text
stringlengths
234
589k
id
stringlengths
47
47
dump
stringclasses
62 values
url
stringlengths
16
734
date
stringlengths
20
20
file_path
stringlengths
109
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
124k
score
float64
2.52
4.91
int_score
int64
3
5
Pain management devices help to reduce chronic pain suffering. The primary goal of hospice pain management is to enhance quality of life. Managing the pain can also help improve the physical and mental functions of an individual. Chronic pain continues and is subdivided into cancer-related pain and non-malignant pain s...
<urn:uuid:e7ef4f06-0ad4-4a62-b5a5-e9d2435edc7f>
CC-MAIN-2022-40
https://globalriskcommunity.com/profiles/blogs/all-about-pain-management-devices-and-top-trends-of-the-industr-1
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00217.warc.gz
en
0.937516
1,591
2.859375
3
What is the National Institute of Standards and Technology (NIST)? The National Institute of Standards and Technology (NIST), founded in 1901, is part of the U.S. Department of Commerce. NIST is one of the nation's oldest physical science laboratories, and is a non-regulatory agency providing standards, measurement, an...
<urn:uuid:98009a29-f851-43a7-8250-57133359247e>
CC-MAIN-2022-40
https://www.digicert.com/support/resources/faq/compliance/what-is-the-national-institute-of-standards-and-technology
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00217.warc.gz
en
0.93079
191
3.125
3
NIST Multi-Factor Authentication (MFA) Guide for E-commerce Sites Arrives The National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence (NCCoE) has published a guide to help online retailers implement multi-factor protections to reduce fraudulent purchases. The effort arrives a...
<urn:uuid:413908e6-5007-42bc-ae25-cffe34c28fb2>
CC-MAIN-2022-40
https://www.msspalert.com/cybersecurity-services-and-products/mfa-guide-nist/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00217.warc.gz
en
0.904625
532
2.5625
3
Short-distance wireless communication technologies generally support to connect different cordless products in 100 meters, offering more convenient application for people’s daily communications. Today, LINKVIL will introduce you more about short-distance wireless communication. Zig-Bee is one of the short-distance wire...
<urn:uuid:850d42f8-4e64-4018-b0d3-d47214458dda>
CC-MAIN-2022-40
https://www.fanvil.com/news/2022/20220923/8184.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333455.97/warc/CC-MAIN-20220924182740-20220924212740-00417.warc.gz
en
0.860952
638
2.78125
3
When using Private DNS, the ISP (Internet Service Provider) and the general public will only see that you are visiting a Private DNS website. They cannot tell what websites or services you’re accessing. Private DNS is a service that allows you to access blocked websites or content, similar to how VPNs work. Private DNS...
<urn:uuid:b61b5d4a-68bc-4e35-94cf-1fe3d120aa9b>
CC-MAIN-2022-40
https://gigmocha.com/what-is-private-dns/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00417.warc.gz
en
0.922657
1,275
2.734375
3
Have you been trembling a little more than normal? If you’ve already laid off the caffeine, you might want to consider a social media diet as well. A study by Anxiety UK linked social media usage with increased anxiety. That isn’t to say social media is all bad, the organization stressed (pardon the pun). It has led to...
<urn:uuid:0ebe9a2c-ef72-4837-a43b-eaa7248453c9>
CC-MAIN-2022-40
https://www.faronics.com/news/blog/researchers-link-social-media-usage-to-anxiety
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00417.warc.gz
en
0.959644
483
3
3
What is Data Leakage? Data leakage is when sensitive data is unintentionally exposed to the public. Data can be exposed in transit, at rest or in use. Data exposed in transit can include data sent in emails, chat rooms, API calls, and so on. Data exposed at rest may be the result of a misconfigured cloud storage facili...
<urn:uuid:54f427a4-277a-4566-bc55-3929316b8322>
CC-MAIN-2022-40
https://www.lepide.com/blog/what-is-data-leakage-and-how-do-you-prevent-it/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335276.85/warc/CC-MAIN-20220928180732-20220928210732-00417.warc.gz
en
0.927275
1,403
3.140625
3
Ensuring Data Protection and Privacy in Botswana Botswana’s Data Protection Act 2018 or the Data Protection Act for short is a data privacy law that was recently passed in Botswana in 2018. Prior to the passing of the Data Protection Act, the country of Botswana had yet to pass any legislation strictly pertaining to da...
<urn:uuid:903fbe53-9d3c-4cfc-a6d5-7e624cd827ee>
CC-MAIN-2022-40
https://caseguard.com/articles/ensuring-data-protection-and-privacy-in-botswana/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00417.warc.gz
en
0.931393
1,186
2.859375
3
How Are New Technologies Like AI and Machine Learning Playing a Role in Cybersecurity? Artificial Intelligence is more than a buzzword - it's a key weapon in the fight against breaches. Artificial intelligence is often dismissed as an overused buzzword across the tech industry, and it certainly can be in cybersecurity ...
<urn:uuid:5b33d88d-ea3a-46cf-b86c-650e8cb9abbc>
CC-MAIN-2022-40
https://www.idaptive.com/blog/new-technologies-Artificial-Intelligence-Cybersecurity/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00417.warc.gz
en
0.957423
366
2.890625
3
[ Source – Featured Photo from Pexels ] In this tech-savvy world, keeping sensitive information private has become quite challenging. From in-app permissions of mobile apps to shared organizational files and databases, you never know when you are being watched. You might have come across the terms ‘information security...
<urn:uuid:3aebbfe1-7b39-4b5a-8d37-6bd45ed29df1>
CC-MAIN-2022-40
https://charbelnemnom.com/cybersecurity-and-information-security/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00417.warc.gz
en
0.9473
1,349
3.09375
3
In 2002, the United States Congress passed the Sarbanes-Oxley (SOX) Act in response to the infamous Enron and WorldCom accounting frauds in which investors and shareholders collectively lost billions of dollars. This act aims to bring transparency to all public companies’ financial matters and corporate governance and ...
<urn:uuid:66a7b221-eec3-4a34-b4b2-cb9c6c156782>
CC-MAIN-2022-40
https://nira.com/sox-compliance/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00417.warc.gz
en
0.926532
2,183
2.59375
3
BSD is the software behind the world’s most popular Web site and the world’s most popular FTP site — but unless you’re a geek, you’ve never heard of it. An open-source operating system like Linux, BSD was developed in the 1970s at the University of California-Berkeley, well before Linus Torvalds ever took a computer co...
<urn:uuid:0946e084-9f1f-414c-a306-55e150ddb857>
CC-MAIN-2022-40
https://www.datamation.com/erp/zdnn-bsd-a-better-os-than-linux/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00417.warc.gz
en
0.952898
1,776
2.765625
3
Lunar New Year is celebrated in many Asian cultures and countries. It is a time for families and friends to come together to celebrate the start of a new year and hope for a year of prosperity. The New Year starts on the first new moon of the lunar year and ends on the first full moon of the lunar year. Lunar New Year ...
<urn:uuid:cd77e557-73cd-4c8b-973e-0512283ee572>
CC-MAIN-2022-40
https://jobs.gartner.com/life-at-gartner/diversity-equity-and-inclusion/gartner-associates-celebrate-the-lunar-new-year/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337855.83/warc/CC-MAIN-20221006191305-20221006221305-00417.warc.gz
en
0.957459
408
2.65625
3
Did you know that not all bias in machine learning (ML) is bad? In fact, the concept of bias was first introduced into ML by Tom Mitchell in his 1980 paper, "The need for biases in learning generalizations.” He defines learning as the ability to generalize from past experience in order to deal with new situations that ...
<urn:uuid:7bf09b20-e9ac-47e9-9e3c-51af789aaece>
CC-MAIN-2022-40
https://content.alegion.com/podcast/bias-in-machine-learning
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00617.warc.gz
en
0.966984
361
3.171875
3
Data centers are power hogs. In the US, these facilities alone are responsible for about 2% of the total energy usage in the country (according to research by Villanova University). If all the data centers of the world are put together, their power consumption would exceed all but four sovereign nations of the world. T...
<urn:uuid:60fdeb01-c75e-4338-a74a-4b96a5ba868e>
CC-MAIN-2022-40
https://lifelinedatacenters.com/data-center/new-immersion-technology-promises-energy-efficient-leaner-data-centers/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00617.warc.gz
en
0.941662
531
3.265625
3
Arduino is an open source electronics prototyping platform used by an eclectic mix of people from all walks of life ranging from cake makers to artists and hobbyists. We spent some time with Brock Craft, author of Arduino Projects For Dummies, (opens in new tab) to explore why it is becoming increasingly popular. We've...
<urn:uuid:2d165959-0533-4ebd-8d11-db321b88debb>
CC-MAIN-2022-40
https://www.itproportal.com/2013/07/27/interview-with-brock-craft-author-of-arduino-projects-for-dummies-on-how-that-diy-pc-is-being-used-creatively-worldwide/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00617.warc.gz
en
0.960037
1,218
3.296875
3
The Introduction to REXX Programming Language course introduces the REXX programming language and explains how it is run. It also reviews and describes the major elements that comprise a REXX program. These courses instruct operations, systems and application staff in the use and coding of the Restructure Extended Exec...
<urn:uuid:78878638-c10d-4fc8-8b8d-c436d5c3a24e>
CC-MAIN-2022-40
https://interskill.com/?catalogue_item=introduction-to-the-rexx-programming-language&noredirect=en-US
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335286.15/warc/CC-MAIN-20220928212030-20220929002030-00617.warc.gz
en
0.813241
302
3.328125
3
Deep learning can help discover mathematical relations that evade human scientists, a recent paper by researchers at DeepMind shows. Like many things coming from the Alphabet-owned artificial intelligence lab, the paper, which is titled “Advancing mathematics by guiding human intuition with AI,” has received much atten...
<urn:uuid:df3971ca-f159-4cba-84aa-264f125ad91c>
CC-MAIN-2022-40
https://swisscognitive.ch/2021/12/17/featureddeepminds-ai-can-untangle-knots/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00617.warc.gz
en
0.928771
373
3.5625
4
The human eye and brain are an amazing data gathering tool, the eye transmits information at the rate of 10 million bits per second to the brain, comparable to an Ethernet connection. It is for this reason that data visualizations can be a powerful tool to inform about data insights. As good visualizations inform obser...
<urn:uuid:12c5d774-45e8-4870-9ba7-3b14186d7007>
CC-MAIN-2022-40
https://straighttalk.hcltech.com/blind-sided-limitation-of-data-visualization
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00617.warc.gz
en
0.916244
291
2.8125
3
Theoretically unrestricted by the binary limitations that limit the speed of conventional computers, quantum computers will be able to do much more in much shorter periods of time. When the quantum revolution begins, tech watches predict that five industries stand to benefit first: Research by McKinsey found that quant...
<urn:uuid:3f95764e-b9a4-4f8e-816a-6537e8770894>
CC-MAIN-2022-40
https://straighttalk.hcltech.com/listicles/5-industries-that-will-benefit-from-quantum-computing
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00617.warc.gz
en
0.908749
336
3.140625
3
The ALPR matcher uses the "Number of character differences" technique to improve the plate read accuracy rate. This technique allows for a difference in the number of characters between the plate read and the plate number in the hotlist. This allows the system to account for characters in the plate that cannot be read ...
<urn:uuid:03bf1adf-45f5-44fa-b264-0ba9f0c44755>
CC-MAIN-2022-40
https://techdocs.genetec.com/r/en-US/Security-Center-Administrator-Guide-5.9/ALPR-matcher-technique-Number-of-character-differences
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00617.warc.gz
en
0.878187
336
2.703125
3
A virus is a self-replicating program that produces its own copy by attaching itself to another program, computer boot sector or document. It infects other programs, Corrupt files and Programs Different types of Viruses: Boot sector virus: Replaces itself with boot sector moving boot sector into another location on the...
<urn:uuid:d39c84b7-b60e-477d-93c6-8251be90c0c5>
CC-MAIN-2022-40
https://www.greycampus.com/opencampus/ethical-hacking/virus
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334514.38/warc/CC-MAIN-20220925035541-20220925065541-00017.warc.gz
en
0.896399
443
3.265625
3
What is a Trojan Virus? Table of Contents - By David Lukic - Oct 08, 2020 Computers, the internet, and mobile devices make our lives easier and more fun, but they also come with some danger. The digital world is replete with viruses, malware, trojans, and other infections that can ruin your hardware and software as wel...
<urn:uuid:c623ef30-1f6f-40a8-b887-119a1140a9e7>
CC-MAIN-2022-40
https://www.idstrong.com/sentinel/trojan-virus/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335304.71/warc/CC-MAIN-20220929034214-20220929064214-00017.warc.gz
en
0.915373
1,240
3.3125
3
Want to try Keepnets’ Phishing software for phishing training? Cybercriminals do not only target large corporations; they also target small businesses and people, employing a variety of attack vectors such as phishing, vishing, BEC, ransomware, crypto-jacking, and SMS phishing. As a result, learning and adhering to eff...
<urn:uuid:6a2c3a44-fd3c-4ed3-a0e9-7aedd00c9385>
CC-MAIN-2022-40
https://keepnetlabs.com/cyber-safety-rules/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00017.warc.gz
en
0.950699
736
3.5
4
What about this course? This course provides an introduction to programming methods and tools using Java. It introduces core programming concepts, core principles of writing in an object-oriented language, and the software development lifecycle at a very high level. Examples focus on writing applications for dynamicall...
<urn:uuid:6780a131-32ca-4f40-90fd-5183df1ed4f9>
CC-MAIN-2022-40
https://ine.com/learning/courses/java-fundamentals-for-network-engineers
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00017.warc.gz
en
0.759531
692
3.046875
3
Category 5, or CAT5, was ratified in 1991. CAT5 has become obsolete in recent years, due to its limitations compared to CAT5e cables. Although the CAT5 cable is a good, solid cable for 10/100 Mbps LANs, the newer versions of CAT cables are significantly faster. Category 5e, also known as Category 5 Enhanced, or CAT5e, ...
<urn:uuid:7927ac18-9647-406c-baf3-0227171840cd>
CC-MAIN-2022-40
https://www.blackbox.com/en-nz/insights/blackbox-explains/inner/detail/copper-cable/copper-category-standards/what's-the-difference-between-cat5-and-cat5e
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00017.warc.gz
en
0.927298
520
2.515625
3
It seems like there’s always a new warning about yet another online scam. Not only have Americans dealt with typical scams the last several months, but we’ve also had to contend with COVID-related scams, too. The thing about online scams is they’re not only annoying; they’re expensive. As of mid-September, consumer com...
<urn:uuid:e8742ce7-3522-46ba-8226-eb068a677ae8>
CC-MAIN-2022-40
https://www.komando.com/security-privacy/scam-election-sites/757777/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00217.warc.gz
en
0.909593
1,007
2.625
3
Why was 12 and 1 not included in the solution. Hi Gerald,The factoring example shows a multiplication "circuit" with two 3-bit inputs and a 6-bit output. Each 3-bit input can represent unsigned integer factors from 0 through 7 as follows. 000 = 0001 = 1010 = 2011 = 3100 = 4101 = 5110 = 6111 = 7 A 4-bit input would be r...
<urn:uuid:f394ba92-e20d-49e3-8636-689f1aece3f0>
CC-MAIN-2022-40
https://support.dwavesys.com/hc/en-us/community/posts/360017486794-Factoring-12
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00217.warc.gz
en
0.942168
214
3.328125
3
iPhone users have been warned about a recently discovered Apple security flaw that enables hackers to install fake apps and steal personal data. The US government’s Computer Emergency Readiness Team (US-CERT) has issued information regarding the hack, informing iPhone owners to be wary of clicking malicious links. The ...
<urn:uuid:589535c3-9526-4e3a-b65e-c504b247c96e>
CC-MAIN-2022-40
https://www.itproportal.com/2014/11/14/iphone-masque-attack-hack-installs-fake-apps-steal-user-data/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00217.warc.gz
en
0.935361
340
2.5625
3
Physicists have designed artificial intelligence that thinks like the astronomer Nicolaus Copernicus by realizing the Sun must be at the centre of the Solar System. Copyright by www.nature.com Astronomers took centuries to figure it out. But now, a machine-learning algorithm inspired by the brain has worked out that it...
<urn:uuid:157b4bb8-dbc0-409c-b025-db8182e1d681>
CC-MAIN-2022-40
https://swisscognitive.ch/2019/11/10/ai-copernicus-discovers-that-earth-orbits-the-sun/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00217.warc.gz
en
0.966942
617
3.890625
4
In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the priv...
<urn:uuid:64a16b32-bdc9-40b2-8dda-0ced54c1c17c>
CC-MAIN-2022-40
https://wiki.glitchdata.com/index.php/Certificate_authority
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00217.warc.gz
en
0.881982
6,942
3.578125
4
On Friday, May 12, a global ransomware attack hit in over 100 countries. This was one of the biggest cyber attackers to date. According to BBC News, approximately $70,000 were paid to cyber hackers. This terrifying event has served as a wake up call to many businesses that ransomware is a very real threat. No matter th...
<urn:uuid:71e78b55-49ef-42e2-b21f-3e985b7fc7c4>
CC-MAIN-2022-40
https://gxait.com/it/business-guide-to-ransomware/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00217.warc.gz
en
0.963222
529
2.765625
3
Your Ford Mondeo might achieve bigger speeds than some hybrid or electric cars, but the only place you're getting fast is a dirty, heated planet. Condescending talk aside, the truth is that hybrid and electric cars are gaining ground, and even though classic, internal combustion engine cars still have a huge, loyal mar...
<urn:uuid:c830db7c-ad71-4cf2-848f-ac072cc21488>
CC-MAIN-2022-40
https://www.itproportal.com/2015/05/21/five-benefits-driving-hybrid-cars/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00217.warc.gz
en
0.95355
502
2.859375
3
Security+: Understanding Security Risk Concepts (SY0-401) [DECOMMISSIONED ARTICLE] NOTE: This article reflects an older version of the Security+ Exam – please see the current Security+ Certification page for the most up-to-date information. Risk can be defined as “the possibility that something (such as virus or malwar...
<urn:uuid:99f2a646-87fa-4490-ad3a-7a47aa25a685>
CC-MAIN-2022-40
https://resources.infosecinstitute.com/certification/security-plus-understanding-security-risk-concepts-sy0-401/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00217.warc.gz
en
0.914214
2,261
3.5
4
Public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. The PKI creates digital certificates which map public keys to entities, securely stores these certificates in a central repos...
<urn:uuid:9db47fbe-e3ac-43aa-a8fa-7d406acb69fa>
CC-MAIN-2022-40
https://www.encryptionconsulting.com/digital-trends-driving-pki-usage/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00217.warc.gz
en
0.94009
813
2.765625
3
In the ever changing world of technology, security should be your utmost concern. You have passwords that help to secure a vast majority of your online accounts. But to get the most out of your security, Two-Factor Authentication (TFA) is a great way to truly protect your information. Apple ID’s TFA, if used properly, ...
<urn:uuid:8cca3b0b-ede0-45b7-a9ac-c85ac5f8f335>
CC-MAIN-2022-40
https://www.komando.com/privacy/why-two-factor-authentication-is-crucial-for-your-apple-id-and-how-to-use-it/411461/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00217.warc.gz
en
0.929908
882
2.53125
3
What is Video Analytics? Picture this, you’re in a crowded train station and have lost your friend in the mix. How do you and your brain go about picking your friend out of the crowd? Do you go through the same process each time you look for something or does it depend somewhat on what you’re seeking? From a human pers...
<urn:uuid:3d109a7d-571a-46cb-a875-61d1e5e25cd9>
CC-MAIN-2022-40
https://blog.gorilla-technology.com/video-analytics-technology/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00417.warc.gz
en
0.920018
1,943
2.703125
3
Is there a point you can reach where you no longer need to worry about a computer virus? Quick answer: No. You will never reach a point where you have a 100% guarantee that a virus can’t infect your system. There are, however, a few steps you can take to help get you as close as possible to that 100% guarantee. 1. Anti...
<urn:uuid:10b5a6f2-d3cb-4211-b202-42074b46b382>
CC-MAIN-2022-40
https://www.networkdepot.com/when-dont-i-need-to-worry-about-a-virus/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334915.59/warc/CC-MAIN-20220926175816-20220926205816-00417.warc.gz
en
0.956144
864
2.59375
3
Every country’s government has its secrets. Whether it’s information on strategic military positions, to data on its citizens, there has long been a need for cyber-intelligence defences and the protection of High Assurance computer systems. But, as everything from a country’s power grid to its national transportation n...
<urn:uuid:f933f32d-d243-4809-b613-8fead6f095aa>
CC-MAIN-2022-40
https://informationsecuritybuzz.com/articles/tackling-cyber-security-global-perspective/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00417.warc.gz
en
0.950698
1,463
2.9375
3
With the spread of COVID-19, many organizations have adopted work-from–home policies, and more people than ever are using online conferencing tools. Zoom, a platform known for its simplicity and reliability, is the platform that has gained the most popularity in recent weeks. As of the beginning of April 2020, the comp...
<urn:uuid:cd006a37-cca2-4926-9482-3d3aa68a6c7b>
CC-MAIN-2022-40
https://www.cybintsolutions.com/everything-to-know-about-cybersecurity-and-privacy-in-zoom/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00417.warc.gz
en
0.930903
2,262
2.546875
3
Cloud Computing is one of the hot topics of the moment and everyone has an opinion on it. The term “Cloud” covers a number of deployment scenarios, including PaaS (Platform as a Service), SaaS (Software as a Service) and IaaS (infrastructure as a Service). In this article I’ll discuss the latter, including the use of C...
<urn:uuid:1ca4b28b-d0c7-4a9a-aab2-7dfb42590692>
CC-MAIN-2022-40
https://www.datamation.com/storage/comparing-iaas-providers-cost-security-location/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00417.warc.gz
en
0.933537
1,847
2.96875
3
The recent proliferation of the WannaCry ransomware has changed the face of this growing form of computer threat in for several reasons: - WannaCry represents a new evolution of ransomware that not only damages the infected host but also acts as a "worm" that actively attempts to infect any other reachable device. This...
<urn:uuid:4b015cc4-58ad-4f49-8bc0-f3b4087fd4c5>
CC-MAIN-2022-40
https://www.helpsystems.com/blog/could-ransomware-wannacry-hit-ibm-i
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00417.warc.gz
en
0.956235
1,021
2.65625
3
Scientists created a new type of CPU that communicates using light instead of electrons Unexpected miracle. This nickname and many like it have been quickly ascribed to a new kind of CPU that has been created by a group of scientists from three US universities. Their research published by Nature came out unexpectedly. ...
<urn:uuid:1cab6d35-36d1-434c-97ed-858ff535e0d2>
CC-MAIN-2022-40
https://www.masterdc.com/blog/new-type-of-cpu-chip-uses-light-for-io-the-future-of-computing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00417.warc.gz
en
0.939687
670
3.859375
4
Emails are an essential part of our work routine, and by now you have probably sent hundreds, if not thousands of emails to your clients, colleagues, or business partners. However, most of us spend little or no time at all thinking about how emails actually work. Our main focus tends to be on the content of the email i...
<urn:uuid:114e8b85-108b-4247-966f-991cccfda624>
CC-MAIN-2022-40
https://jatheon.com/blog/email-server-software/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00617.warc.gz
en
0.944438
1,676
3.328125
3
A Wide Area Network (WAN) is the network that is used to connect various office environments over large geographic areas by linking the data center to remote locations. Generally, it consists of Multi-Protocol Label Switching (MPLS) infrastructure to connect branches to headquarter networks. However, this infrastructur...
<urn:uuid:3da74355-4d75-4f8f-9682-28db6f3631c7>
CC-MAIN-2022-40
https://www.blackbox.com/en-se/insights/blogs/detail/bbns/2021/06/30/the-road-to-sd-wan-the-evolution-of-wan-infrastructure-why-this-changes-everything
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00617.warc.gz
en
0.93015
1,039
3
3
MTU stands for Maximum transmission unit, which is the maximum packet length that can be sent on an egress interface toward a destination. MTU is an attribute of the egress interface and is typcially considered over a full path from the source to destination. MTU size differes from one media to another and is often a s...
<urn:uuid:dfbd776a-f845-40a8-b87c-9a722738407b>
CC-MAIN-2022-40
https://www.networkers-online.com/blog/2014/05/what-is-mtu/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00617.warc.gz
en
0.94013
371
3.15625
3
The population of city dwellers is increasing across the globe, exerting an immense pressure on existing resources and infrastructures. To accommodate the growing urban population, governments across the globe are devoting a significant amount of resources for building roads, buildings, and transportation systems. But ...
<urn:uuid:8d3bcd69-92e9-4584-ad88-e1ed11e8c9ce>
CC-MAIN-2022-40
https://www.alltheresearch.com/blog/connected-city-problems-prospects
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337731.82/warc/CC-MAIN-20221006061224-20221006091224-00617.warc.gz
en
0.939706
452
3.6875
4
How prepared is your small or medium business (SMB) to withstand a major cyberattack or data breach? Do you have the digital infrastructure to stymie such an intrusion? Do you have the resources available to recover from an especially malicious attack? If you're unsure about any of these questions, you absolutely must ...
<urn:uuid:791f794d-d0e1-4fa8-9704-402a710dab4d>
CC-MAIN-2022-40
https://www.cyberpolicy.com/cybersecurity-education/blind-spot-why-do-smbs-overlook-cyber-liability-insurance
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00017.warc.gz
en
0.946466
643
2.53125
3
The data centers used to manage the country’s ballistic missile defense systems have major security weaknesses that could leave the US vulnerable to missile attacks, according to a newly declassified report from the Department of Defense. The report, released earlier this month by the DoD’s Inspector General, lists a n...
<urn:uuid:0abb7e3c-64c3-46e7-b1f5-b1acbd4efb73>
CC-MAIN-2022-40
https://www.mariakorolov.com/2018/report-of-gaping-security-holes-at-us-missile-defense-systems-data-centers-shocks-experts-2/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00017.warc.gz
en
0.943848
159
2.609375
3
The Ethics of ML and AI AI will enable breakthrough advances in areas like healthcare, agriculture, education and transportation; it's already happening in many ways. But new technology also inevitably raises complex questions and broad societal concerns. As we look to a future powered by a partnership between computer...
<urn:uuid:5482a1a3-302b-40c4-9c17-d021dfcd5b65>
CC-MAIN-2022-40
https://www.careersinfosecurity.com/webinars/ethics-ml-ai-w-2274
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335365.63/warc/CC-MAIN-20220929194230-20220929224230-00017.warc.gz
en
0.954306
218
2.9375
3
This article discusses how to exchange COVID-19 contact tracing information between countries that use contact tracing apps and infrastructure. It takes a structured look at the goals, challenges, opportunities, and limitations of this kind of interoperability between national systems. This article is not intended as a...
<urn:uuid:86e9a65c-2406-4799-98b7-290f2ef184d4>
CC-MAIN-2022-40
https://blog.axway.com/learning-center/software-development/api-development/covid-19-contact-tracing-apps
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337322.29/warc/CC-MAIN-20221002115028-20221002145028-00017.warc.gz
en
0.946962
2,067
3.546875
4
A Brief Introduction to NetFlow NetFlow is data generated by network devices – routers, switches, firewalls, etc. – that contains information about the data that’s moving through the network. The term NetFlow is often used generally to refer to this type of information, but “NetFlow” is actually proprietary to Cisco. O...
<urn:uuid:8717a6c8-4076-46ac-824b-e58621557bcd>
CC-MAIN-2022-40
https://informationsecuritybuzz.com/articles/netflow-monitoring-analysis-infosec-professionals-guide/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337322.29/warc/CC-MAIN-20221002115028-20221002145028-00017.warc.gz
en
0.926004
1,540
2.671875
3
The following validation set and its prediction values shows an R2 value of 0.69 where as Datarobot result shows 0.65. This is not specific to this one data set, whatever model i use, when i check the validation set and calculate its R2, its slightly different from what datarobot is showing. Am i missing anything? Solv...
<urn:uuid:5848cbce-f40d-421a-898a-fa9af25020ca>
CC-MAIN-2022-40
https://community.datarobot.com/t5/platform/r-square-value-different-from-manual-calculation/m-p/5359
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337537.25/warc/CC-MAIN-20221005042446-20221005072446-00017.warc.gz
en
0.891339
893
2.984375
3
Veterans who opt-in to sharing their DNA through the program have the opportunity to support medical discoveries and health improvements across future generations. Veterans across America now have the ability to join the Million Veterans Program research project online. Launched in 2011, the national voluntary research...
<urn:uuid:7f1b577b-9886-45cd-9795-88531fcad842>
CC-MAIN-2022-40
https://www.nextgov.com/it-modernization/2019/10/million-veterans-program-now-open-online-enrollment/160494/?oref=ng-next-story
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337537.25/warc/CC-MAIN-20221005042446-20221005072446-00017.warc.gz
en
0.931191
501
2.625
3
As mobile operators are beginning their roll-outs of 5G technology, a Gartner survey reveals that two thirds of organisations worldwide see enough benefit to their businesses that they would consider deploying their own networks. The rest of us are keen to understand more about the technology, what it means for our sma...
<urn:uuid:35c13fab-abdd-4f84-bffa-956dc5e6d2fd>
CC-MAIN-2022-40
https://www.bluwireless.com/insight/blog/what-is-5g-mmwave/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00017.warc.gz
en
0.948282
1,228
2.59375
3
What is Data Gravity? How it Can Influence Your Cloud Strategy The amount of data that is generated every day is amazing. The latest statistics show that 1.7 MB of data is created every second or 146.88 zettabytes every day. While your business may generate just a small slice of this massive amount, effectively managin...
<urn:uuid:01a154b2-4eb8-4f46-9764-4ca71f73922e>
CC-MAIN-2022-40
https://www.factioninc.com/blog/data-gravity-as-the-center-of-your-multi-cloud-universe/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338280.51/warc/CC-MAIN-20221007210452-20221008000452-00017.warc.gz
en
0.925046
2,415
2.90625
3
ThreatSCOPE Use Case: Healing the Heartbleed OpenSSL vulnerabilityhttps://www.bluerisc.com/wp-content/uploads/2018/11/heartbleed_after_insertion-1024x555.jpg 1024 555 BlueRiSC BlueRiSC https://secure.gravatar.com/avatar/a7158cc1d3cf99ba24bb066e9343643b?s=96&d=mm&r=g In this previous post we showed how ThreatSCOPE can b...
<urn:uuid:646330b6-4641-441a-9859-7055e4c311f4>
CC-MAIN-2022-40
https://www.bluerisc.com/2019/11/21/threatscope-use-case-healing-the-heartbleed-openssl-vulnerability/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334992.20/warc/CC-MAIN-20220927064738-20220927094738-00218.warc.gz
en
0.897277
805
2.5625
3
How beamforming works: making the conference phone a smarter listener Beamforming technology makes the conference phone a smarter listener, actively improving the sound quality of your distance meeting. The technology helps to pick out the right audio data for processing and refinement using intelligent algorithms. We ...
<urn:uuid:279bb258-827a-4709-98b1-59197bf830d8>
CC-MAIN-2022-40
https://www.konftel.com/no/academy/how-beamforming-works
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334992.20/warc/CC-MAIN-20220927064738-20220927094738-00218.warc.gz
en
0.930527
885
2.5625
3
(continued from page 1) Our suspect string is: Step 1: Adjust Trailing Padding if Necessary We put the suspect string into CyberChef and choose the "From Base64" recipe, which produces the error: "Data is not a valid byteArray." Adjust the number of trailing "=" from 0-2 until the error goes away. In this example, dele...
<urn:uuid:3a67c5bc-b4cc-46c5-840b-e45a79ae5aba>
CC-MAIN-2022-40
https://www.darkreading.com/edge-articles/hacker-pig-latin-a-base64-primer-for-security-analysts
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00218.warc.gz
en
0.899774
1,184
2.5625
3
The pulse dialing method was technically determined by how the rotary dial of the telephone works. When the caller picks up the receiver and operates the rotary dial, it disconnects the loop between the telephone and the exchange at a specific frequency and at defined intervals based on the number dialed. The analog ex...
<urn:uuid:c1e37c06-b0b8-441a-be75-96337e026102>
CC-MAIN-2022-40
https://www.nfon.com/en/get-started/cloud-telephony/lexicon/knowledge-base-detail/pulse-dialing
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335396.92/warc/CC-MAIN-20220929225326-20220930015326-00218.warc.gz
en
0.933407
303
3.09375
3
This article introduces a set of evasion techniques wherein malware takes advantage of running processes. These techniques fall under the broad category of malware evasion techniques known as process injection. Finding threats in running processes In the past, malware infections normally involved malicious processes th...
<urn:uuid:6d7d3233-74ef-49ba-8c61-7279b7fe0dd4>
CC-MAIN-2022-40
https://minerva-labs.com/blog/malware-evasion-memory-injection/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00218.warc.gz
en
0.906665
934
2.609375
3
There are some obvious and not-so-obvious overlaps among various “advanced computing” concepts. Before I describe some of the inter-relationships among these concepts, it would be helpful to level-set the general definitions: Classical Computing: is the form of data storage and analysis utilizing transistors in integra...
<urn:uuid:15456b92-ced2-4577-ab2b-4069870959f1>
CC-MAIN-2022-40
https://quantumtech.blog/2022/02/22/at-the-intersection-of-quantum-computing-artificial-intelligence-and-machine-learning/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00218.warc.gz
en
0.923902
2,052
3.453125
3
Every single time a terror attack happens somewhere in the world, we gasp, sigh and think “Why did this happen?” Is there really no way this could have been prevented? Be it the recent tragedy in Sri Lanka, countless school shootings in US (that have become so commonplace that we have lost count), suicide bombings,...
<urn:uuid:35ea0fc9-d76c-435c-9d0e-0fafd9eb22a2>
CC-MAIN-2022-40
https://www.clovity.com/blog/agile-security-and-crime-prevention/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00218.warc.gz
en
0.937427
1,578
2.765625
3
It looks like a regular roof, but the top of the Packard Electrical Engineering Building at Stanford University has been the setting of many milestones in the development of an innovative cooling technology that could someday be part of our everyday lives. Since 2013, Shanhui Fan, professor of electrical engineering, a...
<urn:uuid:465c0d80-8840-45ae-8439-d38049b67f21>
CC-MAIN-2022-40
https://debuglies.com/2017/09/08/cooling-system-works-without-electricity/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00218.warc.gz
en
0.952708
1,187
3.484375
3
The IT security researchers at deep learning cybersecurity firm Deep Instinct have discovered a sophisticated malware in the wild targeting Microsoft’s Windows-based computers. Adding devices to Botnet The malware works in such a way that upon infecting, it allows hackers to take over the device and make it part of a b...
<urn:uuid:1f76a81e-182c-4bd1-a1cd-a60bf6c11845>
CC-MAIN-2022-40
https://debuglies.com/2018/06/25/mylobot-malware-turning-windows-devices-into-botnet/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00218.warc.gz
en
0.927503
508
2.515625
3
If left untreated, it can cause serious and potentially life-threatening damage to the liver over many years. Today, with the help of modern treatments it’s usually possible to cure the infection, and most people with it will have a normal life expectancy. An estimated 1 percent of the world population is chronically i...
<urn:uuid:d1f3e524-9e99-43a9-ad1a-a0a0adeec0e0>
CC-MAIN-2022-40
https://debuglies.com/2018/11/14/research-shows-persisting-fears-about-hiv-infection-may-impact-testing-uptake-for-the-hepatitis-c-virus-hcv/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00218.warc.gz
en
0.924848
651
3.453125
3
With warnings of increased cyber scams related to the Coronavirus and many people working at home, it’s a good time to remember the cybersecurity basics. Learn these 16 tips to help better protect yourself and your loved ones from scams. Passwords and Email - Use strong passwords - The Federal Trade Commission (FTC) ad...
<urn:uuid:7e95b524-ef38-4713-a2b1-fe8aa3601f66>
CC-MAIN-2022-40
https://www.idwatchdog.com/cybersecurity-checkup
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00418.warc.gz
en
0.900686
925
3.015625
3
Recently, the US Securities and Exchange Commission (SEC) offered both a view and a reminder on release of data related to climate change impact. The interpretation is located at: For businesses, this means a greater focus on carbon impact and greenhouse gas emissions. For data center owners, it goes beyond efficiency ...
<urn:uuid:1021c269-0f38-4a6b-947e-88efd8e9985f>
CC-MAIN-2022-40
https://avoa.com/2010/02/16/u-s-sec-views-on-disclosure-bring-focus-to-carbon-impact/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00418.warc.gz
en
0.94304
185
2.59375
3
The Internet of Things (IoT), which connects medical equipment and apps to the healthcare IT system, has been driving the expansion of wearable devices in the healthcare business, which is now known as the Internet of Health Things (IoHT). In medical equipment, the Internet of Things entails machine-to-machine (M2M) co...
<urn:uuid:8ff7bc79-29f5-4f91-b9f8-fcfa5374ca69>
CC-MAIN-2022-40
https://www.iotavenue.com/ai-based-wearables-helpful-for-the-healthcare-industry
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00418.warc.gz
en
0.93995
1,635
3.109375
3
As data drives more and more of the modern economy, data governance and data management are racing to keep up with an ever-expanding range of requirements, constraints and opportunities. It is a little like a data version of the Cambrian Explosion, where data-centricity is giving rise to a rich variety of practices, ea...
<urn:uuid:39b6a360-21a6-4b35-919b-d6e0c5944216>
CC-MAIN-2022-40
https://www.alation.com/blog/defining-data-acquisition-and-why-it-matters/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337473.26/warc/CC-MAIN-20221004023206-20221004053206-00418.warc.gz
en
0.953691
1,136
2.59375
3
Scientists around the world are inspired by the brain and strive to mimic its abilities in the development of technology. Our research team at IBM Research Europe in Zurich shares this fascination and took inspiration from the cerebral attributes of neuronal circuits like hyperdimensionality to create a novel in-memory...
<urn:uuid:322dfdf4-3690-4d25-82da-67a401b112e7>
CC-MAIN-2022-40
https://www.ibm.com/blogs/research/2020/06/in-memory-hyperdimensional-computing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00418.warc.gz
en
0.92989
1,779
3.84375
4
AI mistakes? How could this happen? Aug 10, 2018 AI perceives its environment and takes actions that maximize the probability of successfully achieving its goals. This does not ensure success (the correct answer). This is a common misconception. AI-based systems will produce some wrong answers. AI, much like natural in...
<urn:uuid:bbbcde5c-5ee4-4c75-851b-fcc3fca6e5c9>
CC-MAIN-2022-40
https://www.asranalytics.com/about-asr/blog/2018/08/ai-mistakes-how-could-happen
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00618.warc.gz
en
0.940694
505
3.328125
3
Microsoft ended support for XP last year but there are probably millions of computers out there, in homes and offices that are still running the operating system. How many computers do you see running Vista, the OS that was intended to succeed XP? Vista was buggy, unreliable, and a massively flawed product. Nobody like...
<urn:uuid:5971300a-f298-4d50-930c-32d10fed6b4d>
CC-MAIN-2022-40
https://www.itexchangeweb.com/blog/quality-assurance-vs-quality-control-why-you-need-both-in-software-development/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335286.15/warc/CC-MAIN-20220928212030-20220929002030-00618.warc.gz
en
0.952298
1,057
2.953125
3
Editor’s Note: This post was originally published August 2021 and has been updated for accuracy and comprehensiveness. If you’re anything like me, you have probably fallen into the field of digital forensics (check out my Kicking and Screaming blog to learn more). You may be the semi-technical expert on your team or ju...
<urn:uuid:da553231-365e-417a-8b47-a12454f8de61>
CC-MAIN-2022-40
https://www.grayshift.com/what-is-digital-forensics/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335444.58/warc/CC-MAIN-20220930051717-20220930081717-00618.warc.gz
en
0.924681
1,465
2.71875
3
Critical Alert: Multiple Vulnerabilities in PHP Could Allow for Arbitrary Code Execution Description: Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code. PHP is a programming language originally designed for use in web-based applications with...
<urn:uuid:d64cc859-b69e-412c-9f18-b3884c23371d>
CC-MAIN-2022-40
https://www.cirt.gov.bd/critical-alert-multiple-vulnerabilities-in-php-could-allow-for-arbitrary-code-execution/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00618.warc.gz
en
0.823961
395
2.59375
3
Understanding the RAMBleed Exploit [cylance] Side-channel attacks are some of the scariest exploits ever. They don’t usually exploit vulnerabilities in code, they exploit the fundamental implementation of computer systems themselves. Therefore, they’re often hardware-based. Dynamic random-access memory, or DRAM for sho...
<urn:uuid:cf4e292d-1c29-4437-9970-dedaa0368185>
CC-MAIN-2022-40
https://www.cirt.gov.bd/understanding-the-rambleed-exploit-cylance/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00618.warc.gz
en
0.943228
604
3
3
The national lab is developing more energy-efficient motors to improve the endurance of legged robots used in disaster response. Steve Buerger is leading a Sandia National Laboratories project to demonstrate energy-efficient biped robots. Increased efficiency could enable bots to operate for much longer periods of time...
<urn:uuid:92e527e1-e0a5-493b-b09d-e364d05973b6>
CC-MAIN-2022-40
https://fcw.com/2014/12/sandia-looks-to-open-source-robot-tech/254881/?oref=fcw-next-story
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337631.84/warc/CC-MAIN-20221005140739-20221005170739-00618.warc.gz
en
0.914649
463
2.8125
3
It’s been three months since the world was shaken by the brutal murder of George Floyd. The image of a white police officer kneeling on a black citizen for 8 minutes and 46 seconds are still fresh in America’s collective memory. This wasn’t the first case of racially-charged police brutality in the US. And unfortunatel...
<urn:uuid:60035a2a-e50e-4577-b2ae-a2949c874790>
CC-MAIN-2022-40
https://www.iotforall.com/artificial-intelligence-the-next-front-of-the-fight-against-institutional-racism
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00618.warc.gz
en
0.95671
1,295
2.796875
3
A student may not need a loan until they attend college. Therefore, a student signs up for a loan through the Federal Government or a private bank. Unfortunately, he or she learns that there is an existing loan in their name. Then the student finds out they are an identity theft victim. Identity theft in education affe...
<urn:uuid:cff93647-9a3d-4452-8987-3e7d6f741387>
CC-MAIN-2022-40
https://www.electronicverificationsystems.com/blog/the-effects-of-education-identity-fraud
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00018.warc.gz
en
0.972556
281
3.015625
3
Two decades ago, Brain, the first boot sector virus which infected personal computers via the floppy disk, was detected. While Brain itself was relatively harmless, it marked the genesis of the world of computer viruses. This year marks the 20th year of the existence of viruses after Brain was detected on January 19, 1...
<urn:uuid:ecec680b-88cf-433d-aebb-5cee3e3aa409>
CC-MAIN-2022-40
https://www.itworldcanada.com/article/jan-06-20th-anniversary-of-virus-menace/4903
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00018.warc.gz
en
0.958933
478
2.921875
3
Key things you didn't know about phishing Phishing is one of the most common forms of cyberattack, fooling people into thinking they're dealing with a trusted organization in order to get them to part with credentials. But what are the hallmarks of a phishing attack? Atlas VPN has collected some phishy statistics to fi...
<urn:uuid:4d0172bb-cf79-43e0-9811-c46c105baf21>
CC-MAIN-2022-40
https://betanews.com/2022/08/01/key-things-you-didnt-know-about-phishing/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335058.80/warc/CC-MAIN-20220927194248-20220927224248-00018.warc.gz
en
0.936304
353
2.578125
3
IBM AND Duke University Team to Study Heart Disease Duke University researchers will utilize a powerful IBM SP supercomputer to create models of the heart that they hope will lead to uncovering causes and developing treatments for life-threatening heart conditions. Relying on the same IBM technology used in the U.S. En...
<urn:uuid:9f65a564-2f49-4049-8747-533571a8296e>
CC-MAIN-2022-40
https://esj.com/articles/2000/11/13/ibm-and-duke-university-team-to-study-heart-disease.aspx
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335058.80/warc/CC-MAIN-20220927194248-20220927224248-00018.warc.gz
en
0.875496
444
3.4375
3
Routing, a term commonly used in networking, is the process of selecting the most optimal path for a data packet to travel across networks. Broadly speaking, routing can be static or dynamic. In static routing, the route for a data packet is configured manually or entered each time a data packet travels across networks...
<urn:uuid:cca86a79-4904-4692-aa21-a7cbb987a1a2>
CC-MAIN-2022-40
https://www.ittsystems.com/add-static-route-using-powershell-cmdlet/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335469.40/warc/CC-MAIN-20220930113830-20220930143830-00018.warc.gz
en
0.918586
2,048
4.03125
4
Jens Stoltenberg, NATO secretary-general, wrote that cyber-attacks “can affect every one of us”. The official mentioned that “For NATO, a serious cyber-attack could trigger Article 5 of our founding treaty. This is our collective defense commitment where an attack against one ally is treated as an attack against all.” ...
<urn:uuid:96630b8f-5e8e-471b-984d-b3674880489b>
CC-MAIN-2022-40
https://blog.bit-guardian.com/nato-cyber-attacks-to-trigger-article-5/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00018.warc.gz
en
0.964527
331
2.890625
3
“What exactly is a data scientist?” This question is increasingly on the minds of many in the tech world today. The mix of skills needed to be called a “data scientist” is still very much a work in progress—however, the role may not be as new as you think. A recent Harvard Business Review article made more than a few h...
<urn:uuid:c7bcaa2f-4934-43e8-8b0f-13ab4488ecb4>
CC-MAIN-2022-40
https://www.cio.com/article/286599/data-management-data-scientist-role-is-clear-even-if-job-description-isn-t.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00018.warc.gz
en
0.94182
1,513
2.640625
3
SARS-COV-2 is a biological enemy, but the COVID-19 pandemic can be — and actually has been — fought with digital measures. Advanced analytics and data management made it possible to track the way coronavirus is spreading, know its tactics, its structure, and the way its features make it so efficient and dangerous. Ther...
<urn:uuid:074c6338-14ae-45c0-b7e8-450efaa8b48c>
CC-MAIN-2022-40
https://candf.com/articles/data-driven-life-science-understanding-the-pandemic-through-data/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00218.warc.gz
en
0.950835
1,365
2.859375
3
Royals and espionage have gone together ever since Sun Tzu’s identification to his royal masters in the 4th century BC, of the three different types of intelligence agents he deemed necessary for subsequent military success. In the centuries since, we have seen Julius Caesar’s creation of a spy network to keep track of...
<urn:uuid:4b1e2e76-a726-468a-8b8f-25060c0eeb53>
CC-MAIN-2022-40
https://kcsgroup.com/a-right-royal-case-of-espionage/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00218.warc.gz
en
0.982902
843
2.765625
3
Virtualization has been transforming IT infrastructure strategies. It began with server virtualization. Establishing virtual machines within single systems allowed one server to host dozens of applications, changing the way data centers operate by allowing apps to use system resources on an as-needed basis. This proces...
<urn:uuid:b852ea89-cc40-445a-90f8-b8f97066bc35>
CC-MAIN-2022-40
https://www.bcmone.com/blog/software-defined-networking-transforming-wan-capabilities/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334912.28/warc/CC-MAIN-20220926144455-20220926174455-00218.warc.gz
en
0.929846
1,041
2.578125
3
As more IT functions are moved offshore to developing countries, there are ways for IT workers in developed countries to improve their chances of staying employed, according to a report from the Association for Computing Machinery (ACM). Savvy students and IT workers already know they should obtain a strong educational...
<urn:uuid:cb29f1c0-5e66-4865-b131-bc4c59ef2e9a>
CC-MAIN-2022-40
https://www.cio.com/article/256901/it-organization-staffing-how-to-save-it-jobs.html
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00218.warc.gz
en
0.958407
331
2.765625
3
Welcome to Terminology Tuesday! Where we explain some commonly misused or misunderstood terms and phrases! This week’s term is Operating System (sometimes referred to as OS). Operating systems (OS) are installed in nearly every consumer computer today. They’re needed to run other programs and applications that we’re fa...
<urn:uuid:33a9472f-7d18-4b61-a8fa-bc50c78df3d1>
CC-MAIN-2022-40
https://www.computerhardwareinc.com/terminology-tuesday-vol-1/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00218.warc.gz
en
0.965428
261
3.859375
4
Imagine two groups at war. One defends against every attack as it comes. The other anticipates threats before they happen. Which is more likely to win? The same thing can be said about cybersecurity. Responding to attacks as they happen is important, but it's even more vital to anticipate the inevitability of a cyberat...
<urn:uuid:9d999b17-0ad0-419e-8e0f-8a15c783c54c>
CC-MAIN-2022-40
https://www.cyberpolicy.com/cybersecurity-education/anticipation-the-best-weapon-against-cyber-attacks
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00218.warc.gz
en
0.948515
680
2.578125
3
A map as we know it does not tell the whole story; it’s missing classifications of what makes up the land such as water, types of forests, snow, grasslands, and so on. Interplay® can be used as a land classification system, able to clearly define boundaries between land classes. This can then be graphically mapped out ...
<urn:uuid:02a69167-2ef1-4430-b879-0451a04ce028>
CC-MAIN-2022-40
https://www.iterate.ai/use-cases/applications/landcover-classification?industry=&application=&force=
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00218.warc.gz
en
0.933855
284
2.5625
3
What is the Surface Web? Also known as the Visible Web “Lightnet”, or Indexed Web; Surface Web is everything that you can find on the regular World-Wide-Web. It contains the pages that are put under “Indexable” to be readily available to its searchers in any Search Engine’s Result Page. According to the worldwidewebsiz...
<urn:uuid:87bdb95b-d367-4bc9-8d26-e7bef0c2ff99>
CC-MAIN-2022-40
https://www.hitechnectar.com/blogs/introduction-surface-web-deep-dark-web/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335491.4/warc/CC-MAIN-20220930145518-20220930175518-00218.warc.gz
en
0.91741
874
3
3
If you have completed the first lesson of this course, you are well aware that personal data has no place in the public domain. So how does it end up there? There numerous ways, and not all are under your control. For example, a cybercriminal can steal information from the server of an online store or hotel if it is no...
<urn:uuid:ea62a692-f36f-4cdf-854e-4a360aa3a533>
CC-MAIN-2022-40
https://education.kaspersky.com/en/lesson/16/page/68
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336978.73/warc/CC-MAIN-20221001230322-20221002020322-00218.warc.gz
en
0.947574
587
3.453125
3
If you have your laptop, you can work from just about anywhere if there’s an internet connection to your company servers. Out on a sales call and need to log in to grab your proposal? Need to get to your email from home? Updating your project timelines while you’re waiting at the airport for your next flight? No proble...
<urn:uuid:e6fa9349-67d0-401b-87df-741909e6445e>
CC-MAIN-2022-40
https://www.accentonit.com/blog/remote-access-without-vpn-is-risky-business
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00218.warc.gz
en
0.925736
798
2.625
3
Some counters are configured to count a duration, rather than a number of events. Basically, it is incrementing by the number of active TBF, each second. For example : during 5s, the number of simultaneous DL TBF is: 5 TBF,4 TBF,5 TBF,6 TBF, 3 TBF Over this 5seconds, the counter will print : 5+4+5+6+3 = 23 seconds. Thi...
<urn:uuid:e7a6112f-3409-4fc7-90b5-23ef57122840>
CC-MAIN-2022-40
https://www.erlang.com/reply/69524/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00218.warc.gz
en
0.890343
224
3.015625
3
How long has AR/VR/Mixed Reality been around? Although VR, AR and MR have garnered more attention and gained more momentum in recent memory, the idea (and rudimentary executions) of these technologies has actually been around for more than 150 years. Some would say that panoramic paintings and stereoscopes are early in...
<urn:uuid:17568928-0bb6-4b11-97b8-c5721d3cd120>
CC-MAIN-2022-40
https://www.1623farnam.com/ar-vr-faq/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00218.warc.gz
en
0.935512
578
2.671875
3
Today’s tech can connect you with anyone, anywhere in the world. By the minute, our world is getting more connected and increasingly in tune with our modern, on-demand, on-the-go lifestyles. There are countless organizations and individuals alike responsible for the innovations fueling this transformation. As Father’s ...
<urn:uuid:29fcb288-54a5-412c-bd7e-30d7ba86b44b>
CC-MAIN-2022-40
https://www.beyondtrust.com/blog/entry/celebrating-the-forefathers-of-it
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00218.warc.gz
en
0.963005
1,200
2.640625
3
To celebrate her historic visit to Bletchley Park, the home of the Codebreakers of World War II, Her Majesty The Queen has issued a challenge to schoolkids: break a book of war-time ciphers. The Codebreakers worked in secret throughout World War II, intercepting and decoding encrypted German communications to aid the w...
<urn:uuid:e6245031-ff96-4d12-84c2-2c47022350e7>
CC-MAIN-2022-40
https://www.itproportal.com/2011/07/15/queen-launches-code-book-challenge/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00218.warc.gz
en
0.953135
354
2.625
3
New Physics AI Could Be a ‘Snowball that Causes a Quantum Computing Avalanche’ (NextWeb) Scientists in the quantum computing field may have found a eureka moment in recently published physics research conducted by an international team with representatives from Cornell, Harvard, Université Paris-Sud, Stanford, Universi...
<urn:uuid:8ebf64fd-f5e8-4933-9334-845545277358>
CC-MAIN-2022-40
https://www.insidequantumtechnology.com/news-archive/new-physics-ai-snowball-causes-quantum-computing-avalanche/
null
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00418.warc.gz
en
0.913606
337
2.90625
3