435
850
2.953125
3
Consumers and network administrators often become complacent about security, trusting their anti-intrusion efforts to security product self-updates and older security technology. RSS reader software can heighten the potential for intrusion, warn some security experts. IT managers often fail to ensure that their network...
<urn:uuid:35b0f787-3a6a-4d1a-bffa-706962c03f73>
CC-MAIN-2022-40
https://www.ecommercetimes.com/story/is-really-simple-syndication-really-secure-56134.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00637.warc.gz
en
0.91987
1,346
2.703125
3
The FBI has issued a warning that cybercriminals have been applying for remote IT positions using deep fakes and personally identifiable information (PII) obtained from the internet to access systems, passwords, and sensitive data. According to a warning from the FBI, complaints about using deep fakes and stolen PII in...
<urn:uuid:98e92097-950a-4580-9f8c-bf48172818bc>
CC-MAIN-2022-40
https://www.harbortg.com/blog/deepfake-scams-are-on-the-rise?hsLang=en
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00637.warc.gz
en
0.945233
596
2.609375
3
A new study of privacy concerns from the University of Notre Dame upends the notion that traditional “reasonable expectation of privacy” models also apply to digital tracking and data collection. Respondents had nuanced views of how location data collection and data privacy should work in public spaces, views that run ...
<urn:uuid:34d71183-7a5e-4fe9-9875-53d6c1562f77>
CC-MAIN-2022-40
https://www.cpomagazine.com/data-privacy/consumer-privacy-concerns-vary-with-location-social-circumstances-expectations-of-privacy-do-not-necessarily-mirror-offline-models/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337631.84/warc/CC-MAIN-20221005140739-20221005170739-00637.warc.gz
en
0.965741
955
2.578125
3
The Log4j vulnerability has been described as “the single biggest, most critical vulnerability of the last decade”. This vulnerability is impacting everyone on the internet from financial institutions to government entities. Log4j is an open-source logging tool that exists in nearly every server and enterprise software...
<urn:uuid:f843dd24-58ef-4e7c-b777-468e8b78a756>
CC-MAIN-2022-40
https://criadvantage.com/log4j-vulnerability-explained-by-a-cybersecurity-expert/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00037.warc.gz
en
0.951065
1,260
2.90625
3
You thought you had the basic concepts of edge computing down pat, and then someone had to come along and throw the word “mobile” in front of it. [ What's the latest in edge and 5G? See Red Hat's news roundup from Mobile World Congress 2022. ] While we’re well familiar with mobile and might be able to deduce its meanin...
<urn:uuid:d4772726-6fe6-4f14-89ef-49a00d6c4064>
CC-MAIN-2022-40
https://enterprisersproject.com/article/2021/2/what-mobile-edge-computing-mec
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335469.40/warc/CC-MAIN-20220930113830-20220930143830-00037.warc.gz
en
0.934117
1,791
2.734375
3
Ransomware can wreak complete havoc across your systems, compromising key data and files, and leaving your network at the mercy of the attacker. New types of ransomware are constantly cropping up, making it difficult to keep on top of, let alone protect against, the latest strains. Although new variants present differe...
<urn:uuid:48d426eb-740c-4d5e-8eb4-c317548bf33e>
CC-MAIN-2022-40
https://www.atera.com/blog/what-are-the-different-types-of-ransomware/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337398.52/warc/CC-MAIN-20221003035124-20221003065124-00037.warc.gz
en
0.934171
1,112
2.921875
3
Researchers call for 'improved training in nuclear materials security and enhanced end-user accountability.' Negligence was involved in all 73 incidents last year in which radioactive substances reported went missing, concludes a new expert report on nuclear trafficking. The report finding by the James Martin Center fo...
<urn:uuid:d04e2a84-a4d5-4e3f-ae6e-5691fc34f327>
CC-MAIN-2022-40
https://www.nextgov.com/cxo-briefing/2014/03/negligence-blame-all-73-incidents-missing-radioactive-materials-2013-report-finds/81052/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00037.warc.gz
en
0.928996
500
2.515625
3
NumPy supports many statistical distributions. This means it can generate samples from a wide variety of use cases. For example, NumPy can help to statistically predict: - The chances of rolling a 7 (i.e, winning) in a game of dice - How likely someone is to get run over by a car - How likely it is that your car will b...
<urn:uuid:9d1af34d-46c5-461c-9a0b-8e5350001ae5>
CC-MAIN-2022-40
https://www.bmc.com/blogs/numpy-statistical-functions/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00237.warc.gz
en
0.875866
1,084
3.796875
4
Coronavirus and COVID-19 have people around the world rethinking their hygiene habits. In 2018, a CDC study revealed only 31% of men and 65% of women wash their hands after using the restroom. Flash forward to today and you’ll be lucky to find any soap left in bathroom soap dispensers. This social shift has also alerte...
<urn:uuid:fbe41ca8-0fae-4114-8a9d-6e1a5048d57a>
CC-MAIN-2022-40
https://www.komando.com/news/coronavirus-smartwatch-sanitize/711840/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00237.warc.gz
en
0.943098
824
2.921875
3
Extortion scams are increasing in frequency and sophistication. The criminal contacts potential victims by email with a threat or claims to have compromising information that will be released to the public if the victim does not pay to keep it quiet. As 'proof' that the criminal has access to this material, the email i...
<urn:uuid:ef9f169e-08a1-416c-9bdf-ca5015fd32c4>
CC-MAIN-2022-40
https://www.barracuda.com/glossary/extortion?switch_lang_code=en
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00237.warc.gz
en
0.927936
1,141
2.53125
3
How can decentralised storage models prevent massive data breaches? Is India's biometric database a massive achievement or a dystopian nightmare? Can blockchain technology transform the security industry? How can decentralised storage models prevent massive data breaches? The Equifax hack has been cited as very possibl...
<urn:uuid:ae95f5f4-1731-4168-871a-36eb83ffc070>
CC-MAIN-2022-40
https://www.nickhalstead.com/single-post/datascanissue47
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00237.warc.gz
en
0.915464
920
2.59375
3
When creating a presentation using Google Slides, you may want to add quite a few elements beyond blocks of text to make your point. Graphics and photographs are important to creating a successful presentation. A newer type of element that has become extremely popular for presentations is video. Adding video clips to e...
<urn:uuid:86fdccd0-35e4-4525-97fe-cf4f4ecd0383>
CC-MAIN-2022-40
https://nira.com/google-slides-video/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00237.warc.gz
en
0.897573
2,258
2.5625
3
One of the major steps to getting a new computer is transferring existing files to it. For Apple products, this is simpler as Macs offer the opportunity to do so from the startup. This isn’t the case with Windows computers however. Instead, transferring data from PC to PC has to do be done through some extra steps. The...
<urn:uuid:7d0f6490-80d8-4928-b105-ef7c961ec685>
CC-MAIN-2022-40
https://davidpapp.com/2022/09/05/5-ways-to-transfer-files-from-one-computer-to-another/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00237.warc.gz
en
0.938299
1,383
2.765625
3
Breakthrough in quantum sensing by Northeastern University researchers provides new material to make qubits (Phys.org) Atomic defects in certain solid crystals may be key to unleashing the potential of the quantum revolution, according to new discoveries by researchers at Northeastern University. The defects are essent...
<urn:uuid:60f1cfb0-181d-4a01-a5f4-70ecc764aca3>
CC-MAIN-2022-40
https://www.insidequantumtechnology.com/news-archive/breakthrough-in-quantum-sensing-by-northeastern-university-researchers-provides-new-material-to-make-qubits/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00437.warc.gz
en
0.919229
426
3.140625
3
14 years ago made its major public debut at the New York World's Fair in 1964, located in Flushing Meadows Park in Queens. The Bell System provided about 7,000 pay phones for the fair grounds of new Touch Tone telephones in futuristic swirl phone booths. (The booths were spacious and had thick dividers for good acousti...
<urn:uuid:30f04647-b417-4c67-b8e0-f5d6d084cd3b>
CC-MAIN-2022-40
https://forums.cabling-design.com/telecom/touch-tone-at-1964-world-s-fair-telecom-14434-.htm
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00437.warc.gz
en
0.964307
715
2.96875
3
Have you ever thought about the process that it takes in order to obtain a passport? Get health insurance? Register to vote? In order to gain access all these government benefits (and more) you need to be identifiable to the government. This happens when you register for a national ID card or number, or any mandated id...
<urn:uuid:856762f5-de61-40f3-b933-631071b383cc>
CC-MAIN-2022-40
https://www.aware.com/blog-international-civil-id/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00437.warc.gz
en
0.92696
894
3.484375
3
The terms information security, cybersecurity and network security are nothing new. You might at least have a slight idea about what they mean, but don’t necessarily have a full grasp on the differences between them. One thing is for sure, though: they all secure business data. But does this mean that they are the same...
<urn:uuid:635c51aa-514f-47a1-a3eb-bebfcd67298b>
CC-MAIN-2022-40
https://cybersainik.com/information-security-vs-cybersecurity-vs-network-security-are-they-the-same/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00437.warc.gz
en
0.923636
727
2.90625
3
What is Ethernet and how does it work? Which type of Ethernet cable should I use? All these questions and more, answered below. Watch the videos or read the information below. Learn more about what Ethernet is and what it can do for you or your network, at home or at your business. What Is Ethernet? In the below video ...
<urn:uuid:7841cccd-9d36-4fcd-b8e8-3e9c5f382cbf>
CC-MAIN-2022-40
https://www.fastmetrics.com/blog/wifi/what-is-ethernet/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00437.warc.gz
en
0.955799
4,853
3.4375
3
Spyware is a subset of malware, or malicious software, intentionally deployed against users and downloaded onto their devices. Once installed, spyware logs information from the user’s device and web browsing habits and relays it to an outside party where the information is leveraged for fraud. Spyware may also take the...
<urn:uuid:dea06c07-6609-4cc5-ad32-f6f50a170343>
CC-MAIN-2022-40
https://www.hypr.com/security-encyclopedia/spyware
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00437.warc.gz
en
0.9111
262
2.703125
3
AI is the buzz word in technology these days and everyone seems to be using it (or misusing - a recent edtech ad). Despite the hype, AI is here to stay and more importantly grow. And the growth is not going to be small by any means and measure. While AI is a 1000 ft view, there are multiple technologies that are growin...
<urn:uuid:4b618975-ddb0-4ea4-8bec-8092b1482134>
CC-MAIN-2022-40
https://industryoutreachmagazine.com/ai-use-cases-in-health-care/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00437.warc.gz
en
0.93566
1,209
2.984375
3
Ever heard of IOT, Internet of Things? Well, this is the new bling and it is something that is going to help you extend the use of internet from just computer, laptops to daily household stuff. Internet of Things is the idea or theory where one will be able to expand the use of internet beyond the usual standard device...
<urn:uuid:f1c4be9a-f803-436c-a8e5-c5a85d4b7c5f>
CC-MAIN-2022-40
https://www.m2sys.com/blog/guest-blog-posts/10-iot-revolutions-that-will-be-available-in-every-smart-home-after-10-years/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00637.warc.gz
en
0.94862
1,195
2.53125
3
The problem with erecting wind turbines in big cities and other urban areas come down to several factors: size and noise, zoning laws, wind variability and intermittency, bird safety… But thanks to some new innovations, urban communities and a couple of “small wind” startups are poised to bring renewable energy to town...
<urn:uuid:7abeaac7-0694-41d2-90b6-1e091e6bf6d8>
CC-MAIN-2022-40
https://www.ecoinsite.com/2010/08/urban-wind-gathers-momentum.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00637.warc.gz
en
0.930417
476
2.953125
3
When most people think about data, they might imagine a mad dash of numbers swarming across the screen in a frenzy. Unfortunately, they don’t always think about what those ones and zeroes might really mean. If you’re talking about protecting student data privacy, they mean a whole lot. But not all personal data is crea...
<urn:uuid:61575dce-a21a-4fb1-b67c-4c3d88bc592b>
CC-MAIN-2022-40
https://managedmethods.com/blog/a-guide-to-data-classification-and-data-loss-prevention/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00637.warc.gz
en
0.912286
1,563
3.46875
3
Technology continues to spark creativity. Students around the country are creating news broadcasts and award-winning short documentaries that are making a difference in their community. Last year, ten students at Rancho Minerva Middle School crafted a four-minute documentary on the importance of digital equity. The you...
<urn:uuid:383524b9-9935-4879-9da2-c44e0b255433>
CC-MAIN-2022-40
https://ddsecurity.com/2018/03/08/students-adopt-software-to-create-digital-stories/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00637.warc.gz
en
0.961351
375
3.171875
3
No company is immune to the risk of cyber attacks and the resulting loss of customer information. Network security solutions can reduce the risk of attack, but these solutions face an unexpected adversary: SSL encryption. While SSL encryption improves privacy and integrity, it also creates a blind spot in corporate def...
<urn:uuid:2b6bea29-bd0a-41b5-86ff-bea2f19d5cde>
CC-MAIN-2022-40
https://informationsecuritybuzz.com/articles/what-lies-beneath-advanced-cyber-attacks-that-hide-in-ssl-traffic/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335530.56/warc/CC-MAIN-20221001035148-20221001065148-00037.warc.gz
en
0.918527
894
2.609375
3
Kapley - stock.adobe.com For any organisation that operates in a high-risk environment, critical alarms are a fundamental component to assure the safety of staff and continuity of operations. The manufacturing industry, in particular, is known to be a high-risk environment as workers typically have to deal with heavy-d...
<urn:uuid:eaf3928c-bcca-4cc5-9033-205f6f78f905>
CC-MAIN-2022-40
https://www.computerweekly.com/microscope/opinion/What-are-the-risks-of-not-responding-to-a-critical-alarm-in-time
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337432.78/warc/CC-MAIN-20221003200326-20221003230326-00037.warc.gz
en
0.967164
651
2.9375
3
Collaborative robots (cobots) don’t get sick, take their time getting tools, crash after lunch, or have bad days. Cobots meet daily standards efficiently through laser-focused performance, which leads understanding and defining metrics. Cobots working on the industrial floor can be deployed for a wide range of duties. ...
<urn:uuid:ca67105c-f2de-4b96-915a-9a34d1507819>
CC-MAIN-2022-40
https://www.missioncriticalmagazine.com/articles/93994-cobots-are-changing-manufacturing-forever
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337432.78/warc/CC-MAIN-20221003200326-20221003230326-00037.warc.gz
en
0.9439
505
3.171875
3
People who engage in technology-facilitated violence, abuse, and harassment sometimes install spyware on a targeted person’s mobile phone. Known as ‘stalkerware’, this technology allows a operator to reach inside a target’s phone to terrorize, control, and manipulate current and former partners. And two Citizen Lab rep...
<urn:uuid:567682bc-30d1-476b-8b6c-f9c3dc43c0cb>
CC-MAIN-2022-40
https://citizenlab.ca/2019/06/toronto-star-legal-gaps-allow-cellphone-stalkerware-to-thrive-researchers-say/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337537.25/warc/CC-MAIN-20221005042446-20221005072446-00037.warc.gz
en
0.925464
309
2.53125
3
Cookie consent is a hot topic with the recent data privacy legislation. However, there seems to be a lot of confusion around cookie consent and consent preferences. But before we dive into the difference, let’s talk about the Cookie Law. Cookie Law, or the ePrivacy directive, is a separate piece of legislation that wor...
<urn:uuid:b5c35604-3b76-4f3b-9599-91501e5394fb>
CC-MAIN-2022-40
https://adzapier.com/2022/03/08/cookie-consent-vs-consent-preferences/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334620.49/warc/CC-MAIN-20220925225000-20220926015000-00238.warc.gz
en
0.929387
849
2.890625
3
The recent explosion of industrial data, the emergence of advanced big data technologies, and inexpensive hardware and bandwidthall fuel a renewed interest in the field of Data Science. Now, more than ever, highly skilled data scientists are in demand by governments, businesses, and educational institutions to leverage...
<urn:uuid:85938ce1-999f-416a-83f7-a746fea963aa>
CC-MAIN-2022-40
https://resources.experfy.com/bigdata-cloud/data-scientist-study-infographic-emc/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334620.49/warc/CC-MAIN-20220925225000-20220926015000-00238.warc.gz
en
0.910548
314
3
3
Stronger security is always necessary, and sometimes the classic password is not enough. But fear not, other methods will help you a lot. Access to a company’s devices and user accounts should ideally involve the highest possible security level, at least stronger security than access to a public forum on the web requir...
<urn:uuid:f755d7b7-0041-4b8e-8d0b-df0ab13f76b1>
CC-MAIN-2022-40
https://demyo.com/stronger-security-authentication-beyond-passwords/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00238.warc.gz
en
0.934237
1,254
3.1875
3
The ALPR matcher uses the "Common and contiguous characters" technique to improve plate read accuracy rate (sometimes called “fuzzy matching”). You can configure how the ALPR matcher handles common and contiguous characters by modifying the MatcherSettings.xml file. For more information, see MatcherSettings.xml file. -...
<urn:uuid:8ade8676-6c29-4476-90f5-7d1629730d90>
CC-MAIN-2022-40
https://techdocs.genetec.com/r/en-US/Security-Center-Administrator-Guide-5.9/ALPR-matcher-technique-Common-and-contiguous-characters
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00238.warc.gz
en
0.899387
408
2.640625
3
Sometimes when people start throwing around the words software and firmware, things can get a little muddled and confusing. Software and firmware are two separate, but related things and some people aren’t sure how to differentiate the two. Today, we’re here to explain what software and firmware are while providing you...
<urn:uuid:8988933e-2015-4fe5-957b-fb42186e7c66>
CC-MAIN-2022-40
https://www.ami.com/blog/2018/03/29/what-is-firmware-how-is-it-different-from-software/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335396.92/warc/CC-MAIN-20220929225326-20220930015326-00238.warc.gz
en
0.944995
651
3.390625
3