text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Types of Topologies in Network Environments Types of Topologies in Network Environments This content is from our CompTIA Network + Video Certification Training Course. Start training today! Topologies are something a networking professional using when they begin setting up their environment. Therefore, it’s important t...
<urn:uuid:417ae6c5-b00f-47f0-85c6-8b818e5b2a5d>
CC-MAIN-2022-40
https://www.interfacett.com/blogs/types-of-topologies-in-network-environments/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00238.warc.gz
en
0.901878
1,120
3.40625
3
What started as a version control system for code has become a platform for ideas and collaboration. Every morning, the first waking task most humans perform is checking email or the latest updates on their social media accounts. For developers, that initial daily fix is GitHub, the social coding platform that has capt...
<urn:uuid:b9aace3e-6b60-4694-a150-6606e33c3418>
CC-MAIN-2022-40
https://fcw.com/2014/07/github-a-swiss-army-knife-for-open-government/255435/?oref=fcw-next-story
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337595.1/warc/CC-MAIN-20221005073953-20221005103953-00238.warc.gz
en
0.924676
1,721
2.65625
3
Cars are an essential part of our everyday life, and are crucial to transporting thousands of commuters on a daily basis through busy towns and cities, and from one country to another. With “smart” vehicles playing such a major role in our day-to-day lives, it’s no surprise that semi- and fully-autonomous transportatio...
<urn:uuid:28f5ebf5-f5b0-410b-8a7a-0fe4e6686c37>
CC-MAIN-2022-40
https://techmonitor.ai/technology/software/driverless-cars-new-cybersecurity-challenge
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00238.warc.gz
en
0.957897
1,276
3.078125
3
The nation's critical infrastructure—the assets that power our homes, bring water to our faucets, and move people and goods from place to place—has grown frighteningly vulnerable to new kinds of threats. To protect these essential systems, federal IT leaders and infrastructure managers need to continue down the path of...
<urn:uuid:0078d56e-856a-4b34-b4fe-cac252af8522>
CC-MAIN-2022-40
https://www.boozallen.com/insights/critical-infrastructure/digital-innovation-key-to-securing-us-infrastructure.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00238.warc.gz
en
0.922564
379
2.625
3
- 22 January, 2020 California utilities should have used digital twin technology instead of power shutoffs Northern California’s proactive power outages were not necessary last fall. Digital Twin technology can predict utility line failures and turn off power in milliseconds to avoid the potential of sparks igniting th...
<urn:uuid:bfc51eec-a455-453a-878e-4f1ccabf79e2>
CC-MAIN-2022-40
https://allegrograph.com/articles/california-utilities-should-have-used-digital-twin-technology-instead-of-power-shutoffs/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333455.97/warc/CC-MAIN-20220924182740-20220924212740-00438.warc.gz
en
0.941615
253
2.75
3
The internet is a valuable, strategic resource, but it harbors a number of risks, especially for users who are most unaware of the dangers that may lurk in the depths of the web. In this article, we focus upon the risks present for the youngest users and see how FlashStart’s DNS cleanbrowsing software can ensure their ...
<urn:uuid:217fd799-6ca9-4f18-a14f-c4f70e12f6d8>
CC-MAIN-2022-40
https://flashstart.com/flashstart-the-dns-cleanbrowsing-software-that-guarantees-the-online-safety-of-young-people/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335276.85/warc/CC-MAIN-20220928180732-20220928210732-00438.warc.gz
en
0.931136
1,974
3
3
BLOCKCHAIN TECHNOLOGY has become the internet sweetheart of those looking to bring security to transactions via an incorruptible, distributed electronic ledger. Businesses, though, aren’t yet taking full advantage of its disruptive potential. Will the Internet of Things (IoT) be just the use case blockchain has been wa...
<urn:uuid:a1e9c7d4-d1f6-4969-8aac-5012bce6159d>
CC-MAIN-2022-40
https://www.channelpronetwork.com/article/when-iot-and-blockchain-intersect
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335276.85/warc/CC-MAIN-20220928180732-20220928210732-00438.warc.gz
en
0.943508
819
2.53125
3
The typical organization stores data in multiple locations, including hard drives, virtual servers, physical servers, flash drives, and databases. There are equally many ways to move this data, including through VPNs, wirelines, and wireless. This modern reality begs the question of whether it is possible to protect se...
<urn:uuid:98b55ae3-9c25-430e-a628-ab3aedebbc10>
CC-MAIN-2022-40
https://nira.com/data-loss-prevention/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00438.warc.gz
en
0.913545
2,876
3.4375
3
The ASC 2019 Student Supercomputer Challenge (ASC19) is underway, as more than 300 student teams from over 200 universities around the world tackle challenges in Single Image Super-Resolution (SISR), an artificial intelligence application during the two-month preliminary. Teams are required to design their own algorith...
<urn:uuid:b464171b-e5ad-4a64-b325-f30bddee0637>
CC-MAIN-2022-40
https://www.hpcwire.com/2019/01/24/asc19-teams-tackle-single-image-super-resolution-challenge-featuring-pytorch-and-gan/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00438.warc.gz
en
0.934924
719
3.171875
3
Whenever a computer user accesses the internet, records of their activity are automatically stored on their PC. This information might include the keywords they have searched for, pages they have visited and even the data they have entered into online forms. For users wishing to keep certain activities away from prying...
<urn:uuid:e163d867-b319-48e4-944a-fdb3591f8738>
CC-MAIN-2022-40
https://www.intaforensics.com/2010/09/24/how-private-is-in-private-browsing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00438.warc.gz
en
0.941468
684
2.71875
3
Sugar impacts on body with huge loss and prone to get other diseases quickly.The human body not made to consume excessive amounts of sugar. Especially fructose, actually a hepatotoxin metabolized directly into fat. It can cause a whole host of problems that can have far-reaching effects on your health As a general reco...
<urn:uuid:384f8f40-a347-4ab6-9826-13de199278f2>
CC-MAIN-2022-40
https://areflect.com/2018/07/04/todays-health-tip-sugar-impact-on-your-body/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00438.warc.gz
en
0.918756
207
3.125
3
According to the Ponemon Institute, more than 1 in 4 companies will experience at least one cyberattack incident in the next two years. And with an increase in work-from-home business models, the remote workforce is a prime target for opportunistic thugs. One more downer, most companies have unprotected data and poor c...
<urn:uuid:8812795c-f93f-4a41-8b34-5fae5537a14c>
CC-MAIN-2022-40
https://itblueprint.ca/the-dirty-dozen-common-malware-definitions-you-should-know-to-protect-yourself/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00438.warc.gz
en
0.930227
1,726
2.578125
3
Whatever Happened to XML Schemas? Early in the growth of XML as a data format, even before the widespread adoption of Web Services, one of the most popular and heated debates was on how best to represent the structure and syntax of data in an XML document. Commonly known as XML schemas, a wide range of proposals emerge...
<urn:uuid:595676a2-d88f-4020-af04-8f19655ae13b>
CC-MAIN-2022-40
https://doveltech.com/innovation/whatever-happened-to-xml-schemas/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00638.warc.gz
en
0.926312
1,692
2.515625
3
In the next five years, schools will begin to redesign learning spaces to accommodate more immersive, hands-on activities, and begin to rethink how schools work in order to keep pace with the demands of the 21st century workforce and equip students with future-focused skills, according to The NMC/CoSN Horizon Report: 2...
<urn:uuid:2d957139-f5fa-4e18-b728-9fa8d0d94d7e>
CC-MAIN-2022-40
https://origin.meritalk.com/articles/redesigned-learning-spaces-collaborative-learning-on-the-horizon-for-k-12/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00638.warc.gz
en
0.952543
864
2.640625
3
Printer Lingo: What Does Collate Mean In Printing Unless you work in the printing industry, then you might not be familiar with the term collate printing. That is completely normal and understandable. If you find yourself wondering about any of these questions: - What does collate mean in printing? - What does it mean ...
<urn:uuid:f6b8da1e-ffc8-43e3-a952-01fe471746a8>
CC-MAIN-2022-40
https://1800officesolutions.com/collate-mean-in-printing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335444.58/warc/CC-MAIN-20220930051717-20220930081717-00638.warc.gz
en
0.926254
1,057
3.359375
3
As denial of service attacks based on hash-flooding are not a new topic, Jean-Philippe Aumasson and Martin Boßlet started with an introduction about this topic. Storage of data in hash tables is usually done for any array-based information, such as data sent for a GET or a POST request towards a website. Instead of rel...
<urn:uuid:13d2580a-14bc-4a16-aad7-521d39472069>
CC-MAIN-2022-40
https://blog.compass-security.com/2012/12/asfws-hash-flooding-dos-reloaded-attacks-and-defenses/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336674.94/warc/CC-MAIN-20221001132802-20221001162802-00638.warc.gz
en
0.916939
806
2.65625
3
McKinsey, in its report on the impact of AI on the world economy, confirmed that by 2030 AI is expected to gradually add 16% (about US$13 trillion) to the global economic output. AI will annually contribute to efficiency development of around 1.2% between 2020 and 2030, says a McKinsey report based on the simulation mo...
<urn:uuid:0e12540a-754e-4e8d-b7d0-b0e7478512ef>
CC-MAIN-2022-40
https://enterprisetalk.com/featured/artificial-intelligence-era-transforming-the-global-economy/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336674.94/warc/CC-MAIN-20221001132802-20221001162802-00638.warc.gz
en
0.947878
555
2.703125
3
According to U.S. Government forecasters, the Atlantic hurricane season is expected to be much busier than usual. They’ve predicted that we’ll have as many as six major storms during the season. On May 23rd, The National Oceanic and Atmospheric Administration (NOAA) said there’s a 70 percent chance that between 13-20 s...
<urn:uuid:2bb4a5c4-7297-4e71-9153-a27c17d5332d>
CC-MAIN-2022-40
https://integrisit.com/us-government-forecasters-predict-a-threatening-atlantic-hurricane-season/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00638.warc.gz
en
0.960637
332
2.875
3
The COVID-19 pandemic has had a profound impact on education, bringing about a sudden boom in remote and online learning. While the transition has forced many schools to implement innovative solutions, it has also revealed stark vulnerabilities in their cybersecurity strategies, which is especially concerning given tha...
<urn:uuid:b0fdadf2-6903-4386-93b1-386ec6e0f361>
CC-MAIN-2022-40
https://www.helpnetsecurity.com/2020/12/23/education-cybersecurity-technology/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00638.warc.gz
en
0.946955
1,281
2.734375
3
When you are studying Cisco and access-lists you will encounter the so-called Wildcard Bits. Most CCNA students find these very confusing so I’m here to help you and explain to you how they work. Let’s take a look at an example access-list: Router#show access-lists Standard IP access list 1 10 permit 192.168.1.0, wildc...
<urn:uuid:03312331-a97c-470b-acc1-7858554413d9>
CC-MAIN-2022-40
https://networklessons.com/cisco/ccie-routing-switching/wildcard-bits-explained
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00638.warc.gz
en
0.774471
524
3.375
3
What Is Structured Data? What Is Unstructured Data? |Structured data is typically stored in tabular form and managed in a relational database (RDBMS). Fields contain data of a predefined format. Some fields might have a strict format, such as phone numbers or addresses, while other fields can have variable-length text ...
<urn:uuid:29a8e3a0-0208-4d05-9b9d-dcf543775fc3>
CC-MAIN-2022-40
https://www.imperva.com/learn/data-security/structured-and-unstructured-data/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00638.warc.gz
en
0.901615
1,591
3.65625
4
What does SCADA stand for? SCADA stands for Supervisory Control and Data Acquisition. It's a computer system for gathering, analyzing and processing data in real-time. Such systems were first used in the 1960s, and as the evolution of SCADA continues, systems are becoming more efficient and more valuable to their enter...
<urn:uuid:3329f42e-5776-47a4-997e-016efffadf9d>
CC-MAIN-2022-40
https://dpstele.com/scada/knowledge-base.php
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334514.38/warc/CC-MAIN-20220925035541-20220925065541-00038.warc.gz
en
0.947484
1,091
3.328125
3
HPE Focusing on the Edge of Internet of Things In a recent story for Mashable, Hewlett Packard Enterprise discussed its vision for the Internet of Things (IoT). This comes on the heels of Discover London 2015, HPE’s largest customer event with over 10,000 IT professionals in attendance. At the show, HPE announced IoT s...
<urn:uuid:ce9111d0-7086-4c5f-9082-9632129ef3d5>
CC-MAIN-2022-40
https://www.iotplaybook.com/article/hpe-focusing-edge-internet-things-0
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335304.71/warc/CC-MAIN-20220929034214-20220929064214-00038.warc.gz
en
0.921245
527
2.578125
3
Of all the emerging technologies, quantum computing is the one that excites, frustrates, and makes techies nervous in equal measure. In 2019, Google's quantum computer completed a calculation in under four minutes. It's a task that would have taken the world's most powerful computer 10,000 years to achieve, making it a...
<urn:uuid:aef3cb38-d017-4978-b90a-0b405d7dc81e>
CC-MAIN-2022-40
https://cybernews.com/security/dangers-of-quantum-computing-from-new-style-warfare-to-breaking-encryption/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00038.warc.gz
en
0.942535
946
2.90625
3
Factory robots with AI technology can help customers save costs and improve efficiency in a number of ways. In the future, machine learning and AI will enable robots to self-learn and self-adjust, enabling improved performance. Through machine learning and AI, we see opportunities to further develop human-robot collabo...
<urn:uuid:44e38107-032d-492f-89b9-f9570b4d4e40>
CC-MAIN-2022-40
https://www.asmag.com/showpost/32034.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00038.warc.gz
en
0.93839
841
3.21875
3
Email Phishing Protection Is Essential To Protect Your Organizational Network From Phishing Attacks Why deploying email phishing protection should be top priority. Phishing is among the oldest forms of cyberattacks and dates back to 1990. However, it is still widespread, and adversaries are developing increasingly soph...
<urn:uuid:5d3bb6eb-edc0-4244-9816-88596984a034>
CC-MAIN-2022-40
https://www.duocircle.com/content/email-phishing-protection
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00238.warc.gz
en
0.916245
1,395
2.890625
3
In addition to the more traditional methods of searching for virus signatures, like virus ‘mask’ matching, there also exists a range of detection technologies capable of recognizing the latest, unknown, malicious programs. The quality of these new technologies helps to raise the overall security level provided by each ...
<urn:uuid:f2dd596e-1bca-4b40-bb93-926f04afea32>
CC-MAIN-2022-40
https://encyclopedia.kaspersky.com/knowledge/new-technologies/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00238.warc.gz
en
0.949754
1,036
2.84375
3
Cyber Tip of the Day - Public Computers - Cybersecurity Awareness Training Public computers that offer you Internet access are high-risk spaces where your personal and sensitive information can and will get stolen. Here are some tips to protect yourself: - Disable “Autocomplete” and “Save Password” features in the brow...
<urn:uuid:df3b5fd0-66f0-4294-af22-1a009042c7a9>
CC-MAIN-2022-40
https://ermprotect.com/blog/cyber-tip-of-the-day-public-computers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00238.warc.gz
en
0.846303
325
2.921875
3
Whether you are buying something from an online store, reading your email in the browser, checking your account balances, or uploading photos / videos to social media, most websites require an individual username and password when accessing their services. This raises various problems. What’s with ALL the Passwords? Us...
<urn:uuid:0d637ca6-3a46-4d41-8ea4-5d14cf337270>
CC-MAIN-2022-40
https://www.farmhousenetworking.com/cloud-services/password-management/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00238.warc.gz
en
0.940197
344
2.703125
3
When it comes to ushering in the next-generation of computer chips, Moore’s Law is not dead, it is just evolving, so say some of the more optimistic scientists and engineers cited in a recent New York Times article from science writer John Markoff. Despite numerous proclamations foretelling Moore’s Law’s imminent demis...
<urn:uuid:04330ef7-45ac-4a72-81f4-c2e681f7e913>
CC-MAIN-2022-40
https://www.hpcwire.com/2014/01/10/moores-law-post-silicon-era/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00238.warc.gz
en
0.935885
561
3.625
4
We would like to keep you up to date with the latest news from Digitalisation World by sending you push notifications. For far too many people, data centres are like utilities – few people think about them unless they go wrong. However, change is afoot and data centres are being thrust into the spotlight. The already i...
<urn:uuid:88508737-1575-4552-9ba6-63427e98cf32>
CC-MAIN-2022-40
https://digitalisationworld.com/blogs/56903/data-centres-are-they-really-sustainable
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00238.warc.gz
en
0.947023
1,151
2.640625
3
Today more and more healthcare facilities, both hospitals and private practices, are moving from paper files to electronic medical records. The benefits of electronic medical records are numerous for both patients and healthcare providers. Benefits of Electronic Medical Records With electronic records, communication be...
<urn:uuid:eb326a99-1eb3-47d8-ba6c-82af2db20a28>
CC-MAIN-2022-40
https://blog.mesltd.ca/the-benefits-of-electronic-medical-records
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00438.warc.gz
en
0.948553
518
2.6875
3
No one wants to be on Santa’s naughty list, but temptation—especially when there’s something to gain—often gets the better of us. The proof? Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else,...
<urn:uuid:af72ae4f-8c00-42b5-9850-ac3e0aca9986>
CC-MAIN-2022-40
https://www.helpsystems.com/resources/articles/writing-secure-ibm-i-application-and-13-ways-check-it-twice
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00438.warc.gz
en
0.928104
2,250
2.5625
3
Pushing the number of transistors it can cram onto silicon, chip giant Intel announced a step forward in its advance to the 65-nanometer manufacturing process, a move toward further miniaturization to boost chip efficiency and performance. In a sign it is on course to begin manufacturing computer chips with the new pro...
<urn:uuid:582582fc-fe69-4d6f-bfac-2896037367ba>
CC-MAIN-2022-40
https://www.linuxinsider.com/story/intel-builds-new-chips-with-65-nanometer-process-technology-36256.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00438.warc.gz
en
0.9464
1,048
2.90625
3
A Guide to State Government Cybersecurity The sheer volume of data held by government entities continues to grow exponentially. Like every public or private organization, states must balance the need for security and protection of its citizens’ personal data with ease-of-use and convenience of its services. Cybercrimin...
<urn:uuid:ae2b1a3f-c89b-4b4c-9864-0e655247e054>
CC-MAIN-2022-40
https://www.getadvantage.com/state-government-cybersecurity/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00438.warc.gz
en
0.932917
2,445
2.59375
3
IBM’s New Quantum Computer Is Double the Size of China’s Jiuzhang 2 (FierceElectronics) Computing giant IBM announced that it has built the world’s largest superconducting quantum computer, called Eagle, a press statement reveals. The new machine is larger than Google’s Sycamore as well as China’s Jiuzhang 2. In Octobe...
<urn:uuid:29863d11-6508-42fd-b24b-a67329832d85>
CC-MAIN-2022-40
https://www.insidequantumtechnology.com/news-archive/ibms-new-quantum-computer-is-double-the-size-of-chinas-jiuzhang-2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00438.warc.gz
en
0.939419
390
2.625
3
- 1 October, 2018 Is Deep Learning Too Superficial? Deep learning has been broadly acclaimed for its advanced pattern recognition abilities that are primed for working with data at scale. It can detect non-linear patterns with quantities of variables that make it difficult, if not impossible, for humans to do so. Deep ...
<urn:uuid:37269095-c9dd-4cb9-9b38-6249441de17d>
CC-MAIN-2022-40
https://allegrograph.com/articles/is-deep-learning-too-superficial/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00438.warc.gz
en
0.929076
250
3.0625
3
SpaceX has a chance at beating the aerospace giant Boeing to be the first private company to fly humans into orbit. This post has been corrected. The Space Exploration Technology rocket factory is a large, white hangar-like building near Los Angeles international airport, with a parking lot filled with late-model motor...
<urn:uuid:d26897a6-b945-4ad6-bb40-16f74047c6b0>
CC-MAIN-2022-40
https://www.nextgov.com/emerging-tech/2014/10/how-spacex-leapfrogged-nasa-and-became-serious-space-company/96995/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00438.warc.gz
en
0.958385
3,763
2.71875
3
In this article we are going to look at the UK General Data Protection Regulation, or rather, how the General Data Protection Regulation (GDPR), will affect how data protection is dealt with in the UK. The GDPR takes effect from 25 May 2018, so it’s important that any businesses and organisations are well prepared for ...
<urn:uuid:88e9cc73-c4ec-4a97-85f2-cf0ee61d71d5>
CC-MAIN-2022-40
https://www.compliancejunction.com/uk-general-data-protection-regulation/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00638.warc.gz
en
0.944214
1,884
2.65625
3
We’ve all had some experience in Microsoft Word, perhaps the most popular program in the Office Suite (many would argue). But many still don’t realize that there are quite a few hidden features in Word that, when learned, will help make you into a master of the globally-instituted document composition platform. Here ar...
<urn:uuid:54747791-4670-4d07-8d3d-5761530d99e7>
CC-MAIN-2022-40
https://www.hammett-tech.com/10-ways-to-master-your-use-of-microsoft-word/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335124.77/warc/CC-MAIN-20220928051515-20220928081515-00638.warc.gz
en
0.914485
1,050
2.5625
3
February 1, 2017 | Written by: Avi Alkalay, IBM Cloud Advisor Share this post: Object storage is a relatively new option for data storage, optimized for general binary or unstructured data, often multimedia. It has gained a lot of importance in the last few years due to the exponential growth of audio, video and images...
<urn:uuid:5625d6bf-7baa-416c-961c-6734a61b91fa>
CC-MAIN-2022-40
https://www.ibm.com/blogs/cloud-computing/2017/02/01/object-storage-benefits-myths-and-options/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00638.warc.gz
en
0.92825
832
2.625
3
When most people think of “compatibility”, they’re not thinking about computer software programs. But they honestly should be! Some types of compatibility have nothing to do with how people or animals get along. Software compatibility testing, for example, helps determine whether or not a software program or applicatio...
<urn:uuid:017423fd-081b-44c4-af91-84ad58e473fb>
CC-MAIN-2022-40
https://www.ibeta.com/what-is-software-compatibility-testing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00638.warc.gz
en
0.910725
564
3.09375
3
The Air Force Research Laboratory has built a supercomputer that is driven in part by several hundred Sony PlayStation 3 consoles. The Air Force Research Laboratory has built a supercomputer driven by several hundred Sony PlayStation 3 consoles, reports Warren Peace in Stars and Stripes. AFRL has assembled 336 PlayStat...
<urn:uuid:87ae1c46-532e-4441-89a8-74301b2ae250>
CC-MAIN-2022-40
https://fcw.com/2010/01/playstations-power-air-force-supercomputer/251184/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337529.69/warc/CC-MAIN-20221004215917-20221005005917-00638.warc.gz
en
0.934035
593
3.046875
3
Help Net Security writes that security threats related to IoT and related devices within healthcare environments have remained sorely under-addressed, despite increased investments in healthcare cybersecurity. Data shows that 53% of connected medical devices and other IoT devices in hospitals have a known critical vuln...
<urn:uuid:9d066c12-3c3b-473c-9386-6e38f4ef7711>
CC-MAIN-2022-40
https://informationsecuritybuzz.com/expert-comments/53-of-medical-devices-have-a-known-critical-vulnerability/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337731.82/warc/CC-MAIN-20221006061224-20221006091224-00638.warc.gz
en
0.940087
340
2.515625
3
D-Wave’s quantum computer leverages quantum dynamics to accelerate and enable new methods for solving discrete optimization, sampling, material science, and machine learning problems. It uses a process called quantum annealing that harnesses the natural tendency of real-world quantum systems to find low-energy states. ...
<urn:uuid:dcaf3ccb-6048-49c4-a53b-5706fdfd9fa9>
CC-MAIN-2022-40
https://support.dwavesys.com/hc/en-us/articles/360009752414-What-Is-D-Wave-s-Technology-
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00038.warc.gz
en
0.900659
123
3.375
3
This is one of those little things that make life much, much easier. Imagine the scenario; you go to eject a USB disk drive or USB flash and Windows tells you that it is still in use. How to track down which application is using the drive? Eject, Eject, Eject In the below example, the USB flash drive E: will be ejected...
<urn:uuid:331ba9f5-af62-4776-9b31-3a5ff271d36b>
CC-MAIN-2022-40
https://blog.rmilne.ca/2017/04/14/quick-tip-windows-10-unable-to-stop-device-notification/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335254.72/warc/CC-MAIN-20220928113848-20220928143848-00038.warc.gz
en
0.938372
295
2.78125
3
What is the Best Intercom? The first intercoms were developed in the late 1800s. They used speaking tubes to talk to other people in the building. Business organizations were the first to use these intercoms. The office manager could reach his secretary or other people in various departments in the building. The invent...
<urn:uuid:f124908e-9dd5-43ed-a1bd-a0dc421e3fec>
CC-MAIN-2022-40
https://kintronics.com/comparison-of-apartment-intercom-systems/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337537.25/warc/CC-MAIN-20221005042446-20221005072446-00038.warc.gz
en
0.941261
1,463
2.59375
3
While a number of different types of firewalls exist, two of the most important steps in the evolution of the firewall are the introduction of the stateful firewall, invented by Check Point Founder and CEO Gil Schwed in 1993, and the transition from the traditional data center firewall to the next-generation cloud fire...
<urn:uuid:9200eff0-e025-4209-ba2e-d04987bb4a1a>
CC-MAIN-2022-40
https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/evolution-of-the-firewall/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030331677.90/warc/CC-MAIN-20220924151538-20220924181538-00239.warc.gz
en
0.938421
947
3.046875
3
Increasingly, modern technologies are helping people’s secrets move into the public domain. There are many such examples, from massive leaks of personal data to the online appearance of private (and even intimate) photos and messages. This post will leave aside the countless dossiers kept on every citizen in the databa...
<urn:uuid:06ef9abc-86de-412e-b788-46256b74f4a4>
CC-MAIN-2022-40
https://me-en.kaspersky.com/blog/mentions-and-dna-vs-privacy/12329/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334620.49/warc/CC-MAIN-20220925225000-20220926015000-00239.warc.gz
en
0.948778
2,127
2.78125
3
Network Video Recorder (NVR) The Network Video Recorder, also known as the NVR, is another essential element to any I.P. camera system. Connected to the same I.P. network, you can install the NVR virtually anywhere in your building. The NVR allowed you to record and store video on a hard drive, snap images and transmit...
<urn:uuid:a8727245-41b5-427a-bfa6-7abb47c371d4>
CC-MAIN-2022-40
https://dicsan.com/nvr/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00239.warc.gz
en
0.921884
2,168
3.015625
3
What is Random Number Generation (RNG) and how does it effect video games? Here’s everything you need to know about random number generators (RNGs) and how they’re utilised in games. Have you ever felt daunted by the sheer quantity of acronyms in the gaming world? There’s a lot to remember, from genres to technical jar...
<urn:uuid:ff8cafac-cda1-4859-8aa9-d9dc492c11f6>
CC-MAIN-2022-40
https://cybersguards.com/what-is-rng-a-lesson-for-gamers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335396.92/warc/CC-MAIN-20220929225326-20220930015326-00239.warc.gz
en
0.924666
2,003
3.125
3
Find out more about How to Learn and Use Advanced Vocabulary Word Efficacy as part of your advanced English vocabulary builder goals, watch ▶️ https://youtu.be/2Ot3GqurIfU A basic definition of efficacy is the degree and ability of how useful something works at reaching a desired effect or result. Learn a new word toda...
<urn:uuid:171f18ac-fe70-4e71-adf9-80a8e3fa8b77>
CC-MAIN-2022-40
https://dztechno.com/how-to-learn-and-use-advanced-vocabulary-word-efficacy-shorts/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00239.warc.gz
en
0.818612
189
3
3
Humans can retain just 7 (plus or minus 2) items in short-term memory. Yet Homer’s Odyssey and Iliad were recited long before they were written down. We carry on conversations that take place over hours. We write long essays. We deliver speeches. We rocket to the moon. We perform hours-long operas. If we carry only 5-9...
<urn:uuid:f35123f9-ebac-42d7-86cb-0d340e9e2a5e>
CC-MAIN-2022-40
https://www.entefy.com/blog/magic-number-7-more-or-less/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00239.warc.gz
en
0.945407
365
3.078125
3
In July of 2016, a refrigerator truck packed with explosives detonated next to a crowded apartment block in Baghdad’s Karrada neighborhood. The blast killed 323 people and was one of the worst Vehicle–Borne Improvised Explosive Device (VBIED also known as car bombs) attacks ever recorded. On May 30, 2017, a VBIED in a ...
<urn:uuid:06cac8b7-42b1-499a-ae3b-67e647cea833>
CC-MAIN-2022-40
https://americansecuritytoday.com/dhs-works-mitigate-large-scale-car-bomb-attacks-us/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00239.warc.gz
en
0.949198
855
2.765625
3
Installers and integrators working with intruder alarm systems will be aware of the Grading system set out in BS EN 50131-1. The Grading approach allows alarm systems to be categorised based upon the level of threat they are likely to face. It is important to remember that the lowest Grade device used sets the level fo...
<urn:uuid:6a51ab5f-bcb3-4dde-9f64-4340ef78b032>
CC-MAIN-2022-40
https://benchmarkmagazine.com/getting-the-right-performance-from-anti-masking-detection/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335276.85/warc/CC-MAIN-20220928180732-20220928210732-00439.warc.gz
en
0.926574
578
2.921875
3
Given the global public debate over online privacy and mounting concerns that big tech giants are tracking and monitoring children, the attention of lawmakers in both in the U.S. and Britain is shifting to children’s privacy online. In the U.S., Senator Ed Markey is leading a bilateral and bicameral push to update the ...
<urn:uuid:462b2ece-7982-4340-ade5-637647917dac>
CC-MAIN-2022-40
https://www.cpomagazine.com/data-protection/lawmakers-in-the-u-s-and-uk-turn-their-attention-to-childrens-privacy-online/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00439.warc.gz
en
0.945068
1,391
2.625
3
A hoax ( to trick into believing or accepting as genuine something false and often preposterous ) is the word we use for a fake warning. Since they are not only annoying and confusing, but sometimes even potentially harmful, they deserve some attention. Hoaxes started out as emails and the idea was the same as the one ...
<urn:uuid:91bbd32c-12ec-4271-b040-7ddc6ea60615>
CC-MAIN-2022-40
https://www.malwarebytes.com/blog/news/2013/03/hoaxes
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00439.warc.gz
en
0.973447
1,235
3.125
3
(Sponsored Content) By its very nature, high performance computing is conflicted. On the one hand, HPC belongs on the bleeding edge, trying out new ideas and testing new technologies. That is its job, after all. But at the same time, HPC centers have to compete for budget dollars and they have to get actual science don...
<urn:uuid:0491a3ad-4aa6-4482-8ac3-7337dfbeba46>
CC-MAIN-2022-40
https://www.nextplatform.com/2019/04/04/back-to-the-hpc-future-with-next-generation-amd-epyc-processors/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00439.warc.gz
en
0.954688
3,880
2.609375
3
An Intrusion Detection System (IDS) is a network monitoring solution that detects and alerts suspicious network traffic. The relevant personnel can investigate the alerts to determine whether they need further attention. An Intrusion Detection System can be either host-based or network-based. Host-Based IDS (HIDS) A ho...
<urn:uuid:a881e2f9-b156-4497-bf15-07b31c719acb>
CC-MAIN-2022-40
https://www.lepide.com/blog/what-is-an-intrusion-detection-system/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337855.83/warc/CC-MAIN-20221006191305-20221006221305-00439.warc.gz
en
0.946152
808
3.109375
3
Failover is the ability to seamlessly and automatically switch to a reliable backup system. Either redundancy or moving into a standby operational mode when a primary system component fails should achieve failover and reduce or eliminate negative user impact. A redundant or standby database server, system, or other har...
<urn:uuid:2d22c304-cae0-40fd-9c00-1cba8cb45952>
CC-MAIN-2022-40
https://avinetworks.com/glossary/failover/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335286.15/warc/CC-MAIN-20220928212030-20220929002030-00639.warc.gz
en
0.907184
1,773
3.46875
3
The possibilities of the Internet of Things (IoT) are seemingly endless, and its applications extend beyond being used by homeowners and commercial businesses. Although there are many similarities in the way IoT protocols are implemented, there are some differences that set them apart when they are used in a commercial...
<urn:uuid:a2b1fdd1-2ce4-437b-8072-b2d1dc2670c9>
CC-MAIN-2022-40
https://www.iotforall.com/iot-physical-security-technology
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336674.94/warc/CC-MAIN-20221001132802-20221001162802-00639.warc.gz
en
0.958115
1,247
2.578125
3
When a computer connects to a network in an office for example, a world of working possibilities opens up to employees: sharing documents, messaging, instant access to data in other systems… In an office, the issue of security is not very problematic, as we are talking about an enclosed, generally closely-monitored env...
<urn:uuid:6d028c7c-b110-49cc-8efe-0af022aaae48>
CC-MAIN-2022-40
https://www.helpnetsecurity.com/2002/09/23/security-online/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00639.warc.gz
en
0.937825
915
3.015625
3
Northrop Grumman‘s Astro Aerospace subsidiary has completed the preliminary design review of a radar antenna reflector technology the business developed for a joint satellite project between NASA and the Indian Space Research Organization. Northrop said Tuesday the AstroMesh reflector will be integrated onto the NASA-I...
<urn:uuid:9e9bbd91-6e37-4dac-ac21-002c0369ee5c>
CC-MAIN-2022-40
https://blog.executivebiz.com/2016/08/northrop-subsidiary-reviews-design-of-radar-antenna-reflector-for-joint-nasa-india-satellite/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334514.38/warc/CC-MAIN-20220925035541-20220925065541-00039.warc.gz
en
0.891949
221
2.53125
3
Although the vast majority of research on the gut microbiome has focused on bacteria in the large intestine, a new study—one of a few to concentrate on microbes in the upper gastrointestinal tract—shows how the typical calorie-dense western diet can induce expansion of microbes that promote the digestion and absorption...
<urn:uuid:3c48d6da-59bf-44c8-8ad0-57c1bcf037d7>
CC-MAIN-2022-40
https://debuglies.com/2018/04/12/specific-bacteria-in-the-small-intestine-are-crucial-for-fat-absorption/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00039.warc.gz
en
0.946868
1,023
3.265625
3
A journey through the ages We are currently in the midst of what is commonly referred to as the Fourth Industrial Revolution. This has seen a shift from the traditional engineered mechanical technologies of the 19th and early 20th centuries to digital technology and all the innovation this has engendered. So how has th...
<urn:uuid:e4f92e80-eabf-4903-b63e-42d6ccd82e0b>
CC-MAIN-2022-40
https://www.capita.com/our-thinking/evolution-of-data-policing
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00039.warc.gz
en
0.965449
1,575
2.921875
3
The term “cloud services” refers to a wide range of services delivered to companies and customers over the Internet. These services make it easy for your employees to have access to various business applications and information. Whether they’re aware of it, from checking email to collaborating on documents, most employ...
<urn:uuid:8c5cb162-28bf-4d32-9cb1-510c9d481907>
CC-MAIN-2022-40
https://www.appviewx.com/education-center/cloud-services/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335304.71/warc/CC-MAIN-20220929034214-20220929064214-00039.warc.gz
en
0.940706
1,102
2.90625
3
Containers sound so simple. We know what the word means: It’s something that you use to hold stuff. Just do a Google image search: The top visual explainer is a shipping container. This translates reasonably well to a software context: A container is still essentially something that we put stuff in; in this case, the “...
<urn:uuid:5da37306-9f9e-433f-bcf9-0319e7e42f75>
CC-MAIN-2022-40
https://enterprisersproject.com/article/2018/8/how-explain-containers-plain-english?sc_cid=70160000000h0axaaq
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335469.40/warc/CC-MAIN-20220930113830-20220930143830-00039.warc.gz
en
0.924112
1,125
2.78125
3
This is a depressing, mostly unsatisfying review of the challenge that global warming poses. Additional, global-level possible solutions are considered by its author, but you may not be fully persuaded by the solutions as framed in this text. No matter. You must read this book anyway. Sedjo’s credentials are impressive...
<urn:uuid:c925e236-faf0-449c-8448-b61e10e7592d>
CC-MAIN-2022-40
https://knowlengr.com/category/resource-management/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00039.warc.gz
en
0.924373
763
2.78125
3
HIPAA & The Privacy Law HIPAA Protects Patient Privacy Over the last 30 years, patient records shifted from paper to electronic formats and digital records. The digitization of individual medical histories also meant there was an increase for more individuals to gain access and use personal health data to treat their p...
<urn:uuid:7290035a-517a-4d39-b403-542a9175e87f>
CC-MAIN-2022-40
https://caseguard.com/articles/hipaa-the-privacy-law/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00039.warc.gz
en
0.931371
2,280
3.03125
3
Virtualization provides the bridge between how information technology services are delivered in the current data center environment to how those same services and applications are delivered in a cloud environment. Understanding virtualization is critical to understanding cloud computing. Cloud computing is the model fo...
<urn:uuid:dd888896-19b1-44e6-a0aa-553ad9f3cf5c>
CC-MAIN-2022-40
https://electricala2z.com/cloud-computing/virtualization-in-cloud-computing-virtualization-types/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00039.warc.gz
en
0.939379
979
3.515625
4
Health information is among the most sensitive categories of data. Collected in high volume and stored in systems that are often vulnerable, health data has become an attractive target for malicious outsiders. The rise in attacks has led to a string of high-profile data breaches the world over, with healthcare companie...
<urn:uuid:40c5eda4-28b8-4b78-82d2-6cb9100c003d>
CC-MAIN-2022-40
https://www.endpointprotector.com/blog/data-security-concerns-in-healthcare-and-how-to-solve-them/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00039.warc.gz
en
0.958013
1,227
2.671875
3
How to Password Protect a ZIP File Today, data compression is an integral part of the workplace. Just think about it. It’s likely you have received or sent out a ZIP file sometime this week. What makes ZIP files so ubiquitous is their ability to carry more data at faster speeds than simply sending individuals files. Es...
<urn:uuid:70d753ca-2fe5-4b5f-afda-2f30bf7eed5f>
CC-MAIN-2022-40
https://nordpass.com/blog/how-to-password-protect-zip-file/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337971.74/warc/CC-MAIN-20221007045521-20221007075521-00039.warc.gz
en
0.90458
934
2.640625
3
Normal skin contains a patchwork of mutated cells, yet very few go on to eventually form cancer and scientists have now uncovered the reason why. Researchers at the Wellcome Sanger Institute and MRC Cancer Unit, University of Cambridge genetically engineered mice to show that mutant cells in skin tissue compete with ea...
<urn:uuid:7428c61c-11f0-4062-8627-4c2a01cb6a8a>
CC-MAIN-2022-40
https://debuglies.com/2018/09/27/scientists-uncover-why-mutated-cells-in-our-skin-go-on-to-eventually-form-cancer/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00239.warc.gz
en
0.953144
907
3.640625
4
Vital biometrics—the measurement of a user’s internal body functions, like heart rate, ECG and blood oxygen level—play a unique and increasingly prominent role in mobile identity tech. Also known as physiological biometrics, these indicators are most often found in wearable devices for the purpose of fitness tracking. ...
<urn:uuid:5f306996-4648-4442-b494-00ae8a8c2b94>
CC-MAIN-2022-40
https://mobileidworld.com/solutions/vital/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00239.warc.gz
en
0.943236
227
2.53125
3
U.S. Consortium Tackling ‘Error Factor’ in Quantum Computing (Optics.org) Researchers in a U.S. consortium led by the Department of Energy’s Fermilab, in Chicago, say they are moving closer to solving one of the biggest challenges posed by quantum computing: the “error factor.” They hope their work will help to open pa...
<urn:uuid:fd6c70ab-983c-43fc-ae4f-39ec6189c81a>
CC-MAIN-2022-40
https://www.insidequantumtechnology.com/news-archive/u-s-group-tackling-error-factor-in-quantum-computing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00239.warc.gz
en
0.926915
355
2.640625
3
Virlock ransomware was first seen in 2014 but in September of 2016 was found to be capable of spreading across networks via cloud storage and collaboration apps. This strain uses a variety of threat techniques. So how does Virlock work? Unlike most ransomware, this strain not only encrypts selected files but also conve...
<urn:uuid:1c076b93-58a1-45d5-867e-3ba94895b64e>
CC-MAIN-2022-40
https://www.knowbe4.com/virlock-ransomware
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00239.warc.gz
en
0.961877
592
2.875
3
Disclaimer: Building strong cryptosystems is way harder than breaking them. Props to the system author for going for it and publishing the system – it’s a nice and simple design which is useful for learning cryptographic concepts. I hope this post helps inform future designs! I recently heard about the Sarah2 pen-and-p...
<urn:uuid:da18b7ea-61b4-47f1-8a28-0f062dd087d0>
CC-MAIN-2022-40
https://www.robertxiao.ca/hacking/sarah2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00239.warc.gz
en
0.80468
5,234
2.921875
3
By Sean Lauziere, MPA Emergency professionals are trained and prepared to deal with every unexpected situation imaginable. 9-1-1 serves as the incident command during times of emergency. They dispatch resources to the scene like first responders who are given essential information, follow procedures and work as a team....
<urn:uuid:a5cddd2e-9a7c-4494-ab0f-3aef933be05a>
CC-MAIN-2022-40
https://americansecuritytoday.com/how-self-dispatch-can-slow-down-emergency-response-create-additional-safety-risks/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00439.warc.gz
en
0.933742
1,282
3.546875
4
The last decade has seen a significant increase in the sophistication and frequency of cybercrime. Businesses of all sizes have become targets, with malicious actors using ever-more sophisticated techniques to exploit vulnerabilities and steal data. The cost of these attacks can be high regarding the financial loss cau...
<urn:uuid:b0c80df7-1818-42c6-8b04-31324e5d1594>
CC-MAIN-2022-40
https://cybersainik.com/top-targets-for-cybercriminals-how-to-protect-your-business/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00439.warc.gz
en
0.942684
1,489
2.875
3
Of all the different forms of malware, none are more destructive than ransomware. Ransomware can encrypt your data while demanding that you pay a fee or “ransom” to regain access to it. Research shows that the number of ransomware attacks has increased by over 60% within the past two years. While most of these attacks ...
<urn:uuid:ccf0fb66-1744-495d-ace3-151c9f294122>
CC-MAIN-2022-40
https://logixconsulting.com/2021/10/06/what-is-mobile-ransomware/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00439.warc.gz
en
0.911479
517
2.890625
3
For people who work with storage units designed to hold liquids, gasses, and various other items, a necessary part of their operations is the ability to accurately determine the volume they are currently holding. Tank monitoring is the practice of keeping an eye, so to speak, on the contents of a storage tank. This is ...
<urn:uuid:7a5d0f5e-b20d-434c-a053-18a9f5064cb7>
CC-MAIN-2022-40
https://www.dpstele.com/network-monitoring/fuel/tank.php
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00439.warc.gz
en
0.955086
469
2.53125
3
Tiny Nanosatellites Could Bring Quantum Internet to People on Earth (Futurity.org) Tiny nanosatellites such as the SpooQy=1 could bring the quantum internet to people on Earth, researchers report. Headline-grabbing experiments by China’s satellite Micius have shown that quantum signals can reach Earth from satellites w...
<urn:uuid:90e95128-9c7c-4c81-9a3d-e70841004501>
CC-MAIN-2022-40
https://www.insidequantumtechnology.com/news-archive/tiny-nanosatellites-could-bring-quantum-internet-to-people-on-earth/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00439.warc.gz
en
0.91077
315
2.640625
3
Guru: Using SELECT * With Cursors November 27, 2017 Ted Holt From time to time someone brings to my attention the use of SELECT * with SQL cursors in RPG programs. Specifically, is that a good idea or a bad idea? I have learned that the answer to that question is “It depends.” Using SELECT * in a cursor declaration may...
<urn:uuid:2e772458-7664-444d-a697-57324e6dfcbe>
CC-MAIN-2022-40
https://www.itjungle.com/2017/11/27/guru-using-select-cursors/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00439.warc.gz
en
0.828678
2,311
2.640625
3
SMS is Broken and Hackers can Read Text Messages. Never use Regular Texting for ePHI. Security firm Positive Technologies has published a report (see their overview of attack on one time passwords and PDF of the SS7 security problems) that explains how attackers can easily attack the protocols underlying the mobile tex...
<urn:uuid:81a5ee20-9dc4-4add-89fb-53218ac7fda0>
CC-MAIN-2022-40
https://luxsci.com/blog/sms-is-broken-and-hackers-can-read-text-messages-never-text-ephi.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337723.23/warc/CC-MAIN-20221006025949-20221006055949-00439.warc.gz
en
0.9328
595
2.53125
3
Mars Rovers and deep space telescopes are already high-tech, but NASA wants to use artificial intelligence to make some of its most exciting creations even more ingenious. The agency has plans to employ AI throughout its operations, from conducting basic financial operations to finding extra radio frequencies aboard th...
<urn:uuid:44710422-4c3d-470f-9e82-17201f387e38>
CC-MAIN-2022-40
https://fedtechmagazine.com/article/2019/05/gitec-2019-nasa-artificial-intelligence-complements-rocket-science
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00639.warc.gz
en
0.941354
913
2.859375
3
These days, a password is a pretty weak barrier between a hacker and your private data. At the end of the day, it doesn’t really matter all that much whether your password is five characters or 50. As a singular form of authentication, a password is decidedly weak. Maybe it could fly 10 years ago, but that’s not the wo...
<urn:uuid:6dc6adbc-366b-4ec6-a7b8-5c6a98a5e1bb>
CC-MAIN-2022-40
https://www.entrust.com/de/blog/2015/04/that-password-youre-using-its-not-enough/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00639.warc.gz
en
0.950354
978
2.78125
3
History is not just a genuinely occurring intersection of fact, choice, and expectation. A look at the Roman Tacitus and the Byzantine Procopius, two very different historians, reveals the complexity and difficulty of the study of the past. At least three different approaches to history are part of this: recalling or r...
<urn:uuid:0b4cd37a-e543-4bcf-94d2-d3c2b12090b0>
CC-MAIN-2022-40
https://areflect.com/2020/10/01/today-in-history-october-1/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00639.warc.gz
en
0.951478
461
2.6875
3
A group of academics at South Korea’s Gwangju Institute of Science and Technology (GIST) have utilized natural silk fibers from domesticated silkworms to build an environmentally friendly digital security system that they say is “practically unbreachable.” “The first natural physical unclonable function (PUF) […] takes...
<urn:uuid:75c5e76e-17cd-4531-ac87-224736a19494>
CC-MAIN-2022-40
https://news.cyberfreakz.com/researchers-use-natural-silk-fibers-to-generate-secure-keys-for-strong-authentication/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00639.warc.gz
en
0.893719
292
2.96875
3
By David Camilo, Edited by Nima Schei– Computer vision faces a processing challenge, in order to get results as fast as possible. Usually, the algorithmic processes, such as machine learning and deep learning processing take place at the cloud, where all the data is analyzed, processed, and then the results is sent to ...
<urn:uuid:66925d4b-38b1-4f99-9029-4f8610f53e99>
CC-MAIN-2022-40
https://hummingbirds.ai/iot-and-edge-computing-for-computer-vision/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337529.69/warc/CC-MAIN-20221004215917-20221005005917-00639.warc.gz
en
0.892261
1,839
3.046875
3
Cyber crimes are expected to cause more than 6 trillion dollars in damages in 2021. By the year 2025, it's estimated that the cost will go up to $10.5 trillion, making application security a top concern for organizations. According to the most recent Data Breach Investigations Report from Verizon, 39% of data breaches ...
<urn:uuid:d56a3b33-2e0e-46f1-94c5-5c032531aff0>
CC-MAIN-2022-40
https://www.contrastsecurity.com/glossary/vulnerability-assessment?hsLang=en
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337731.82/warc/CC-MAIN-20221006061224-20221006091224-00639.warc.gz
en
0.915842
2,009
3.0625
3
Corporations are always thinking about how to protect assets. A few of the white-collar crimes companies must consider include hacking/intrusions (cyber vulnerability), insider/outsider trading (convergence of cyber and financial crimes), the Foreign Corrupt Practices Act (FCPA), spear fishing (email compromise) and ec...
<urn:uuid:83977f32-0461-4b77-b031-824f22a2905c>
CC-MAIN-2022-40
https://www.knowledgeleader.com/blog/what-internal-audits-role-cybersecurity
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00639.warc.gz
en
0.919335
1,386
2.875
3
Endpoint detection and response (EDR) is a form of endpoint protection that uses data collected from endpoint devices to understand how cyberthreats behave and the ways that organizations respond to cyberthreats. While some forms of endpoint protection are focused purely on blocking threats, endpoint detection and resp...
<urn:uuid:521b7d66-77d6-49eb-a599-6395c3d96663>
CC-MAIN-2022-40
https://www.malwarebytes.com/cybersecurity/business/what-is-edr
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00639.warc.gz
en
0.933213
1,868
2.75
3
EVERYTHING YOU NEED TO KNOW ABOUT PRIVATE PUBLIC PARTNERSHIPS (PPP) Private Public Partnership (PPP) is the term used to describe a private business collaborating with their local police agency by sharing video footage and data through a camera share program, with the goal of contributing to public safety efforts. Thro...
<urn:uuid:ac8c2971-64b4-4d1a-9ce7-116276452feb>
CC-MAIN-2022-40
https://www.motorolasolutions.com/en_us/solutions/private-public-partnership.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335254.72/warc/CC-MAIN-20220928113848-20220928143848-00039.warc.gz
en
0.955856
355
2.640625
3
When it is not possible to eliminate an SQL statement to improve performance, it might be possible to simplify the statement. Consider the following questions: - Are all columns required? - Can a table join be removed? - Is a join or WHERE restriction necessary for additional SQL statements in a given function? An impo...
<urn:uuid:2984925b-d87b-4bd1-8497-3cfb8510e873>
CC-MAIN-2022-40
https://logicalread.com/simplify-sql-statements-improve-mysql-perf-mc12/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335365.63/warc/CC-MAIN-20220929194230-20220929224230-00039.warc.gz
en
0.854398
780
2.78125
3
An intrusion prevention system (IPS) is an automated network security device used to monitor and respond to potential threats. Like an intrusion detection system (IDS), an IPS determines possible threats by examining network traffic. Because an exploit may be carried out very quickly after an attacker gains access, int...
<urn:uuid:a26a8a48-26df-4120-abe1-4e067843005f>
CC-MAIN-2022-40
https://www.barracuda.com/glossary/intrusion-prevention-system
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335365.63/warc/CC-MAIN-20220929194230-20220929224230-00039.warc.gz
en
0.893557
1,137
3.40625
3
SQL Injection (SQLi) is a type of an injection attack that makes it possible to execute malicious SQL statements. These statements control a database server behind a web application. Attackers can use SQL Injection vulnerabilities to bypass application security measures. They can go around authentication and authorizat...
<urn:uuid:3a77eaab-78e5-47ad-a23e-05280705820e>
CC-MAIN-2022-40
https://www.acunetix.com/websitesecurity/sql-injection/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00039.warc.gz
en
0.866043
2,045
3.5625
4
Application Traffic Management Definition Application traffic management (ATM) refers to techniques for intercepting, analyzing, decoding, and directing web traffic to the optimum resources based on specific policies. Also called network traffic management, it allows network administrators to significantly increase ove...
<urn:uuid:22c3a8ed-15d3-4cb5-957b-7819e9ed6cc4>
CC-MAIN-2022-40
https://www-stage.avinetworks.com/glossary/application-traffic-management/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338280.51/warc/CC-MAIN-20221007210452-20221008000452-00039.warc.gz
en
0.906132
1,123
3.09375
3
The Domain Name System (DNS) Server is a server that is specifically used for matching website hostnames (like example.com)to their corresponding Internet Protocol or IP addresses. The DNS server contains a database of public IP addresses and their corresponding domain names. Every device connected to the internet has ...
<urn:uuid:e0ec965a-e6b7-4411-8d5b-750995060cd3>
CC-MAIN-2022-40
https://www.cdnetworks.com/ko/web-performance-blog/what-is-a-dns-server/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338280.51/warc/CC-MAIN-20221007210452-20221008000452-00039.warc.gz
en
0.904894
2,150
3.546875
4
Ransomware attacks are becoming more and more common. Since they are on the rise, you should be doing everything possible to protect yourself. You may not be able to completely avoid them even with the best protection but you can take other steps to ensure you are not a victim. Ransomware Attacks on the Rise No one wan...
<urn:uuid:143880a0-c30c-4b07-82f1-bfdaefa18153>
CC-MAIN-2022-40
https://www.interplayit.com/blog/the-rise-of-ransomware-attacks-and-how-you-can-protect-yourself/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338280.51/warc/CC-MAIN-20221007210452-20221008000452-00039.warc.gz
en
0.968525
409
2.75
3
We continue with The Apple Data Center FAQ How Does Apple Power its North Carolina Data Center? In May 2012 Apple announced that the electricity supporting the iDataCenter in Maiden would either be supplied by renewable energy generated on-site, or by directly purchasing clean, renewable energy generated by local and r...
<urn:uuid:06047008-41bd-4a4e-a055-cd145857bcab>
CC-MAIN-2022-40
https://www.datacenterknowledge.com/data-center-faqs/apple-data-center-faq-part-2
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030331677.90/warc/CC-MAIN-20220924151538-20220924181538-00240.warc.gz
en
0.951867
1,426
2.703125
3